All Papers

There is also a more detailed view with abstracts, categories, math rendering, and timestamps.

2024/1867
Symmetric Twin Column Parity Mixers and their Applications
Hao Lei, Raghvendra Rohit, Guoxiao Liu, Jiahui He, Mohamed Rachidi, Keting Jia, Kai Hu, and Meiqin Wang
2024/1866
ARCHER: Architecture-Level Simulator for Side-Channel Analysis in RISC-V Processors
Asmita Adhikary, Abraham J. Basurto Becerra, Lejla Batina, Ileana Buhan, Durba Chatterjee, Senna van Hoek, and Eloi Sanfelix Gonzalez
2024/1865
Tightly-Secure Group Key Exchange with Perfect Forward Secrecy
Emanuele Di Giandomenico, Doreen Riepel, and Sven Schäge
2024/1864
Tweakable ForkCipher from Ideal Block Cipher
Sougata Mandal
2024/1863
Carbon Footprint Traction System Incorporated as Blockchain
Umut Pekel and Oguz Yayla
2024/1862
BatchZK: A Fully Pipelined GPU-Accelerated System for Batch Generation of Zero-Knowledge Proofs
Tao Lu, Yuxun Chen, Zonghui Wang, Xiaohang Wang, Wenzhi Chen, and Jiaheng Zhang
2024/1861
Another Lattice Attack Against an RSA-like Cryptosystem
George Teseleanu
2024/1860
Constructions of self-orthogonal codes and LCD codes from functions over finite fields
Sihem Mesnager and Ahmet SINAK
2024/1859
Fully Encrypted Machine Learning Protocol using Functional Encryption
Seungwan Hong, Jiseung Kim, Changmin Lee, and Minhye Seo
2024/1858
(In)Security of Threshold Fully Homomorphic Encryption based on Shamir Secret Sharing
Wonhee Cho, Jiseung Kim, and Changmin Lee
2024/1857
Access-Controlled Inner Product Function-Revealing Encryption
Ojaswi Acharya, Weiqi Feng, Roman Langrehr, and Adam O'Neill
2024/1856
"There's always another counter": Detecting Micro-architectural Attacks in a Probabilistically Interleaved Malicious/Benign Setting
Upasana Mandal, Rupali Kalundia, Nimish Mishra, Shubhi Shukla, Sarani Bhattacharya, and Debdeep Mukhopadhyay
2024/1855
Lova: A Novel Framework for Verifying Mathematical Proofs with Incrementally Verifiable Computation
Noel Elias
2024/1854
A Zero-Knowledge PCP Theorem
Tom Gur, Jack O'Connor, and Nicholas Spooner
2024/1853
Giant Does NOT Mean Strong: Cryptanalysis of BQTRU
Ali Raya, Vikas Kumar, Aditi Kar Gangopadhyay, and Sugata Gangopadhyay
2024/1852
Faster algorithms for isogeny computations over extensions of finite fields
Shiping Cai, Mingjie Chen, and Christophe Petit
2024/1851
Secure Transformer-Based Neural Network Inference for Protein Sequence Classification
Jingwei Chen, Linhan Yang, Chen Yang, Shuai Wang, Rui Li, Weijie Miao, Wenyuan Wu, Li Yang, Kang Wu, and Lizhong Dai
2024/1850
Single-trace side-channel attacks on MAYO exploiting leaky modular multiplication
Sönke Jendral and Elena Dubrova
2024/1849
A Linearisation Method for Identifying Dependencies in Differential Characteristics: Examining the Intersection of Deterministic Linear Relations and Nonlinear Constraints
Ling Sun
2024/1848
Non-Interactive Zero-Knowledge Proofs with Certified Deletion
Kasra Abbaszadeh and Jonathan Katz
2024/1847
Notions of Quantum Reductions and Impossibility of Statistical NIZK
Chuhan Lu and Nikhil Pappu
2024/1846
The LaZer Library: Lattice-Based Zero Knowledge and Succinct Proofs for Quantum-Safe Privacy
Vadim Lyubashevsky, Gregor Seiler, and Patrick Steuer
2024/1845
Single-Server Client Preprocessing PIR with Tight Space-Time Trade-off
Zhikun Wang and Ling Ren
2024/1844
KLaPoTi: An asymptotically efficient isogeny group action from 2-dimensional isogenies
Lorenz Panny, Christophe Petit, and Miha Stopar
2024/1843
Khatam: Reducing the Communication Complexity of Code-Based SNARKs
Hadas Zeilberger
2024/1842
Zero-Knowledge Location Privacy via Accurate Floating-Point SNARKs
Jens Ernstberger, Chengru Zhang, Luca Ciprian, Philipp Jovanovic, and Sebastian Steinhorst
2024/1841
Verifying Jolt zkVM Lookup Semantics
Carl Kwan, Quang Dao, and Justin Thaler
2024/1840
Ideal Pseudorandom Codes
Omar Alrabiah, Prabhanjan Ananth, Miranda Christ, Yevgeniy Dodis, and Sam Gunn
2024/1839
Cryptographically Secure Digital Consent
F. Betül Durak, Abdullah Talayhan, and Serge Vaudenay
2024/1838
Pushing the QAM method for finding APN functions further
Nadiia Ichanska, Simon Berg, Nikolay S. Kaleyski, and Yuyin Yu
2024/1837
A Query Reconstruction Attack on the Chase-Shen Substring-Searchable Symmetric Encryption Scheme
Zichen Gui, Kenneth G. Paterson, and Sikhar Patranabis
2024/1836
Symmetric Encryption on a Quantum Computer
David Garvin, Oleksiy Kondratyev, Alexander Lipton, and Marco Paini
2024/1835
Hybrid Zero-Knowledge from Garbled Circuits
Masayuki Abe, Miguel Ambrona, and Miyako Ohkubo
2024/1834
Scutum: Temporal Verification for Cross-Rollup Bridges via Goal-Driven Reduction
Yanju Chen, Juson Xia, Bo Wen, Kyle Charbonnet, Hongbo Wen, Hanzhi Liu, and Yu Feng
2024/1833
Private Neural Network Training with Packed Secret Sharing
Hengcheng Zhou
2024/1832
How to Delete Without a Trace: Certified Deniability in a Quantum World
Alper Çakan, Vipul Goyal, and Justin Raizes
2024/1831
Fast Two-party Threshold ECDSA with Proactive Security
Brian Koziel, S. Dov Gordon, and Craig Gentry
2024/1830
A Tight Analysis of GHOST Consistency
Peter Gaži, Zahra Motaqy, and Alexander Russell
2024/1829
Compiled Nonlocal Games from any Trapdoor Claw-Free Function
Kaniuar Bacho, Alexander Kulpe, Giulio Malavolta, Simon Schmidt, and Michael Walter
2024/1828
Classic McEliece Hardware Implementation with Enhanced Side-Channel and Fault Resistance
Peizhou Gan, Prasanna Ravi, Kamal Raj, Anubhab Baksi, and Anupam Chattopadhyay
2024/1827
OPTIMSM: FPGA hardware accelerator for Zero-Knowledge MSM
Xander Pottier, Thomas de Ruijter, Jonas Bertels, Wouter Legiest, Michiel Van Beirendonck, and Ingrid Verbauwhede
2024/1826
Cloning Games, Black Holes and Cryptography
Alexander Poremba, Seyoon Ragavan, and Vinod Vaikuntanathan
2024/1825
BrakingBase - a linear prover, poly-logarithmic verifier, field agnostic polynomial commitment scheme
Vineet Nair, Ashish Sharma, and Bhargav Thankey
2024/1824
Constructing Dembowski–Ostrom permutation polynomials from upper triangular matrices
Yuyin Yu, Yanbin Zheng, Yongqiang Li, and Jingang Liu
2024/1823
A Composability Treatment of Bitcoin's Transaction Ledger with Variable Difficulty
Juan Garay, Yun Lu, Julien Prat, Brady Testa, and Vassilis Zikas
2024/1822
Anonymous Public-Key Quantum Money and Quantum Voting
Alper Çakan, Vipul Goyal, and Takashi Yamakawa
2024/1821
SCIF: Privacy-Preserving Statistics Collection with Input Validation and Full Security
Jianan Su, Laasya Bangalore, Harel Berger, Jason Yi, Alivia Castor, Micah Sherr, and Muthuramakrishnan Venkitasubramaniam
2024/1820
On the Power of Oblivious State Preparation
James Bartusek and Dakshita Khurana
2024/1819
VCVio: A Formally Verified Forking Lemma and Fiat-Shamir Transform, via a Flexible and Expressive Oracle Representation
Devon Tuma and Nicholas Hopper
2024/1818
SoK: On the Physical Security of UOV-based Signature Schemes
Thomas Aulbach, Fabio Campos, and Juliane Krämer
2024/1817
Improved ML-DSA Hardware Implementation With First Order Masking Countermeasure
Kamal Raj, Prasanna Ravi, Tee Kiah Chia, and Anupam Chattopadhyay
2024/1816
Attacking Automotive RKE Security: How Smart are your ‘Smart’ Keys?
Ritul Satish, Alfred Daimari, Argha Chakrabarty, Kahaan Shah, and Debayan Gupta
2024/1815
Succinct Randomized Encodings from Non-compact Functional Encryption, Faster and Simpler
Nir Bitansky and Rachit Garg
2024/1814
SophOMR: Improved Oblivious Message Retrieval from SIMD-Aware Homomorphic Compression
Keewoo Lee and Yongdong Yeo
2024/1813
Revisiting Leakage-Resilient MACs and Succinctly-Committing AEAD: More Applications of Pseudo-Random Injections
Mustafa Khairallah
2024/1812
Batching Adaptively-Sound SNARGs for NP
Lalita Devadas, Brent Waters, and David J. Wu
2024/1811
Pseudorandom Function-like States from Common Haar Unitary
Minki Hhan and Shogo Yamada
2024/1810
Linear Proximity Gap for Reed-Solomon Codes within the 1.5 Johnson Bound
Yiwen Gao, Haibin Kan, and Yuan Li
2024/1809
Foundations of Adaptor Signatures
Paul Gerhart, Dominique Schröder, Pratik Soni, and Sri AravindaKrishnan Thyagarajan
2024/1808
Breaking BASS
Simon-Philipp Merz, Kenneth G. Paterson, and Àlex Rodríguez García
2024/1807
An Unstoppable Ideal Functionality for Signatures and a Modular Analysis of the Dolev-Strong Broadcast
Ran Cohen, Jack Doerner, Eysa Lee, Anna Lysyanskaya, and Lawrence Roy
2024/1806
Encrypted RAM Delegation: Applications to Rate-1 Extractable Arguments, Homomorphic NIZKs, MPC, and more
Abtin Afshar, Jiaqi Cheng, Rishab Goyal, Aayush Yadav, and Saikumar Yadugiri
2024/1805
Smoothing Parameter and Shortest Vector Problem on Random Lattices
Amaury Pouly and Yixin Shen
2024/1804
Quantum Chosen-Cipher Attack on Camellia
Yanjun Li, Qi Wang, DingYun Huang, Jian Liu, and Huiqin Xie
2024/1803
Siniel: Distributed Privacy-Preserving zkSNARK
Yunbo Yang, Yuejia Cheng, Kailun Wang, Xiaoguo Li, Jianfei Sun, Jiachen Shen, Xiaolei Dong, Zhenfu Cao, Guomin Yang, and Robert H. Deng
2024/1802
ColliderScript: Covenants in Bitcoin via 160-bit hash collisions
Ethan Heilman, Victor I. Kolobov, Avihu M. Levy, and Andrew Poelstra
2024/1801
Investigation of the Optimal Linear Characteristics of BAKSHEESH (Full Version)
Yuxuan Peng, Jinpeng Liu, and Ling Sun
2024/1800
Privacy-Preserving Multi-Party Search via Homomorphic Encryption with Constant Multiplicative Depth
Mihail-Iulian Pleşa and Ruxandra F. Olimid
2024/1799
Consensus Under Adversary Majority Done Right
Srivatsan Sridhar, Ertem Nusret Tas, Joachim Neu, Dionysis Zindros, and David Tse
2024/1798
Quantum One-Time Protection of any Randomized Algorithm
Sam Gunn and Ramis Movassagh
2024/1797
FLock: Robust and Privacy-Preserving Federated Learning based on Practical Blockchain State Channels
Ruonan Chen, Ye Dong, Yizhong Liu, Tingyu Fan, Dawei Li, Zhenyu Guan, Jianwei Liu, and Jianying Zhou
2024/1796
Isogeny interpolation and the computation of isogenies from higher dimensional representations
David Jao and Jeanne Laflamme
2024/1795
How Fast Does the Inverse Walk Approximate a Random Permutation?
Tianren Liu, Angelos Pelecanos, Stefano Tessaro, and Vinod Vaikuntanathan
2024/1794
How Much Public Randomness Do Modern Consensus Protocols Need?
Joseph Bonneau, Benedikt Bünz, Miranda Christ, and Yuval Efron
2024/1793
On the Jordan-Gauss graphs and new multivariate public keys
Vasyl Ustimenko, Tymoteusz Chojecki, and Aneta Wróblewska
2024/1792
Towards Explainable Side-Channel Leakage: Unveiling the Secrets of Microarchitecture
Ischa Stork, Vipul Arora, Łukasz Chmielewski, and Ileana Buhan
2024/1791
Discrete gaussian sampling for BKZ-reduced basis
Amaury Pouly and Yixin Shen
2024/1790
Revisiting subgroup membership testing on pairing-friendly curves via the Tate pairing
Yu Dai, Debiao He, Dmitrii Koshelev, Cong Peng, and Zhijian Yang
2024/1789
Stealth and Beyond: Attribute-Driven Accountability in Bitcoin Transactions
Alberto Maria Mongardini, Daniele Friolo, and Giuseppe Ateniese
2024/1788
Advanced Transparency System
Yuxuan Sun, Yuncong Hu, and Yu Yu
2024/1787
An Efficient and Secure Boolean Function Evaluation Protocol
Sushmita Sarkar, Vikas Srivastava, Tapaswini Mohanty, Nibedita Kundu, and Sumit Kumar Debnath
2024/1786
Black-Box Timed Commitments from Time-Lock Puzzles
Hamza Abusalah and Gennaro Avitabile
2024/1785
A General Quantum Duality for Representations of Groups with Applications to Quantum Money, Lightning, and Fire
John Bostanci, Barak Nehoran, and Mark Zhandry
2024/1784
Fine-Grained Non-Interactive Key-Exchange without Idealized Assumptions
Yuyu Wang, Chuanjie Su, and Jiaxin Pan
2024/1783
PriSrv: Privacy-Enhanced and Highly Usable Service Discovery in Wireless Communications
Yang Yang, Robert H. Deng, Guomin Yang, Yingjiu Li, HweeHwa Pang, Minming Huang, Rui Shi, and Jian Weng
2024/1782
Is Periodic Pseudo-randomization Sufficient for Beacon Privacy?
Liron David, Avinatan Hassidim, Yossi Matias, and Moti Yung
2024/1781
New results in Share Conversion, with applications to evolving access structures
Tamar Ben David, Varun Narayanan, Olga Nissenbaum, and Anat Paskin-Cherniavsky
2024/1780
ABE for Circuits with $\mathsf{poly}(\lambda)$-sized Keys from LWE
Valerio Cini and Hoeteck Wee
2024/1779
Ciphertext-Policy ABE from Inner-Product FE
Ahmad Khoureich Ka
2024/1778
Construction of quadratic APN functions with coefficients in $\mathbb{F}_2$ in dimensions $10$ and $11$
Yuyin Yu, Jingchen Li, Nadiia Ichanska, and Nikolay Kaleyski
2024/1777
Masking Gaussian Elimination at Arbitrary Order, with Application to Multivariate- and Code-Based PQC
Quinten Norga, Suparna Kundu, Uttam Kumar Ojha, Anindya Ganguly, Angshuman Karmakar, and Ingrid Verbauwhede
2024/1776
An efficient collision attack on Castryck-Decru-Smith’s hash function
Ryo Ohashi and Hiroshi Onuki
2024/1775
zkMarket : Privacy-preserving Digital Data Trade System via Blockchain
Seungwoo Kim, Semin Han, Seongho Park, Kyeongtae Lee, Jihye Kim, and Hyunok Oh
2024/1774
PANTHER: Private Approximate Nearest Neighbor Search in the Single Server Setting
Jingyu Li, Zhicong Huang, Min Zhang, Jian Liu, Cheng Hong, Tao Wei, and Wenguang Chen
2024/1773
Universal Adaptor Signatures from Blackbox Multi-Party Computation
Michele Ciampi, Xiangyu Liu, Ioannis Tzannetos, and Vassilis Zikas
2024/1772
Byte-wise equal property of ARADI
Sunyeop Kim, Insung Kim, Dongjae Lee, Deukjo Hong, Jaechul Sung, and Seokhie Hong
2024/1771
PRIME: Differentially Private Distributed Mean Estimation with Malicious Security
Laasya Bangalore, Albert Cheu, and Muthuramakrishnan Venkitasubramaniam
2024/1770
Improved Attacks for SNOVA by Exploiting Stability under a Group Action
Daniel Cabarcas, Peigen Li, Javier Verbel, and Ricardo Villanueva-Polanco
2024/1769
A Closer Look at Falcon
Phillip Gajland, Jonas Janneck, and Eike Kiltz
2024/1768
Push-Button Verification for BitVM Implementations
Hanzhi Liu, Jingyu Ke, Hongbo Wen, Robin Linus, Lukas George, Manish Bista, Hakan Karakuş, Domo, Junrui Liu, Yanju Chen, and Yu Feng
2024/1767
ECPM Cryptanalysis Resource Estimation
Dedy Septono Catur Putranto, Rini Wisnu Wardhani, Jaehan Cho, and Howon Kim
2024/1766
Critical Round in Multi-Round Proofs: Compositions and Transformation to Trapdoor Commitments
Masayuki Abe, David Balbás, Dung Bui, Miyako Ohkubo, Zehua Shang, and Mehdi Tibouchi
2024/1765
Compact and Tightly Secure (Anonymous) IBE from Module LWE in the QROM
Toi Tomita and Junji Shikata
2024/1764
Fully Homomorphic Encryption with Efficient Public Verification
Mi-Ying (Miryam) Huang, Baiyu Li, Xinyu Mao, and Jiapeng Zhang
2024/1763
Quantum Black-Box Separations: Succinct Non-Interactive Arguments from Falsifiable Assumptions
Gorjan Alagic, Dana Dachman-Soled, Manasi Shingane, and Patrick Struck
2024/1762
Homomorphic Matrix Operations under Bicyclic Encoding
Jingwei Chen, Linhan Yang, Wenyuan Wu, Yang Liu, and Yong Feng
2024/1761
Resilience-Optimal Lightweight High-threshold Asynchronous Verifiable Secret Sharing
Hao Cheng, Jiliang Li, Yizhong Liu, Yuan Lu, Weizhi Meng, and Zhenfeng Zhang
2024/1760
Somewhat Homomorphic Encryption from Linear Homomorphism and Sparse LPN
Henry Corrigan-Gibbs, Alexandra Henzinger, Yael Kalai, and Vinod Vaikuntanathan
2024/1759
A Forgery Attack on a Code-based Signature Scheme
Ali Babaei and Taraneh Eghlidos
2024/1758
A comprehensive analysis of Regev's quantum algorithm
Razvan Barbulescu, Mugurel Barcau, and Vicentiu Pasol
2024/1757
On the Sample Complexity of Linear Code Equivalence for all Code Rates
Alessandro Budroni and Andrea Natale
2024/1756
$\mathsf{Graphiti}$: Secure Graph Computation Made More Scalable
Nishat Koti, Varsha Bhat Kukkala, Arpita Patra, and Bhavish Raj Gopal
2024/1755
Exponential sums in linear cryptanalysis
Tim Beyne and Clémence Bouvier
2024/1754
PQNTRU: Acceleration of NTRU-based Schemes via Customized Post-Quantum Processor
Zewen Ye, Junhao Huang, Tianshun Huang, Yudan Bai, Jinze Li, Hao Zhang, Guangyan Li, Donglong Chen, Ray C.C. Cheung, and Kejie Huang
2024/1753
HTCNN: High-Throughput Batch CNN Inference with Homomorphic Encryption for Edge Computing
Zewen Ye, Tianshun Huang, Tianyu Wang, Yonggen Li, Chengxuan Wang, Ray C.C. Cheung, and Kejie Huang
2024/1752
DEEP Commitments and Their Applications
Alan Szepieniec
2024/1751
Offline-Online Indifferentiability of Cryptographic Systems
Ashrujit Ghoshal, Ilan Komargodski, and Gil Segev
2024/1750
Robust Double Auctions for Resource Allocation
Arthur Lazzaretti, Charalampos Papamanthou, and Ismael Hishon-Rezaizadeh
2024/1749
Revisiting the “improving the security of multi-party quantum key agreement with five- qubit Brown states”
Yu-Yuan Chou, Hsien-Hung Liu, and Jue-Sam Chou
2024/1748
New Experimental Evidences For the Riemann Hypothesis
Zhengjun Cao
2024/1747
POMS : Proxy Offloading for Multicloud Storage with Keyword Search
Adam Oumar Abdel-Rahman, Sofiane Azogagh, Zelma Aubin Birba, and Arthur Tran Van
2024/1746
Secure and Privacy-preserving CBDC Offline Payments using a Secure Element
Elli Androulaki, Angelo De Caro, Kaoutar El Khiyaoui, Romain Gay, Rebekah Mercer, and Alessandro Sorniotti
2024/1745
Pseudorandomness in the (Inverseless) Haar Random Oracle Model
Prabhanjan Ananth, John Bostanci, Aditya Gulati, and Yao-Ting Lin
2024/1744
PEARL-SCALLOP: Parameter Extension Applicable in Real-Life SCALLOP
Bill Allombert, Jean-François Biasse, Jonathan Komada Eriksen, Péter Kutas, Chris Leonardi, Aurel Page, Renate Scheidler, and Márton Tot Bagi
2024/1743
The Window Heuristic: Automating Differential Trail Search in ARX Ciphers with Partial Linearization Trade-offs
Emanuele Bellini, David GERAULT, Juan Grados, and Thomas Peyrin
2024/1742
Pseudorandom Obfuscation and Applications
Pedro Branco, Nico Döttling, Abhishek Jain, Giulio Malavolta, Surya Mathialagan, Spencer Peters, and Vinod Vaikuntanathan
2024/1741
The Learning Stabilizers with Noise problem
Alexander Poremba, Yihui Quek, and Peter Shor
2024/1740
OpenNTT: An Automated Toolchain for Compiling High-Performance NTT Accelerators in FHE
Florian Krieger, Florian Hirner, Ahmet Can Mert, and Sujoy Sinha Roy
2024/1739
Provably Robust Watermarks for Open-Source Language Models
Miranda Christ, Sam Gunn, Tal Malkin, and Mariana Raykova
2024/1738
More Efficient Isogeny Proofs of Knowledge via Canonical Modular Polynomials
Thomas den Hollander, Sören Kleine, Marzio Mula, Daniel Slamanig, and Sebastian A. Spindler
2024/1737
Embedded Curves and Embedded Families for SNARK-Friendly Curves
Aurore Guillevic and Simon Masson
2024/1736
A graph-theoretic approach to analyzing decoding failures of BIKE
Sarah Arpin, Tyler Raven Billingsley, Daniel Rayor Hast, Jun Bo Lau, Ray Perlner, and Angela Robinson
2024/1735
The Mysteries of LRA: Roots and Progresses in Side-channel Applications
Jiangshan Long, Changhai Ou, Zhu Wang, and Fan Zhang
2024/1734
Optimizing Message Range and Ciphertext Storage in GSW Encryption Using CRT and PVW-like Compression Scheme
Kung-Wei Hu, Huan-Chih Wang, and Ja-Ling Wu
2024/1733
One Time Pad and the Short Key Dream
Umberto Cerruti
2024/1732
Radical 2-isogenies and cryptographic hash functions in dimensions 1, 2 and 3
Sabrina Kunzweiler, Luciano Maino, Tomoki Moriya, Christophe Petit, Giacomo Pope, Damien Robert, Miha Stopar, and Yan Bo Ti
2024/1731
Arc: Accumulation for Reed--Solomon Codes
Benedikt Bünz, Pratyush Mishra, Wilson Nguyen, and William Wang
2024/1730
Secure and Efficient Outsourced Matrix Multiplication with Homomorphic Encryption
Aikata Aikata and Sujoy Sinha Roy
2024/1729
cuTraNTT: A Novel Transposed Number Theoretic Transform Targeting Low Latency Homomorphic Encryption for IoT Applications
Supriya Adhikary, Wai Kong Lee, Angshuman Karmakar, Yongwoo Lee, Seong Oun Hwang, and Ramachandra Achar
2024/1728
On Key Substitution Attacks against Aggregate Signatures and Multi-Signatures
Yuuki Fujita, Yusuke Sakai, Kyosuke Yamashita, and Goichiro Hanaoka
2024/1727
(Quantum) Indifferentiability and Pre-Computation
Joseph Carolan, Alexander Poremba, and Mark Zhandry
2024/1726
Certified Randomness implies Secure Classical Position-Verification
Omar Amer, Kaushik Chakraborty, David Cui, Fatih Kaleoglu, Charles Lim, Minzhao Liu, and Marco Pistoia
2024/1725
PISA: Privacy-Preserving Smart Parking
Sayon Duttagupta and Dave Singelée
2024/1724
Straight-Line Knowledge Extraction for Multi-Round Protocols
Lior Rotem and Stefano Tessaro
2024/1723
Proving the Security of the Extended Summation-Truncation Hybrid
Avijit Dutta and Eik List
2024/1722
Revisiting Fermat's Factorization Method
Gajraj Kuldeep and Rune Hylsberg Jacobsen
2024/1721
An Efficient Noncommutative NTRU from Semidirect Product
Vikas Kumar, Ali Raya, Aditi Kar Gangopadhyay, Sugata Gangopadhyay, and Md Tarique Hussain
2024/1720
Pseudorandom Multi-Input Functional Encryption and Applications
Shweta Agrawal, Simran Kumari, and Shota Yamada
2024/1719
Compact Pseudorandom Functional Encryption from Evasive LWE
Shweta Agrawal, Simran Kumari, and Shota Yamada
2024/1718
Drifting Towards Better Error Probabilities in Fully Homomorphic Encryption Schemes
Olivier Bernard, Marc Joye, Nigel P. Smart, and Michael Walter
2024/1717
Practical Asynchronous MPC from Lightweight Cryptography
Atsuki Momose
2024/1716
Rate-1 Statistical Non-Interactive Zero-Knowledge
Pedro Branco, Nico Döttling, and Akshayaram Srinivasan
2024/1715
OT-PCA: New Key-Recovery Plaintext-Checking Oracle Based Side-Channel Attacks on HQC with Offline Templates
Haiyue Dong and Qian Guo
2024/1714
Theoretical Approaches to Solving the Shortest Vector Problem in NP-Hard Lattice-Based Cryptography with Post-SUSY Theories of Quantum Gravity in Polynomial Time
Trevor Nestor
2024/1713
Universally Composable Non-Interactive Zero-Knowledge from Sigma Protocols via a New Straight-line Compiler
Megan Chen, Pousali Dey, Chaya Ganesh, Pratyay Mukherjee, Pratik Sarkar, and Swagata Sasmal
2024/1712
Low-Communication Updatable PSI from Asymmetric PSI and PSU
Guowei Ling, Peng Tang, and Weidong Qiu
2024/1711
Good things come to those who wait: Dishonest-Majority Coin-Flipping Requires Delay Functions
Joseph Bonneau, Benedikt Bünz, Miranda Christ, and Yuval Efron
2024/1710
$\widetilde{\mbox{O}}$ptimal Adaptively Secure Hash-based Asynchronous Common Subset
Hanwen Feng, Zhenliang Lu, and Qiang Tang
2024/1709
Do Not Disturb a Sleeping Falcon: Floating-Point Error Sensitivity of the Falcon Sampler and Its Consequences
Xiuhan Lin, Mehdi Tibouchi, Yang Yu, and Shiduo Zhang
2024/1708
Subliminal Encrypted Multi-Maps and Black-Box Leakage Absorption
Amine Bahi, Seny Kamara, Tarik Moataz, and Guevara Noubir
2024/1707
CountCrypt: Quantum Cryptography between QCMA and PP
Eli Goldin, Tomoyuki Morimae, Saachi Mutreja, and Takashi Yamakawa
2024/1706
State of the art of HFE variants Is it possible to repair HFE with appropriate perturbations?
Benoit COGLIATI, Gilles Macariot-Rat, Jacques Patarin, and Pierre Varjabedian
2024/1705
Dumbo-MPC: Efficient Fully Asynchronous MPC with Optimal Resilience
Yuan Su, Yuan Lu, Jiliang Li, Yuyi Wang, Chengyi Dong, and Qiang Tang
2024/1704
From One-Time to Two-Round Reusable Multi-Signatures without Nested Forking
Lior Rotem, Gil Segev, and Eylon Yogev
2024/1703
Free-XOR Gate Bootstrapping
Chunling Chen, Xianhui Lu, Ruida Wang, Zhihao Li, Xuan Shen, and Benqiang Wei
2024/1702
Secure and efficient transciphering for FHE-based MPC
Diego F. Aranha, Antonio Guimarães, Clément Hoffmann, and Pierrick Méaux
2024/1701
Secure Computation with Parallel Calls to 2-ary Functions
Varun Narayanan, Shubham Vivek Pawar, and Akshayaram Srinivasan
2024/1700
Does quantum lattice sieving require quantum RAM?
Beomgeun Cho, Minki Hhan, Taehyun Kim, Jeonghoon Lee, and Yixin Shen
2024/1699
HADES: Range-Filtered Private Aggregation on Public Data
Xiaoyuan Liu, Ni Trieu, Trinabh Gupta, Ishtiyaque Ahmad, and Dawn Song
2024/1698
Computational Analysis of Plausibly Post-Quantum-Secure Recursive Arguments of Knowledge
Dustin Ray and Paulo L. Barreto
2024/1697
On pairing-friendly 2-cycles and SNARK-friendly 2-chains of elliptic curves containing a curve from a prime-order family
Tomáš Novotný
2024/1696
Revisiting the Robustness of (R/M)LWR under Polynomial Moduli with Applications to Lattice-Based Compact SO-CCA Security
Haoxiang Jin, Feng-Hao Liu, Zhedong Wang, Yang Yu, and Dawu Gu
2024/1695
Discrete Gaussians Modulo Sub-Lattices: New Leftover Hash Lemmas for Discrete Gaussians
Haoxiang Jin, Feng-Hao Liu, Zhedong Wang, and Dawu Gu
2024/1694
Full Key-Recovery Cubic-Time Template Attack on Classic McEliece Decapsulation
Vlad-Florin Drăgoi, Brice Colombier, Nicolas Vallet, Pierre-Louis Cayrel, and Vincent Grosso
2024/1693
A notion on S-boxes for a partial resistance to some integral attacks
Claude Carlet
2024/1692
On the practicality of quantum sieving algorithms for the shortest vector problem
Joao F. Doriguello, George Giapitzakis, Alessandro Luongo, and Aditya Morolia
2024/1691
A Framework for Group Action-Based Multi-Signatures and Applications to LESS, MEDS, and ALTEQ
Giuseppe D'Alconzo, Andrea Flamini, Alessio Meneghetti, and Edoardo Signorini
2024/1690
A Note on Security Definitions for Secret Sharing with Certified Deletion
Dominique Bazin and Ryo Nishimaki
2024/1689
Homomorphic Encryption with Authority
Joohee Lee and Joon-Woo Lee
2024/1688
Revisiting Products of the Form $X$ Times a Linearized Polynomial $L(X)$
Christof Beierle
2024/1687
Revocable Encryption, Programs, and More: The Case of Multi-Copy Security
Prabhanjan Ananth, Saachi Mutreja, and Alexander Poremba
2024/1686
Circular Insecure Encryption: from Long Cycles to Short Cycles
Zehou Wu
2024/1685
GAPP: Generic Aggregation of Polynomial Protocols
Chaya Ganesh, Sikhar Patranabis, Shubh Prakash, and Nitin Singh
2024/1684
Blind zkSNARKs for Private Proof Delegation and Verifiable Computation over Encrypted Data
Mariana Gama, Emad Heydari Beni, Jiayi Kang, Jannik Spiessens, and Frederik Vercauteren
2024/1683
Unclonable Functional Encryption
Arthur Mehta and Anne Müller
2024/1682
Toward Optimal-Complexity Hash-Based Asynchronous MVBA with Optimal Resilience
Jovan Komatovic, Joachim Neu, and Tim Roughgarden
2024/1681
Another L makes it better? Lagrange meets LLL and may improve BKZ pre-processing
Sebastien Balny, Claire Delaplace, and Gilles Dequen
2024/1680
Sunfish: Reading Ledgers with Sparse Nodes
Giulia Scaffino, Karl Wüst, Deepak Maram, Alberto Sonnino, and Lefteris Kokoris-Kogias
2024/1679
Information Set Decoding for Ring-Linear Code
Giulia Cavicchioni, Alessio Meneghetti, and Giovanni Tognolini
2024/1678
Commutative Cryptanalysis as a Generalization of Differential Cryptanalysis
Jules Baudrin, Christof Beierle, Patrick Felke, Gregor Leander, Patrick Neumann, Léo Perrin, and Lukas Stennes
2024/1677
Batch Range Proof: How to Make Threshold ECDSA More Efficient
Guofeng Tang, Shuai Han, Li Lin, Changzheng Wei, and Ying Yan
2024/1676
The Sting Framework: Proving the Existence of Superclass Adversaries
Mahimna Kelkar, Yunqi Li, Nerla Jean-Louis, Carolina Ortega Pérez, Kushal Babel, Andrew Miller, and Ari Juels
2024/1675
Testing Robustness of Homomorphically Encrypted Split Model LLMs
Lars Wolfgang Folkerts and Nektarios Georgios Tsoutsos
2024/1674
Provable Security Analysis of Butterfly Key Mechanism Protocol in IEEE 1609.2.1 Standard
Alexandra Boldyreva, Virendra Kumar, and Jiahao Sun
2024/1673
Proteus: A Fully Homomorphic Authenticated Transciphering Protocol
Lars Wolfgang Folkerts and Nektarios Georgios Tsoutsos
2024/1672
New Strategies for Bootstrapping Large-Error Ciphertext in Large-Precision FHEW/TFHE Cryptosystem
Hongbo Li, Dengfa Liu, and Guangsheng Ma
2024/1671
Multi-party Setup Ceremony for Generating Tokamak zk-SNARK Parameters
Muhammed Ali Bingol
2024/1670
Statistical Layered MPC
Giovanni Deligios, Anders Konring, Chen-Da Liu-Zhang, and Varun Narayanan
2024/1669
The Role of Message-Bound Signatures for the Beyond UnForgeability Features and Weak Keys
Samed Düzlü and Patrick Struck
2024/1668
Modelings for generic PoK and Applications: Shorter SD and PKP based Signatures
Slim Bettaieb, Loïc Bidoux, Philippe Gaborit, and Mukul Kulkarni
2024/1667
Overlapped Bootstrapping for FHEW/TFHE and Its Application to SHA3
Deokhwa Hong, Youngjin Choi, Yongwoo Lee, and Young-Sik Kim
2024/1666
Concretely Efficient Asynchronous MPC from Lightweight Cryptography
Akhil Bandarupalli, Xiaoyu Ji, Aniket Kate, Chen-Da Liu-Zhang, and Yifan Song
2024/1665
DMM: Distributed Matrix Mechanism for Differentially-Private Federated Learning using Packed Secret Sharing
Alexander Bienstock, Ujjwal Kumar, and Antigoni Polychroniadou
2024/1664
Consensus on SNARK pre-processed circuit polynomials
Jehyuk Jang
2024/1663
A Hidden-Bits Approach to Black-Box Statistical ZAPs from LWE
Eli Bradley, George Lu, Shafik Nassar, Brent Waters, and David J. Wu
2024/1662
Composability in Watermarking Schemes
Jiahui Liu and Mark Zhandry
2024/1661
zkFFT: Extending Halo2 with Vector Commitments & More
Aram Jivanyan, Gohar Hovhannisyan, Hayk Hovhannisyan, and Nerses Asaturyan
2024/1660
A Note on the Hint in the Dilithium Digital Signature Scheme
Amit Berman, Ariel Doubchak, and Noam Livne
2024/1659
Instance Compression, Revisited
Gal Arnon, Shany Ben-David, and Eylon Yogev
2024/1658
High-Throughput Three-Party DPFs with Applications to ORAM and Digital Currencies
Guy Zyskind, Avishay Yanai, and Alex "Sandy" Pentland
2024/1657
Securely Computing One-Sided Matching Markets
James Hsin-Yu Chiang, Ivan Damgård, Claudio Orlandi, Mahak Pancholi, and Mark Simkin
2024/1656
Optimal Early Termination for Dishonest Majority Broadcast
Giovanni Deligios, Ivana Klasovita, and Chen-Da Liu-Zhang
2024/1655
Secure Stateful Aggregation: A Practical Protocol with Applications in Differentially-Private Federated Learning
Marshall Ball, James Bell-Clark, Adria Gascon, Peter Kairouz, Sewoong Oh, and Zhiye Xie
2024/1654
$\Sigma$-Check: Compressed $\Sigma$-protocol Theory from Sum-check
Shang Gao, Chen Qian, Tianyu Zheng, Yu Guo, and Bin Xiao
2024/1653
AD-MPC: Fully Asynchronous Dynamic MPC with Guaranteed Output Delivery
Wenxuan Yu, Minghui Xu, Bing Wu, Sisi Duan, and Xiuzhen Cheng
2024/1652
How to Construct Random Unitaries
Fermi Ma and Hsin-Yuan Huang
2024/1651
One-Shot Native Proofs of Non-Native Operations in Incrementally Verifiable Computations
Tohru Kohrita, Patrick Towa, and Zachary J. Williamson
2024/1650
Towards Practical Oblivious Map
Xinle Cao, Weiqi Feng, Jian Liu, Jinjin Zhou, Wenjing Fang, Lei Wang, Quanqing Xu, Chuanhui Yang, and Kui Ren
2024/1649
Multiplying Polynomials without Powerful Multiplication Instructions (Long Paper)
Vincent Hwang, YoungBeom Kim, and Seog Chung Seo
2024/1648
SIMD-style Sorting of Integer Sequence in RLWE Ciphertext
Zijing Li, Hongbo Li, and Zhengyang Wang
2024/1647
Curve Forests: Transparent Zero-Knowledge Set Membership with Batching and Strong Security
Matteo Campanelli, Mathias Hall-Andersen, and Simon Holmgaard Kamp
2024/1646
Transaction Execution Mechanisms
Abdoulaye Ndiaye
2024/1645
Fiat-Shamir Goes Rational
Matteo Campanelli and Agni Datta
2024/1644
A Tight Lower Bound on the TdScrypt Trapdoor Memory-Hard Function
Jeremiah Blocki and Seunghoon Lee
2024/1643
Optimizing Liveness for Blockchain-Based Sealed-Bid Auctions in Rational Settings
Maozhou Huang, Xiangyu Su, Mario Larangeira, and Keisuke Tanaka
2024/1642
Fuzzy PSI via Oblivious Protocol Routing
David Richardson, Mike Rosulek, and Jiayu Xu
2024/1641
Simplification Issues of An Authentication and Key Agreement Scheme for Smart Grid
Zhengjun Cao and Lihua Liu
2024/1640
Maximizing the Utility of Cryptographic Setups: Secure PAKEs, with either functional RO or CRS
Yuting Xiao, Rui Zhang, and Hong-Sheng Zhou
2024/1639
Efficient Quantum Pseudorandomness from Hamiltonian Phase States
John Bostanci, Jonas Haferkamp, Dominik Hangleiter, and Alexander Poremba
2024/1638
Modular Reduction in CKKS
Jaehyung Kim and Taeyeong Noh
2024/1637
Bootstrapping Small Integers With CKKS
Youngjin Bae, Jaehyung Kim, Damien Stehlé, and Elias Suvanto
2024/1636
Quantum State Group Actions
Saachi Mutreja and Mark Zhandry
2024/1635
RPO-M31 and XHash-M31: Efficient Hash Functions for Circle STARKs
Tomer Ashur and Sundas Tariq
2024/1634
On Constructing Pseudorandom Involutions: Feistel variants using a single round function
Chun Guo, Meiqin Wang, and Weijia Wang
2024/1633
Efficient Boolean-to-Arithmetic Mask Conversion in Hardware
Aein Rezaei Shahmirzadi and Michael Hutter
2024/1632
Fully Secure Searchable Encryption from PRFs, Pairings, and Lattices
Hirotomo Shinoki, Hisayoshi Sato, and Masayuki Yoshino
2024/1631
Sparrow: Space-Efficient zkSNARK for Data-Parallel Circuits and Applications to Zero-Knowledge Decision Trees
Christodoulos Pappas and Dimitrios Papadopoulos
2024/1630
Hybrid Password Authentication Key Exchange in the UC Framework
You Lyu and Shengli Liu
2024/1629
Efficient Key-Switching for Word-Type FHE and GPU Acceleration
Shutong Jin, Zhen Gu, Guangyan Li, Donglong Chen, Çetin Kaya Koç, Ray C. C. Cheung, and Wangchen Dai
2024/1628
Glacius: Threshold Schnorr Signatures from DDH with Full Adaptive Security
Renas Bacho, Sourav Das, Julian Loss, and Ling Ren
2024/1627
Lollipops of pairing-friendly elliptic curves for composition of proof systems
Craig Costello and Gaurish Korpal
2024/1626
Faster Proofs and VRFs from Isogenies
Shai Levin and Robi Pedersen
2024/1625
On the Tight Security of the Double Ratchet
Daniel Collins, Doreen Riepel, and Si An Oliver Tran
2024/1624
Double-Matrix: Complete Diffusion in a Single Round with (small) MDS Matrices
Jorge Nakahara Jr
2024/1623
General Functional Bootstrapping using CKKS
Andreea Alexandru, Andrey Kim, and Yuriy Polyakov
2024/1622
A New Approach Towards Encrypted Data Sharing and Computation: Enhancing Efficiency Beyond MPC and Multi-Key FHE
Anil Kumar Pradhan
2024/1621
PAKE Combiners and Efficient Post-Quantum Instantiations
Julia Hesse and Michael Rosenberg
2024/1620
Really Complex Codes with Application to STARKs
Yuval Domb
2024/1619
Structure-Preserving Compressing Primitives: Vector Commitments, Accumulators and Applications
Stephan Krenn, Omid Mir, and Daniel Slamanig
2024/1618
Shaking up authenticated encryption
Joan Daemen, Seth Hoffert, Silvia Mella, Gilles Van Assche, and Ronny Van Keer
2024/1617
Algebraic Equipage for Learning with Errors in Cyclic Division Algebras
Cong Ling and Andrew Mendelsohn
2024/1616
End-to-End Encrypted Cloud Storage in the Wild: A Broken Ecosystem
Jonas Hofmann and Kien Tuong Truong
2024/1615
LeOPaRd: Towards Practical Post-Quantum Oblivious PRFs via Interactive Lattice Problems
Muhammed F. Esgin, Ron Steinfeld, Erkan Tairi, and Jie Xu
2024/1614
Related-Key Cryptanalysis of FUTURE
Amit Jana, Smita Das, Ayantika Chatterjee, and Debdeep Mukhopadhyay
2024/1613
Efficient Maliciously Secure Oblivious Exponentiations
Carsten Baum, Jens Berlips, Walther Chen, Ivan Damgård, Kevin M. Esvelt, Leonard Foner, Dana Gretton, Martin Kysel, Ronald L. Rivest, Lawrence Roy, Francesca Sage-Ling, Adi Shamir, Vinod Vaikuntanathan, Lynn Van Hauwe, Theia Vogel, Benjamin Weinstein-Raun, Daniel Wichs, Stephen Wooster, Andrew C. Yao, and Yu Yu
2024/1612
On Wagner's k-Tree Algorithm Over Integers
Haoxing Lin and Prashant Nalini Vasudevan
2024/1611
Rhombus: Fast Homomorphic Matrix-Vector Multiplication for Secure Two-Party Inference
Jiaxing He, Kang Yang, Guofeng Tang, Zhangjie Huang, Li Lin, Changzheng Wei, Ying Yan, and Wei Wang
2024/1610
Secret Sharing with Snitching
Stefan Dziembowski, Sebastian Faust, Tomasz Lizurej, and Marcin Mielniczuk
2024/1609
Blaze: Fast SNARKs from Interleaved RAA Codes
Martijn Brehm, Binyi Chen, Ben Fisch, Nicolas Resch, Ron D. Rothblum, and Hadas Zeilberger
2024/1608
Mild Asymmetric Message Franking: Illegal-Messages-Only and Retrospective Content Moderation
Zhengan Huang, Junzuo Lai, Gongxian Zeng, and Jian Weng
2024/1607
Tighter Proofs for PKE-to-KEM Transformation in the Quantum Random Oracle Model
Jinrong Chen, Yi Wang, Rongmao Chen, Xinyi Huang, and Wei Peng
2024/1606
NeutronNova: Folding everything that reduces to zero-check
Abhiram Kothapalli and Srinath Setty
2024/1605
Nebula: Efficient read-write memory and switchboard circuits for folding schemes
Arasu Arun and Srinath Setty
2024/1604
Predicting truncated multiple matrix congruential generators with unknown parameters
Changcun Wang and Zhaopeng Dai
2024/1603
Boosting SNARKs and Rate-1 Barrier in Arguments of Knowledge
Jiaqi Cheng and Rishab Goyal
2024/1602
Cryptography and Collective Power
Leah Namisa Rosenbloom
2024/1601
Juggernaut: Efficient Crypto-Agnostic Byzantine Agreement
Daniel Collins, Yuval Efron, and Jovan Komatovic
2024/1600
Pacmann: Efficient Private Approximate Nearest Neighbor Search
Mingxun Zhou, Elaine Shi, and Giulia Fanti
2024/1599
Simplified PIR and CDS Protocols and Improved Linear Secret-Sharing Schemes
Bar Alon, Amos Beimel, and Or Lasri
2024/1598
On the security of the initial tropical Stickel protocol and its modification based on Linde-de la Puente matrices
Sulaiman Alhussaini and Serge˘ı Sergeev
2024/1597
An undetectable watermark for generative image models
Sam Gunn, Xuandong Zhao, and Dawn Song
2024/1596
Secret Sharing with Publicly Verifiable Deletion
Jonathan Katz and Ben Sela
2024/1595
DeepFold: Efficient Multilinear Polynomial Commitment from Reed-Solomon Code and Its Application to Zero-knowledge Proofs
Yanpei Guo, Xuanming Liu, Kexi Huang, Wenjie Qu, Tianyang Tao, and Jiaheng Zhang
2024/1594
Bit-fixing Correlation Attacks on Goldreich's Pseudorandom Generators
Ximing Fu, Mo Li, Shihan Lyu, and Chuanyi Liu
2024/1593
Stateful Communication with Malicious Parties
Chen-Da Liu-Zhang, Christopher Portmann, and Guilherme Rito
2024/1592
DART: Distributed argument of knowledge for rough terrains
Steve Thakur
2024/1591
MPC-in-the-Head Framework without Repetition and its Applications to the Lattice-based Cryptography
Weihao Bai, Long Chen, Qianwen Gao, and Zhenfeng Zhang
2024/1590
Matching radar signals and fingerprints with MPC
Benjamin Hansen Mortensen, Mathias Karsrud Nordal, and Martin Strand
2024/1589
A Systematic Study of Sparse LWE
Aayush Jain, Huijia Lin, and Sagnik Saha
2024/1588
A Note on ``Privacy-Preserving and Secure Cloud Computing: A Case of Large-Scale Nonlinear Programming''
Zhengjun Cao and Lihua Liu
2024/1587
Fully Homomorphic Encryption for Cyclotomic Prime Moduli
Robin Geelen and Frederik Vercauteren
2024/1586
WHIR: Reed–Solomon Proximity Testing with Super-Fast Verification
Gal Arnon, Alessandro Chiesa, Giacomo Fenzi, and Eylon Yogev
2024/1585
Quantum Money from Class Group Actions on Elliptic Curves
Hart Montgomery and Shahed Sharif
2024/1584
Block Ciphers in Idealized Models: Automated Proofs and New Security Results
Miguel Ambrona, Pooya Farshim, and Patrick Harasser
2024/1583
Efficient Pairing-Free Adaptable k-out-of-N Oblivious Transfer Protocols
Keykhosro Khosravani, Taraneh Eghlidos, and Mohammad reza Aref
2024/1582
Halving differential additions on Kummer lines
Damien Robert and Nicolas Sarkis
2024/1581
$\mathsf{Protoss}$ Protocol for Tight Optimal Symmetric Security
Emanuele Di Giandomenico, Yong Li, and Sven Schäge
2024/1580
Polynomial Time Cryptanalytic Extraction of Deep Neural Networks in the Hard-Label Setting
Nicholas Carlini, Jorge Chávez-Saab, Anna Hambitzer, Francisco Rodríguez-Henríquez, and Adi Shamir
2024/1579
Re-visiting Authorized Private Set Intersection: A New Privacy-Preserving Variant and Two Protocols
Francesca Falzon and Evangelia Anna Markatou
2024/1578
Quantum Group Actions
Tomoyuki Morimae and Keita Xagawa
2024/1577
Solving Multivariate Coppersmith Problems with Known Moduli
Keegan Ryan
2024/1576
Verifiable Value Added Tax
Victor Sint Nicolaas and Sascha Jafari
2024/1575
Efficiently-Thresholdizable Batched Identity Based Encryption, with Applications
Amit Agarwal, Rex Fernando, and Benny Pinkas
2024/1574
Scalable Two-Round $n$-out-of-$n$ and Multi-Signatures from Lattices in the Quantum Random Oracle Model
Qiqi Lai, Feng-Hao Liu, Yang Lu, Haiyang Xue, and Yong Yu
2024/1573
OML: Open, Monetizable, and Loyal AI
Zerui Cheng, Edoardo Contente, Ben Finch, Oleg Golev, Jonathan Hayase, Andrew Miller, Niusha Moshrefi, Anshul Nasery, Sandeep Nailwal, Sewoong Oh, Himanshu Tyagi, and Pramod Viswanath
2024/1572
Bounded Collusion-Resistant Registered Functional Encryption for Circuits
Yijian Zhang, Jie Chen, Debiao He, and Yuqing Zhang
2024/1571
Basefold in the List Decoding Regime
Ulrich Haböck
2024/1570
Can KANs Do It? Toward Interpretable Deep Learning-based Side-channel Analysis
Kota Yoshida, Sengim Karayalcin, and Stjepan Picek
2024/1569
The Supersingular Isogeny Path and Endomorphism Ring Problems: Unconditional Reductions
Maher Mamah
2024/1568
Oracle Separation Between Quantum Commitments and Quantum One-wayness
John Bostanci, Boyang Chen, and Barak Nehoran
2024/1567
A New World in the Depths of Microcrypt: Separating OWSGs and Quantum Money from QEFID
Amit Behera, Giulio Malavolta, Tomoyuki Morimae, Tamer Mour, and Takashi Yamakawa
2024/1566
Dynamic zk-SNARKs
Weijie Wang, Charalampos Papamanthou, Shravan Srinivasan, and Dimitrios Papadopoulos
2024/1565
Fiat-Shamir in the Wild
Hieu Nguyen, Uyen Ho, and Alex Biryukov
2024/1564
A Simple Framework for Secure Key Leasing
Fuyuki Kitagawa, Tomoyuki Morimae, and Takashi Yamakawa
2024/1563
Optimized One-Dimensional SQIsign Verification on Intel and Cortex-M4
Marius A. Aardal, Gora Adj, Arwa Alblooshi, Diego F. Aranha, Isaac A. Canales-Martínez, Jorge Chavez-Saab, Décio Luiz Gazzoni Filho, Krijn Reijnders, and Francisco Rodríguez-Henríquez
2024/1562
Fully Privacy-preserving Billing Models for Peer-to-Peer Electricity Trading Markets
Akash Madhusudan, Mustafa A. Mustafa, Hilder V.L. Pereira, and Erik Takke
2024/1561
FLUENT: A Tool for Efficient Mixed-Protocol Semi-Private Function Evaluation
Daniel Günther, Joachim Schmidt, Thomas Schneider, and Hossein Yalame
2024/1560
Revisiting Shuffle-Based Private Set Unions with Reduced Communication
Jiseung Kim, Hyung Tae Lee, and Yongha Son
2024/1559
Mind the Composition of Toffoli Gates: Structural Algebraic Distinguishers of ARADI
Emanuele Bellini, Mohamed Rachidi, Raghvendra Rohit, and Sharwan K. Tiwari
2024/1558
Understanding Leakage in Searchable Encryption: a Quantitative Approach
Alexandra Boldyreva, Zichen Gui, and Bogdan Warinschi
2024/1557
Tightly Secure Threshold Signatures over Pairing-Free Groups
Renas Bacho and Benedikt Wagner
2024/1556
The module action for isogeny based cryptography
Damien Robert
2024/1555
Private Laconic Oblivious Transfer with Preprocessing
Rishabh Bhadauria, Nico Döttling, Carmit Hazay, and Chuanwei Lin
2024/1554
Breaking, Repairing and Enhancing XCBv2 into the Tweakable Enciphering Mode GEM
Amit Singh Bhati, Michiel Verbauwhede, and Elena Andreeva
2024/1553
STARK-based Signatures from the RPO Permutation
Shahla Atapoor, Cyprien Delpech de Saint Guilhem, and Al Kindi
2024/1552
Revisiting Keyed-Verification Anonymous Credentials
Michele Orrù
2024/1551
SNARKs for Virtual Machines are Non-Malleable
Matteo Campanelli, Antonio Faonio, and Luigi Russo
2024/1550
MAYO Key Recovery by Fixing Vinegar Seeds
Sönke Jendral and Elena Dubrova
2024/1549
Universally Composable SNARKs with Transparent Setup without Programmable Random Oracle
Christian Badertscher, Matteo Campanelli, Michele Ciampi, Luigi Russo, and Luisa Siniscalchi
2024/1548
Fully-Succinct Arguments over the Integers from First Principles
Matteo Campanelli and Mathias Hall-Andersen
2024/1547
HHL for tensor-decomposable matrices
Cezary Pilaszewicz and Marian Margraf
2024/1546
Bit t-SNI Secure Multiplication Gadget for Inner Product Masking
John Gaspoz and Siemen Dhooghe
2024/1545
Fully Composable Homomorphic Encryption
Daniele Micciancio
2024/1544
PoUDR: Proof of Unified Data Retrieval in Decentralized Storage Networks
Zonglun Li, Shuhao Zheng, Junliang Luo, Ziyue Xin, Dun Yuan, Shang Gao, Sichao Yang, Bin Xiao, and Xue Liu
2024/1543
HEonGPU: a GPU-based Fully Homomorphic Encryption Library 1.0
Ali Şah Özcan and Erkay Savaş
2024/1542
Robust AE With Committing Security
Viet Tung Hoang and Sanketh Menda
2024/1541
Findex: A Concurrent and Database-Independent Searchable Encryption Scheme
Théophile Brézot and Chloé Hébant
2024/1540
Formal Security Analysis of the OpenID FAPI 2.0 Family of Protocols: Accompanying a Standardization Process
Pedram Hosseyni, Ralf Küsters, and Tim Würtele
2024/1539
Quantum Cryptography from Meta-Complexity
Taiga Hiroka and Tomoyuki Morimae
2024/1538
Security Perceptions of Users in Stablecoins: Advantages and Risks within the Cryptocurrency Ecosystem
Maggie Yongqi Guan, Yaman Yu, Tanusree Sharma, Molly Zhuangtong Huang, Kaihua Qin, Yang Wang, and Kanye Ye Wang
2024/1537
VOLE-in-the-head signatures from Subfield Bilinear Collisions
Janik Huth and Antoine Joux
2024/1536
Cryptographic Characterization of Quantum Advantage
Tomoyuki Morimae, Yuki Shirakawa, and Takashi Yamakawa
2024/1535
Relaxed Lattice-Based Programmable Hash Functions: New Efficient Adaptively Secure IBEs
Xingye Lu, Jingjing Fan, and Man Ho AU
2024/1534
More Efficient Lattice-based OLE from Circuit-private Linear HE with Polynomial Overhead
Leo de Castro, Duhyeong Kim, Miran Kim, Keewoo Lee, Seonhong Min, and Yongsoo Song
2024/1533
BEAT-MEV: Epochless Approach to Batched Threshold Encryption for MEV Prevention
Jan Bormet, Sebastian Faust, Hussien Othman, and Ziyan Qu
2024/1532
Bitwise Garbling Schemes --- A Model with $\frac{3}{2}\kappa$-bit Lower Bound of Ciphertexts
Fei Xu, Honggang Hu, and Changhong Xu
2024/1531
FLI: Folding Lookup Instances
Albert Garreta and Ignacio Manzur
2024/1530
Folding Schemes with Privacy Preserving Selective Verification
Joan Boyar and Simon Erfurth
2024/1529
Challenges in Timed Cryptography: A Position Paper
Karim Eldefrawy, Benjamin Terner, and Moti Yung
2024/1528
Schnorr Signatures are Tightly Secure in the ROM under a Non-interactive Assumption
Gavin Cho, Georg Fuchsbauer, and Adam O'Neill
2024/1527
How to Recover the Full Plaintext of XCB
Peng Wang, Shuping Mao, Ruozhou Xu, Jiwu Jing, and Yuewu Wang
2024/1526
Overpass Channels: Horizontally Scalable, Privacy-Enhanced, with Independent Verification, Fluid Liquidity, and Robust Censorship Proof, Payments
Brandon "Cryptskii" Ramsay
2024/1525
Evaluating Leakage Attacks Against Relational Encrypted Search
Patrick Ehrler, Abdelkarim Kati, Thomas Schneider, and Amos Treiber
2024/1524
Lower Bounds on the Overhead of Indistinguishability Obfuscation
Zhenjian Lu, Noam Mazor, Igor C. Oliveira, and Rafael Pass
2024/1523
Functional Adaptor Signatures: Beyond All-or-Nothing Blockchain-based Payments
Nikhil Vanjani, Pratik Soni, and Sri AravindaKrishnan Thyagarajan
2024/1522
Beware of Keccak: Practical Fault Attacks on SHA-3 to Compromise Kyber and Dilithium on ARM Cortex-M Devices
Yuxuan Wang, Jintong Yu, Shipei Qu, Xiaolin Zhang, Xiaowei Li, Chi Zhang, and Dawu Gu
2024/1521
The SMAesH dataset
Gaëtan Cassiers and Charles Momin
2024/1520
On the rough order assumption in imaginary quadratic number fields
Antonio Sanso
2024/1519
Efficient theta-based algorithms for computing $(\ell, \ell)$-isogenies on Kummer surfaces for arbitrary odd $\ell$
Ryo Yoshizumi, Hiroshi Onuki, Ryo Ohashi, Momonari Kudo, and Koji Nuida
2024/1518
Witness Semantic Security
Paul Lou, Nathan Manohar, and Amit Sahai
2024/1517
A Note on the SNOVA Security
Lih-Chung Wang, Chun-Yen Chou, Jintai Ding, Yen-Liang Kuan, Jan Adriaan Leegwater, Ming-Siou Li, Bo-Shu Tseng, Po-En Tseng, and Chia-Chun Wang
2024/1516
Practical Mempool Privacy via One-time Setup Batched Threshold Encryption
Arka Rai Choudhuri, Sanjam Garg, Guru-Vamsi Policharla, and Mingyuan Wang
2024/1515
Optimized Software Implementation of Keccak, Kyber, and Dilithium on RV{32,64}IM{B}{V}
Jipeng Zhang, Yuxing Yan, Junhao Huang, and Çetin Kaya Koç
2024/1514
Black-Box Non-Interactive Zero Knowledge from Vector Trapdoor Hash
Pedro Branco, Arka Rai Choudhuri, Nico Döttling, Abhishek Jain, Giulio Malavolta, and Akshayaram Srinivasan
2024/1513
Depth Optimized Circuits for Lattice Based Voting with Large Candidate Sets
Oskar Goldhahn and Kristian Gjøsteen
2024/1512
Improved Soundness Analysis of the FRI Protocol
Yiwen Gao, Haibin Kan, and Yuan Li
2024/1511
Some Classes of Cubic Monomial Boolean Functions with Good Second-Order Nonlinearity
RUCHI TELANG GODE
2024/1510
Group Factorisation for Smaller Signatures from Cryptographic Group Actions
Giuseppe D'Alconzo, Alessio Meneghetti, and Edoardo Signorini
2024/1509
DUPLEX: Scalable Zero-Knowledge Lookup Arguments over RSA Group
Semin Han, Geonho Yoon, Hyunok Oh, and Jihye Kim
2024/1508
Key Collisions on AES and Its Applications
Kodai Taiyama, Kosei Sakamoto, Ryoma Ito, Kazuma Taka, and Takanori Isobe
2024/1507
Unbounded ABE for Circuits from LWE, Revisited
Valerio Cini and Hoeteck Wee
2024/1506
Bit Security: optimal adversaries, equivalence results, and a toolbox for computational-statistical security analysis
Daniele Micciancio and Mark Schultz-Wu
2024/1505
FINALLY: A Multi-Key FHE Scheme Based on NTRU and LWE
Jeongeun Park, Barry Van Leeuwen, and Oliver Zajonc
2024/1504
Comments on "Privacy-Enhanced Federated Learning Against Poisoning Adversaries"
Thomas Schneider, Ajith Suresh, and Hossein Yalame
2024/1503
Scalable Mixnets from Two-Party Mercurial Signatures on Randomizable Ciphertexts
Masayuki Abe, Masaya Nanri, Miyako Ohkubo, Octavio Perez Kempner, Daniel Slamanig, and Mehdi Tibouchi
2024/1502
TopGear 2.0: Accelerated Authenticated Matrix Triple Generation with Scalable Prime Fields via Optimized HE Packing
HyunHo Cha, Intak Hwang, Seonhong Min, Jinyeong Seo, and Yongsoo Song
2024/1501
Exploring User Perceptions of Security Auditing in the Web3 Ecosystem
Molly Zhuangtong Huang, Rui Jiang, Tanusree Sharma, and Kanye Ye Wang
2024/1500
Hard Quantum Extrapolations in Quantum Cryptography
Luowen Qian, Justin Raizes, and Mark Zhandry
2024/1499
Multi-Key Fully-Homomorphic Aggregate MAC for Arithmetic Circuits
Suvasree Biswas and Arkady Yerukhimovich
2024/1498
Practical Implementation of Pairing-Based zkSNARK in Bitcoin Script
Federico Barbacovi, Enrique Larraia, Paul Germouty, and Wei Zhang
2024/1497
Low-degree Security of the Planted Random Subgraph Problem
Andrej Bogdanov, Chris Jones, Alon Rosen, and Ilias Zadik
2024/1496
No Fish Is Too Big for Flash Boys! Frontrunning on DAG-based Blockchains
Jianting Zhang and Aniket Kate
2024/1495
Lattice-Based Vulnerabilities in Lee Metric Post-Quantum Cryptosystems
Anna-Lena Horlemann, Karan Khathuria, Marc Newman, Amin Sakzad, and Carlos Vela Cabello
2024/1494
Concretely Efficient Private Set Union via Circuit-based PSI
Gowri R Chandran, Thomas Schneider, Maximilian Stillger, and Christian Weinert
2024/1493
Rate-1 Zero-Knowledge Proofs from One-Way Functions
Noor Athamnah, Eden Florentz – Konopnicki, and Ron D. Rothblum
2024/1492
Multi-Designated Detector Watermarking for Language Models
Zhengan Huang, Gongxian Zeng, Xin Mu, Yu Wang, and Yue Yu
2024/1491
On the Anonymity of One Authentication and Key Agreement Scheme for Peer-to-Peer Cloud
Zhengjun Cao and Lihua Liu
2024/1490
Founding Quantum Cryptography on Quantum Advantage, or, Towards Cryptography from $\#\mathsf{P}$-Hardness
Dakshita Khurana and Kabir Tomer
2024/1489
Adaptive Security, Erasures, and Network Assumptions in Communication-Local MPC
Nishanth Chandran, Juan Garay, Ankit Kumar Misra, Rafail Ostrovsky, and Vassilis Zikas
2024/1488
Compact Proofs of Partial Knowledge for Overlapping CNF Formulae
Gennaro Avitabile, Vincenzo Botta, Daniele Friolo, Daniele Venturi, and Ivan Visconti
2024/1487
The transition to post-quantum cryptography, metaphorically
Stefan-Lukas Gazdag and Sophia Grundner-Culemann
2024/1486
Adaptively Secure Attribute-Based Encryption from Witness Encryption
Brent Waters and Daniel Wichs
2024/1485
LARMix$\mathbf{++}$: Latency-Aware Routing in Mix Networks with Free Routes Topology
Mahdi Rahimi
2024/1484
Quadratic-like balanced functions and permutations
Claude Carlet and Irene Villa
2024/1483
Making Searchable Symmetric Encryption Schemes Smaller and Faster
Debrup Chakraborty, Avishek Majumder, and Subhabrata Samajder
2024/1482
The Power of NAPs: Compressing OR-Proofs via Collision-Resistant Hashing
Katharina Boudgoust and Mark Simkin
2024/1481
Tighter Adaptive IBEs and VRFs: Revisiting Waters' Artificial Abort
Goichiro Hanaoka, Shuichi Katsumata, Kei Kimura, Kaoru Takemure, and Shota Yamada
2024/1480
On Schubert cells of Projective Geometry and quadratic public keys of Multivariate Cryptography
Vasyl Ustimenko
2024/1479
Honest Majority GOD MPC with $O(\mathsf{depth}(C))$ Rounds and Low Online Communication
Amit Agarwal, Alexander Bienstock, Ivan Damgård, and Daniel Escudero
2024/1478
Mind the Bad Norms: Revisiting Compressed Oracle-based Quantum Indistinguishability Proofs
Ritam Bhaumik, Benoît Cogliati, Jordan Ethan, and Ashwin Jha
2024/1477
Signature-based Witness Encryption with Compact Ciphertext
Gennaro Avitabile, Nico Döttling, Bernardo Magri, Christos Sakkas, and Stella Wohnig
2024/1476
The Concrete Security of Two-Party Computation: Simple Definitions, and Tight Proofs for PSI and OPRFs
Mihir Bellare, Rishabh Ranjan, Doreen Riepel, and Ali Aldakheel
2024/1475
On the Spinor Genus and the Distinguishing Lattice Isomorphism Problem
Cong Ling, Jingbo Liu, and Andrew Mendelsohn
2024/1474
Mystrium: Wide Block Encryption Efficient on Entry-Level Processors
Parisa Amiri Eliasi, Koustabh Ghosh, and Joan Daemen
2024/1473
A Note on Low-Communication Secure Multiparty Computation via Circuit Depth-Reduction
Pierre Charbit, Geoffroy Couteau, Pierre Meyer, and Reza Naserasr
2024/1472
Isogeny-Based Secure Voting Systems for Large-Scale Elections
Mohammed El Baraka and Siham Ezzouak
2024/1471
Communication Efficient Secure and Private Multi-Party Deep Learning
Sankha Das, Sayak Ray Chowdhury, Nishanth Chandran, Divya Gupta, Satya Lokam, and Rahul Sharma
2024/1470
Quantum Pseudorandom Scramblers
Chuhan Lu, Minglong Qin, Fang Song, Penghui Yao, and Mingnan Zhao
2024/1469
Password-Protected Threshold Signatures
Stefan Dziembowski, Stanislaw Jarecki, Paweł Kędzior, Hugo Krawczyk, Chan Nam Ngo, and Jiayu Xu
2024/1468
Dense and smooth lattices in any genus
Wessel van Woerden
2024/1467
P2C2T: Preserving the Privacy of Cross-Chain Transfer
Panpan Han, Zheng Yan, Laurence T. Yang, and Elisa Bertino
2024/1466
Dishonest Majority Constant-Round MPC with Linear Communication from DDH
Vipul Goyal, Junru Li, Ankit Kumar Misra, Rafail Ostrovsky, Yifan Song, and Chenkai Weng
2024/1465
Linear approximations of the Flystel construction
Tim Beyne and Clémence Bouvier
2024/1464
SoK: Descriptive Statistics Under Local Differential Privacy
René Raab, Pascal Berrang, Paul Gerhart, and Dominique Schröder
2024/1463
Asynchronous Verifiable Secret Sharing with Elastic Thresholds and Distributed Key Generation
Junming Li, Zhi Lu, Renfei Shen, Yuanqing Feng, and Songfeng Lu
2024/1462
Efficient Fuzzy Private Set Intersection from Fuzzy Mapping
Ying Gao, Lin Qi, Xiang Liu, Yuanchao Luo, and Longxin Wang
2024/1461
Detecting and Correcting Computationally Bounded Errors: A Simple Construction Under Minimal Assumptions
Jad Silbak and Daniel Wichs
2024/1460
PPSA: Polynomial Private Stream Aggregation for Time-Series Data Analysis
Antonia Januszewicz, Daniela Medrano Gutierrez, Nirajan Koirala, Jiachen Zhao, Jonathan Takeshita, Jaewoo Lee, and Taeho Jung
2024/1459
Verifiable Oblivious Pseudorandom Functions from Lattices: Practical-ish and Thresholdisable
Martin R. Albrecht and Kamil Doruk Gur
2024/1458
Providing Integrity for Authenticated Encryption in the Presence of Joint Faults and Leakage
Francesco Berti and Itamar Levi
2024/1457
A Combined Design of 4-PLL-TRNG and 64-bit CDC-7-XPUF on a Zynq-7020 SoC
Oğuz Yayla and Yunus Emre Yılmaz
2024/1456
Crooked Indifferentiability of the Feistel Construction
Alexander Russell, Qiang Tang, and Jiadong Zhu
2024/1455
Threshold PAKE with Security against Compromise of all Servers
Yanqi Gu, Stanislaw Jarecki, Pawel Kedzior, Phillip Nazarian, and Jiayu Xu
2024/1454
Interval Key-Encapsulation Mechanism
Alexander Bienstock, Yevgeniy Dodis, Paul Rösler, and Daniel Wichs
2024/1453
Breaking and Repairing SQIsign2D-East
Wouter Castryck, Mingjie Chen, Riccardo Invernizzi, Gioella Lorenzon, and Frederik Vercauteren
2024/1452
On the Complexity of Cryptographic Groups and Generic Group Models
Cong Zhang, Keyu Ji, Taiyu Wang, Bingsheng Zhang, Hong-Sheng Zhou, Xin Wang, and Kui Ren
2024/1451
Traffic-aware Merkle Trees for Shortening Blockchain Transaction Proofs
Avi Mizrahi, Noam Koren, Ori Rottenstreich, and Yuval Cassuto
2024/1450
TentLogiX: 5-bit Chaos-Driven S-Boxes for Lightweight Cryptographic Systems
Maha Allouzi and Arefeh Rahaei
2024/1449
Marian: An Open Source RISC-V Processor with Zvk Vector Cryptography Extensions
Thomas Szymkowiak, Endrit Isufi, and Markku-Juhani Saarinen
2024/1448
Randomness in Private Sequential Stateless Protocols
Hari Krishnan P. Anilkumar, Varun Narayanan, Manoj Prabhakaran, and Vinod M. Prabhakaran
2024/1447
Generic Differential Key Recovery Attacks and Beyond
Ling Song, Huimin Liu, Qianqian Yang, Yincen Chen, Lei Hu, and Jian Weng
2024/1446
Updatable Private Set Intersection Revisited: Extended Functionalities, Deletion, and Worst-Case Complexity
Saikrishna Badrinarayanan, Peihan Miao, Xinyi Shi, Max Tromanhauser, and Ruida Zeng
2024/1445
Another Walk for Monchi
Riccardo Taiello, Emre Tosun, Alberto Ibarrondo, Hervé Chabanne, and Melek Önen
2024/1444
Attestation Proof of Association – provability that attestation keys are bound to the same hardware and person
Eric Verheul
2024/1443
32-bit and 64-bit CDC-7-XPUF Implementations on a Zynq-7020 SoC
Oğuz Yayla and Yunus Emre Yılmaz
2024/1442
Design and Implementation of a Fast, Platform-Adaptive, AIS-20/31 Compliant PLL-Based True Random Number Generator on a Zynq 7020 SoC FPGA
Oğuz Yayla and Yunus Emre Yılmaz
2024/1441
FlashSwift: A Configurable and More Efficient Range Proof With Transparent Setup
Nan Wang and Dongxi Liu
2024/1440
Trojan Insertion versus Layout Defenses for Modern ICs: Red-versus-Blue Teaming in a Competitive Community Effort
Johann Knechtel, Mohammad Eslami, Peng Zou, Min Wei, Xingyu Tong, Binggang Qiu, Zhijie Cai, Guohao Chen, Benchao Zhu, Jiawei Li, Jun Yu, Jianli Chen, Chun-Wei Chiu, Min-Feng Hsieh, Chia-Hsiu Ou, Ting-Chi Wang, Bangqi Fu, Qijing Wang, Yang Sun, Qin Luo, Anthony W. H. Lau, Fangzhou Wang, Evangeline F. Y. Young, Shunyang Bi, Guangxin Guo, Haonan Wu, Zhengguang Tang, Hailong You, Cong Li, Ramesh Karri, Ozgur Sinanoglu, and Samuel Pagliarini
2024/1439
Scabbard: An Exploratory Study on Hardware Aware Design Choices of Learning with Rounding-based Key Encapsulation Mechanisms
Suparna Kundu, Quinten Norga, Angshuman Karmakar, Shreya Gangopadhyay, Jose Maria Bermudo Mera, and Ingrid Verbauwhede
2024/1438
Anamorphic Authenticated Key Exchange: Double Key Distribution under Surveillance
Weihao Wang, Shuai Han, and Shengli Liu
2024/1437
HierNet: A Hierarchical Deep Learning Model for SCA on Long Traces
Suvadeep Hajra and Debdeep Mukhopadhyay
2024/1436
Eva: Efficient IVC-Based Authentication of Lossy-Encoded Videos
Chengru Zhang, Xiao Yang, David Oswald, Mark Ryan, and Philipp Jovanovic
2024/1435
Actively Secure Polynomial Evaluation from Shared Polynomial Encodings
Pascal Reisert, Marc Rivinius, Toomas Krips, Sebastian Hasler, and Ralf Küsters
2024/1434
Untangling the Security of Kilian's Protocol: Upper and Lower Bounds
Alessandro Chiesa, Marcel Dall'Agnol, Ziyi Guan, Nicholas Spooner, and Eylon Yogev
2024/1433
$Shortcut$: Making MPC-based Collaborative Analytics Efficient on Dynamic Databases
Peizhao Zhou, Xiaojie Guo, Pinzhi Chen, Tong Li, Siyi Lv, and Zheli Liu
2024/1432
On Multi-user Security of Lattice-based Signature under Adaptive Corruptions and Key Leakages
Masayuki Fukumitsu and Shingo Hasegawa
2024/1431
Interactive Line-Point Zero-Knowledge with Sublinear Communication and Linear Computation
Fuchun Lin, Chaoping Xing, and Yizhou Yao
2024/1430
MYao: Multiparty ``Yao'' Garbled Circuits with Row Reduction, Half Gates, and Efficient Online Computation
Aner Ben-Efraim, Lior Breitman, Jonathan Bronshtein, Olga Nissenbaum, and Eran Omri
2024/1429
Powerformer: Efficient Privacy-Preserving Transformer with Batch Rectifier-Power Max Function and Optimized Homomorphic Attention
Dongjin Park, Eunsang Lee, and Joon-Woo Lee
2024/1428
Mario: Multi-round Multiple-Aggregator Secure Aggregation with Robustness against Malicious Actors
Truong Son Nguyen, Tancrède Lepoint, and Ni Trieu
2024/1427
LogRobin++: Optimizing Proofs of Disjunctive Statements in VOLE-Based ZK
Carmit Hazay, David Heath, Vladimir Kolesnikov, Muthuramakrishnan Venkitasubramaniam, and Yibin Yang
2024/1426
Agile Asymmetric Cryptography and the Case for Finite Fields
Anna M. Johnston
2024/1425
New constructions of pseudorandom codes
Surendra Ghentiyala and Venkatesan Guruswami
2024/1424
A Waterlog for Detecting and Tracing Synthetic Text from Large Language Models
Brennon Brimhall, Orion Weller, Matthew Green, and Ian Miers
2024/1423
Towards package opening detection at power-up by monitoring thermal dissipation
Julien Toulemont, Geoffrey Chancel, Fréderick Mailly, Philippe Maurine, and Pascal Nouet
2024/1422
ZKFault: Fault attack analysis on zero-knowledge based post-quantum digital signature schemes
Puja Mondal, Supriya Adhikary, Suparna Kundu, and Angshuman Karmakar
2024/1421
Provable Security of Linux-DRBG in the Seedless Robustness Model
Woohyuk Chung, Hwigyeom Kim, Jooyoung Lee, and Yeongmin Lee
2024/1420
Privacy-Preserving Breadth-First-Search and Maximal-Flow
Vincent Ehrmanntraut and Ulrike Meyer
2024/1419
On the Relationship between Public Key Primitives via Indifferentiability
Shuang Hu, Bingsheng Zhang, Cong Zhang, and Kui Ren
2024/1418
Public-key encryption from a trapdoor one-way embedding of $SL_2(\mathbb{N})$
Robert Hines
2024/1417
Distributed Broadcast Encryption from Lattices
Jeffrey Champion and David J. Wu
2024/1416
Circuit ABE with poly(depth, λ)-sized Ciphertexts and Keys from Lattices
Hoeteck Wee
2024/1415
Privacy Comparison for Bitcoin Light Client Implementations
Arad Kotzer and Ori Rottenstreich
2024/1414
Code-Based Zero-Knowledge from VOLE-in-the-Head and Their Applications: Simpler, Faster, and Smaller
Ying Ouyang, Deng Tang, and Yanhong Xu
2024/1413
The Black-Box Simulation Barrier Persists in a Fully Quantum World
Nai-Hui Chia, Kai-Min Chung, Xiao Liang, and Jiahui Liu
2024/1412
A New Method to Test the Zeros of Riemann Zeta Function
Zhengjun Cao and Lihua Liu
2024/1411
Design issues of ``an anonymous authentication and key agreement protocol in smart living''
Zhengjun Cao and Lihua Liu
2024/1410
Cryptobazaar: Private Sealed-bid Auctions at Scale
Andrija Novakovic, Alireza Kavousi, Kobi Gurkan, and Philipp Jovanovic
2024/1409
Oraqle: A Depth-Aware Secure Computation Compiler
Jelle Vos, Mauro Conti, and Zekeriya Erkin
2024/1408
Multiple-Tweak Differential Attack Against SCARF
Christina Boura, Shahram Rasoolzadeh, Dhiman Saha, and Yosuke Todo
2024/1407
Encrypted MultiChannel Communication (EMC2): Johnny Should Use Secret Sharing
Gowri R. Chandran, Kilian Demuth, Kasra Edalatnejad, Sebastian Linsner, Christian Reuter, and Thomas Schneider
2024/1406
Blind Multisignatures for Anonymous Tokens with Decentralized Issuance
Ioanna Karantaidou, Omar Renawi, Foteini Baldimtsi, Nikolaos Kamarinakis, Jonathan Katz, and Julian Loss
2024/1405
Lego-DLC: batching module for commit-carrying SNARK under Pedersen Engines
Byeongjun Jang, Gweonho Jeong, Hyuktae Kwon, Hyunok Oh, and Jihye Kim
2024/1404
$\Pi$-signHD: A New Structure for the SQIsign Family with Flexible Applicability
Kaizhan Lin, Weize Wang, Chang-An Zhao, and Yunlei Zhao
2024/1403
Hard-Label Cryptanalytic Extraction of Neural Network Models
Yi Chen, Xiaoyang Dong, Jian Guo, Yantian Shen, Anyu Wang, and Xiaoyun Wang
2024/1402
A Recursive zk-based State Update System
Daniel Bloom and Sai Deng
2024/1401
New Techniques for Preimage Sampling: Improved NIZKs and More from LWE
Brent Waters, Hoeteck Wee, and David J. Wu
2024/1400
Efficient Asymmetric PAKE Compiler from KEM and AE
You Lyu, Shengli Liu, and Shuai Han
2024/1399
A Note on Ligero and Logarithmic Randomness
Guillermo Angeris, Alex Evans, and Gyumin Roh
2024/1398
Coercion-resistant i-voting with short PIN and OAuth 2.0
Matteo Bitussi, Riccardo Longo, Francesco Antonio Marino, Umberto Morelli, Amir Sharif, Chiara Spadafora, and Alessandro Tomasi
2024/1397
Efficient Batch Algorithms for the Post-Quantum Crystals Dilithium Signature Scheme and Crystals Kyber Encryption Scheme
Nazlı Deniz TÜRE and Murat CENK
2024/1396
Rare structures in tensor graphs - Bermuda triangles for cryptosystems based on the Tensor Isomorphism problem
Lars Ran and Simona Samardjiska
2024/1395
A Formal Analysis of Apple’s iMessage PQ3 Protocol
Felix Linker, Ralf Sasse, and David Basin
2024/1394
SLAMP-FSS: Two-Party Multi-Point Function Secret Sharing from Simple Linear Algebra
Erki Külaots, Toomas Krips, Hendrik Eerikson, and Pille Pullonen-Raudvere
2024/1393
Survivable Payment Channel Networks
Yekaterina Podiatchev, Ariel Orda, and Ori Rottenstreich
2024/1392
Key Policy Attribute-Based Encryption Leveraging Isogeny-Based Cryptography
Madické Diadji Mbodj and Anis Bkakria
2024/1391
Scalable Equi-Join Queries over Encrypted Database
Kai Du, Jianfeng Wang, Jiaojiao Wu, and Yunling Wang
2024/1390
Cache Timing Leakages in Zero-Knowledge Protocols
Shibam Mukherjee, Christian Rechberger, and Markus Schofnegger
2024/1389
DL-SITM: Deep Learning-Based See-in-the-Middle Attack on AES
Tomáš Gerlich, Jakub Breier, Pavel Sikora, Zdeněk Martinásek, Aron Gohr, Anubhab Baksi, and Xiaolu Hou
2024/1388
One-Way Functions and pKt Complexity
Shuichi Hirahara, Zhenjian Lu, and Igor C. Oliveira
2024/1387
SPADE: Digging into Selective and PArtial DEcryption using Functional Encryption
Camille Nuoskala, Hossein Abdinasibfar, and Antonis Michalas
2024/1386
Problems and New Approaches for Crypto-Agility in Operational Technology
Tobias Frauenschläger and Jürgen Mottok
2024/1385
Locally Verifiable Distributed SNARGs
Eden Aldema Tshuva, Elette Boyle, Ran Cohen, Tal Moran, and Rotem Oshman
2024/1384
Password-Protected Key Retrieval with(out) HSM Protection
Sebastian Faller, Tobias Handirk, Julia Hesse, Máté Horváth, and Anja Lehmann
2024/1383
Self-Orthogonal Minimal Codes From (Vectorial) p-ary Plateaued Functions
René Rodríguez Aldama, Enes Pasalic, Fengrong Zhang, and Yongzhuang Wei
2024/1382
Universal Context Commitment without Ciphertext Expansion
Arghya Bhattacharjee, Ritam Bhaumik, and Chandranan Dhar
2024/1381
Reality Check on Side-Channels: Lessons learnt from breaking AES on an ARM Cortex A processor
Shivam Bhasin, Harishma Boyapally, and Dirmanto Jap
2024/1380
EUCLEAK
Thomas Roche
2024/1379
EvalRound+ Bootstrapping and its Rigorous Analysis for CKKS Scheme
Hyewon Sung, Sieun Seo, Taekyung Kim, and Chohong Min
2024/1378
Practical Blind Signatures in Pairing-Free Groups
Michael Klooß, Michael Reichle, and Benedikt Wagner
2024/1377
Security Strengthening of Threshold Symmetric Schemes
Ehsan Ebrahimi
2024/1376
FDFB$^2$: Functional Bootstrapping via Sparse Polynomial Multiplication
Kamil Kluczniak and Leonard Schild
2024/1375
ALGAES: An Authenticated Lattice-based Generic Asymmetric Encryption Scheme
Aravind Vishnu S S, M Sethumadhavan, and Lakshmy K V
2024/1374
Lifting approach against the SNOVA scheme
Shuhei Nakamura, Yusuke Tani, and Hiroki Furue
2024/1373
Uncompressing Dilithium's public key
Paco Azevedo Oliveira, Andersson Calle Viera, Benoît Cogliati, and Louis Goubin
2024/1372
Coral: Maliciously Secure Computation Framework for Packed and Mixed Circuits
Zhicong Huang, Wen-jie Lu, Yuchen Wang, Cheng Hong, Tao Wei, and WenGuang Chen
2024/1371
PIGEON: A Framework for Private Inference of Neural Networks
Christopher Harth-Kitzerow, Yongqin Wang, Rachit Rajat, Georg Carle, and Murali Annavaram
2024/1370
ML based Improved Differential Distinguisher with High Accuracy: Application to GIFT-128 and ASCON
Tarun Yadav and Manoj Kumar
2024/1369
AGATE: Augmented Global Attested Trusted Execution in the Universal Composability framework
Lorenzo Martinico and Markulf Kohlweiss
2024/1368
Tightly Secure Non-Interactive BLS Multi-Signatures
Renas Bacho and Benedikt Wagner
2024/1367
A Better Kyber Butterfly for FPGAs
Jonas Bertels, Quinten Norga, and Ingrid Verbauwhede
2024/1366
Adaptive Successive Over-Relaxation Method for a Faster Iterative Approximation of Homomorphic Operations
Jungho Moon, Zhanibek Omarov, Donghoon Yoo, Yongdae An, and Heewon Chung
2024/1365
High-Throughput GPU Implementation of Dilithium Post-Quantum Digital Signature
Shiyu Shen, Hao Yang, Wangchen Dai, Hong Zhang, Zhe Liu, and Yunlei Zhao
2024/1364
FLIP-and-prove R1CS
Anca Nitulescu, Nikitas Paslis, and Carla Ràfols
2024/1363
Improved Key Recovery Attacks on Reduced-Round Salsa20
Sabyasachi Dey, Gregor Leander, and Nitin Kumar Sharma
2024/1362
A Documentation of Ethereum’s PeerDAS
Benedikt Wagner and Arantxa Zapico
2024/1361
What Did Come Out of It? Analysis and Improvements of DIDComm Messaging
Christian Badertscher, Fabio Banfi, and Jesus Diaz
2024/1360
CPA-secure KEMs are also sufficient for Post-Quantum TLS 1.3
Biming Zhou, Haodong Jiang, and Yunlei Zhao
2024/1359
Finding Complete Impossible Differential Attacks on AndRX Ciphers and Efficient Distinguishers for ARX Designs
Debasmita Chakraborty, Hosein Hadipour, Phuong Hoa Nguyen, and Maria Eichlseder
2024/1358
Quantum Sieving for Code-Based Cryptanalysis and Its Limitations for ISD
Lynn Engelberts, Simona Etinski, and Johanna Loyer
2024/1357
Understanding the Blockchain Interoperability Graph based on Cryptocurrency Price Correlation
Ori Mazor and Ori Rottenstreich
2024/1356
Leakage-Resilience of Circuit Garbling
Ruiyang Li, Yiteng Sun, Chun Guo, Francois-Xavier Standaert, Weijia Wang, and Xiao Wang
2024/1355
Direct Range Proofs for Paillier Cryptosystem and Their Applications
Zhikang Xie, Mengling Liu, Haiyang Xue, Man Ho Au, Robert H. Deng, and Siu-Ming Yiu
2024/1354
Votexx: Extreme Coercion Resistance
David Chaum, Richard T. Carback, Mario Yaksetig, Jeremy Clark, Mahdi Nejadgholi, Bart Preneel, Alan T. Sherman, Filip Zagorski, Bingsheng Zhang, and Zeyuan Yin
2024/1353
On the overflow and $p$-adic theory applied to homomorphic encryption
Jacob Blindenbach, Jung Hee Cheon, Gamze Gürsoy, and Jiayi Kang
2024/1352
ISABELLA: Improving Structures of Attribute-Based Encryption Leveraging Linear Algebra
Doreen Riepel, Marloes Venema, and Tanya Verma
2024/1351
Proximity Gaps in Interleaved Codes
Benjamin E. Diamond and Angus Gruen
2024/1350
Update to the Sca25519 Library: Mitigating Tearing-based Side-channel Attacks
Lukasz Chmielewski and Lubomír Hrbáček
2024/1349
Oblivious Pseudo Random Function base on Ideal Lattice, Application in PSI and PIR
Zhuang Shan, Leyou Zhang, Qing Wu, Qiqi Lai, and Fuchun Guo
2024/1348
Zero-Knowledge Validation for an Offline Electronic Document Wallet using Bulletproofs
Michael Brand and Benoît Poletti
2024/1347
Secure Multiparty Computation with Lazy Sharing
Shuaishuai Li, Cong Zhang, and Dongdai Lin
2024/1346
Provably Secure Online Authenticated Encryption and Bidirectional Online Channels
Arghya Bhattacharjee, Ritam Bhaumik, Daniel Collins, and Mridul Nandi
2024/1345
SoK: The Engineer’s Guide to Post-Quantum Cryptography for Embedded Devices
Maximilian Pursche, Nikolai Puch, Sebastian N. Peters, and Michael P. Heinl
2024/1344
Quantum Security of a Compact Multi-Signature
Shaoquan Jiang
2024/1343
Generalized one-way function and its application
Hua-Lei Yin
2024/1342
Unconditionally secure key distribution without quantum channel
Hua-Lei Yin
2024/1341
Approach for High-Performance Random Number Generators for Critical Systems
Pascal Hammer, Veronika Krause, Tobias Probst, and Jürgen Mottok
2024/1340
Unbalanced Private Set Union with Reduced Computation and Communication
Cong Zhang, Yu Chen, Weiran Liu, Liqiang Peng, Meng Hao, Anyu Wang, and Xiaoyun Wang
2024/1339
Comprehensive Robustness Analysis of GCM, CCM, and OCB3
Akiko Inoue, Tetsu Iwata, and Kazuhiko Minematsu
2024/1338
Horcrux: Synthesize, Split, Shift and Stay Alive Preventing Channel Depletion via Universal and Enhanced Multi-hop Payments
Anqi Tian, Peifang Ni, Yingzi Gao, and Jing Xu
2024/1337
Construction bent functions using the Maiorana McFarland class
Juan Carlos Ku-Cauich and Javier Diaz-Vargas
2024/1336
Fast Low Level Disk Encryption Using FPGAs
Debrup Chakraborty, Sebati Ghosh, Cuauhtemoc Mancillas Lopez, and Palash Sarkar
2024/1335
Perfect Monomial Prediction for Modular Addition
Kai Hu and Trevor Yap
2024/1334
Chosen Text Attacks Against an Image Encryption Based on the Kronecker Xor Product, the Hill Cipher and the Sigmoid Logistic Map
George Teseleanu
2024/1333
Efficient online and Non-Interactive Threshold Signatures with Identifiable Aborts for Identity-Based Signatures in the IEEE P1363 Standard
Yan Jiang, Youwen Zhu, Jian Wang, and Yudi Zhang
2024/1332
Attacking trapdoors from matrix products
Thomas Decru, Tako Boris Fouotsa, Paul Frixons, Valerie Gilchrist, and Christophe Petit
2024/1331
Practical Small Private Exponent Attacks against RSA
Yansong Feng, Zhen Liu, Abderrahmane Nitaj, and Yanbin Pan
2024/1330
Newton Polytope-Based Strategy for Finding Small Roots of Multivariate Polynomials
Yansong Feng, Abderrahmane Nitaj, and Yanbin Pan
2024/1329
Small Public Exponent Brings More: Improved Partial Key Exposure Attacks against RSA
Yansong Feng, Abderrahmane Nitaj, and Yanbin Pan
2024/1328
A Note on ARADI and LLAMA
Roberto Avanzi, Orr Dunkelman, and Shibam Ghosh
2024/1327
Public-Key Anamorphism in (CCA-secure) Public-Key Encryption and Beyond
Giuseppe Persiano, Duong Hieu Phan, and Moti Yung
2024/1326
On the anonymity of one authenticated key agreement scheme for mobile vehicles-assisted precision agricultural IoT networks
Zhengjun Cao and Lihua Liu
2024/1325
Authenticity in the Presence of Leakage using a Forkcipher
Francesco Berti, François-Xavier Standaert, and Itamar Levi
2024/1324
CLAASPing ARADI: Automated Analysis of the ARADI Block Cipher
Emanuele Bellini, Mattia Formenti, David Gérault, Juan Grados, Anna Hambitzer, Yun Ju Huang, Paul Huynh, Mohamed Rachidi, Raghvendra Rohit, and Sharwan K. Tiwari
2024/1323
SoK: Instruction Set Extensions for Cryptographers
Hao Cheng, Johann Großschädl, Ben Marshall, Daniel Page, and Markku-Juhani O. Saarinen
2024/1322
Revisiting a Realistic EM Side-Channel Attack on a Complex Modern SoC
Debao Wang, Yiwen Gao, Yongbin Zhou, and Xian Huang
2024/1321
ECC’s Achilles’ Heel: Unveiling Weak Keys in Standardized Curves
Enrico Talotti, Matteo Paier, and Marino Miculan
2024/1320
Post-Quantum DNSSEC over UDP via QNAME-Based Fragmentation
Aditya Singh Rawat and Mahabir Prasad Jhanwar
2024/1319
Quantum-safe Signatureless DNSSEC
Aditya Singh Rawat and Mahabir Prasad Jhanwar
2024/1318
FHEW-like Leveled Homomorphic Evaluation: Refined Workflow and Polished Building Blocks
Ruida Wang, Jincheol Ha, Xuan Shen, Xianhui Lu, Chunling Chen, Kunpeng Wang, and Jooyoung Lee
2024/1317
MAESTRO: Multi-party AES using Lookup Tables
Hiraku Morita, Erik Pohle, Kunihiko Sadakane, Peter Scholl, Kazunari Tozawa, and Daniel Tschudi
2024/1316
Generalized Triangular Dynamical System: An Algebraic System for Constructing Cryptographic Permutations over Finite Fields
Arnab Roy and Matthias Johann Steiner
2024/1315
PulpFHE: Complex Instruction Set Extensions for FHE Processors
Omar Ahmed and Nektarios Georgios Tsoutsos
2024/1314
Verifiable Homomorphic Linear Combinations in Multi-Instance Time-Lock Puzzles
Aydin Abadi
2024/1313
A Lattice Attack Against a Family of RSA-like Cryptosystems
George Teseleanu
2024/1312
Probabilistic Data Structures in the Wild: A Security Analysis of Redis
Mia Filić, Jonas Hofmann, Sam A. Markelon, Kenneth G. Paterson, and Anupama Unnikrishnan
2024/1311
Dynamic Threshold Key Encapsulation with a Transparent Setup
Joon Sik Kim, Kwangsu Lee, Jong Hwan Park, and Hyoseung Kim
2024/1310
On the Effects of Neural Network-based Output Prediction Attacks on the Design of Symmetric-key Ciphers
Hayato Watanabe, Ryoma Ito, and Toshihiro Ohigashi
2024/1309
R-STELLAR: A Resilient Synthesizable Signature Attenuation SCA Protection on AES-256 with built-in Attack-on-Countermeasure Detection
Archisman Ghosh, Dong-Hyun Seo, Debayan Das, Santosh Ghosh, and Shreyas Sen
2024/1308
LAMA: Leakage-Abuse Attacks Against Microsoft Always Encrypted
Ryan Seah, Daren Khu, Alexander Hoover, and Ruth Ng
2024/1307
On Algebraic Homomorphic Encryption and its Applications to Doubly-Efficient PIR
Hiroki Okada, Rachel Player, Simon Pohmann, and Christian Weinert
2024/1306
Scloud+: a Lightweight LWE-based KEM without Ring/Module Structure
Anyu Wang, Zhongxiang Zheng, Chunhuan Zhao, Zhiyuan Qiu, Guang Zeng, and Xiaoyun Wang
2024/1305
Constructions of Efficiently Implementable Boolean functions Possessing High Nonlinearity and Good Resistance to Algebraic Attacks
Claude Carlet and Palash Sarkar
2024/1304
Improved Algebraic Attacks on Round-Reduced LowMC with Single-Data Complexity
Xingwei Ren, Yongqiang Li, and Mingsheng Wang
2024/1303
Efficient Zero-Knowledge Arguments for Paillier Cryptosystem
Borui GONG, Wang Fat Lau, Man Ho Au, Rupeng Yang, Haiyang Xue, and Lichun Li
2024/1302
RABAEKS: Revocable Attribute-based Authenticated Encrypted Search over Lattice for Multi-receiver Cloud Storage
Yibo Cao, Shiyuan Xu, Xiu-Bo Chen, and Siu-Ming Yiu
2024/1301
Kalos: Hierarchical-auditable and Human-binding Authentication Scheme for Clinical Trial
Chang Chen, Zelong Wu, Guoyu Yang, Qi Chen, Wei Wang, and Jin Li
2024/1300
SoK: 5 Years of Neural Differential Cryptanalysis
David Gerault, Anna Hambitzer, Moritz Huppert, and Stjepan Picek
2024/1299
Permissionless Verifiable Information Dispersal (Data Availability for Bitcoin Rollups)
Ben Fisch, Arthur Lazzaretti, Zeyu Liu, and Lei Yang
2024/1298
Point (de)compression for elliptic curves over highly $2$-adic finite fields
Dmitrii Koshelev
2024/1297
Improved Cryptanalysis of SNOVA
Ward Beullens
2024/1296
Universal Composable Transaction Serialization with Order Fairness
Michele Ciampi, Aggelos Kiayias, and Yu Shen
2024/1295
Identity-Based Encryption from Lattices with More Compactness in the Standard Model
Weidan Ji, Zhedong Wang, Haoxiang Jin, Qi Wang, Geng Wang, and Dawu Gu
2024/1294
Don't Trust Setup! New Directions in Pre-Constrained Cryptography
Shweta Agrawal, Simran Kumari, and Ryo Nishimaki
2024/1293
Greyhound: Fast Polynomial Commitments from Lattices
Ngoc Khanh Nguyen and Gregor Seiler
2024/1292
Chosen Ciphertext Security for (Hierarchical) Identity-Based Matchmaking Encryption
Sohto Chiku, Keisuke Hara, and Junji Shikata
2024/1291
Raccoon: A Masking-Friendly Signature Proven in the Probing Model
Rafaël del Pino, Shuichi Katsumata, Thomas Prest, and Mélissa Rossi
2024/1290
SoK: Computational and Distributed Differential Privacy for MPC
Fredrik Meisingseth and Christian Rechberger
2024/1289
Improved Lattice Blind Signatures from Recycled Entropy
Corentin Jeudy and Olivier Sanders
2024/1288
KpqClean Ver2: Comprehensive Benchmarking and Analysis of KpqC Algorithm Round 2 Submissions
Minjoo Sim, Siwoo Eum, Gyeongju Song, Minwoo Lee, Sangwon Kim, Minho Song, and Hwajeong Seo
2024/1287
Basic Lattice Cryptography: The concepts behind Kyber (ML-KEM) and Dilithium (ML-DSA)
Vadim Lyubashevsky
2024/1286
Towards a Tightly Secure Signature in Multi-User Setting with Corruptions Based on Search Assumptions
Hirofumi Yoshioka, Wakaha Ogata, and Keitaro Hashimoto
2024/1285
Robust Multiparty Computation from Threshold Encryption Based on RLWE
Antoine Urban and Matthieu Rambaud
2024/1284
Plaintext-Ciphertext Matrix Multiplication and FHE Bootstrapping: Fast and Fused
Youngjin Bae, Jung Hee Cheon, Guillaume Hanrot, Jai Hyun Park, and Damien Stehlé
2024/1283
Password-authenticated Cryptography from Consumable Tokens
Ghada Almashaqbeh
2024/1282
NTRU+PKE: Efficient Public-Key Encryption Schemes from the NTRU Problem
Jonghyun Kim and Jong Hwan Park
2024/1281
Stackproofs: Private proofs of stack and contract execution using Protogalaxy
Liam Eagen, Ariel Gabizon, Marek Sefranek, Patrick Towa, and Zachary J. Williamson
2024/1280
A Survey on SoC Security Verification Methods at the Pre-silicon Stage
Rasheed Kibria, Farimah Farahmandi, and Mark Tehranipoor
2024/1279
Improved Polynomial Division in Cryptography
Kostas Kryptos Chalkias, Charanjit Jutla, Jonas Lindstrom, Varun Madathil, and Arnab Roy
2024/1278
Quantum Key Recovery Attacks on 4-round Iterated Even-Mansour with Two Keys
Ravi Anand, Shibam Ghosh, Takanori Isobe, and Rentaro Shiba
2024/1277
Robust but Relaxed Probing Model
Nicolai Müller and Amir Moradi
2024/1276
A bound on the quantum value of all compiled nonlocal games
Alexander Kulpe, Giulio Malavolta, Connor Paddock, Simon Schmidt, and Michael Walter
2024/1275
MIFARE Classic: exposing the static encrypted nonce variant
Philippe Teuwen
2024/1274
Generation of Authenticated Secret-Shared Scaled Unit Vectors for Beaver Triples
Vincent Rieder
2024/1273
HyperPianist: Pianist with Linear-Time Prover and Logarithmic Communication Cost
Chongrong Li, Pengfei Zhu, Yun Li, Cheng Hong, Wenjie Qu, and Jiaheng Zhang
2024/1272
An Improved Algorithm for Code Equivalence
Julian Nowakowski
2024/1271
AES-based CCR Hash with High Security and Its Application to Zero-Knowledge Proofs
Hongrui Cui, Chun Guo, Xiao Wang, Chenkai Weng, Kang Yang, and Yu Yu
2024/1270
Meet-in-the-Middle Attack on 4+4 Rounds of SCARF under Single-Tweak Setting
Siwei Chen, Kai Hu, Guozhen Liu, Zhongfeng Niu, Quan Quan Tan, and Shichang Wang
2024/1269
Cryptographic Security through Kleene’s Theorem and Automata Theory
Mike Wa Nkongolo
2024/1268
Improved YOSO Randomness Generation with Worst-Case Corruptions
Chen-Da Liu-Zhang, Elisaweta Masserova, João Ribeiro, Pratik Soni, and Sri AravindaKrishnan Thyagarajan
2024/1267
Chrysalis Cipher Suite
Ian Malloy and Dennis Hollenbeck
2024/1266
Information-Theoretic Topology-Hiding Broadcast: Wheels, Stars, Friendship, and Beyond
D'or Banoun, Elette Boyle, and Ran Cohen
2024/1265
Safe curves for elliptic-curve cryptography
Daniel J. Bernstein and Tanja Lange
2024/1264
Succinct Non-Subsequence Arguments
San Ling, Khai Hanh Tang, Khu Vu, Huaxiong Wang, and Yingfei Yan
2024/1263
A Security Analysis of Two Classes of RSA-like Cryptosystems
Paul Cotan and George Teseleanu
2024/1262
Dilithium-Based Verifiable Timed Signature Scheme
Erkan Uslu and Oğuz Yayla
2024/1261
A Key-Recovery Attack on a Leaky Seasign Variant
Shai Levin
2024/1260
zk-Promises: Making Zero-Knowledge Objects Accept the Call for Banning and Reputation
Maurice Shih, Michael Rosenberg, Hari Kailad, and Ian Miers
2024/1259
Efficient (Non-)Membership Tree from Multicollision-Resistance with Applications to Zero-Knowledge Proofs
Maksym Petkus
2024/1258
Count Corruptions, Not Users: Improved Tightness for Signatures, Encryption and Authenticated Key Exchange
Mihir Bellare, Doreen Riepel, Stefano Tessaro, and Yizhao Zhang
2024/1257
Committing Wide Encryption Mode with Minimum Ciphertext Expansion
Yusuke Naito, Yu Sasaki, and Takeshi Sugawara
2024/1256
Concrete Analysis of Schnorr-type Signatures with Aborts
Theo Fanuela Prabowo and Chik How Tan
2024/1255
Compass: Encrypted Semantic Search with High Accuracy
Jinhao Zhu, Liana Patel, Matei Zaharia, and Raluca Ada Popa
2024/1254
Non-Interactive Zero-Knowledge from LPN and MQ
Quang Dao, Aayush Jain, and Zhengzhong Jin
2024/1253
FELIX (XGCD for FALCON): FPGA-based Scalable and Lightweight Accelerator for Large Integer Extended GCD
Sam Coulon, Tianyou Bao, and Jiafeng Xie
2024/1252
Legendre Sequences are Pseudorandom under the Quadratic-Residuosity Assumption
Henry Corrigan-Gibbs and David J. Wu
2024/1251
EMI Shielding for Use in Side-Channel Security: Analysis, Simulation and Measurements
Daniel Dobkin, Edut Katz, David Popovtzer, and Itamar Levi
2024/1250
AutoHoG: Automating Homomorphic Gate Design for Large-Scale Logic Circuit Evaluation
Zhenyu Guan, Ran Mao, Qianyun Zhang, Zhou Zhang, Zian Zhao, and Song Bian
2024/1249
Koala: A Low-Latency Pseudorandom Function
Parisa Amiri Eliasi, Yanis Belkheyar, Joan Daemen, Santosh Ghosh, Daniël Kuijsters, Alireza Mehrdad, Silvia Mella, Shahram Rasoolzadeh, and Gilles Van Assche
2024/1248
A Not So Discrete Sampler: Power Analysis Attacks on HAWK signature scheme
Morgane Guerreau and Mélissa Rossi
2024/1247
A Note on the Quasigroup Lai-Massey Structures
George Teseleanu
2024/1246
MSMAC: Accelerating Multi-Scalar Multiplication for Zero-Knowledge Proof
Pengcheng Qiu, Guiming Wu, Tingqiang Chu, Changzheng Wei, Runzhou Luo, Ying Yan, Wei Wang, and Hui Zhang
2024/1245
Garuda and Pari: Faster and Smaller SNARKs via Equifficient Polynomial Commitments
Michel Dellepere, Pratyush Mishra, and Alireza Shirzad
2024/1244
A Note on ``Three-Factor Anonymous Authentication and Key Agreement Based on Fuzzy Biological Extraction for Industrial Internet of Things''
Zhengjun Cao and Lihua Liu
2024/1243
Tailorable codes for lattice-based KEMs with applications to compact ML-KEM instantiations
Thales B. Paiva, Marcos A. Simplicio Jr, Syed Mahbub Hafiz, Bahattin Yildiz, Eduardo L. Cominetti, and Henrique S. Ogawa
2024/1242
Beyond the Whitepaper: Where BFT Consensus Protocols Meet Reality
David Wong, Denis Kolegov, and Ivan Mikushin
2024/1241
PROF: Protected Order Flow in a Profit-Seeking World
Kushal Babel, Nerla Jean-Louis, Yan Ji, Ujval Misra, Mahimna Kelkar, Kosala Yapa Mudiyanselage, Andrew Miller, and Ari Juels
2024/1240
ARADI and LLAMA: Low-Latency Cryptography for Memory Encryption
Patricia Greene, Mark Motley, and Bryan Weeks
2024/1239
Efficient Differentially Private Set Intersection
Xinyu Peng, Yufei Wang, Weiran Liu, Liqiang Peng, Feng Han, Zhen Gu, Jianling Sun, and Yuan Hong
2024/1238
Dynamic Collusion Functional Encryption and Multi-Authority Attribute-Based Encryption
Rachit Garg, Rishab Goyal, and George Lu
2024/1237
Efficient Variants of TNT with BBB Security
Ritam Bhaumik, Wonseok Choi, Avijit Dutta, Cuauhtemoc Mancillas López, Hrithik Nandi, and Yaobin Shen
2024/1236
Optimizing Big Integer Multiplication on Bitcoin: Introducing w-windowed Approach
Dmytro Zakharov, Oleksandr Kurbatov, Manish Bista, and Belove Bist
2024/1235
Blue fish, red fish, live fish, dead fish
Victor Shoup
2024/1234
EagleSignV3 : A new secure variant of EagleSign signature over lattices
Abiodoun Clement Hounkpevi, Sidoine Djimnaibeye, Michel Seck, and Djiby Sow
2024/1233
Binding Security of Implicitly-Rejecting KEMs and Application to BIKE and HQC
Juliane Krämer, Patrick Struck, and Maximiliane Weishäupl
2024/1232
Efficient and Privacy-Preserving Collective Remote Attestation for NFV
Ghada Arfaoui, Thibaut Jacques, and Cristina Onete
2024/1231
A Composable View of Homomorphic Encryption and Authenticator
Ganyuan Cao
2024/1230
Impossible Boomerang Attacks Revisited: Applications to Deoxys-BC, Joltik-BC and SKINNY
Jianing Zhang, Haoyang Wang, and Deng Tang
2024/1229
Benchmarking Attacks on Learning with Errors
Emily Wenger, Eshika Saxena, Mohamed Malhou, Ellie Thieu, and Kristin Lauter
2024/1228
Automated Software Vulnerability Static Code Analysis Using Generative Pre-Trained Transformer Models
Elijah Pelofske, Vincent Urias, and Lorie M. Liebrock
2024/1227
ZIPNet: Low-bandwidth anonymous broadcast from (dis)Trusted Execution Environments
Michael Rosenberg, Maurice Shih, Zhenyu Zhao, Rui Wang, Ian Miers, and Fan Zhang
2024/1226
A Spectral Analysis of Noise: A Comprehensive, Automated, Formal Analysis of Diffie-Hellman Protocols
Guillaume Girol, Lucca Hirschi, Ralf Sasse, Dennis Jackson, Cas Cremers, and David Basin
2024/1225
SIGNITC: Supersingular Isogeny Graph Non-Interactive Timed Commitments
Knud Ahrens
2024/1224
Generic Construction of Secure Sketches from Groups
Axel Durbet, Koray Karabina, and Kevin Thiry-Atighehchi
2024/1223
A short-list of pairing-friendly curves resistant to the Special TNFS algorithm at the 192-bit security level
Diego F. Aranha, Georgios Fotiadis, and Aurore Guillevic
2024/1222
Quantum Implementation and Analysis of ARIA
Yujin Oh, Kyungbae Jang, Yujin Yang, and Hwajeong Seo
2024/1221
Depth Optimized Quantum Circuits for HIGHT and LEA
Kyungbae Jang, Yujin Oh, Minwoo Lee, Dukyoung Kim, and Hwajeong Seo
2024/1220
Mova: Nova folding without committing to error terms
Nikolaos Dimitriou, Albert Garreta, Ignacio Manzur, and Ilia Vlasov
2024/1219
Foldable, Recursive Proofs of Isogeny Computation with Reduced Time Complexity
Krystal Maughan, Joseph Near, and Christelle Vincent
2024/1218
A Note on the use of the Double Boomerang Connectivity Table (DBCT) for Spotting Impossibilities
Xavier Bonnetain and Virginie Lallemand
2024/1217
A Compact and Parallel Swap-Based Shuffler based on butterfly Network and its complexity against Side Channel Analysis
Jong-Yeon Park, Wonil Lee, Bo Gyeong Kang, Il-jong Song, Jaekeun Oh, and Kouichi Sakurai
2024/1216
Delegatable Anonymous Credentials From Mercurial Signatures With Stronger Privacy
Scott Griffy, Anna Lysyanskaya, Omid Mir, Octavio Perez Kempner, and Daniel Slamanig
2024/1215
Falsifiability, Composability, and Comparability of Game-based Security Models for Key Exchange Protocols
Chris Brzuska, Cas Cremers, Håkon Jacobsen, Douglas Stebila, and Bogdan Warinschi
2024/1214
Less Effort, More Success: Efficient Genetic Algorithm-Based Framework for Side-channel Collision Attacks
Jiawei Zhang, Jiangshan Long, Changhai Ou, Kexin Qiao, Fan Zhang, and Shi Yan
2024/1213
Bounded-Collusion Streaming Functional Encryption from Minimal Assumptions
Kaartik Bhushan, Alexis Korb, and Amit Sahai
2024/1212
Efficient Layered Circuit for Verification of SHA3 Merkle Tree
Changchang Ding and Zheming Fu
2024/1211
A Generic Framework for Side-Channel Attacks against LWE-based Cryptosystems
Julius Hermelink, Silvan Streit, Erik Mårtensson, and Richard Petri
2024/1210
More Optimizations to Sum-Check Proving
Quang Dao and Justin Thaler
2024/1209
Collaborative CP-NIZKs: Modular, Composable Proofs for Distributed Secrets
Mohammed Alghazwi, Tariq Bontekoe, Leon Visscher, and Fatih Turkmen
2024/1208
Hekaton: Horizontally-Scalable zkSNARKs via Proof Aggregation
Michael Rosenberg, Tushar Mopuri, Hossein Hafezi, Ian Miers, and Pratyush Mishra
2024/1207
What Have SNARGs Ever Done for FHE?
Michael Walter
2024/1206
Applying Post-Quantum Cryptography Algorithms to a DLT-Based CBDC Infrastructure: Comparative and Feasibility Analysis
Daniel de Haro Moraes, Joao Paulo Aragao Pereira, Bruno Estolano Grossi, Gustavo Mirapalheta, George Marcel Monteiro Arcuri Smetana, Wesley Rodrigues, Courtnay Nery Guimarães Jr., Bruno Domingues, Fábio Saito, and Marcos Simplício
2024/1205
Analysis of One Scheme for User Authentication and Session Key Agreement in Wireless Sensor Network Using Smart Card
Zhengjun Cao and Lihua Liu
2024/1204
A fast heuristic for mapping Boolean circuits to functional bootstrapping
Sergiu Carpov
2024/1203
Preservation of Speculative Constant-time by Compilation
Santiago Arranz Olmos, Gilles Barthe, Lionel Blatter, Benjamin Grégoire, and Vincent Laporte
2024/1202
Prover - Toward More Efficient Formal Verification of Masking in Probing Model
Feng Zhou, Hua Chen, and Limin Fan
2024/1201
Designing a General-Purpose 8-bit (T)FHE Processor Abstraction
Daphné Trama, Pierre-Emmanuel Clet, Aymen Boudguiga, and Renaud Sirdey
2024/1200
Depth-Aware Arithmetization of Common Primitives in Prime Fields
Jelle Vos, Mauro Conti, and Zekeriya Erkin
2024/1199
On degrees of carry and Scholz's conjecture
Theophilus Agama
2024/1198
ECO-CRYSTALS: Efficient Cryptography CRYSTALS on Standard RISC-V ISA
Xinyi Ji, Jiankuo Dong, Junhao Huang, Zhijian Yuan, Wangchen Dai, Fu Xiao, and Jingqiang Lin
2024/1197
Optimizing Rectangle and Boomerang Attacks: A Unified and Generic Framework for Key Recovery
Qianqian Yang, Ling Song, Nana Zhang, Danping Shi, Libo Wang, Jiahao Zhao, Lei Hu, and Jian Weng
2024/1196
Client-Aided Privacy-Preserving Machine Learning
Peihan Miao, Xinyi Shi, Chao Wu, and Ruofan Xu
2024/1195
Efficient Implementation of Super-optimal Pairings on Curves with Small Prime Fields at the 192-bit Security Level
Jianming Lin, Chang-An Zhao, and Yuhao Zheng
2024/1194
Hardware Implementation and Security Analysis of Local-Masked NTT for CRYSTALS-Kyber
Rafael Carrera Rodriguez, Emanuele Valea, Florent Bruguier, and Pascal Benoit
2024/1193
The syzygy distinguisher
Hugues RANDRIAMBOLOLONA
2024/1192
Towards ML-KEM & ML-DSA on OpenTitan
Amin Abdulrahman, Felix Oberhansl, Hoang Nguyen Hien Pham, Jade Philipoom, Peter Schwabe, Tobias Stelzer, and Andreas Zankl
2024/1191
A note on ``a novel authentication protocol for IoT-enabled devices''
Zhengjun Cao and Lihua Liu
2024/1190
Efficient Two-Party Secure Aggregation via Incremental Distributed Point Function
Nan Cheng, Aikaterini Mitrokotsa, Feng Zhang, and Frank Hartmann
2024/1189
The Espresso Sequencing Network: HotShot Consensus, Tiramisu Data-Availability, and Builder-Exchange
Jeb Bearer, Benedikt Bünz, Philippe Camacho, Binyi Chen, Ellie Davidson, Ben Fisch, Brendon Fish, Gus Gutoski, Fernando Krell, Chengyu Lin, Dahlia Malkhi, Kartik Nayak, Keyao Shen, Alex Xiong, Nathan Yospe, and Sishan Long
2024/1188
Lightweight Dynamic Linear Components for Symmetric Cryptography
S. M. Dehnavi and M. R. Mirzaee Shamsabad
2024/1187
STORM — Small Table Oriented Redundancy-based SCA Mitigation for AES
Yaacov Belenky, Hennadii Chernyshchyk, Oleg Karavaev, Oleh Maksymenko, Valery Teper, Daria Ryzhkova, Itamar Levi, Osnat Keren, and Yury Kreimer
2024/1186
MATTER: A Wide-Block Tweakable Block Cipher
Roberto Avanzi, Orr Dunkelman, and Kazuhiko Minematsu
2024/1185
Erebor and Durian: Full Anonymous Ring Signatures from Quaternions and Isogenies
Giacomo Borin, Yi-Fu Lai, and Antonin Leroux
2024/1184
Sanitizable and Accountable Endorsement for Dynamic Transactions in Fabric
Zhaoman Liu, Jianting Ning, Huiying Hou, and Yunlei Zhao
2024/1183
Updatable Private Set Intersection from Structured Encryption
Archita Agarwal, David Cash, Marilyn George, Seny Kamara, Tarik Moataz, and Jaspal Singh
2024/1182
Hyperion: Transparent End-to-End Verifiable Voting with Coercion Mitigation
Aditya Damodaran, Simon Rastikian, Peter B. Rønne, and Peter Y A Ryan
2024/1181
AQQUA: Augmenting Quisquis with Auditability
George Papadoulis, Danai Balla, Panagiotis Grontas, and Aris Pagourtzis
2024/1180
Fast computation of 2-isogenies in dimension 4 and cryptographic applications
Pierrick Dartois
2024/1179
Inner Product Ring LWE Problem, Reduction, New Trapdoor Algorithm for Inner Product Ring LWE Problem and Ring SIS Problem
Zhuang Shan, Leyou Zhang, Qing Wu, and Qiqi Lai
2024/1178
Towards Quantum-Safe Blockchain: Exploration of PQC and Public-key Recovery on Embedded Systems
Dominik Marchsreiter
2024/1177
Cryptanalysis of two post-quantum authenticated key agreement protocols
Mehdi Abri and Hamid Mala
2024/1176
A zero-trust swarm security architecture and protocols
Alex Shafarenko
2024/1175
AVeCQ: Anonymous Verifiable Crowdsourcing with Worker Qualities
Vlasis Koutsos, Sankarshan Damle, Dimitrios Papadopoulos, Sujit Gujar, and Dimitris Chatzopoulos
2024/1174
Grafted Trees Bear Better Fruit: An Improved Multiple-Valued Plaintext-Checking Side-Channel Attack against Kyber
Jinnuo Li, Chi Cheng, Muyan Shen, Peng Chen, Qian Guo, Dongsheng Liu, Liji Wu, and Jian Weng
2024/1173
Cryptanalysis of Rank-2 Module-LIP with Symplectic Automorphisms
Hengyi Luo, Kaijie Jiang, Yanbin Pan, and Anyu Wang
2024/1172
Generalized class group actions on oriented elliptic curves with level structure
Sarah Arpin, Wouter Castryck, Jonathan Komada Eriksen, Gioella Lorenzon, and Frederik Vercauteren
2024/1171
Tight Time-Space Tradeoffs for the Decisional Diffie-Hellman Problem
Akshima, Tyler Besselman, Siyao Guo, Zhiye Xie, and Yuping Ye
2024/1170
Rudraksh: A compact and lightweight post-quantum key-encapsulation mechanism
Suparna Kundu, Archisman Ghosh, Angshuman Karmakar, Shreyas Sen, and Ingrid Verbauwhede
2024/1169
Attacking Tropical Stickel Protocol by MILP and Heuristic Optimization Techniques
Sulaiman Alhussaini and Serge˘ı Sergeev
2024/1168
Time is not enough: Timing Leakage Analysis on Cryptographic Chips via Plaintext-Ciphertext Correlation in Non-timing Channel
Congming Wei, Guangze Hong, An Wang, Jing Wang, Shaofei Sun, Yaoling Ding, Liehuang Zhu, and Wenrui Ma
2024/1167
Expanding the Toolbox: Coercion and Vote-Selling at Vote-Casting Revisited
Tamara Finogina, Javier Herranz, and Peter B. Roenne
2024/1166
On the Relationship between FuncCPA and FuncCPA+
Takumi Shinozaki, Keisuke Tanaka, Masayuki Tezuka, and Yusuke Yoshida
2024/1165
Respire: High-Rate PIR for Databases with Small Records
Alexander Burton, Samir Jordan Menon, and David J. Wu
2024/1164
A Crack in the Firmament: Restoring Soundness of the Orion Proof System and More
Thomas den Hollander and Daniel Slamanig
2024/1163
On the Number of Restricted Solutions to Constrained Systems and their Applications
Benoît Cogliati, Jordan Ethan, Ashwin Jha, Mridul Nandi, and Abishanka Saha
2024/1162
Practical Traceable Receipt-Free Encryption
Henri Devillez, Olivier Pereira, and Thomas Peters
2024/1161
On the Concrete Security of Non-interactive FRI
Alexander R. Block and Pratyush Ranjan Tiwari
2024/1160
Post-Quantum Access Control with Application to Secure Data Retrieval
Behzad Abdolmaleki, Hannes Blümel, Giacomo Fenzi, Homa Khajeh, Stefan Köpsell, and Maryam Zarezadeh
2024/1159
LaPSuS – A Lattice-Based Private Stream Aggregation Scheme under Scrutiny
Johannes Ottenhues and Alexander Koch
2024/1158
A Note on `` Provably Secure and Lightweight Authentication Key Agreement Scheme for Smart Meters''
Zhengjun Cao and Lihua Liu
2024/1157
Shift-invariant functions and almost liftings
Jan Kristian Haugland and Tron Omland
2024/1156
On affine forestry over integral domains and families of deep Jordan-Gauss graphs
Tymoteusz Chojecki, Grahame Erskine, James Tuite, and Vasyl Ustimenko
2024/1155
Cross Ledger Transaction Consistency for Financial Auditing
Vlasis Koutsos, Xiangan Tian, Dimitrios Papadopoulos, and Dimitris Chatzopoulos
2024/1154
Blockchain Space Tokenization
Aggelos Kiayias, Elias Koutsoupias, Philip Lazos, and Giorgos Panagiotakos
2024/1153
Designated-Verifier zk-SNARKs Made Easy
Chen Li and Fangguo Zhang
2024/1152
Secure Multiparty Computation of Symmetric Functions with Polylogarithmic Bottleneck Complexity and Correlated Randomness
Reo Eriguchi
2024/1151
Privacy-Preserving Data Deduplication for Enhancing Federated Learning of Language Models
Aydin Abadi, Vishnu Asutosh Dasu, and Sumanta Sarkar
2024/1150
Finding Practical Parameters for Isogeny-based Cryptography
Maria Corte-Real Santos, Jonathan Komada Eriksen, Michael Meyer, and Francisco Rodríguez-Henríquez
2024/1149
Improved High-Order Masked Generation of Masking Vector and Rejection Sampling in Dilithium
Jean-Sébastien Coron, François Gérard, Tancrède Lepoint, Matthias Trannoy, and Rina Zeitoun
2024/1148
On hermitian decomposition lattices and the module-LIP problem in rank 2
Thomas Espitau and Heorhii Pliatsok
2024/1147
A reduction from Hawk to the principal ideal problem in a quaternion algebra
Clémence Chevignard, Pierre-Alain Fouque, Guilhem Mureau, Alice Pellet-Mary, and Alexandre Wallet
2024/1146
Breaking Free: Efficient Multi-Party Private Set Union Without Non-Collusion Assumptions
Minglang Dong, Yu Chen, Cong Zhang, and Yujie Bai
2024/1145
A Practical and Scalable Implementation of the Vernam Cipher, under Shannon Conditions, using Quantum Noise
Adrian Neal
2024/1144
A Note on ``Secure and Distributed IoT Data Storage in Clouds Based on Secret Sharing and Collaborative Blockchain''
Zhengjun Cao and Lihua Liu
2024/1143
LR-OT: Leakage-Resilient Oblivious Transfer
Francesco Berti, Carmit Hazay, and Itamar Levi
2024/1142
Predicting one class of truncated matrix congruential generators with unknown parameters
Changcun Wang and Zhaopeng Dai
2024/1141
Optimized Privacy-Preserving Clustering with Fully Homomorphic Encryption
Chen Yang, Jingwei Chen, Wenyuan Wu, and Yong Feng
2024/1140
Permutation Superposition Oracles for Quantum Query Lower Bounds
Christian Majenz, Giulio Malavolta, and Michael Walter
2024/1139
Anonymous Outsourced Statekeeping with Reduced Server Storage
Dana Dachman-Soled, Esha Ghosh, Mingyu Liang, Ian Miers, and Michael Rosenberg
2024/1138
Dot-Product Proofs and Their Applications
Nir Bitansky, Prahladh Harsha, Yuval Ishai, Ron D. Rothblum, and David J. Wu
2024/1137
Cryptanalysis of EagleSign
Ludo N. Pulles and Mehdi Tibouchi
2024/1136
Probabilistic Linearization: Internal Differential Collisions in up to 6 Rounds of SHA-3
Zhongyi Zhang, Chengan Hou, and Meicheng Liu
2024/1135
Scalable and Lightweight State-Channel Audits
Christian Badertscher, Maxim Jourenko, Dimitris Karakostas, and Mario Larangeira
2024/1134
Exploiting signature leakages: breaking Enhanced pqsigRM
Thomas Debris-Alazard, Pierre Loisel, and Valentin Vasseur
2024/1133
Parameters of Algebraic Representation vs. Efficiency of Algebraic Cryptanalysis
Hossein Arabnezhad and Babak Sadeghiyan
2024/1132
A New PPML Paradigm for Quantized Models
Tianpei Lu, Bingsheng Zhang, Xiaoyuan Zhang, and Kui Ren
2024/1131
Jolt-b: recursion friendly Jolt with basefold commitment
Hang Su, Qi Yang, and Zhenfei Zhang
2024/1130
Distributed Verifiable Random Function With Compact Proof
Ahmet Ramazan Ağırtaş, Arda Buğra Özer, Zülfükar Saygı, and Oğuz Yayla
2024/1129
Attribute-Based Signatures for Circuits with Optimal Parameter Size from Standard Assumptions
Ryuya Hayashi, Yusuke Sakai, and Shota Yamada
2024/1128
Cryptiny: Compacting Cryptography for Space-Restricted Channels and its Use-case for IoT-E2EE
Liron David, Omer Berkman, Avinatan Hassidim, David Lazarov, Yossi Matias, and Moti Yung
2024/1127
Curl: Private LLMs through Wavelet-Encoded Look-Up Tables
Manuel B. Santos, Dimitris Mouris, Mehmet Ugurbil, Stanislaw Jarecki, José Reis, Shubho Sengupta, and Miguel de Vega
2024/1126
Is ML-Based Cryptanalysis Inherently Limited? Simulating Cryptographic Adversaries via Gradient-Based Methods
Avital Shafran, Eran Malach, Thomas Ristenpart, Gil Segev, and Stefano Tessaro
2024/1125
Revisiting PACD-based Attacks on RSA-CRT
Guillaume Barbu, Laurent Grémy, and Roch Lescuyer
2024/1124
OPPID: Single Sign-On with Oblivious Pairwise Pseudonyms
Maximilian Kroschewski, Anja Lehmann, and Cavit Özbay
2024/1123
Switching Off your Device Does Not Protect Against Fault Attacks
Paul Grandamme, Pierre-Antoine Tissot, Lilian Bossuet, Jean-Max Dutertre, Brice Colombier, and Vincent Grosso
2024/1122
Finding Bugs and Features Using Cryptographically-Informed Functional Testing
Giacomo Fenzi, Jan Gilcher, and Fernando Virdia
2024/1121
Implementation and Performance Evaluation of Elliptic Curve Cryptography over SECP256R1 on STM32 Microprocessor
Onur İşler
2024/1120
A Fast and Efficient SIKE Co-Design: Coarse-Grained Reconfigurable Accelerators with Custom RISC-V Microcontroller on FPGA
Jing Tian, Bo Wu, Lang Feng, Haochen Zhang, and Zhongfeng Wang
2024/1119
Generic Anamorphic Encryption, Revisited: New Limitations and Constructions
Dario Catalano, Emanuele Giunta, and Francesco Migliaro
2024/1118
Shared-Custodial Password-Authenticated Deterministic Wallets
Poulami Das, Andreas Erwig, and Sebastian Faust
2024/1117
Oryx: Private detection of cycles in federated graphs
Ke Zhong and Sebastian Angel
2024/1116
A Simple Post-Quantum Oblivious Transfer Protocol from Mod-LWR
Shen Dong, Hongrui Cui, Kaiyi Zhang, Kang Yang, and Yu Yu
2024/1115
Public vs Private Blockchains lineage storage
Bilel Zaghdoudi and Maria Potop Butucaru
2024/1114
Time-Memory Trade-off Algorithms for Homomorphically Evaluating Look-up Table in TFHE
Shintaro Narisada, Hiroki Okada, Kazuhide Fukushima, and Takashi Nishide
2024/1113
Ringtail: Practical Two-Round Threshold Signatures from Learning with Errors
Cecilia Boschini, Darya Kaviani, Russell W. F. Lai, Giulio Malavolta, Akira Takahashi, and Mehdi Tibouchi
2024/1112
HERatio: Homomorphic Encryption of Rationals using Laurent Polynomials
Luke Harmon, Gaetan Delavignette, and Hanes Oliveira
2024/1111
Collision Attacks on Galois/Counter Mode (GCM)
John Preuß Mattsson
2024/1110
Legacy Encryption Downgrade Attacks against LibrePGP and CMS
Falko Strenzke and Johannes Roth
2024/1109
QuickPool: Privacy-Preserving Ride-Sharing Service
Banashri Karmakar, Shyam Murthy, Arpita Patra, and Protik Paul
2024/1108
Faster Asynchronous Blockchain Consensus and MVBA
Matthieu Rambaud
2024/1107
Phase Modulation Side Channels: Jittery JTAG for On-Chip Voltage Measurements
Colin O'Flynn
2024/1106
Masked Vector Sampling for HQC
Maxime Spyropoulos, David Vigilant, Fabrice Perion, Renaud Pacalet, and Laurent Sauvage
2024/1105
A New CRT-based Fully Homomorphic Encryption
Anil Kumar Pradhan
2024/1104
Structural Lower Bounds on Black-Box Constructions of Pseudorandom Functions
Amos Beimel, Tal Malkin, and Noam Mazor
2024/1103
A Note on Efficient Computation of the Multilinear Extension
Ron D. Rothblum
2024/1102
A Note on ``Privacy Preserving n-Party Scalar Product Protocol''
Lihua Liu
2024/1101
Stickel’s Protocol using Tropical Increasing Matrices
Any Muanalifah, Zahari Mahad, Nurwan, and Rosalio G Artes
2024/1100
Unforgeability of Blind Schnorr in the Limited Concurrency Setting
Franklin Harding and Jiayu Xu
2024/1099
FHE-MENNs: Opportunities and Pitfalls for Accelerating Fully Homomorphic Private Inference with Multi-Exit Neural Networks
Lars Wolfgang Folkerts and Nektarios Georgios Tsoutsos
2024/1098
Limits of Black-Box Anamorphic Encryption
Dario Catalano, Emanuele Giunta, and Francesco Migliaro
2024/1097
The Cost of Maintaining Keys in Dynamic Groups with Applications to Multicast Encryption and Group Messaging
Michael Anastos, Benedikt Auerbach, Mirza Ahad Baig, Miguel Cueto Noval, Matthew Kwan, Guillermo Pascual-Perez, and Krzysztof Pietrzak
2024/1096
Post-Quantum Ready Key Agreement for Aviation
Marcel Tiepelt, Christian Martin, and Nils Maeurer
2024/1095
Lower Bound on Number of Compression Calls of a Collision-Resistance Preserving Hash
Debasmita Chakraborty and Mridul Nandi
2024/1094
Notes on Multiplying Cyclotomic Polynomials on a GPU
Joseph Johnston
2024/1093
Faster Lookup Table Evaluation with Application to Secure LLM Inference
Xiaoyang Hou, Jian Liu, Jingyu Li, Jiawen Zhang, and Kui Ren
2024/1092
Fusion Channel Attack with POI Learning Encoder
Xinyao Li, Xiwen Ren, Ling Ning, and Changhai Ou
2024/1091
MatcHEd: Privacy-Preserving Set Similarity based on MinHash
Rostin Shokri, Charles Gouert, and Nektarios Georgios Tsoutsos
2024/1090
PolyFHEmus: Rethinking Multiplication in Fully Homomorphic Encryption
Charles Gouert and Nektarios Georgios Tsoutsos
2024/1089
Juliet: A Configurable Processor for Computing on Encrypted Data
Charles Gouert, Dimitris Mouris, and Nektarios Georgios Tsoutsos
2024/1088
HElix: Genome Similarity Detection in the Encrypted Domain
Rostin Shokri, Charles Gouert, and Nektarios Georgios Tsoutsos
2024/1087
Tyche: Probabilistic Selection over Encrypted Data for Generative Language Models
Lars Folkerts and Nektarios Georgios Tsoutsos
2024/1086
Obfuscated Key Exchange
Felix Günther, Douglas Stebila, and Shannon Veitch
2024/1085
Randomized Distributed Function Computation with Semantic Communications: Applications to Privacy
Onur Gunlu
2024/1084
Enabling Complete Atomicity for Cross-chain Applications Through Layered State Commitments
Yuandi Cai, Ru Cheng, Yifan Zhou, Shijie Zhang, Jiang Xiao, and Hai Jin
2024/1083
LEA Block Cipher in Rust Language: Trade-off between Memory Safety and Performance
Sangwon Kim, Siwoo Eum, Minho Song, and Hwajeong Seo
2024/1082
Quantum Implementation of LSH
Yujin Oh, Kyungbae Jang, and Hwajeong Seo
2024/1081
Practical Non-interactive Multi-signatures, and a Multi-to-Aggregate Signatures Compiler
Matthieu Rambaud and Christophe Levrat
2024/1080
Separating Selective Opening Security From Standard Security, Assuming IO
Justin Holmgren and Brent Waters
2024/1079
QuietOT: Lightweight Oblivious Transfer with a Public-Key Setup
Geoffroy Couteau, Lalita Devadas, Srinivas Devadas, Alexander Koch, and Sacha Servan-Schreiber
2024/1078
GAuV: A Graph-Based Automated Verification Framework for Perfect Semi-Honest Security of Multiparty Computation Protocols
Xingyu Xie, Yifei Li, Wei Zhang, Tuowei Wang, Shizhen Xu, Jun Zhu, and Yifan Song
2024/1077
Securely Training Decision Trees Efficiently
Divyanshu Bhardwaj, Sandhya Saravanan, Nishanth Chandran, and Divya Gupta
2024/1076
A More Compact AES, and More
Dag Arne Osvik and David Canright
2024/1075
TaSSLE: Lasso for the commitment-phobic
Daniel Dore
2024/1074
Trust Nobody: Privacy-Preserving Proofs for Edited Photos with Your Laptop
Pierpaolo Della Monica, Ivan Visconti, Andrea Vitaletti, and Marco Zecchini
2024/1073
Message Latency in Waku Relay with Rate Limiting Nullifiers
Alvaro Revuelta, Sergei Tikhomirov, Aaryamann Challani, Hanno Cornelius, and Simon Pierre Vivier
2024/1072
A Study of Partial Non-Linear Layers with DEFAULT and BAKSHEESH
Anubhab Baksi
2024/1071
On the efficient representation of isogenies (a survey)
Damien Robert
2024/1070
Protecting cryptographic code against Spectre-RSB
Santiago Arranz Olmos, Gilles Barthe, Chitchanok Chuengsatiansup, Benjamin Grégoire, Vincent Laporte, Tiago Oliveira, Peter Schwabe, Yuval Yarom, and Zhiyuan Zhang
2024/1069
Strong Existential Unforgeability and More of MPC-in-the-Head Signatures
Mukul Kulkarni and Keita Xagawa
2024/1068
From Interaction to Independence: zkSNARKs for Transparent and Non-Interactive Remote Attestation
Shahriar Ebrahimi and Parisa Hassanizadeh
2024/1067
Efficient Lattice-Based Threshold Signatures with Functional Interchangeability
Guofeng Tang, Bo Pang, Long Chen, and Zhenfeng Zhang
2024/1066
VerITAS: Verifying Image Transformations at Scale
Trisha Datta, Binyi Chen, and Dan Boneh
2024/1065
AITIA: Efficient Secure Computation of Bivariate Causal Discovery
Truong Son Nguyen, Lun Wang, Evgenios M. Kornaropoulos, and Ni Trieu
2024/1064
ArcEDB: An Arbitrary-Precision Encrypted Database via (Amortized) Modular Homomorphic Encryption
Zhou Zhang, Song Bian, Zian Zhao, Ran Mao, Haoyi Zhou, Jiafeng Hua, Yier Jin, and Zhenyu Guan
2024/1063
VIMz: Verifiable Image Manipulation using Folding-based zkSNARKs
Stefan Dziembowski, Shahriar Ebrahimi, and Parisa Hassanizadeh
2024/1062
Compact Key Function Secret Sharing with Non-linear Decoder
Chandan Kumar, Sikhar Patranabis, and Debdeep Mukhopadhyay
2024/1061
Insta-Pok3r: Real-time Poker on Blockchain
Sanjam Garg, Aniket Kate, Pratyay Mukherjee, Rohit Sinha, and Sriram Sridhar
2024/1060
Quirky Interactive Reductions of Knowledge
Joseph Johnston
2024/1059
HEProfiler: An In-Depth Profiler of Approximate Homomorphic Encryption Libraries
Jonathan Takeshita, Nirajan Koirala, Colin McKechney, and Taeho Jung
2024/1058
Natively Compatible Super-Efficient Lookup Arguments and How to Apply Them
Matteo Campanelli, Dario Fiore, and Rosario Gennaro
2024/1057
Password-authenticated Key Exchange and Applications
Kristian Gjøsteen
2024/1056
Shuffle Arguments Based on Subset-Checking
Behzad Abdolmaleki, Prastudy Fauzi, Toomas Krips, and Janno Siim
2024/1055
Enhancing Local Verification: Aggregate and Multi-Signature Schemes
Ahmet Ramazan Ağırtaş, Neslihan Yaman Gökce, and Oğuz Yayla
2024/1054
Optimized Computation of the Jacobi Symbol
Jonas Lindstrøm and Kostas Kryptos Chalkias
2024/1053
Stochastic Secret Sharing with $1$-Bit Shares and Applications to MPC
Benny Applebaum and Eliran Kachlon
2024/1052
A New Fine Tuning Method for FHEW/TFHE Bootstrapping with IND-CPAD Security
Deokhwa Hong, Young-Sik Kim, Yongwoo Lee, and Eunyoung Seo
2024/1051
Adaptor Signatures: New Security Definition and A Generic Construction for NP Relations
Xiangyu Liu, Ioannis Tzannetos, and Vassilis Zikas
2024/1050
On Sequential Functions and Fine-Grained Cryptography
Jiaxin Guan and Hart Montgomery
2024/1049
KyberSlash: Exploiting secret-dependent division timings in Kyber implementations
Daniel J. Bernstein, Karthikeyan Bhargavan, Shivam Bhasin, Anupam Chattopadhyay, Tee Kiah Chia, Matthias J. Kannwischer, Franziskus Kiefer, Thales Paiva, Prasanna Ravi, and Goutam Tamvada
2024/1048
Distributional Secure Merge
Gayathri Garimella, Srinivasan Raghuramam, and Peter Rindal
2024/1047
Improved Multi-Party Fixed-Point Multiplication
Saikrishna Badrinarayanan, Eysa Lee, Peihan Miao, and Peter Rindal
2024/1046
The Sum-Check Protocol over Fields of Small Characteristic
Suyash Bagad, Yuval Domb, and Justin Thaler
2024/1045
Efficient Secret Sharing for Large-Scale Applications
Sarvar Patel, Giuseppe Persiano, Joon Young Seo, and Kevin Yeo
2024/1044
Searching for differential addition chains
Daniel J. Bernstein, Jolijn Cottaar, and Tanja Lange
2024/1043
Cryptography in the Common Haar State Model: Feasibility Results and Separations
Prabhanjan Ananth, Aditya Gulati, and Yao-Ting Lin
2024/1042
Efficient Verifiable Differential Privacy with Input Authenticity in the Local and Shuffle Model
Tariq Bontekoe, Hassan Jameel Asghar, and Fatih Turkmen
2024/1041
Embedding Integer Lattices as Ideals into Polynomial Rings
Yihang Cheng, Yansong Feng, and Yanbin Pan
2024/1040
PeaceFounder: centralised E2E verifiable evoting via pseudonym braiding and history trees
Janis Erdmanis
2024/1039
Reduction from Average-Case M-ISIS to Worst-Case CVP Over Perfect Lattices
Samuel Lavery
2024/1038
Constraint-Packing and the Sum-Check Protocol over Binary Tower Fields
Quang Dao and Justin Thaler
2024/1037
A note on adding zero-knowledge to STARKs
Ulrich Haböck and Al Kindi
2024/1036
A note on the G-FFT
Ulrich Haböck
2024/1035
Reading It like an Open Book: Single-trace Blind Side-channel Attacks on Garbled Circuit Frameworks
Sirui Shen and Chenglu Jin
2024/1034
A Practical Protocol for Quantum Oblivious Transfer from One-Way Functions
Eleni Diamanti, Alex B. Grilo, Adriano Innocenzi, Pascal Lefebvre, Verena Yacoub, and Álvaro Yángüez
2024/1033
Adaptively Secure 5 Round Threshold Signatures from MLWE/MSIS and DL with Rewinding
Shuichi Katsumata, Michael Reichle, and Kaoru Takemure
2024/1032
Threshold OPRF from Threshold Additive HE
Animesh Singh, Sikhar Patranabis, and Debdeep Mukhopadhyay
2024/1031
SACfe: Secure Access Control in Functional Encryption with Unbounded Data
Uddipana Dowerah, Subhranil Dutta, Frank Hartmann, Aikaterini Mitrokotsa, Sayantan Mukherjee, and Tapas Pal
2024/1030
GRASP: Accelerating Hash-based PQC Performance on GPU Parallel Architecture
Yijing Ning, Jiankuo Dong, Jingqiang Lin, Fangyu Zheng, Yu Fu, Zhenjiang Dong, and Fu Xiao
2024/1029
Oblivious Single Access Machines: A New Model for Oblivious Computation
Ananya Appan, David Heath, and Ling Ren
2024/1028
FASIL: A challenge-based framework for secure and privacy-preserving federated learning
Ferhat Karakoç, Betül Güvenç Paltun, Leyli Karaçay, Ömer Tuna, Ramin Fuladi, and Utku Gülen
2024/1027
Structured-Seed Local Pseudorandom Generators and their Applications
Dung Bui, Geoffroy Couteau, and Nikolas Melissaris
2024/1026
MaSTer: Maliciously Secure Truncation for Replicated Secret Sharing without Pre-Processing
Martin Zbudila, Erik Pohle, Aysajan Abidin, and Bart Preneel
2024/1025
Polynomial sharings on two secrets: Buy one, get one free
Paula Arnold, Sebastian Berndt, Thomas Eisenbarth, and Maximilian Orlt
2024/1024
Attribute-Based Threshold Issuance Anonymous Counting Tokens and Its Application to Sybil-Resistant Self-Sovereign Identity
Reyhaneh Rabaninejad, Behzad Abdolmaleki, Sebastian Ramacher, Daniel Slamanig, and Antonis Michalas
2024/1023
Constant-Size Unbounded Multi-Hop Fully Homomorphic Proxy Re-Encryption from Lattices
Feixiang Zhao, Huaxiong Wang, and Jian Weng
2024/1022
Competitive Policies for Online Collateral Maintenance
Ghada Almashaqbeh, Sixia Chen, and Alexander Russell
2024/1021
ammBoost: State Growth Control for AMMs
Nicholas Michel, Mohamed E. Najd, and Ghada Almashaqbeh
2024/1020
chainBoost: A Secure Performance Booster for Blockchain-based Resource Markets
Zahra Motaqy, Mohamed E. Najd, and Ghada Almashaqbeh
2024/1019
Exploiting Clock-Slew Dependent Variability in CMOS Digital Circuits Towards Power and EM SCA Resilience
Archisman Ghosh, Md. Abdur Rahman, Debayan Das, Santosh Ghosh, and Shreyas Sen
2024/1018
Sparsity-Aware Protocol for ZK-friendly ML Models: Shedding Lights on Practical ZKML
Alan Li, Qingkai Liang, and Mo Dong
2024/1017
Accelerating pairings on BW10 and BW14 Curves
Senegue Gomez Nyamsi, Laurian Guimagang Azebaze, and Emmanuel Fouotsa
2024/1016
A Succinct Range Proof for Polynomial-based Vector Commitment
Rui Gao, Zhiguo Wan, Yuncong Hu, and Huaqun Wang
2024/1015
Expediting Homomorphic Computation via Multiplicative Complexity-aware Multiplicative Depth Minimization
Mingfei Yu and Giovanni De Micheli
2024/1014
Grafting: Complementing RNS in CKKS
Jung Hee Cheon, Hyeongmin Choe, Minsik Kang, and Jaehyung Kim
2024/1013
Tempora-Fusion: Time-Lock Puzzle with Efficient Verifiable Homomorphic Linear Combination
Aydin Abadi
2024/1012
Supersonic OT: Fast Unconditionally Secure Oblivious Transfer
Aydin Abadi and Yvo Desmedt
2024/1011
Secure Vickrey Auctions with Rational Parties
Chaya Ganesh, Shreyas Gupta, Bhavana Kanukurthi, and Girisha Shankar
2024/1010
FSSiBNN: FSS-based Secure Binarized Neural Network Inference with Free Bitwidth Conversion
Peng Yang, Zoe Lin Jiang, Jiehang Zhuang, Junbin Fang, Siu Ming Yiu, and Xuan Wang
2024/1009
Improved Reductions from Noisy to Bounded and Probing Leakages via Hockey-Stick Divergences
Maciej Obremski, João Ribeiro, Lawrence Roy, François-Xavier Standaert, and Daniele Venturi
2024/1008
A Deep Study of The Impossible Boomerang Distinguishers: New Construction Theory and Automatic Search Methods
Xichao Hu, Lin Jiao, Dengguo Feng, Yonglin Hao, Xinxin Gong, and Yongqiang Li
2024/1007
On the vector subspaces of $\mathbb{F}_{2^n}$ over which the multiplicative inverse function sums to zero
Claude Carlet
2024/1006
Delegated-Query Oblivious Transfer and its Practical Applications
Yvo Desmedt and Aydin Abadi
2024/1005
Differential Fault Attack on HE-Friendly Stream Ciphers: Masta, Pasta and Elisabeth
Weizhe Wang and Deng Tang
2024/1004
Relaxed Vector Commitment for Shorter Signatures
Seongkwang Kim, Byeonghak Lee, and Mincheol Son
2024/1003
zkVoting : Zero-knowledge proof based coercion-resistant and E2E verifiable e-voting system
Seongho Park, Jaekyoung Choi, Jihye Kim, and Hyunok Oh
2024/1002
Elementary Formulas for Greatest Common Divisors and Semiprime Factors
Joseph M. Shunia
2024/1001
Guidance for Efficient Selection of Secure Parameters for Fully Homomorphic Encryption
Elena Kirshanova, Chiara Marcolla, and Sergi Rovira
2024/1000
File-Injection Attacks on Searchable Encryption, Based on Binomial Structures
Tjard Langhout, Huanhuan Chen, and Kaitai Liang
2024/999
ProxCode: Efficient Biometric Proximity Searchable Encryption from Error Correcting Codes
Maryam Rezapour and Benjamin Fuller
2024/998
Measuring Conditional Anonymity - A Global Study
Pascal Berrang, Paul Gerhart, and Dominique Schröder
2024/997
Dishonest Majority Multi-Verifier Zero-Knowledge Proofs for Any Constant Fraction of Corrupted Verifiers
Daniel Escudero, Antigoni Polychroniadou, Yifan Song, and Chenkai Weng
2024/996
Great-LaKeys: An Improved Threshold-PRF and a Novel Exponent-VRF from LWR
Matthias Geihs
2024/995
Cross-chain bridges via backwards-compatible SNARKs
Sergio Juárez, Mark Blunden, Joris Koopman, Anish Mohammed, Kapil Shenvi Pause, and Steve Thakur
2024/994
On Knowledge-Soundness of Plonk in ROM from Falsifiable Assumptions
Helger Lipmaa, Roberto Parisella, and Janno Siim
2024/993
Limits on the Power of Prime-Order Groups: Separating Q-Type from Static Assumptions
George Lu and Mark Zhandry
2024/992
An analysis of the Crossbred Algorithm for the MQ Problem
Damien Vidal, Sorina Ionica, and Claire Delaplace
2024/991
Leveled Homomorphic Encryption Schemes for Homomorphic Encryption Standard
Shuhong Gao and Kyle Yates
2024/990
Perfectly-secure Network-agnostic MPC with Optimal Resiliency
Shravani Patil and Arpita Patra
2024/989
A Formal Treatment of End-to-End Encrypted Cloud Storage
Matilda Backendal, Hannah Davis, Felix Günther, Miro Haller, and Kenneth G. Paterson
2024/988
Privacy-Preserving Dijkstra
Benjamin Ostrovsky
2024/987
CoGNN: Towards Secure and Efficient Collaborative Graph Learning
Zhenhua Zou, Zhuotao Liu, Jinyong Shan, Qi Li, Ke Xu, and Mingwei Xu
2024/986
FABESA: Fast (and Anonymous) Attribute-Based Encryption under Standard Assumption
Long Meng, Liqun Chen, Yangguang Tian, and Mark Manulis
2024/985
DualRing-PRF: Post-Quantum (Linkable) Ring Signatures from Legendre and Power Residue PRFs
Xinyu Zhang, Ron Steinfeld, Joseph K. Liu, Muhammed F. Esgin, Dongxi Liu, and Sushmita Ruj
2024/984
Side-Channel and Fault Resistant ASCON Implementation: A Detailed Hardware Evaluation (Extended Version)
Aneesh Kandi, Anubhab Baksi, Peizhou Gan, Sylvain Guilley, Tomáš Gerlich, Jakub Breier, Anupam Chattopadhyay, Ritu Ranjan Shrivastwa, Zdeněk Martinásek, and Shivam Bhasin
2024/983
SoCureLLM: An LLM-driven Approach for Large-Scale System-on-Chip Security Verification and Policy Generation
Shams Tarek, Dipayan Saha, Sujan Kumar Saha, Mark Tehranipoor, and Farimah Farahmandi
2024/982
SoK: Programmable Privacy in Distributed Systems
Daniel Benarroch, Bryan Gillespie, Ying Tong Lai, and Andrew Miller
2024/981
Hadamard Product Arguments and Their Applications
Kyeongtae Lee, Donghwan Oh, Hankyung Ko, Jihye Kim, and Hyunok Oh
2024/980
FaultyGarble: Fault Attack on Secure Multiparty Neural Network Inference
Mohammad Hashemi, Dev Mehta, Kyle Mitard, Shahin Tajik, and Fatemeh Ganji
2024/979
Volatile and Persistent Memory for zkSNARKs via Algebraic Interactive Proofs
Alex Ozdemir, Evan Laufer, and Dan Boneh
2024/978
Distributed PIR: Scaling Private Messaging via the Users' Machines
Elkana Tovey, Jonathan Weiss, and Yossi Gilad
2024/977
Improved Boomerang Attacks on 6-Round AES
Augustin Bariant, Orr Dunkelman, Nathan Keller, Gaëtan Leurent, and Victor Mollimard
2024/976
PIR with Client-Side Preprocessing: Information-Theoretic Constructions and Lower Bounds
Yuval Ishai, Elaine Shi, and Daniel Wichs
2024/975
ZLR: a fast online authenticated encryption scheme achieving full security
Wonseok Choi, Seongha Hwang, Byeonghak Lee, and Jooyoung Lee
2024/974
Towards Optimal Parallel Broadcast under a Dishonest Majority
Daniel Collins, Sisi Duan, Julian Loss, Charalampos Papamanthou, Giorgos Tsimos, and Haochen Wang
2024/973
ICICLE v2: Polynomial API for Coding ZK Provers to Run on Specialized Hardware
Karthik Inbasekar, Yuval Shekel, and Michael Asa
2024/972
Efficient Secure Communication Over Dynamic Incomplete Networks With Minimal Connectivity
Ivan Damgård, Divya Ravi, Lawrence Roy, Daniel Tschudi, and Sophia Yakoubov
2024/971
A Note on (2, 2)-isogenies via Theta Coordinates
Jianming Lin, Saiyu Wang, and Chang-An Zhao
2024/970
Cryptography at the Crossroads: Ethical Responsibility, the Cypherpunk Movement and Institutions
Eric Blair
2024/969
Analysis, modify and apply in IIOT form light-weight PSI in CM20
Zhuang Shan, Leyou Zhang, Qing Wu, and Qiqi Lai
2024/968
Fast SNARK-based Non-Interactive Distributed Verifiable Random Function with Ethereum Compatibility
Jia Liu and Mark Manulis
2024/967
Consolidated Linear Masking (CLM): Generalized Randomized Isomorphic Representations, Powerful Degrees of Freedom and Low(er)-cost
Itamar Levi and Osnat Keren
2024/966
Diffuse Some Noise: Diffusion Models for Measurement Noise Removal in Side-channel Analysis
Sengim Karayalcin, Guilherme Perin, and Stjepan Picek
2024/965
Efficient and Secure Post-Quantum Certificateless Signcryption for Internet of Medical Things
Shiyuan Xu, Xue Chen, Yu Guo, Siu-Ming Yiu, Shang Gao, and Bin Xiao
2024/964
Malicious Security for PIR (almost) for Free
Brett Falk, Pratyush Mishra, and Matan Shtepel
2024/963
Shared OT and Its Applications to Unconditional Secure Integer Equality, Comparison and Bit-Decomposition
Lucas Piske, Jeroen van de Graaf, Anderson C. A. Nascimento, and Ni Trieu
2024/962
Secure Account Recovery for a Privacy-Preserving Web Service
Ryan Little, Lucy Qin, and Mayank Varia
2024/961
Efficient Execution Auditing for Blockchains under Byzantine Assumptions
Jeff Burdges, Alfonso Cevallos, Handan Kılınç Alper, Chen-Da Liu-Zhang, Fatemeh Shirazi, Alistair Stewart, Rob Habermeier, Robert Klotzner, and Andronik Ordian
2024/960
Designs for practical SHE schemes based on Ring-LWR
Madalina Bolboceanu, Anamaria Costache, Erin Hales, Rachel Player, Miruna Rosca, and Radu Titiu
2024/959
Flood and Submerse: Distributed Key Generation and Robust Threshold Signature from Lattices
Thomas Espitau, Guilhem Niot, and Thomas Prest
2024/958
Signer Revocability for Threshold Ring Signatures
Da Teng and Yanqing Yao
2024/957
VRaaS: Verifiable Randomness as a Service on Blockchains
Jacob Gorman, Lucjan Hanzlik, Aniket Kate, Easwar Vivek Mangipudi, Pratyay Mukherjee, Pratik Sarkar, and Sri AravindaKrishnan Thyagarajan
2024/956
SNARGs under LWE via Propositional Proofs
Zhengzhong Jin, Yael Tauman Kalai, Alex Lombardi, and Vinod Vaikuntanathan
2024/955
ElectionGuard: a Cryptographic Toolkit to Enable Verifiable Elections
Josh Benaloh, Michael Naehrig, Olivier Pereira, and Dan S. Wallach
2024/954
Arithmetisation of computation via polynomial semantics for first-order logic
Murdoch J. Gabbay
2024/953
MixBuy: Contingent Payment in the Presence of Coin Mixers
Diego Castejon-Molina, Dimitrios Vasilopoulos, and Pedro Moreno-Sanchez
2024/952
Communication Complexity vs Randomness Complexity in Interactive Proofs
Benny Applebaum, Kaartik Bhushan, and Manoj Prabhakaran
2024/951
Notes on (failed) attempts to instantiate TLR3
Alexander Maximov
2024/950
DISCO: Dynamic Searchable Encryption with Constant State
Xiangfu Song, Yu Zheng, Jianli Bai, Changyu Dong, Zheli Liu, and Ee-Chien Chang
2024/949
Efficient 2PC for Constant Round Secure Equality Testing and Comparison
Tianpei Lu, Xin Kang, Bingsheng Zhang, Zhuo Ma, Xiaoyuan Zhang, Yang Liu, and Kui Ren
2024/948
Return of the Kummer: a Toolbox for Genus-2 Cryptography
Maria Corte-Real Santos and Krijn Reijnders
2024/947
A Modular Approach to Registered ABE for Unbounded Predicates
Nuttapong Attrapadung and Junichi Tomida
2024/946
Provably Secure Butterfly Key Expansion from the CRYSTALS Post-Quantum Schemes
Edward Eaton, Philippe Lamontagne, and Peter Matsakis
2024/945
Quantum-Safe Public Key Blinding from MPC-in-the-Head Signature Schemes
Sathvika Balumuri, Edward Eaton, and Philippe Lamontagne
2024/944
Quantum CCA-Secure PKE, Revisited
Navid Alamati and Varun Maram
2024/943
Dual Polynomial Commitment Schemes and Applications to Commit-and-Prove SNARKs
Chaya Ganesh, Vineet Nair, and Ashish Sharma
2024/942
Let Them Drop: Scalable and Efficient Federated Learning Solutions Agnostic to Client Stragglers
Riccardo Taiello, Melek Önen, Clémentine Gritti, and Marco Lorenzi
2024/941
SmartZKCP: Towards Practical Data Exchange Marketplace Against Active Attacks
Xuanming Liu, Jiawen Zhang, Yinghao Wang, Xinpeng Yang, and Xiaohu Yang
2024/940
Scalable Collaborative zk-SNARK and Its Application to Efficient Proof Outsourcing
Xuanming Liu, Zhelei Zhou, Yinghao Wang, Jinye He, Bingsheng Zhang, Xiaohu Yang, and Jiaheng Zhang
2024/939
Two RSA-based Cryptosystems
A. Telveenus
2024/938
Certifying Private Probabilistic Mechanisms
Zoë Ruha Bell, Shafi Goldwasser, Michael P. Kim, and Jean-Luc Watson
2024/937
Distributed Point Function with Constraints, Revisited
Keyu Ji, Bingsheng Zhang, Hong-Sheng Zhou, and Kui Ren
2024/936
Willow: Secure Aggregation with One-Shot Clients
James Bell-Clark, Adrià Gascón, Baiyu Li, Mariana Raykova, and Phillipp Schoppmann
2024/935
MFKDF: Multiple Factors Knocked Down Flat
Matteo Scarlata, Matilda Backendal, and Miro Haller
2024/934
An Explicit High-Moment Forking Lemma and its Applications to the Concrete Security of Multi-Signatures
Gil Segev and Liat Shapira
2024/933
A Pure Indistinguishability Obfuscation Approach to Adaptively-Sound SNARGs for NP
Brent Waters and David J. Wu
2024/932
CISELeaks: Information Leakage Assessment of Cryptographic Instruction Set Extension Prototypes
Aruna Jayasena, Richard Bachmann, and Prabhat Mishra
2024/931
Multi-Hop Multi-Key Homomorphic Signatures with Context Hiding from Standard Assumptions
Abtin Afshar, Jiaqi Cheng, and Rishab Goyal
2024/930
Information-Theoretic Single-Server PIR in the Shuffle Model
Yuval Ishai, Mahimna Kelkar, Daniel Lee, and Yiping Ma
2024/929
Combining Outputs of a Random Permutation: New Constructions and Tight Security Bounds by Fourier Analysis
Itai Dinur
2024/928
The Committing Security of MACs with Applications to Generic Composition
Ritam Bhaumik, Bishwajit Chakraborty, Wonseok Choi, Avijit Dutta, Jérôme Govinden, and Yaobin Shen
2024/927
MATHEMATICAL SPECULATIONS ON CRYPTOGRAPHY
Anjali C B
2024/926
Verifiable and Private Vote-by-Mail
Henri Devillez, Olivier Pereira, and Thomas Peters
2024/925
Time Sharing - A Novel Approach to Low-Latency Masking
Dilip Kumar S. V., Siemen Dhooghe, Josep Balasch, Benedikt Gierlichs, and Ingrid Verbauwhede
2024/924
Climbing and descending tall volcanos
Steven Galbraith
2024/923
On Orchestrating Parallel Broadcasts for Distributed Ledgers
Peiyao Sheng, Chenyuan Wu, Dahlia Malkhi, Michael K. Reiter, Chrysoula Stathakopoulou, Michael Wei, and Maofan Yin
2024/922
Scalable Private Set Union, with Stronger Security
Yanxue Jia, Shi-Feng Sun, Hong-Sheng Zhou, and Dawu Gu
2024/921
Simple Logarithmic-size LSAG signature
Edsger Hughes
2024/920
Leveraging Small Message Spaces for CCA1 Security in Additively Homomorphic and BGN-type Encryption
Benoit Libert
2024/919
Multi-Input Functional Encryption for Unbounded Inner Products
Bishnu Charan Behera and Somindu C. Ramanna
2024/918
Cryptographic Analysis of Delta Chat
Yuanming Song, Lenka Mareková, and Kenneth G. Paterson
2024/917
Unbounded Non-Zero Inner Product Encryption
Bishnu Charan Behera and Somindu C. Ramanna
2024/916
Polymath: Groth16 Is Not The Limit
Helger Lipmaa
2024/915
REACTIVE: Rethinking Effective Approaches Concerning Trustees in Verifiable Elections
Josh Benaloh, Michael Naehrig, and Olivier Pereira
2024/914
Compact Key Storage: A Modern Approach to Key Backup and Delegation
Yevgeniy Dodis, Daniel Jost, and Antonio Marcedone
2024/913
SoK: Model Reverse Engineering Threats for Neural Network Hardware
Seetal Potluri and Farinaz Koushanfar
2024/912
Quantum Evolving Secret Sharing for General Access Structures
Efrat Cohen and Anat Paskin-Cherniavsky
2024/911
Generalized Indifferentiable Sponge and its Application to Polygon Miden VM
Tomer Ashur and Amit Singh Bhati
2024/910
A Tight Security Proof for $\mathrm{SPHINCS^{+}}$, Formally Verified
Manuel Barbosa, François Dupressoir, Andreas Hülsing, Matthias Meijers, and Pierre-Yves Strub
2024/909
Approximate CRT-Based Gadget Decomposition and Application to TFHE Blind Rotation
Olivier Bernard and Marc Joye
2024/908
Preliminary Analysis of Ascon-Xof and Ascon-Hash
Christoph Dobraunig, Maria Eichlseder, Florian Mendel, and Martin Schläffer
2024/907
Reducing the Number of Qubits in Quantum Information Set Decoding
Clémence Chevignard, Pierre-Alain Fouque, and André Schrottenloher
2024/906
Are Your Keys Protected? Time will Tell
Yoav Ben-Dov, Liron David, Moni Naor, and Elad Tzalik
2024/905
On the Semidirect Discrete Logarithm Problem in Finite Groups
Christopher Battarbee, Giacomo Borin, Julian Brough, Ryann Cartor, Tobias Hemmert, Nadia Heninger, David Jao, Delaram Kahrobaei, Laura Maddison, Edoardo Persichetti, Angela Robinson, Daniel Smith-Tone, and Rainer Steinwandt
2024/904
On round elimination for special-sound multi-round identification and the generality of the hypercube for MPCitH
Andreas Hülsing, David Joseph, Christian Majenz, and Anand Kumar Narayanan
2024/903
Nopenena Untraceable Payments: Defeating Graph Analysis with Small Decoy Sets
Jayamine Alupotha, Mathieu Gestin, and Christian Cachin
2024/902
Access Structure Hiding Verifiable Tensor Designs
Anandarup Roy, Bimal Kumar Roy, Kouichi Sakurai, and Suprita Talnikar
2024/901
Practical Committing Attacks against Rocca-S
Ryunosuke Takeuchi, Yosuke Todo, and Tetsu Iwata
2024/900
Breaktooth: Breaking Bluetooth Sessions Abusing Power-Saving Mode
Keiichiro Kimura, Hiroki Kuzuno, Yoshiaki Shiraishi, and Masakatu Morii
2024/899
Monotone-Policy Aggregate Signatures
Maya Farber Brodsky, Arka Rai Choudhuri, Abhishek Jain, and Omer Paneth
2024/898
Edit Distance Robust Watermarks for Language Models
Noah Golowich and Ankur Moitra
2024/897
Laconic Function Evaluation and ABE for RAMs from (Ring-)LWE
Fangqi Dong, Zihan Hao, Ethan Mook, Hoeteck Wee, and Daniel Wichs
2024/896
Dynamic-FROST: Schnorr Threshold Signatures with a Flexible Committee
Annalisa Cimatti, Francesco De Sclavis, Giuseppe Galano, Sara Giammusso, Michela Iezzi, Antonio Muci, Matteo Nardelli, and Marco Pedicini
2024/895
Fully-Succinct Multi-Key Homomorphic Signatures from Standard Assumptions
Gaspard Anthoine, David Balbás, and Dario Fiore
2024/894
Quantum Algorithms for Fast Correlation Attacks on LFSR-Based Stream Ciphers
Akinori Hosoyamada
2024/893
How to Construct Quantum FHE, Generically
Aparna Gupte and Vinod Vaikuntanathan
2024/892
Flock: A Framework for Deploying On-Demand Distributed Trust
Darya Kaviani, Sijun Tan, Pravein Govindan Kannan, and Raluca Ada Popa
2024/891
Glitch-Stopping Circuits: Hardware Secure Masking without Registers
Zhenda Zhang, Svetla Nikova, and Ventzislav Nikov
2024/890
Ring Signatures for Deniable AKEM: Gandalf's Fellowship
Phillip Gajland, Jonas Janneck, and Eike Kiltz
2024/889
Analyzing and Benchmarking ZK-Rollups
Stefanos Chaliasos, Itamar Reif, Adrià Torralba-Agell, Jens Ernstberger, Assimakis Kattis, and Benjamin Livshits
2024/888
zkCross: A Novel Architecture for Cross-Chain Privacy-Preserving Auditing
Yihao Guo, Minghui Xu, Xiuzhen Cheng, Dongxiao Yu, Wangjie Qiu, Gang Qu, Weibing Wang, and Mingming Song
2024/887
Secret Key Recovery in a Global-Scale End-to-End Encryption System
Graeme Connell, Vivian Fang, Rolfe Schmidt, Emma Dauterman, and Raluca Ada Popa
2024/886
A New Security Evaluation Method Based on Resultant for Arithmetic-Oriented Algorithms
Hong-Sen Yang, Qun-Xiong Zheng, Jing Yang, Quan-feng Liu, and Deng Tang
2024/885
Bruisable Onions: Anonymous Communication in the Asynchronous Model
Megumi Ando, Anna Lysyanskaya, and Eli Upfal
2024/884
Security of Fixed-Weight Repetitions of Special-Sound Multi-Round Proofs
Michele Battagliola, Riccardo Longo, Federico Pintore, Edoardo Signorini, and Giovanni Tognolini
2024/883
Low-Latency Linear Transformations with Small Key Transmission for Private Neural Network on Homomorphic Encryption
Byeong-Seo Min and Joon-Woo Lee
2024/882
Lattice-based Fault Attacks against ECMQV
Weiqiong Cao, Hua Chen, Jingyi Feng, Linmin Fan, and Wenling Wu
2024/881
PipeSwap: Forcing the Timely Release of a Secret for Atomic Swaps Across All Blockchains
Peifang Ni, Anqi Tian, and Jing Xu
2024/880
Extending class group action attacks via sesquilinear pairings
Joseph Macula and Katherine E. Stange
2024/879
Consistency-or-Die: Consistency for Key Transparency
Joakim Brorsson, Elena Pagnin, Bernardo David, and Paul Stankovski Wagner
2024/878
Radical Vélu Isogeny Formulae
Thomas Decru
2024/877
Multiple Sampling Fast Correlation Attack on Small State Stream Ciphers with Limited Round Key Period
Zhongzhi Zhou, Vahid Amin-Ghafari, and Hui Liu
2024/876
Distributing Keys and Random Secrets with Constant Complexity
Benny Applebaum and Benny Pinkas
2024/875
Succinctly-Committing Authenticated Encryption
Mihir Bellare and Viet Tung Hoang
2024/874
Fake It till You Make It: Enhancing Security of Bluetooth Secure Connections via Deferrable Authentication
Marc Fischlin and Olga Sanina
2024/873
Cryptanalysis of Algebraic Verifiable Delay Functions
Alex Biryukov, Ben Fisch, Gottfried Herold, Dmitry Khovratovich, Gaëtan Leurent, María Naya-Plasencia, and Benjamin Wesolowski
2024/872
Epistle: Elastic Succinct Arguments for Plonk Constraint System
Shuangjun Zhang, Dongliang Cai, Yuan Li, Haibin Kan, and Liang Zhang
2024/871
New Approaches for Estimating the Bias of Differential-Linear Distinguishers (Full Version)
Ting Peng, Wentao Zhang, Jingsui Weng, and Tianyou Ding
2024/870
Computationally Secure Aggregation and Private Information Retrieval in the Shuffle Model
Adrià Gascón, Yuval Ishai, Mahimna Kelkar, Baiyu Li, Yiping Ma, and Mariana Raykova
2024/869
On cycles of pairing-friendly abelian varieties
Maria Corte-Real Santos, Craig Costello, and Michael Naehrig
2024/868
Loquat: A SNARK-Friendly Post-Quantum Signature based on the Legendre PRF with Applications in Ring and Aggregate Signatures
Xinyu Zhang, Ron Steinfeld, Muhammed F. Esgin, Joseph K. Liu, Dongxi Liu, and Sushmita Ruj
2024/867
Optimal Traitor Tracing from Pairings
Mark Zhandry
2024/866
Ripple: Accelerating Programmable Bootstraps for FHE with Wavelet Approximations
Charles Gouert, Mehmet Ugurbil, Dimitris Mouris, Miguel de Vega, and Nektarios Georgios Tsoutsos
2024/865
Result Pattern Hiding Boolean Searchable Encryption: Achieving Negligible False Positive Rates in Low Storage Overhead
Dandan Yuan, Shujie Cui, and Giovanni Russello
2024/864
Collaborative, Segregated NIZK (CoSNIZK) and More Efficient Lattice-Based Direct Anonymous Attestation
Liqun Chen, Patrick Hough, and Nada El Kassem
2024/863
Length Leakage in Oblivious Data Access Mechanisms
Grace Jia, Rachit Agarwal, and Anurag Khandelwal
2024/862
BackdoorIndicator: Leveraging OOD Data for Proactive Backdoor Detection in Federated Learning
Songze Li and Yanbo Dai
2024/861
A new multivariate primitive from CCZ equivalence
Marco Calderini, Alessio Caminata, and Irene Villa
2024/860
HAWKEYE – Recovering Symmetric Cryptography From Hardware Circuits
Gregor Leander, Christof Paar, Julian Speith, and Lukas Stennes
2024/859
Novel approximations of elementary functions in zero-knowledge proofs
Kaarel August Kurik and Peeter Laud
2024/858
Ascon-Keccak AEAD Algorithm
Stephan Müller
2024/857
Speeding up Preimage and Key-Recovery Attacks with Highly Biased Differential-Linear Approximations
Zhongfeng Niu, Kai Hu, Siwei Sun, Zhiyu Zhang, and Meiqin Wang
2024/856
Indistinguishability Obfuscation from Bilinear Maps and LPN Variants
Seyoon Ragavan, Neekon Vafa, and Vinod Vaikuntanathan
2024/855
Securing the Future of GenAI: Policy and Technology
Mihai Christodorescu, Ryan Craven, Soheil Feizi, Neil Gong, Mia Hoffmann, Somesh Jha, Zhengyuan Jiang, Mehrdad Saberi Kamarposhti, John Mitchell, Jessica Newman, Emelia Probasco, Yanjun Qi, Khawaja Shams, and Matthew Turek
2024/854
Simulation-Extractable KZG Polynomial Commitments and Applications to HyperPlonk
Benoit Libert
2024/853
Practical q-IND-CPA-D-Secure Approximate Homomorphic Encryption
Jean-Philippe Bossuat, Anamaria Costache, Christian Mouchet, Lea Nürnberger, and Juan Ramón Troncoso-Pastoriza
2024/852
Breaking Indistinguishability with Transfer Learning: A First Look at SPECK32/64 Lightweight Block Ciphers
Jimmy Dani, Kalyan Nakka, and Nitesh Saxena
2024/851
On the parallelization of square-root Vélu's formulas
Jorge Chávez-Saab, Odalis Ortega, and Amalia Pizarro-Madariaga
2024/850
Constant-Round Arguments for Batch-Verification and Bounded-Space Computations from One-Way Functions
Noga Amit and Guy N. Rothblum
2024/849
Fast, Large Scale Dimensionality Reduction Schemes Based on CKKS
Haonan Yuan, Wenyuan Wu, and Jingwei Chen
2024/848
How (Not) to Simulate PLONK
Marek Sefranek
2024/847
More Efficient Approximate $k$-wise Independent Permutations from Random Reversible Circuits via log-Sobolev Inequalities
Lucas Gretta, William He, and Angelos Pelecanos
2024/846
Distributed Asynchronous Remote Key Generation
Mark Manulis and Hugo Nartz
2024/845
PathGES: An Efficient and Secure Graph Encryption Scheme for Shortest Path Queries
Francesca Falzon, Esha Ghosh, Kenneth G. Paterson, and Roberto Tamassia
2024/844
Finding Dense Submodules with Algebraic Lattice Reduction
Alexander Karenin and Elena Kirshanova
2024/843
Formally verifying Kyber Episode V: Machine-checked IND-CCA security and correctness of ML-KEM in EasyCrypt
José Bacelar Almeida, Santiago Arranz Olmos, Manuel Barbosa, Gilles Barthe, François Dupressoir, Benjamin Grégoire, Vincent Laporte, Jean-Christophe Léchenet, Cameron Low, Tiago Oliveira, Hugo Pacheco, Miguel Quaresma, Peter Schwabe, and Pierre-Yves Strub
2024/842
Computation Efficient Structure Aware PSI From Incremental Function Secret Sharing
Gayathri Garimella, Benjamin Goff, and Peihan Miao
2024/841
Two generalizations of almost perfect nonlinearity
Claude Carlet
2024/840
Batching-Efficient RAM using Updatable Lookup Arguments
Moumita Dutta, Chaya Ganesh, Sikhar Patranabis, Shubh Prakash, and Nitin Singh
2024/839
Almost optimal succinct arguments for Boolean circuit on RAM
Tiancheng Xie and Tianyi Liu
2024/838
Verifiable Secret Sharing from Symmetric Key Cryptography with Improved Optimistic Complexity
Ignacio Cascudo, Daniele Cozzo, and Emanuele Giunta
2024/837
Fully Secure MPC and zk-FLIOP Over Rings: New Constructions, Improvements and Extensions
Anders Dalskov, Daniel Escudero, and Ariel Nof
2024/836
The Round Complexity of Proofs in the Bounded Quantum Storage Model
Alex B. Grilo and Philippe Lamontagne
2024/835
Provable security against decryption failure attacks from LWE
Christian Majenz and Fabrizio Sisinni
2024/834
Fine-Grained Non-Interactive Key Exchange, Revisited
Balthazar Bauer, Geoffroy Couteau, and Elahe Sadeghi
2024/833
INDIANA - Verifying (Random) Probing Security through Indistinguishability Analysis
Christof Beierle, Jakob Feldtkeller, Anna Guinet, Tim Güneysu, Gregor Leander, Jan Richter-Brockmann, and Pascal Sasdrich
2024/832
Hamming Weight Proofs of Proximity with One-Sided Error
Gal Arnon, Shany Ben-David, and Eylon Yogev
2024/831
Tight Characterizations for Preprocessing against Cryptographic Salting
Fangqi Dong, Qipeng Liu, and Kewen Wu
2024/830
How (not) to Build Quantum PKE in Minicrypt
Longcheng Li, Qian Li, Xingjian Li, and Qipeng Liu
2024/829
Multi-Server Doubly Efficient PIR
Arthur Lazzaretti, Zeyu Liu, Ben Fisch, and Charalampos Papamanthou
2024/828
Post-quantum XML and SAML Single Sign-On
Johannes Müller and Jan Oupický
2024/827
Multivariate Multi-Polynomial Commitment and its Applications
Xiao Yang, Chengru Zhang, Mark Ryan, and Gao Meng
2024/826
Securing Lightning Channels against Rational Miners
Lukas Aumayr, Zeta Avarikioti, Matteo Maffei, and Subhra Mazumdar
2024/825
KHAN Encryption Algorithm: Leveraging Full Reptend Primes
Ayaz Khan
2024/824
Improved Meet-LWE Attack via Ternary Trees
Eunmin Lee, Joohee Lee, Yongha Son, and Yuntao Wang
2024/823
Batched Distributed Point Function from Sparse LPN and Homomorphic Secret Sharing
Lucas Piske, Jaspal Singh, and Ni Trieu
2024/822
Early Stopping Byzantine Agreement in $(1+\epsilon) \cdot f$ Rounds
Fatima Elsheimy, Julian Loss, and Charalampos Papamanthou
2024/821
A General Framework for Lattice-Based ABE Using Evasive Inner-Product Functional Encryption
Yao-Ching Hsieh, Huijia Lin, and Ji Luo
2024/820
Rate-1 Arithmetic Garbling from Homomorphic Secret-Sharing
Pierre Meyer, Claudio Orlandi, Lawrence Roy, and Peter Scholl
2024/819
A new stand-alone MAC construct called SMAC
Dachao Wang, Alexander Maximov, Patrik Ekdahl, and Thomas Johansson
2024/818
The Brave New World of Global Generic Groups and UC-Secure Zero-Overhead SNARKs
Jan Bobolz, Pooya Farshim, Markulf Kohlweiss, and Akira Takahashi
2024/817
DVA: Dangerous Variations of ALTEQ
Arnaud Sipasseuth
2024/816
Zero-knowledge IOPs Approaching Witness Length
Noga Ron-Zewi and Mor Weiss
2024/815
Faster verifications and smaller signatures: Trade-offs for ALTEQ using rejections
Arnaud Sipasseuth
2024/814
Succinct Homomorphic Secret Sharing
Damiano Abram, Lawrence Roy, and Peter Scholl
2024/813
How to Redact the Bitcoin Backbone Protocol
Mehmet Sabir Kiraz, Enrique Larraia, and Owen Vaughan
2024/812
Relations among new CCA security notions for approximate FHE
Sébastien Canard, Caroline Fontaine, Duong Hieu Phan, David Pointcheval, Marc Renard, and Renaud Sirdey
2024/811
Traceable Secret Sharing Based on the Chinese Remainder Theorem
Charlotte Hoffmann
2024/810
The Perils of Limited Key Reuse: Adaptive and Parallel Mismatch Attacks with Post-processing Against Kyber
Qian Guo, Erik Mårtensson, and Adrian Åström
2024/809
Reducing Overdefined Systems of Polynomial Equations Derived from Small Scale Variants of the AES via Data Mining Methods
Jana Berušková, Martin Jureček, and Olha Jurečková
2024/808
Arma: Byzantine Fault Tolerant Consensus with Horizontal Scalability
Yacov Manevich, Hagar Meir, Kaoutar Elkhiyaoui, Yoav Tock, and May Buzaglo
2024/807
Consensus in the Presence of Overlapping Faults and Total Omission
Julian Loss, Kecheng Shi, and Gilad Stern
2024/806
Resettable Statistical Zero-Knowledge for NP
Susumu Kiyoshima
2024/805
DiTRU: A Resurrection of NTRU over Dihedral Group
Ali Raya, Vikas Kumar, and Sugata Gangopadhyay
2024/804
Analysis on Sliced Garbling via Algebraic Approach
Taechan Kim
2024/803
Can We Beat Three Halves Lower Bound?: (Im)Possibility of Reducing Communication Cost for Garbled Circuits
Chunghun Baek and Taechan Kim
2024/802
On Maximum Size Simultaneous Linear Approximations in Ascon and Keccak and Related Translation and Differential Properties
Nicolas T. Courtois, Frédéric Amiel, and Alexandre Bonnard de Fonvillars
2024/801
Algebraic Structure of the Iterates of $\chi$
Björn Kriepke and Gohar Kyureghyan
2024/800
A Note on Zero-Knowledge for NP and One-Way Functions
Yanyi Liu, Noam Mazor, and Rafael Pass
2024/799
Symmetric Signcryption and E2EE Group Messaging in Keybase
Joseph Jaeger, Akshaya Kumar, and Igors Stepanovs
2024/798
Incompressible Functional Encryption
Rishab Goyal, Venkata Koppula, Mahesh Sreekumar Rajasree, and Aman Verma
2024/797
Nonadaptive One-Way to Hiding Implies Adaptive Quantum Reprogramming
Joseph Jaeger
2024/796
Weak Consistency mode in Key Transparency: OPTIKS
Esha Ghosh and Melissa Chase
2024/795
New Limits of Provable Security and Applications to ElGamal Encryption
Sven Schäge
2024/794
Detecting Rogue Decryption in (Threshold) Encryption via Self-Incriminating Proofs
James Hsin-yu Chiang, Bernardo David, Tore Kasper Frederiksen, Arup Mondal, and Esra Yeniaras
2024/793
Hide-and-Seek and the Non-Resignability of the BUFF Transform
Jelle Don, Serge Fehr, Yu-Hsuan Huang, Jyun-Jie Liao, and Patrick Struck
2024/792
Stickel's Key Agreement Algebraic Variation
Daniel Nager
2024/791
Minimize the Randomness in Rasta-Like Designs: How Far Can We Go?
Lorenzo Grassi, Fukang Liu, Christian Rechberger, Fabian Schmid, Roman Walch, and Qingju Wang
2024/790
Physical Ring Signature
Xavier Bultel
2024/789
Maliciously Secure Circuit-PSI via SPDZ-Compatible Oblivious PRF
Yaxi Yang, Xiaojian Liang, Xiangfu Song, Linting Huang, Hongyu Ren, Changyu Dong, and Jianying Zhou
2024/788
A Fault-Resistant NTT by Polynomial Evaluation and Interpolation
Sven Bauer, Fabrizio De Santis, Kristjane Koleci, and Anita Aghaie
2024/787
A new attack against search-LWE using Diophantine approximations
Robin Frot and Daniel Zentai
2024/786
Modelling Ciphers with Overdefined Systems of Quadratic Equations: Application to Friday, Vision, RAIN and Biscuit
Fukang Liu, Mohammad Mahzoun, and Willi Meier
2024/785
SmartBean: Transparent, Concretely Efficient, Polynomial Commitment Scheme with Logarithmic Verification and Communication Costs that Runs on Any Group
Frank Y.C. Lu
2024/784
Universal Blockchain Assets
Owen Vaughan
2024/783
Differential Cryptanalysis on Quantum Computers
Kyungbae Jang, Yujin Oh, and Hwajeong Seo
2024/782
Relating Code Equivalence to Other Isomorphism Problems
Huck Bennett and Kaung Myat Htay Win
2024/781
Doubly-Efficient Batch Verification in Statistical Zero-Knowledge
Or Keret, Ron D. Rothblum, and Prashant Nalini Vasudevan
2024/780
Information-theoretic Multi-server Private Information Retrieval with Client Preprocessing
Jaspal Singh, Yu Wei, and Vassilis Zikas
2024/779
Elliptic Curve Cryptography for the masses: Simple and fast finite field arithmetic
Michael Scott
2024/778
Ideal-to-isogeny algorithm using 2-dimensional isogenies and its application to SQIsign
Hiroshi Onuki and Kohei Nakagawa
2024/777
Measure-Rewind-Extract: Tighter Proofs of One-Way to Hiding and CCA Security in the Quantum Random Oracle Model
Jiangxia Ge, Heming Liao, and Rui Xue
2024/776
Instance-Hiding Interactive Proofs
Changrui Mu and Prashant Nalini Vasudevan
2024/775
Spec-o-Scope: Cache Probing at Cache Speed
Gal Horowitz, Eyal Ronen, and Yuval Yarom
2024/774
Byzantine Reliable Broadcast with One Trusted Monotonic Counter
Yackolley Amoussou-Guenou, Lionel Beltrando, Maurice Herlihy, and Maria Potop-Butucaru
2024/773
SQIPrime: A dimension 2 variant of SQISignHD with non-smooth challenge isogenies
Max Duparc and Tako Boris Fouotsa
2024/772
Reducing the Share Size of Weighted Threshold Secret Sharing Schemes via Chow Parameters Approximation
Oriol Farràs and Miquel Guiot
2024/771
SQIsign2D-East: A New Signature Scheme Using 2-dimensional Isogenies
Kohei Nakagawa and Hiroshi Onuki
2024/770
Sublinear-Round Broadcast without Trusted Setup
Andreea B. Alexandru, Julian Loss, Charalampos Papamanthou, Giorgos Tsimos, and Benedikt Wagner
2024/769
Time-Based Cryptography From Weaker Assumptions: Randomness Beacons, Delay Functions and More
Damiano Abram, Lawrence Roy, and Mark Simkin
2024/768
The Ouroboros of ZK: Why Verifying the Verifier Unlocks Longer-Term ZK Innovation
Denis Firsov and Benjamin Livshits
2024/767
Bootstrapping Bits with CKKS
Youngjin Bae, Jung Hee Cheon, Jaehyung Kim, and Damien Stehlé
2024/766
Breaking Verifiable Delay Functions in the Random Oracle Model
Ziyi Guan, Artur Riazanov, and Weiqiang Yuan
2024/765
Information-Theoretic Multi-Server PIR with Global Preprocessing
Ashrujit Ghoshal, Baitian Li, Yaohua Ma, Chenxin Dai, and Elaine Shi
2024/764
Decentralized Multi-Client Functional Encryption with Strong Security
Ky Nguyen, David Pointcheval, and Robert Schädlich
2024/763
Incorporating SIS Problem into Luby-Rackoff Cipher
Yu Morishima and Masahiro Kaminaga
2024/762
Constant-Cost Batched Partial Decryption in Threshold Encryption
Sora Suegami, Shinsaku Ashizawa, and Kyohei Shibano
2024/761
Lattice-based Broadcast Authenticated Searchable Encryption for Cloud Storage
Yibo Cao, Shiyuan Xu, Xiu-Bo Chen, Gang Xu, Siu-Ming Yiu, and Zongpeng Li
2024/760
SQIsign2D-West: The Fast, the Small, and the Safer
Andrea Basso, Luca De Feo, Pierrick Dartois, Antonin Leroux, Luciano Maino, Giacomo Pope, Damien Robert, and Benjamin Wesolowski
2024/759
Watermarking Language Models for Many Adaptive Users
Aloni Cohen, Alexander Hoover, and Gabe Schoenbach
2024/758
Admissible Parameters for the Crossbred Algorithm and Semi-regular Sequences over Finite Fields
John Baena, Daniel Cabarcas, Sharwan K. Tiwari, Javier Verbel, and Luis Villota
2024/757
Formal Definition and Verification for Combined Random Fault and Random Probing Security
Sonia Belaid, Jakob Feldtkeller, Tim Güneysu, Anna Guinet, Jan Richter-Brockmann, Matthieu Rivain, Pascal Sasdrich, and Abdul Rahman Taleb
2024/756
(Strong) aPAKE Revisited: Capturing Multi-User Security and Salting
Dennis Dayanikli and Anja Lehmann
2024/755
Efficient Second-Order Masked Software Implementations of Ascon in Theory and Practice
Barbara Gigerl, Florian Mendel, Martin Schläffer, and Robert Primas
2024/754
Adversary Resilient Learned Bloom Filters
Allison Bishop and Hayder Tirmazi
2024/753
Summation-based Private Segmented Membership Test from Threshold-Fully Homomorphic Encryption
Nirajan Koirala, Jonathan Takeshita, Jeremy Stevens, and Taeho Jung
2024/752
More Embedded Curves for SNARK-Pairing-Friendly Curves
Aurore Guillevic
2024/751
Simultaneous Haar Indistinguishability with Applications to Unclonable Cryptography
Prabhanjan Ananth, Fatih Kaleoglu, and Henry Yuen
2024/750
Speeding Up Multi-Scalar Multiplications for Pairing-Based zkSNARKs
Xinxin Fan, Veronika Kuchta, Francesco Sica, and Lei Xu
2024/749
Reducing the CRS Size in Registered ABE Systems
Rachit Garg, George Lu, Brent Waters, and David J. Wu
2024/748
PERK: Compact Signature Scheme Based on a New Variant of the Permuted Kernel Problem
Slim Bettaieb, Loïc Bidoux, Victor Dyseryn, Andre Esser, Philippe Gaborit, Mukul Kulkarni, and Marco Palumbi
2024/747
Scaling Lattice Sieves across Multiple Machines
Martin R. Albrecht and Joe Rowell
2024/746
The Art of Bonsai: How Well-Shaped Trees Improve the Communication Cost of MLS
Céline Chevalier, Guirec Lebrun, Ange Martinelli, and Jérôme Plût
2024/745
FRAST: TFHE-friendly Cipher Based on Random S-boxes
Mingyu Cho, Woohyuk Chung, Jincheol Ha, Jooyoung Lee, Eun-Gyeol Oh, and Mincheol Son
2024/744
An NVMe-based Secure Computing Platform with FPGA-based TFHE Accelerator
Yoshihiro Ohba, Tomoya Sanuki, Claude Gravel, and Kentaro Mihara
2024/743
Improved Conditional Cube Attacks on Ascon AEADs in Nonce-Respecting Settings -- with a Break-Fix Strategy
Kai Hu
2024/742
Efficient Universally-Verifiable Electronic Voting with Everlasting Privacy
David Pointcheval
2024/741
A Deniability Analysis of Signal's Initial Handshake PQXDH
Rune Fiedler and Christian Janson
2024/740
Multi-Client Functional Encryption with Public Inputs and Strong Security
Ky Nguyen, Duong Hieu Phan, and David Pointcheval
2024/739
BGJ15 Revisited: Sieving with Streamed Memory Access
Ziyu Zhao, Jintai Ding, and Bo-Yin Yang
2024/738
Quantum Key-Revocable Dual-Regev Encryption, Revisited
Prabhanjan Ananth, Zihan Hu, and Zikuan Huang
2024/737
Mutable Batch Arguments and Applications
Rishab Goyal
2024/736
Secret Sharing with Certified Deletion
James Bartusek and Justin Raizes
2024/735
Secure Multiparty Computation in the Presence of Covert Adaptive Adversaries
Isheeta Nargis and Anwar Hasan
2024/734
Proof of Stake and Activity: Rewarding On-Chain Activity Through Consensus
Aram Jivanyan and Karen Terjanian
2024/733
Proxying is Enough: Security of Proxying in TLS Oracles and AEAD Context Unforgeability
Zhongtang Luo, Yanxue Jia, Yaobin Shen, and Aniket Kate
2024/732
Compact Encryption based on Module-NTRU problems
Shi Bai, Hansraj Jangir, Hao Lin, Tran Ngo, Weiqiang Wen, and Jinwei Zheng
2024/731
Toward Full $n$-bit Security and Nonce Misuse Resistance of Block Cipher-based MACs
Wonseok Choi, Jooyoung Lee, and Yeongmin Lee
2024/730
New Solutions to Delsarte's Dual Linear Programs
André Chailloux and Thomas Debris-Alazard
2024/729
Covert Adaptive Adversary Model: A New Adversary Model for Multiparty Computation
Isheeta Nargis and Anwar Hasan
2024/728
Relativized Succinct Arguments in the ROM Do Not Exist
Annalisa Barbara, Alessandro Chiesa, and Ziyi Guan
2024/727
Let Attackers Program Ideal Models: Modularity and Composability for Adaptive Compromise
Joseph Jaeger
2024/726
Challenger: Blockchain-based Massively Multiplayer Online Game Architecture
Boris Chan Yip Hon, Bilel Zaghdoudi, Maria Potop-Butucaru, Sébastien Tixeuil, and Serge Fdida
2024/725
Multi User Security of LightMAC and LightMAC_Plus
Nilanjan Datta, Shreya Dey, Avijit Dutta, and Devdutto Kanungo
2024/724
zkSNARKs in the ROM with Unconditional UC-Security
Alessandro Chiesa and Giacomo Fenzi
2024/723
$\mathsf{OPA}$: One-shot Private Aggregation with Single Client Interaction and its Applications to Federated Learning
Harish Karthikeyan and Antigoni Polychroniadou
2024/722
Ultrametric integral cryptanalysis
Tim Beyne and Michiel Verbauwhede
2024/721
Real-world Universal zkSNARKs are non-malleable
Antonio Faonio, Dario Fiore, and Luigi Russo
2024/720
Multivariate Blind Signatures Revisited
Ward Beullens
2024/719
Client-Efficient Online-Offline Private Information Retrieval
Hoang-Dung Nguyen, Jorge Guajardo, and Thang Hoang
2024/718
PAC-Private Algorithms
Mayuri Sridhar, Hanshen Xiao, and Srinivas Devadas
2024/717
An Improved Threshold Homomorphic Cryptosystem Based on Class Groups
Lennart Braun, Guilhem Castagnos, Ivan Damgård, Fabien Laguillaumie, Kelsey Melissaris, Claudio Orlandi, and Ida Tucker
2024/716
Unclonable Secret Sharing
Prabhanjan Ananth, Vipul Goyal, Jiahui Liu, and Qipeng Liu
2024/715
A New Cryptographic Algorithm
Ali Mahdoum
2024/714
Learning with Quantization: Construction, Hardness, and Applications
Shanxiang Lyu, Ling Liu, and Cong Ling
2024/713
Analyzing Pump and jump BKZ algorithm using dynamical systems
Leizhang Wang
2024/712
Quantum NV Sieve on Grover for Solving Shortest Vector Problem
Hyunji Kim, Kyungbae Jang, Hyunjun Kim, Anubhab Baksi, Sumanta Chakraborty, and Hwajeong Seo
2024/711
Non-Transferable Anonymous Tokens by Secret Binding
F. Betül Durak, Laurane Marco, Abdullah Talayhan, and Serge Vaudenay
2024/710
BUFFing FALCON without Increasing the Signature Size
Samed Düzlü, Rune Fiedler, and Marc Fischlin
2024/709
Masked Computation the Floor Function and its Application to the FALCON Signature
Pierre-Augustin Berthet, Justine Paillet, and Cédric Tavernier
2024/708
Automated Generation of Fault-Resistant Circuits
Nicolai Müller and Amir Moradi
2024/707
Towards a Polynomial Instruction Based Compiler for Fully Homomorphic Encryption Accelerators
Sejun Kim, Wen Wang, Duhyeong Kim, Adish Vartak, Michael Steiner, and Rosario Cammarota
2024/706
Linicrypt in the Ideal Cipher Model
Zahra Javar and Bruce M. Kapron
2024/705
Large-Scale MPC: Scaling Private Iris Code Uniqueness Checks to Millions of Users
Remco Bloemen, Bryan Gillespie, Daniel Kales, Philipp Sippl, and Roman Walch
2024/704
Fully Automated Selfish Mining Analysis in Efficient Proof Systems Blockchains
Krishnendu Chatterjee, Amirali Ebrahim-Zadeh, Mehrdad Karrabi, Krzysztof Pietrzak, Michelle Yeo, and Djordje Zikelic
2024/703
An Efficient and Extensible Zero-knowledge Proof Framework for Neural Networks
Tao Lu, Haoyu Wang, Wenjie Qu, Zonghui Wang, Jinye He, Tianyang Tao, Wenzhi Chen, and Jiaheng Zhang
2024/702
Security Analysis of Signal's PQXDH Handshake
Rune Fiedler and Felix Günther
2024/701
Quantum Unpredictability
Tomoyuki Morimae, Shogo Yamada, and Takashi Yamakawa
2024/700
Sublinear Distributed Product Checks on Replicated Secret-Shared Data over $\mathbb{Z}_{2^k}$ Without Ring Extensions
Yun Li, Daniel Escudero, Yufei Duan, Zhicong Huang, Cheng Hong, Chao Zhang, and Yifan Song
2024/699
An Efficient All-to-All GCD Algorithm for Low Entropy RSA Key Factorization
Elijah Pelofske
2024/698
Private Computations on Streaming Data
Vladimir Braverman, Kevin Garbe, Eli Jaffe, and Rafail Ostrovsky
2024/697
LINE: Cryptosystem based on linear equations for logarithmic signatures
Gennady Khalimov, Yevgen Kotukh, Maksym Kolisnyk, Svitlana Khalimova, and Oleksandr Sievierinov
2024/696
A Theoretical Take on a Practical Consensus Protocol
Victor Shoup
2024/695
Beale Cipher 1 and Cipher 3: Numbers With No Messages
Richard Wassmer
2024/694
Lower-Bounds on Public-Key Operations in PIR
Jesko Dujmovic and Mohammad Hajiabadi
2024/693
A Note on Gröbner Bases for Anemoi
Pierre Briaud
2024/692
Blink: An Optimal Proof of Proof-of-Work
Lukas Aumayr, Zeta Avarikioti, Matteo Maffei, Giulia Scaffino, and Dionysis Zindros
2024/691
White-box filtering attacks breaking SEL masking: from exponential to polynomial time
Alex Charlès and Aleksei Udovenko
2024/690
LPN-based Attacks in the White-box Setting
Alex Charlès and Aleksei Udovenko
2024/689
Automated Creation of Source Code Variants of a Cryptographic Hash Function Implementation Using Generative Pre-Trained Transformer Models
Elijah Pelofske, Vincent Urias, and Lorie M. Liebrock
2024/688
Succinct Functional Commitments for Circuits from k-Lin
Hoeteck Wee and David J. Wu
2024/687
Lower Bounds for Levin–Kolmogorov Complexity
Nicholas Brandt
2024/686
Unstructured Inversions of New Hope
Ian Malloy
2024/685
Committing AVID with Partial Retrieval and Optimal Storage
Nicolas Alhaddad, Leonid Reyzin, and Mayank Varia
2024/684
A Plug-and-Play Long-Range Defense System for Proof-of-Stake Blockchains
Lucien K. L. Ng, Panagiotis Chatzigiannis, Duc V. Le, Mohsen Minaei, Ranjit Kumaresan, and Mahdi Zamani
2024/683
A note on ``a new password-authenticated module learning with rounding-based key exchange protocol: Saber.PAKE''
Zhengjun Cao and Lihua Liu
2024/682
Approximate PSI with Near-Linear Communication
Wutichai Chongchitmate, Steve Lu, and Rafail Ostrovsky
2024/681
HRA-Secure Homomorphic Lattice-Based Proxy Re-Encryption with Tight Security
Aloni Cohen, David Bruce Cousins, Nicholas Genise, Erik Kline, Yuriy Polyakov, and Saraswathy RV
2024/680
Universal Vector Commitments
Ojaswi Acharya, Foteini Baldimtsi, Samuel Dov Gordon, Daniel McVicker, and Aayush Yadav
2024/679
Isotropic Quadratic Forms, Diophantine equations and Digital Signatures, DEFIv2
Martin Feussner and Igor Semaev
2024/678
Quantum-Safe Account Recovery for WebAuthn
Douglas Stebila and Spencer Wilson
2024/677
Asynchronous Consensus without Trusted Setup or Public-Key Cryptography
Sourav Das, Sisi Duan, Shengqi Liu, Atsuki Momose, Ling Ren, and Victor Shoup
2024/676
Composing Timed Cryptographic Protocols: Foundations and Applications
Karim Eldefrawy, Benjamin Terner, and Moti Yung
2024/675
Privacy-Preserving Blueprints via Succinctly Verifiable Computation over Additively-Homomorphically Encrypted Data
Scott Griffy, Markulf Kohlweiss, Anna Lysyanskaya, and Meghna Sengupta
2024/674
SigmaSuite: How to Minimize Foreign Arithmetic in ZKP Circuits While Keeping Succinct Final Verification.
Wyatt Benno
2024/673
Chocobo: Creating Homomorphic Circuit Operating with Functional Bootstrapping in basis B
Pierre-Emmanuel Clet, Aymen Boudguiga, and Renaud Sirdey
2024/672
Secure Coded Distributed Computing and Extensions to Multiple Access Setting
Shanuja Sasi and Onur Gunlu
2024/671
Exploiting Internal Randomness for Privacy in Vertical Federated Learning
Yulian Sun, Li Duan, Ricardo Mendes, Derui Zhu, Yue Xia, Yong Li, and Asja Fischer
2024/670
Secure Implementation of SRAM PUF for Private Key Generation
Raja Adhithan Radhakrishnan
2024/669
Mempool Privacy via Batched Threshold Encryption: Attacks and Defenses
Arka Rai Choudhuri, Sanjam Garg, Julien Piet, and Guru-Vamsi Policharla
2024/668
Blockchain Price vs. Quantity Controls
Abdoulaye Ndiaye
2024/667
Agile, Post-quantum Secure Cryptography in Avionics
Karolin Varner, Wanja Zaeske, Sven Friedrich, Aaron Kaiser, and Alice Bowman
2024/666
Private Analytics via Streaming, Sketching, and Silently Verifiable Proofs
Mayank Rathee, Yuwen Zhang, Henry Corrigan-Gibbs, and Raluca Ada Popa
2024/665
Homomorphic Evaluation of LWR-based PRFs and Application to Transciphering
Amit Deo, Marc Joye, Benoit Libert, Benjamin R. Curtis, and Mayeul de Bellabre
2024/664
Pando: Extremely Scalable BFT Based on Committee Sampling
Xin Wang, Haochen Wang, Haibin Zhang, and Sisi Duan
2024/663
Xproofs: New Aggregatable and Maintainable Matrix Commitment with Optimal Proof Size
Xinwei Yong, Jiaojiao Wu, and Jianfeng Wang
2024/662
Faster Private Decision Tree Evaluation for Batched Input from Homomorphic Encryption
Kelong Cong, Jiayi Kang, Georgio Nicolas, and Jeongeun Park
2024/661
On amortization techniques for FRI-based SNARKs
Albert Garreta, Hayk Hovhanissyan, Aram Jivanyan, Ignacio Manzur, Isaac Villalobos, and Michał Zając
2024/660
FE[r]Chain: Enforcing Fairness in Blockchain Data Exchanges Through Verifiable Functional Encryption
Camille Nuoskala, Reyhaneh Rabbaninejad, Tassos Dimitriou, and Antonis Michalas
2024/659
Secure Latent Dirichlet Allocation
Thijs Veugen, Vincent Dunning, Michiel Marcus, and Bart Kamphorst
2024/658
Information-theoretic security with asymmetries
Tim Beyne and Yu Long Chen
2024/657
Cryptographic Accumulators: New Definitions, Enhanced Security, and Delegatable Proofs
Anaïs Barthoulot, Olivier Blazy, and Sébastien Canard
2024/656
Cryptanalytic Audit of the XHash Sponge Function and its Components
Vincent Rijmen
2024/655
Implementation and Performance Analysis of Homomorphic Signature Schemes
Davide Carnemolla, Dario Catalano, Mario Di Raimondo, and Federico Savasta
2024/654
Monchi: Multi-scheme Optimization For Collaborative Homomorphic Identification
Alberto Ibarrondo, Ismet Kerenciler, Hervé Chabanne, Vincent Despiegel, and Melek Önen
2024/653
Aether: Approaching the Holy Grail in Asynchronous BFT
Xiaohai Dai, Chaozheng Ding, Hai Jin, Julian Loss, and Ling Ren
2024/652
Compact and Secure Zero-Knowledge Proofs for Quantum-Resistant Cryptography from Modular Lattice Innovations
Samuel Lavery
2024/651
A New Hash-based Enhanced Privacy ID Signature Scheme
Liqun Chen, Changyu Dong, Nada El Kassem, Christopher J.P. Newton, and Yalan Wang
2024/650
Hash-based Direct Anonymous Attestation
Liqun Chen, Changyu Dong, Nada El Kassem, Christopher J.P. Newton, and Yalan Wang
2024/649
Sphinx-in-the-Head: Group Signatures from Symmetric Primitives
Liqun Chen, Changyu Dong, Christopher J. P. Newton, and Yalan Wang
2024/648
Encrypted KNN Implementation on Distributed Edge Device Network
B Pradeep Kumar Reddy, Ruchika Meel, and Ayantika Chatterjee
2024/647
Weightwise (almost) perfectly balanced functions based on total orders
Pierrick Méaux
2024/646
Efficient Quantum Algorithm for SUBSET-SUM Problem
Sanchita Ghosh, Anant Sharma, Sreetama Das, and Shibdas Roy
2024/645
Toward Key Independent Encryption based on Q-Problem
Abdelkader Laouid, Mostefa Kara, Mohammad Hammoudeh, and Abdullah T. Al-Essa
2024/644
Jumping for Bernstein-Yang Inversion
Li-Jie Jian, Ting-Yuan Wang, Bo-Yin Yang, and Ming-Shing Chen
2024/643
Key-Homomorphic and Aggregate Verifiable Random Functions
Giulio Malavolta
2024/642
GraphOS: Towards Oblivious Graph Processing
Javad Ghareh Chamani, Ioannis Demertzis, Dimitrios Papadopoulos, Charalampos Papamanthou, and Rasool Jalili
2024/641
Rondo: Scalable and Reconfiguration-Friendly Randomness Beacon
Xuanji Meng, Xiao Sui, Zhaoxin Yang, Kang Rong, Wenbo Xu, Shenglong Chen, Ying Yan, and Sisi Duan
2024/640
On Proving Pairings
Andrija Novakovic and Liam Eagen
2024/639
Computational Attestations of Polynomial Integrity Towards Verifiable Machine Learning
Dustin Ray and Caroline El Jazmi
2024/638
A note on ``a lightweight mutual and transitive authentication mechanism for IoT network''
Zhengjun Cao and Lihua Liu
2024/637
Towards Permissionless Consensus in the Standard Model via Fine-Grained Complexity
Marshall Ball, Juan Garay, Peter Hall, Aggelos Kiayias, and Giorgos Panagiotakos
2024/636
Regev Factoring Beyond Fibonacci: Optimizing Prefactors
Seyoon Ragavan
2024/635
Organizing Records for Retrieval in Multi-Dimensional Range Searchable Encryption
Mahdieh Heidaripour, Ladan Kian, Maryam Rezapour, Mark Holcomb, Benjamin Fuller, Gagan Agrawal, and Hoda Maleki
2024/634
NTRU-based FHE for Larger Key and Message Space
Robin Jadoul, Axel Mertens, Jeongeun Park, and Hilder V. L. Pereira
2024/633
Vision Mark-32: ZK-Friendly Hash Function Over Binary Tower Fields
Tomer Ashur, Mohammad Mahzoun, Jim Posen, and Danilo Šijačić
2024/632
Further Investigations on Nonlinear Complexity of Periodic Binary Sequences
Qin Yuan, Chunlei Li, Xiangyong Zeng, Tor Helleseth, and Debiao He
2024/631
BackMon: IC Backside Tamper Detection using On-Chip Impedance Monitoring
Tahoura Mosavirik and Shahin Tajik
2024/630
Conditional disclosure of secrets with quantum resources
Vahid R. Asadi, Kohdai Kuroiwa, Debbie Leung, Alex May, Sabrina Pasterski, and Chris Waddell
2024/629
Unconditional correctness of recent quantum algorithms for factoring and computing discrete logarithms
Cédric Pilatte
2024/628
MUSEN: Aggregatable Key-Evolving Verifiable Random Functions and Applications
Bernardo David, Rafael Dowsley, Anders Konring, and Mario Larangeira
2024/627
Distributed & Scalable Oblivious Sorting and Shuffling
Nicholas Ngai, Ioannis Demertzis, Javad Ghareh Chamani, and Dimitrios Papadopoulos
2024/626
Exponential Quantum Speedup for the Traveling Salesman Problem
Anant Sharma, Nupur Deshpande, Sanchita Ghosh, Sreetama Das, and Shibdas Roy
2024/625
Interactive Threshold Mercurial Signatures and Applications
Masayuki Abe, Masaya Nanri, Octavio Perez Kempner, and Mehdi Tibouchi
2024/624
POKE: A Framework for Efficient PKEs, Split KEMs, and OPRFs from Higher-dimensional Isogenies
Andrea Basso
2024/623
Complete group law for genus 2 Jacobians on Jacobian coordinates
Elif Ozbay Gurler and Huseyin Hisil
2024/622
Deep Selfish Proposing in Longest-Chain Proof-of-Stake Protocols
Roozbeh Sarenche, Svetla Nikova, and Bart Preneel
2024/621
How to Lose Some Weight - A Practical Template Syndrome Decoding Attack
Sebastian Bitzer, Jeroen Delvaux, Elena Kirshanova, Sebastian Maaßen, Alexander May, and Antonia Wachter-Zeh
2024/620
New SAT-based Model for Quantum Circuit Decision Problem: Searching for Low-Cost Quantum Implementation
Jingwen Chen, Qun Liu, Yanhong Fan, Lixuan Wu, Boyun Li, and Meiqin Wang
2024/619
BPDTE: Batch Private Decision Tree Evaluation via Amortized Efficient Private Comparison
Huiqiang Liang, Haining Lu, and Geng Wang
2024/618
Efficient KZG-based Univariate Sum-check and Lookup Argument
Yuncong Zhang, Shi-Feng Sun, and Dawu Gu
2024/617
Lattice-Based Succinct Mercurial Functional Commitment for Boolean Circuits: Definitions and Constructions
Hongxiao Wang, Siu-Ming Yiu, Yanmin Zhao, Zoe L. Jiang, and Min Xie
2024/616
$\mathsf{Cougar}$: Cubic Root Verifier Inner Product Argument under Discrete Logarithm Assumption
Hyeonbum Lee, Seunghun Paik, Hyunjung Son, and Jae Hong Seo
2024/615
Subverting Cryptographic Protocols from A Fine-Grained Perspective - A Case Study on 2-Party ECDSA
Jialiu Cheng, Yi Wang, Rongmao Chen, and Xinyi Huang
2024/614
Non-interactive Blind Signatures: Post-quantum and Stronger Security
Foteini Baldimtsi, Jiaqi Cheng, Rishab Goyal, and Aayush Yadav
2024/613
Hadamard Product Argument from Lagrange-Based Univariate Polynomials
Jie Xie, Yuncong Hu, and Yu Yu
2024/612
FHERMA: Building the Open-Source FHE Components Library for Practical Use
Gurgen Arakelov, Nikita Kaskov, Daria Pianykh, and Yuriy Polyakov
2024/611
A Security Analysis of Restricted Syndrome Decoding Problems
Ward Beullens, Pierre Briaud, and Morten Øygarden
2024/610
Practical Delegatable Attribute-Based Anonymous Credentials with Chainable Revocation
Min Xie, Peichen Ju, Yanqi Zhao, Zoe Lin Jiang, Junbin Fang, Yong Yu, Xuan Wang, and Man Ho Au
2024/609
New Security Proofs and Techniques for Hash-and-Sign with Retry Signature Schemes
Benoît Cogliati, Pierre-Alain Fouque, Louis Goubin, and Brice Minaud
2024/608
The Practical Advantage of RSA over ECC and Pairings
Zhengjun Cao and Lihua Liu
2024/607
Low-latency Secure Integrated Sensing and Communication with Transmitter Actions
Truman Welling, Onur Gunlu, and Aylin Yener
2024/606
Classical Commitments to Quantum States
Sam Gunn, Yael Tauman Kalai, Anand Natarajan, and Agi Villanyi
2024/605
Security Analysis of XHASH8/12
Léo Perrin
2024/604
Generic MitM Attack Frameworks on Sponge Constructions
Xiaoyang Dong, Boxin Zhao, Lingyue Qin, Qingliang Hou, Shun Zhang, and Xiaoyun Wang
2024/603
Worst-Case to Average-Case Hardness of LWE: An Alternative Perspective
Divesh Aggarwal, Leong Jin Ming, and Alexandra Veliche
2024/602
Secret-Sharing Schemes for High Slices
Amos Beimel, Oriol Farràs, and Oded Nir
2024/601
Improved Provable Reduction of NTRU and Hypercubic Lattices
Henry Bambury and Phong Q. Nguyen
2024/600
A note on -Tweakable HCTR: A BBB Secure Tweakable Enciphering Scheme-
Mustafa Khairallah
2024/599
Probabilistically Checkable Arguments for all NP
Shany Ben-David
2024/598
Decryption Indistinguishability under Chosen Control Flow
Ganyuan Cao
2024/597
Blockchain-based decentralized identity system: Design and security analysis
Gewu BU, Serge Fdida, Maria Potop-Butucaru, and Bilel Zaghdoudi
2024/596
Cryptanalysis of signature schemes based on the root extraction problem over braid group
Djimnaibeye Sidoine, Guy Mobouale Wamba, Abiodoun Clement Hounkpevi, Tieudjo Daniel, and Djiby Sow
2024/595
Analysis of Multivariate Encryption Schemes: Application to Dob and C*
Morten Øygarden, Patrick Felke, and Håvard Raddum
2024/594
Greco: Fast Zero-Knowledge Proofs for Valid FHE RLWE Ciphertexts Formation
Enrico Bottazzi
2024/593
The Case of Small Prime Numbers Versus the Okamoto-Uchiyama Cryptosystem
George Teseleanu
2024/592
Asymptotics for the standard block size in primal lattice attacks: second order, formally verified
Daniel J. Bernstein
2024/591
Hash your Keys before Signing: BUFF Security of the Additional NIST PQC Signatures
Thomas Aulbach, Samed Düzlü, Michael Meyer, Patrick Struck, and Maximiliane Weishäupl
2024/590
Revisiting the Security of Fiat-Shamir Signature Schemes under Superposition Attacks
Quan Yuan, Chao Sun, and Tsuyoshi Takagi
2024/589
Blind-Folded: Simple Power Analysis Attacks using Data with a Single Trace and no Training
Xunyue Hu, Quentin L. Meunier, and Emmanuelle Encrenaz
2024/588
Digital Signatures for Authenticating Compressed JPEG Images
Simon Erfurth
2024/587
Hidden $\Delta$-fairness: A Novel Notion for Fair Secure Two-Party Computation
Saskia Bayreuther, Robin Berger, Felix Dörre, Jeremias Mechler, and Jörn Müller-Quade
2024/586
Encryption Based Covert Channel for Large Language Models
Yongge Wang
2024/585
A Complete Beginner Guide to the Number Theoretic Transform (NTT)
Ardianto Satriawan, Rella Mareta, and Hanho Lee
2024/584
Efficient Implementations of Square-root Vélu's Formulas
Jianming Lin, Weize Wang, Chang-An Zhao, and Yuhao Zheng
2024/583
A Note on Quantum Algorithms for Lattice Problems
Omri Shmueli
2024/582
Improved Alternating-Moduli PRFs and Post-Quantum Signatures
Navid Alamati, Guru-Vamsi Policharla, Srinivasan Raghuraman, and Peter Rindal
2024/581
Fault Attack on SQIsign
JeongHwan Lee, Donghoe Heo, Hyeonhak Kim, Gyusang Kim, Suhri Kim, Heeseok Kim, and Seokhie Hong
2024/580
Dynamic Decentralized Functional Encryptions from Pairings in the Standard Model
Duy Nguyen
2024/579
Tight Multi-user Security of Ascon and Its Large Key Extension
Bishwajit Chakraborty, Chandranan Dhar, and Mridul Nandi
2024/578
Assessing the quality of Random Number Generators through Neural Networks
José Luis Crespo, Javier González-Villa, Jaime Gutierrez, and Angel Valle
2024/577
Determination of cryptographic tables and properties related to the revised boomerang and its application to a fundamental S-box
Said Eddahmani and Sihem Mesnager
2024/576
On complexity of the problem of solving systems of tropical polynomial equations of degree two
Ivan Buchinskiy, Matvei Kotov, and Alexander Treier
2024/575
Pairing Optimizations for Isogeny-based Cryptosystems
Shiping Cai, Kaizhan Lin, and Chang-An Zhao
2024/574
PoMMES: Prevention of Micro-architectural Leakages in Masked Embedded Software
Jannik Zeitschner and Amir Moradi
2024/573
Tokenised Multi-client Provisioning for Dynamic Searchable Encryption with Forward and Backward Privacy
Arnab Bag, Sikhar Patranabis, and Debdeep Mukhopadhyay
2024/572
Split Gröbner Bases for Satisfiability Modulo Finite Fields
Alex Ozdemir, Shankara Pailoor, Alp Bassa, Kostas Ferles, Clark Barrett, and Işil Dillig
2024/571
MiniCast: Minimizing the Communication Complexity of Reliable Broadcast
Thomas Locher and Victor Shoup
2024/570
Actively Secure Private Set Intersection in the Client-Server Setting
Yunqing Sun, Jonathan Katz, Mariana Raykova, Phillipp Schoppmann, and Xiao Wang
2024/569
An overview of symmetric fuzzy PAKE protocols
Johannes Ottenhues
2024/568
Communication-Efficient Multi-Party Computation for RMS Programs
Thomas Attema, Aron van Baarsen, Stefan van den Berg, Pedro Capitão, Vincent Dunning, and Lisa Kohl
2024/567
Amortizing Circuit-PSI in the Multiple Sender/Receiver Setting
Aron van Baarsen and Marc Stevens
2024/566
A $3$-Round Near-Linear Third-Party Private Set Intersection Protocol
Foo Yee Yeo and Jason H. M. Ying
2024/565
On the construction of quantum circuits for S-boxes with different criteria based on the SAT solver
Da Lin, Chunli Yang, Shengyuan Xu, Shizhu Tian, Bing Sun
2024/564
Multiple Group Action Dlogs with(out) Precomputation
Alexander May and Massimo Ostuzzi
2024/563
A Note on Related-Tweakey Impossible Differential Attacks
Xavier Bonnetain and Virginie Lallemand
2024/562
Practical Proofs of Parsing for Context-free Grammars
Harjasleen Malvai, Siam Hussain, Gregory Neven, and Andrew Miller
2024/561
SQIAsignHD: SQIsignHD Adaptor Signature
Farzin Renan and Péter Kutas
2024/560
Two-Party Decision Tree Training from Updatable Order-Revealing Encryption
Robin Berger, Felix Dörre, Alexander Koch
2024/559
Convolution-Friendly Image Compression in FHE
Axel Mertens, Georgio Nicolas, Sergi Rovira
2024/558
Scoring the predictions: a way to improve profiling side-channel attacks
Damien Robissout, Lilian Bossuet, Amaury Habrard
2024/557
Permutation-Based Hash Chains with Application to Password Hashing
Charlotte Lefevre and Bart Mennink
2024/556
Menhir: An Oblivious Database with Protection against Access and Volume Pattern Leakage
Leonie Reichert, Gowri R Chandran, Phillipp Schoppmann, Thomas Schneider, and Björn Scheuermann
2024/555
Quantum Algorithms for Lattice Problems
Yilei Chen
2024/554
Leakage-Abuse Attacks Against Structured Encryption for SQL
Alexander Hoover, Ruth Ng, Daren Khu, Yao'an Li, Joelle Lim, Derrick Ng, Jed Lim, Yiyang Song
2024/553
Efficient Linkable Ring Signatures: New Framework and Post-Quantum Instantiations
Yuxi Xue, Xingye Lu, Man Ho Au, and Chengru Zhang
2024/552
Insights from building a blockchain-based metaverse
Mario Yaksetig
2024/551
Probabilistic Algorithms with applications to countering Fault Attacks on Lattice based Post-Quantum Cryptography
Nimish Mishra, Debdeep Mukhopadhyay
2024/550
Fast Parallelizable Misuse-Resistant Authenticated Encryption: Low Latency (Decryption-Fast) SIV
Mustafa Khairallah
2024/549
Integral Attack on the Full FUTURE Block Cipher
Zeyu Xu, Jiamin Cui, Kai Hu, Meiqin Wang
2024/548
Efficient isochronous fixed-weight sampling with applications to NTRU
Décio Luiz Gazzoni Filho, Tomás S. R. Silva, and Julio López
2024/547
Efficient Permutation Correlations and Batched Random Access for Two-Party Computation
Stanislav Peceny, Srinivasan Raghuraman, Peter Rindal, and Harshal Shah
2024/546
Share with Care: Breaking E2EE in Nextcloud
Martin R. Albrecht, Matilda Backendal, Daniele Coppola, Kenneth G. Paterson
2024/545
Optimal Asynchronous Byzantine Consensus with Fair Separability
Vincent Gramoli, Zhenliang Lu, Qiang Tang, and Pouriya Zarbafian
2024/544
A post-quantum Distributed OPRF from the Legendre PRF
Novak Kaluderovic, Nan Cheng, and Katerina Mitrokotsa
2024/543
A Note on the Common Haar State Model
Prabhanjan Ananth, Aditya Gulati, and Yao-Ting Lin
2024/542
Breaking Bicoptor from S$\&$P 2023 Based on Practical Secret Recovery Attack
Jun Xu, Zhiwei Li, and Lei Hu
2024/541
Dual Support Decomposition in the Head: Shorter Signatures from Rank SD and MinRank
Loïc Bidoux, Thibauld Feneuil, Philippe Gaborit, Romaric Neveu, and Matthieu Rivain
2024/540
Lattice-Based Timed Cryptography
Russell W. F. Lai and Giulio Malavolta
2024/539
Supersingular Hashing using Lattès Maps
Daniel Larsson
2024/538
A comment on "Comparing the MOV and FR reductions in elliptic curve cryptography" from EUROCRYPT'99
Qiping Lin and Fengmei Liu
2024/537
Confidential and Verifiable Machine Learning Delegations on the Cloud
Wenxuan Wu, Soamar Homsi, and Yupeng Zhang
2024/536
Public-Algorithm Substitution Attacks: Subverting Hashing and Verification
Mihir Bellare, Doreen Riepel, and Laura Shea
2024/535
NodeGuard: A Highly Efficient Two-Party Computation Framework for Training Large-Scale Gradient Boosting Decision Tree
Tianxiang Dai, Yufan Jiang, Yong Li, and Fei Mei
2024/534
CryptoVampire: Automated Reasoning for the Complete Symbolic Attacker Cryptographic Model
Simon Jeanteur, Laura Kovács, Matteo Maffei, and Michael Rawson
2024/533
HyCaMi: High-Level Synthesis for Cache Side-Channel Mitigation
Heiko Mantel, Joachim Schmidt, Thomas Schneider, Maximilian Stillger, Tim Weißmantel, and Hossein Yalame
2024/532
Analysing Cryptography in the Wild - A Retrospective
Martin R. Albrecht and Kenneth G. Paterson
2024/531
Avoiding Trusted Setup in Isogeny-based Commitments
Gustave Tchoffo Saah, Tako Boris Fouotsa, Emmanuel Fouotsa, and Célestin Nkuimi-Jugnia
2024/530
An efficient key generation algorithm for GR-NTRU over dihedral group
Vikas Kumar, Ali Raya, and Aditi Kar Gangopadhyay
2024/529
Fully Homomorphic Training and Inference on Binary Decision Tree and Random Forest
Hojune Shin, Jina Choi, Dain Lee, Kyoungok Kim, and Younho Lee
2024/528
The solving degrees for computing Gröbner bases of affine semi-regular polynomial sequences
Momonari Kudo and Kazuhiro Yokoyama
2024/527
Slice more? It leaks: Analysis on the paper ``On the Feasibility of Sliced Garbling''
Taechan Kim
2024/526
Optimizing and Implementing Fischlin's Transform for UC-Secure Zero-Knowledge
Yi-Hsiu Chen and Yehuda Lindell
2024/525
Privacy Preserving Biometric Authentication for Fingerprints and Beyond
Marina Blanton and Dennis Murphy
2024/524
A Time-Space Tradeoff for the Sumcheck Prover
Alessandro Chiesa, Elisabetta Fedele, Giacomo Fenzi, and Andrew Zitek-Estrada
2024/523
Unbindable Kemmy Schmidt: ML-KEM is neither MAL-BIND-K-CT nor MAL-BIND-K-PK
Sophie Schmieg
2024/522
Cryptanalysis of Secure and Lightweight Conditional Privacy-Preserving Authentication for Securing Traffic Emergency Messages in VANETs
Mahender Kumar
2024/521
LIT-SiGamal: An efficient isogeny-based PKE based on a LIT diagram
Tomoki Moriya
2024/520
A note on securing insertion-only Cuckoo filters
Fernando Virdia and Mia Filić
2024/519
On implementation of Stickel's key exchange protocol over max-min and max-$T$ semirings
Sulaiman Alhussaini and Serge˘ı Sergeev
2024/518
Software-Defined Cryptography: A Design Feature of Cryptographic Agility
Jihoon Cho, Changhoon Lee, Eunkyung Kim, Jieun Lee, and Beumjin Cho
2024/517
Fast pairings via biextensions and cubical arithmetic
Damien Robert
2024/516
Similar Data is Powerful: Enhancing Inference Attacks on SSE with Volume Leakages
Björn Ho, Huanhuan Chen, Zeshun Shi, and Kaitai Liang
2024/515
Inject Less, Recover More: Unlocking the Potential of Document Recovery in Injection Attacks Against SSE
Manning Zhang, Zeshun Shi, Huanhuan Chen, and Kaitai Liang
2024/514
Zero-Knowledge Proof Vulnerability Analysis and Security Auditing
Xueyan Tang, Lingzhi Shi, Xun Wang, Kyle Charbonnet, Shixiang Tang, and Shixiao Sun
2024/513
Quantum Implementation and Analysis of SHA-2 and SHA-3
Kyungbae Jang, Sejin Lim, Yujin Oh, Hyunjun Kim, Anubhab Baksi, Sumanta Chakraborty, and Hwajeong Seo
2024/512
Single Trace is All It Takes: Efficient Side-channel Attack on Dilithium
Zehua Qiao, Yuejun Liu, Yongbin Zhou, Yuhan Zhao, and Shuyi Chen
2024/511
A Black-box Attack on Fixed-Unitary Quantum Encryption Schemes
Cezary Pilaszewicz, Lea R. Muth, and Marian Margraf
2024/510
Snake-eye Resistance from LWE for Oblivious Message Retrieval and Robust Encryption
Zeyu Liu, Katerina Sotiraki, Eran Tromer, and Yunhao Wang
2024/509
Distribution of cycles in supersingular $\ell$-isogeny graphs
Eli Orvis
2024/508
Secure Multi-Party Linear Algebra with Perfect Correctness
Jules Maire and Damien Vergnaud
2024/507
An Efficient SNARK for Field-Programmable and RAM Circuits
Jehyuk Jang and Jamie Judd
2024/506
A Decentralized Federated Learning using Reputation
Olive Chakraborty and Aymen Boudguiga
2024/505
RSA-Based Dynamic Accumulator without Hashing into Primes
Victor Youdom Kemmoe and Anna Lysyanskaya
2024/504
Polylogarithmic Proofs for Multilinears over Binary Towers
Benjamin E. Diamond and Jim Posen
2024/503
Two Levels are Better than One: Dishonest Majority MPC with $\widetilde{O}(|C|)$ Total Communication
Alexander Bienstock and Kevin Yeo
2024/502
Best of Two Worlds: Efficient, Usable and Auditable Biometric ABC on the Blockchain
Neyire Deniz Sarier
2024/501
Anonymous Revocable Identity-Based Encryption Supporting Anonymous Revocation
Kwangsu Lee
2024/500
Side Channel Resistant Sphincs+
Scott Fluhrer
2024/499
CCA Secure Updatable Encryption from Non-Mappable Group Actions
Jonas Meers and Doreen Riepel
2024/498
Number-Theoretic Transform Architecture for Fully Homomorphic Encryption from Hypercube Topology
Jingwei Hu, Yuhong Fang, and Wangchen Dai
2024/497
On the Security of Data Markets and Private Function Evaluation
István Vajda
2024/496
Two-Round Threshold Signature from Algebraic One-More Learning with Errors
Thomas Espitau, Shuichi Katsumata, and Kaoru Takemure
2024/495
Reducing Signature Size of Matrix-code-based Signature Schemes
Tung Chou, Ruben Niederhagen, Lars Ran, and Simona Samardjiska
2024/494
HW-token-based Common Random String Setup
István Vajda
2024/493
Reckle Trees: Updatable Merkle Batch Proofs with Applications
Charalampos Papamanthou, Shravan Srinivasan, Nicolas Gailly, Ismael Hishon-Rezaizadeh, Andrus Salumets, and Stjepan Golemac
2024/492
Statistical testing of random number generators and their improvement using randomness extraction
Cameron Foreman, Richie Yeung, and Florian J. Curchod
2024/491
Updatable Policy-Compliant Signatures
Christian Badertscher, Monosij Maitra, Christian Matt, and Hendrik Waldner
2024/490
One Tree to Rule Them All: Optimizing GGM Trees and OWFs for Post-Quantum Signatures
Carsten Baum, Ward Beullens, Shibam Mukherjee, Emmanuela Orsini, Sebastian Ramacher, Christian Rechberger, Lawrence Roy, and Peter Scholl
2024/489
Guess and Determine Analysis Based on Set Split
Zhe CEN, Xiutao FENG, Zhangyi WANG, Yamin ZHU, and Chunping CAO
2024/488
Improving Generic Attacks Using Exceptional Functions
Xavier Bonnetain, Rachelle Heim Boissier, Gaëtan Leurent, and André Schrottenloher
2024/487
Real-Valued Somewhat-Pseudorandom Unitaries
Zvika Brakerski and Nir Magrafta
2024/486
Anamorphic Encryption: New Constructions and Homomorphic Realizations
Dario Catalano, Emanuele Giunta, and Francesco Migliaro
2024/485
A Variation on Knellwolf and Meier's Attack on the Knapsack Generator
Florette Martinez
2024/484
Harmonizing PUFs for Forward Secure Authenticated Key Exchange with Symmetric Primitives
Harishma Boyapally, Durba Chatterjee, Kuheli Pratihar, Sayandeep Saha, Debdeep Mukhopadhyay, and Shivam Bhasin
2024/483
Lower data attacks on Advanced Encryption Standard
Orhun Kara
2024/482
$\textsf{ThorPIR}$: Single Server PIR via Homomorphic Thorp Shuffles
Ben Fisch, Arthur Lazzaretti, Zeyu Liu, and Charalampos Papamanthou
2024/481
Watermarkable and Zero-Knowledge Verifiable Delay Functions from any Proof of Exponentiation
Charlotte Hoffmann and Krzysztof Pietrzak
2024/480
Folding-based zkLLM
Wilbert W
2024/479
Making Hash-based MVBA Great Again
Hanwen Feng, Zhenliang Lu, Tiancheng Mai, and Qiang Tang
2024/478
The Insecurity of SHA2 under the Differential Fault Characteristic of Boolean Functions
Weiqiong Cao, Hua Chen, Hongsong Shi, Haoyuan Li, and Jian Wang
2024/477
Large Language Models for Blockchain Security: A Systematic Literature Review
Zheyuan He, Zihao Li, Sen Yang, Ao Qiao, Xiaosong Zhang, Xiapu Luo, and Ting Chen
2024/476
OPSA: Efficient and Verifiable One-Pass Secure Aggregation with TEE for Federated Learning
Zhangshuang Guan, Yulin Zhao, Zhiguo Wan, and Jinsong Han
2024/475
CheckOut: User-Controlled Anonymization for Customer Loyalty Programs
Matthew Gregoire, Rachel Thomas, and Saba Eskandarian
2024/474
Accumulation without Homomorphism
Benedikt Bünz, Pratyush Mishra, Wilson Nguyen, and William Wang
2024/473
Extremely Simple (Almost) Fail-Stop ECDSA Signatures
Mario Yaksetig
2024/472
Sailfish: Towards Improving the Latency of DAG-based BFT
Nibesh Shrestha, Rohan Shrothrium, Aniket Kate, and Kartik Nayak
2024/471
Knot-based Key Exchange protocol
Silvia Sconza and Arno Wildi
2024/470
Fast Secure Computations on Shared Polynomials and Applications to Private Set Operations
Pascal Giorgi, Fabien Laguillaumie, Lucas Ottow, and Damien Vergnaud
2024/469
Malicious Security for Sparse Private Histograms
Lennart Braun, Adrià Gascón, Mariana Raykova, Phillipp Schoppmann, and Karn Seth
2024/468
Zero-Dimensional Gröbner Bases for Rescue-XLIX
Matthias Johann Steiner
2024/467
Partially Non-Interactive Two-Round Lattice-Based Threshold Signatures
Rutchathon Chairattana-Apirom, Stefano Tessaro, and Chenzhi Zhu
2024/466
Arctic: Lightweight and Stateless Threshold Schnorr Signatures
Chelsea Komlo and Ian Goldberg
2024/465
Shorter VOLEitH Signature from Multivariate Quadratic
Dung Bui
2024/464
ON THE IMPLEMENTATION OF A LATTICE-BASED DAA FOR VANET SYSTEM
Doryan Lesaignoux and Mikael Carmona
2024/463
Security Guidelines for Implementing Homomorphic Encryption
Jean-Philippe Bossuat, Rosario Cammarota, Ilaria Chillotti, Benjamin R. Curtis, Wei Dai, Huijing Gong, Erin Hales, Duhyeong Kim, Bryan Kumara, Changmin Lee, Xianhui Lu, Carsten Maple, Alberto Pedrouzo-Ulloa, Rachel Player, Yuriy Polyakov, Luis Antonio Ruiz Lopez, Yongsoo Song, and Donggeon Yhee
2024/462
Perfect Zero-Knowledge PCPs for #P
Tom Gur, Jack O'Connor, and Nicholas Spooner
2024/461
Atlas-X Equity Financing: Unlocking New Methods to Securely Obfuscate Axe Inventory Data Based on Differential Privacy
Antigoni Polychroniadou, Gabriele Cipriani, Richard Hua, and Tucker Balch
2024/460
Encrypted Image Classification with Low Memory Footprint using Fully Homomorphic Encryption
Lorenzo Rovida and Alberto Leporati
2024/459
Isogeny problems with level structure
Luca De Feo, Tako Boris Fouotsa, and Lorenz Panny
2024/458
Classical and Quantum Generic Attacks on 6-round Feistel Schemes
Maya Chartouny, Benoit Cogliati, and Jacques Patarin
2024/457
Studying Lattice-Based Zero-Knowlege Proofs: A Tutorial and an Implementation of Lantern
Lena Heimberger, Florian Lugstein, and Christian Rechberger
2024/456
Tight ZK CPU: Batched ZK Branching with Cost Proportional to Evaluated Instruction
Yibin Yang, David Heath, Carmit Hazay, Vladimir Kolesnikov, and Muthuramakrishnan Venkitasubramaniam
2024/455
Anonymous Complaint Aggregation for Secure Messaging
Connor Bell and Saba Eskandarian
2024/454
The Systemic Errors of Banded Quantum Fourier Transformation
Zhengjun Cao and Zhenfu Cao
2024/453
Verifiable Information-Theoretic Function Secret Sharing
Stanislav Kruglik, Son Hoang Dau, Han Mao Kiah, Huaxiong Wang, and Liang Feng Zhang
2024/452
Modeling Mobile Crash in Byzantine Consensus
Hans Schmiedel, Runchao Han, Qiang Tang, Ron Steinfeld, and Jiangshan Yu
2024/451
Towards Verifiable FHE in Practice: Proving Correct Execution of TFHE's Bootstrapping using plonky2
Louis Tremblay Thibault and Michael Walter
2024/450
The 2Hash OPRF Framework and Efficient Post-Quantum Instantiations
Ward Beullens, Lucas Dodgson, Sebastian Faller, and Julia Hesse
2024/449
Practical Lattice-Based Distributed Signatures for a Small Number of Signers
Nabil Alkeilani Alkadri, Nico Döttling, and Sihang Pu
2024/448
Differential Cryptanalysis of a Lightweight Block Cipher LELBC
Manjeet Kaur, Tarun Yadav, Manoj Kumar, and Dhananjoy Dey
2024/447
ORIGO: Proving Provenance of Sensitive Data with Constant Communication
Jens Ernstberger, Jan Lauinger, Yinnan Wu, Arthur Gervais, and Sebastian Steinhorst
2024/446
Estimating the Unpredictability of Multi-Bit Strong PUF Classes
Ahmed Bendary, Wendson A. S. Barbosa, Andrew Pomerance, and C. Emre Koksal
2024/445
Threshold Structure-Preserving Signatures: Strong and Adaptive Security under Standard Assumptions
Aikaterini Mitrokotsa, Sayantan Mukherjee, Mahdi Sedaghat, Daniel Slamanig, and Jenit Tomy
2024/444
A trust-minimized e-cash for cryptocurrencies
Mario Yaksetig
2024/443
The cool and the cruel: separating hard parts of LWE secrets
Niklas Nolte, Mohamed Malhou, Emily Wenger, Samuel Stevens, Cathy Yuanchen Li, Francois Charton, and Kristin Lauter
2024/442
Fastcrypto: Pioneering Cryptography Via Continuous Benchmarking
Kostas Kryptos Chalkias, Jonas Lindstrøm, Deepak Maram, Ben Riva, Arnab Roy, Alberto Sonnino, and Joy Wang
2024/441
Cryptanalysis of rank-2 module-LIP in Totally Real Number Fields
Guilhem Mureau, Alice Pellet-Mary, Heorhii Pliatsok, and Alexandre Wallet
2024/440
Secret and Shared Keys Recovery on Hamming Quasi-Cyclic with SASCA
Chloé Baïsse, Antoine Moran, Guillaume Goy, Julien Maillard, Nicolas Aragon, Philippe Gaborit, Maxime Lecomte, and Antoine Loiseau
2024/439
Threshold implementations of cryptographic functions between finite Abelian groups
Enrico Piccione
2024/438
EFFLUX-F2: A High Performance Hardware Security Evaluation Board
Arpan Jati, Naina Gupta, Anupam Chattopadhyay, and Somitra Kumar Sanadhya
2024/437
Insecurity of MuSig and Bellare-Neven Multi-Signatures with Delayed Message Selection
Sela Navot
2024/436
Re-Randomized FROST
Conrado P. L. Gouvea and Chelsea Komlo
2024/435
Unbiasable Verifiable Random Functions
Emanuele Giunta and Alistair Stewart
2024/434
Parameter-Hiding Order-Revealing Encryption without Pairings
Cong Peng, Rongmao Chen, Yi Wang, Debiao He, and Xinyi Huang
2024/433
UniHand: Privacy-preserving Universal Handover for Small-Cell Networks in 5G-enabled Mobile Communication with KCI Resilience
Rabiah Alnashwan, Prosanta Gope, and Benjamin Dowling
2024/432
Perfect Asynchronous MPC with Linear Communication Overhead
Ittai Abraham, Gilad Asharov, Shravani Patil, and Arpita Patra
2024/431
Generalized Feistel Ciphers for Efficient Prime Field Masking - Full Version
Lorenzo Grassi, Loïc Masure, Pierrick Méaux, Thorben Moos, and François-Xavier Standaert
2024/430
SoK: Zero-Knowledge Range Proofs
Miranda Christ, Foteini Baldimtsi, Konstantinos Kryptos Chalkias, Deepak Maram, Arnab Roy, and Joy Wang
2024/429
FOLEAGE: $\mathbb{F}_4$OLE-Based Multi-Party Computation for Boolean Circuits
Maxime Bombar, Dung Bui, Geoffroy Couteau, Alain Couvreur, Clément Ducros, and Sacha Servan-Schreiber
2024/428
SNOW-SCA: ML-assisted Side-Channel Attack on SNOW-V
Harshit Saurabh, Anupam Golder, Samarth Shivakumar Titti, Suparna Kundu, Chaoyun Li, Angshuman Karmakar, and Debayan Das
2024/427
A Cautionary Note: Side-Channel Leakage Implications of Deterministic Signature Schemes
Hermann Seuschek, Johann Heyszl, and Fabrizio De Santis
2024/426
Efficient Actively Secure DPF and RAM-based 2PC with One-Bit Leakage
Wenhao Zhang, Xiaojie Guo, Kang Yang, Ruiyu Zhu, Yu Yu, and Xiao Wang
2024/425
Kolmogorov Comes to Cryptomania: On Interactive Kolmogorov Complexity and Key-Agreement
Marshall Ball, Yanyi Liu, Noam Mazor, and Rafael Pass
2024/424
Revisiting the Security of Approximate FHE with Noise-Flooding Countermeasures
Flavio Bergamaschi, Anamaria Costache, Dana Dachman-Soled, Hunter Kippen, Lucas LaBuff, and Rui Tang
2024/423
Plan your defense: A comparative analysis of leakage detection methods on RISC-V cores
Konstantina Miteloudi, Asmita Adhikary, Niels van Drueten, Lejla Batina, and Ileana Buhan
2024/422
A Class of Weightwise Almost Perfectly Balanced Boolean Functions with High Weightwise Nonlinearity
Deepak Kumar Dalai and Krishna Mallick
2024/421
LLRing: Logarithmic Linkable Ring Signatures with Transparent Setup
Xiangyu Hui and Sid Chi-Kin Chau
2024/420
Gap MCSP is not (Levin) NP-complete in Obfustopia
Noam Mazor and Rafael Pass
2024/419
New Upper Bounds for Evolving Secret Sharing via Infinite Branching Programs
Bar Alon, Amos Beimel, Tamar Ben David, Eran Omri, and Anat Paskin-Cherniavsky
2024/418
Atomic and Fair Data Exchange via Blockchain
Ertem Nusret Tas, István András Seres, Yinuo Zhang, Márk Melczer, Mahimna Kelkar, Joseph Bonneau, and Valeria Nikolaenko
2024/417
An improved exact CRR basis conversion algorithm for FHE without floating-point arithmetic
Hongyuan Qu and Guangwu Xu
2024/416
Mangrove: A Scalable Framework for Folding-based SNARKs
Wilson Nguyen, Trisha Datta, Binyi Chen, Nirvan Tyagi, and Dan Boneh
2024/415
Column-wise Garbling, and How to Go Beyond the Linear Model
Lei Fan, Zhenghao Lu, and Hong-Sheng Zhou
2024/414
Quantum One-Wayness of the Single-Round Sponge with Invertible Permutations
Joseph Carolan and Alexander Poremba
2024/413
Bent functions construction using extended Maiorana-McFarland’s class
Juan Carlos Ku-Cauich, Javier Diaz-Vargas, and Sara Mandujano-Velazquez
2024/412
Quasi-Optimal Permutation Ranking and Applications to PERK
Slim Bettaieb, Alessandro Budroni, Marco Palumbi, and Décio Luiz Gazzoni Filho
2024/411
Polytopes in the Fiat-Shamir with Aborts Paradigm
Henry Bambury, Hugo Beguinet, Thomas Ricosset, and Eric Sageloli
2024/410
Recent Progress in Quantum Computing Relevant to Internet Security
Hilarie Orman
2024/409
Nebula: A Privacy-First Platform for Data Backhaul
Jean-Luc Watson, Tess Despres, Alvin Tan, Shishir G. Patil, Prabal Dutta, and Raluca Ada Popa
2024/408
Stateless and Verifiable Execution Layer for Meta-Protocols on Bitcoin
Hongbo Wen, Hanzhi Liu, Shuyang Tang, Tianyue Li, Shuhan Cao, Domo, Yanju Chen, and Yu Feng
2024/407
Permutation-Based Hashing Beyond the Birthday Bound
Charlotte Lefevre and Bart Mennink
2024/406
Some notes on algorithms for abelian varieties
Damien Robert
2024/405
Traceable Secret Sharing: Strong Security and Efficient Constructions
Dan Boneh, Aditi Partap, and Lior Rotem
2024/404
Breaking the DECT Standard Cipher with Lower Time Cost
Lin Ding, Zhengting Li, Ziyu Guan, Xinhai Wang, and Zheng Wu
2024/403
DARE to agree: Byzantine Agreement with Optimal Resilience and Adaptive Communication
Pierre Civit, Muhammad Ayaz Dzulfikar, Seth Gilbert, Rachid Guerraoui, Jovan Komatovic, and Manuel Vidigueira
2024/402
Efficient Unbalanced Quorum PSI from Homomorphic Encryption
Xinpeng Yang, Liang Cai, Yinghao Wang, Yinghao Wang, Lu Sun, and Jingwei Hu
2024/401
Plover: Masking-Friendly Hash-and-Sign Lattice Signatures
Muhammed F. Esgin, Thomas Espitau, Guilhem Niot, Thomas Prest, Amin Sakzad, and Ron Steinfeld
2024/400
SILBE: an Updatable Public Key Encryption Scheme from Lollipop Attacks
Max Duparc, Tako Boris Fouotsa, and Serge Vaudenay
2024/399
A Direct PRF Construction from Kolmogorov Complexity
Yanyi Liu and Rafael Pass
2024/398
The Last Challenge Attack: Exploiting a Vulnerable Implementation of the Fiat-Shamir Transform in a KZG-based SNARK
Oana Ciobotaru, Maxim Peter, and Vesselin Velichkov
2024/397
Exponent-VRFs and Their Applications
Dan Boneh, Iftach Haitner, and Yehuda Lindell
2024/396
On the impact of ionizing and non-ionizing irradiation damage on security microcontrollers in CMOS technology
Theresa Krüger
2024/395
Notus: Dynamic Proofs of Liabilities from Zero-knowledge RSA Accumulators
Jiajun Xin, Arman Haghighi, Xiangan Tian, and Dimitrios Papadopoulos
2024/394
A Deniably Authenticated Searchable Public Key Encryption Scheme in Mobile Electronic Mail System
Shuhan Zeng, Yongjian Liao, Chuanhao Zhou, Jinlin He, and Hongwei Wang
2024/393
Solving McEliece-1409 in One Day --- Cryptanalysis with the Improved BJMM Algorithm
Shintaro Narisada, Shusaku Uemura, Hiroki Okada, Hiroki Furue, Yusuke Aikawa, and Kazuhide Fukushima
2024/392
Heuristic Ideal Obfuscation Based on Evasive LWR
Zhuang Shan, Leyou Zhang, and Qiqi Lai
2024/391
On Information-Theoretic Secure Multiparty Computation with Local Repairability
Daniel Escudero, Ivan Tjuawinata, and Chaoping Xing
2024/390
STIR: Reed–Solomon Proximity Testing with Fewer Queries
Gal Arnon, Alessandro Chiesa, Giacomo Fenzi, and Eylon Yogev
2024/389
On the Feasibility of Sliced Garbling
Tomer Ashur, Carmit Hazay, and Rahul Satish
2024/388
Leakage-Resilient Attribute-Based Encryption with Attribute-Hiding
Yijian Zhang, Yunhao Ling, Jie Chen, and Luping Wang
2024/387
Ceno: Non-uniform, Segment and Parallel Zero-knowledge Virtual Machine
Tianyi Liu, Zhenfei Zhang, Yuncong Zhang, Wenqing Hu, and Ye Zhang
2024/386
High-Throughput Secure Multiparty Computation with an Honest Majority in Various Network Settings
Christopher Harth-Kitzerow, Ajith Suresh, Yongqin Wang, Hossein Yalame, Georg Carle, and Murali Annavaram
2024/385
A New Public Key Cryptosystem Based on the Cubic Pell Curve
Michel Seck and Abderrahmane Nitaj
2024/384
Transmitter Actions for Secure Integrated Sensing and Communication
Truman Welling, Onur Gunlu, and Aylin Yener
2024/383
Malicious Security for SCALES: Outsourced Computation with Ephemeral Servers
Anasuya Acharya, Carmit Hazay, Vladimir Kolesnikov, and Manoj Prabhakaran
2024/382
Decentralized Access Control Infrastructure for Enterprise Digital Asset Management
Chirag Madaan, Rohan Agarwal, Vipul Saini, and Ujjwal Kumar
2024/381
Quantum Circuits of AES with a Low-depth Linear Layer and a New Structure
Haotian Shi and Xiutao Feng
2024/380
Collision Resistance from Multi-Collision Resistance for all Constant Parameters
Jan Buzek and Stefano Tessaro
2024/379
SyRA: Sybil-Resilient Anonymous Signatures with Applications to Decentralized Identity
Elizabeth Crites, Aggelos Kiayias, Markulf Kohlweiss, and Amirreza Sarencheh
2024/378
Strong PUF Security Metrics: Sensitivity of Responses to Single Challenge Bit Flips
Wolfgang Stefani, Fynn Kappelhoff, Martin Gruber, Yu-Neng Wang, Sara Achour, Debdeep Mukhopadhyay, and Ulrich Rührmair
2024/377
Connecting Leakage-Resilient Secret Sharing to Practice: Scaling Trends and Physical Dependencies of Prime Field Masking
Sebastian Faust, Loïc Masure, Elena Micheli, Maximilian Orlt, and François-Xavier Standaert
2024/376
Perfect (Parallel) Broadcast in Constant Expected Rounds via Statistical VSS
Gilad Asharov and Anirudh Chandramouli
2024/375
Efficient and Generic Methods to Achieve Active Security in Private Information Retrieval and More Advanced Database Search
Reo Eriguchi, Kaoru Kurosawa, and Koji Nuida
2024/374
Universal Composable Password Authenticated Key Exchange for the Post-Quantum World
You Lyu, Shengli Liu, and Shuai Han
2024/373
Lower Bounds for Differential Privacy Under Continual Observation and Online Threshold Queries
Edith Cohen, Xin Lyu, Jelani Nelson, Tamás Sarlós, and Uri Stemmer
2024/372
Two-Round Maliciously-Secure Oblivious Transfer with Optimal Rate
Pedro Branco, Nico Döttling, and Akshayaram Srinivasan
2024/371
Preimage Attacks on Reduced-Round Ascon-Xof
Seungjun Baek, Giyoon Kim, and Jongsung Kim
2024/370
Perfectly-Secure Multiparty Computation with Linear Communication Complexity over Any Modulus
Daniel Escudero, Yifan Song, and Wenhao Wang
2024/369
Garbled Circuit Lookup Tables with Logarithmic Number of Ciphertexts
David Heath, Vladimir Kolesnikov, and Lucien K. L. Ng
2024/368
Algorithms for Matrix Code and Alternating Trilinear Form Equivalences via New Isomorphism Invariants
Anand Kumar Narayanan, Youming Qiao, and Gang Tang
2024/367
Accelerating SLH-DSA by Two Orders of Magnitude with a Single Hash Unit
Markku-Juhani O. Saarinen
2024/366
Key Recovery Attack on the Partial Vandermonde Knapsack Problem
Dipayan Das and Antoine Joux
2024/365
Combined Threshold Implementation
Jakob Feldtkeller, Jan Richter-Brockmann, Pascal Sasdrich, and Tim Güneysu
2024/364
Algebraic Algorithm for the Alternating Trilinear Form Equivalence Problem
Lars Ran, Simona Samardjiska, and Monika Trimoska
2024/363
Time-Averaged Analysis of Selfish Mining in Bitcoin
Roozbeh Sarenche, Ren Zhang, Svetla Nikova, and Bart Preneel
2024/362
Integrating Causality in Messaging Channels
Shan Chen and Marc Fischlin
2024/361
Key Exchange with Tight (Full) Forward Secrecy via Key Confirmation
Jiaxin Pan, Doreen Riepel, and Runzhi Zeng
2024/360
The NISQ Complexity of Collision Finding
Yassine Hamoudi, Qipeng Liu, and Makrand Sinha
2024/359
Key-Recovery Attack on a Public-Key Encryption Related to Planted Clique
Caicai Chen and Chris Jones
2024/358
Stateless Deterministic Multi-Party EdDSA Signatures with Low Communication
Qi Feng, Kang Yang, Kaiyi Zhang, Xiao Wang, Yu Yu, Xiang Xie, and Debiao He
2024/357
Security analysis of the iMessage PQ3 protocol
Douglas Stebila
2024/356
On Central Primitives for Quantum Cryptography with Classical Communication
Kai-Min Chung, Eli Goldin, and Matthew Gray
2024/355
Adaptively Secure Streaming Functional Encryption
Pratish Datta, Jiaxin Guan, Alexis Korb, and Amit Sahai
2024/354
WARPfold : Wrongfield ARithmetic for Protostar folding
Lev Soukhanov
2024/353
FuLeakage: Breaking FuLeeca by Learning Attacks
Felicitas Hörmann and Wessel van Woerden
2024/352
Improved Meet-in-the-Middle Nostradamus Attacks on AES-like Hashing
Xiaoyang Dong, Jian Guo, Shun Li, Phuong Pham, and Tianyu Zhang
2024/351
Improved Differential Meet-In-The-Middle Cryptanalysis
Zahra Ahmadian, Akram Khalesi, Dounia M'foukh, Hossein Moghimi, and María Naya-Plasencia
2024/350
Automating Collision Attacks on RIPEMD-160
Yingxin Li, Fukang Liu, and Gaoli Wang
2024/349
New Records in Collision Attacks on SHA-2
Yingxin Li, Fukang Liu, and Gaoli Wang
2024/348
A Computational Tsirelson's Theorem for the Value of Compiled XOR Games
David Cui, Giulio Malavolta, Arthur Mehta, Anand Natarajan, Connor Paddock, Simon Schmidt, Michael Walter, and Tina Zhang
2024/347
The Algebraic Freelunch: Efficient Gröbner Basis Attacks Against Arithmetization-Oriented Primitives
Augustin Bariant, Aurélien Boeuf, Axel Lemoine, Irati Manterola Ayala, Morten Øygarden, Léo Perrin, and Håvard Raddum
2024/346
A data aggregation protocol based on TFHE
Maria Ferrara, Antonio Tortora, and Maria Tota
2024/345
An Efficient Adaptive Attack Against FESTA
Guoqing Zhou and Maozhi Xu
2024/344
Probabilistic Extensions: A One-Step Framework for Finding Rectangle Attacks and Beyond
Ling Song, Qianqian Yang, Yincen Chen, Lei Hu, and Jian Weng
2024/343
Partial Differential Fault Analysis on Ascon
Yang Gao
2024/342
Massive Superpoly Recovery with a Meet-in-the-middle Framework -- Improved Cube Attacks on Trivium and Kreyvium
Jiahui He, Kai Hu, Hao Lei, and Meiqin Wang
2024/341
VeriSimplePIR: Verifiability in SimplePIR at No Online Cost for Honest Servers
Leo de Castro and Keewoo Lee
2024/340
A New Approach for Non-Interactive Zero-Knowledge from Learning with Errors
Brent Waters
2024/339
From Random Probing to Noisy Leakages Without Field-Size Dependence
Gianluca Brian, Stefan Dziembowski, and Sebastian Faust
2024/338
Tight Indistinguishability Bounds for the XOR of Independent Random Permutations by Fourier Analysis
Itai Dinur
2024/337
Solving the Tensor Isomorphism Problem for special orbits with low rank points: Cryptanalysis and repair of an Asiacrypt 2023 commitment scheme
Valerie Gilchrist, Laurane Marco, Christophe Petit, and Gang Tang
2024/336
RAMenPaSTA: Parallelizable Scalable Transparent Arguments of Knowledge for RAM Programs
Khai Hanh Tang, Minh Pham, and Chan Nam Ngo
2024/335
Split-State Non-Malleable Codes and Secret Sharing Schemes for Quantum Messages
Naresh Goud Boddu, Vipul Goyal, Rahul Jain, and João Ribeiro
2024/334
The Impact of Reversibility on Parallel Pebbling
Jeremiah Blocki, Blake Holman, and Seunghoon Lee
2024/333
Practical Attack on All Parameters of the DME Signature Scheme
Pierre Briaud, Maxime Bros, Ray Perlner, and Daniel Smith-Tone
2024/332
Leakage-Tolerant Circuits
Yuval Ishai and Yifan Song
2024/331
Transaction Fee Mechanism Design in a Post-MEV World
Maryam Bahrani, Pranav Garimidi, and Tim Roughgarden
2024/330
Fuzzy Private Set Intersection with Large Hyperballs
Aron van Baarsen and Sihang Pu
2024/329
How to Validate a Verification?
Houda Ferradi
2024/328
Attribute-Based Signatures with Advanced Delegation, and Tracing
Cécile Delerablée, Lénaïck Gouriou, and David Pointcheval
2024/327
Registered Functional Encryptions from Pairings
Ziqi Zhu, Jiangtao Li, Kai Zhang, Junqing Gong, and Haifeng Qian
2024/326
Haven++: Batched and Packed Dual-Threshold Asynchronous Complete Secret Sharing with Applications
Nicolas Alhaddad, Mayank Varia, and Ziling Yang
2024/325
Proofs for Deep Thought: Accumulation for large memories and deterministic computations
Benedikt Bünz and Jessica Chen
2024/324
Under What Conditions Is Encrypted Key Exchange Actually Secure?
Jake Januzelli, Lawrence Roy, and Jiayu Xu
2024/323
Circuit Bootstrapping: Faster and Smaller
Ruida Wang, Yundi Wen, Zhihao Li, Xianhui Lu, Benqiang Wei, Kun Liu, and Kunpeng Wang
2024/322
Theoretical Explanation and Improvement of Deep Learning-aided Cryptanalysis
Weixi Zheng, Liu Zhang, and Zilong Wang
2024/321
Formal Verification of Emulated Floating-Point Arithmetic in Falcon
Vincent Hwang
2024/320
POPSTAR: Lightweight Threshold Reporting with Reduced Leakage
Hanjun Li, Sela Navot, and Stefano Tessaro
2024/319
On the cryptosystems based on two Eulerian transfor-mations defined over the commutative rings $Z_{2^s}, s>1$.
Vasyl Ustimenko
2024/318
Plinko: Single-Server PIR with Efficient Updates via Invertible PRFs
Alexander Hoover, Sarvar Patel, Giuseppe Persiano, and Kevin Yeo
2024/317
Closing the Efficiency Gap between Synchronous and Network-Agnostic Consensus
Giovanni Deligios and Mose Mizrahi Erbes
2024/316
Threshold Garbled Circuits with Low Overhead
Schuyler Rosefield, abhi shelat, and LaKyah Tyner
2024/315
Alternative Key Schedules for the AES
Christina Boura, Patrick Derbez, and Margot Funk
2024/314
Exploring the Advantages and Challenges of Fermat NTT in FHE Acceleration
Andrey Kim, Ahmet Can Mert, Anisha Mukherjee, Aikata Aikata, Maxim Deryabin, Sunmin Kwon, HyungChul Kang, and Sujoy Sinha Roy
2024/313
The Complexity of Algebraic Algorithms for LWE
Matthias Johann Steiner
2024/312
Trapdoor Memory-Hard Functions
Benedikt Auerbach, Christoph U. Günther, and Krzysztof Pietrzak
2024/311
Aggregating Falcon Signatures with LaBRADOR
Marius A. Aardal, Diego F. Aranha, Katharina Boudgoust, Sebastian Kolby, and Akira Takahashi
2024/310
A Zero-Dimensional Gröbner Basis for Poseidon
Matthias Johann Steiner
2024/309
NiLoPher: Breaking a Modern SAT-Hardened Logic-Locking Scheme via Power Analysis Attack
Prithwish Basu Roy, Johann Knechtel, Akashdeep Saha, Saideep Sreekumar, Likhitha Mankali, Mohammed Nabeel, Debdeep Mukhopadhyay, Ramesh Karri, and Ozgur Sinanoglu
2024/308
C'est très CHIC: A compact password-authenticated key exchange from lattice-based KEM
Afonso Arriaga, Manuel Barbosa, Stanislaw Jarecki, and Marjan Skrobot
2024/307
SweetPAKE: Key exchange with decoy passwords
Afonso Arriaga, Peter Y.A. Ryan, and Marjan Skrobot
2024/306
Concretely Efficient Lattice-based Polynomial Commitment from Standard Assumptions
Intak Hwang, Jinyeong Seo, and Yongsoo Song
2024/305
Single-Input Functionality against a Dishonest Majority: Practical and Round-Optimal
Zhelei Zhou, Bingsheng Zhang, Hong-Sheng Zhou, and Kui Ren
2024/304
A Two-Layer Blockchain Sharding Protocol Leveraging Safety and Liveness for Enhanced Performance
Yibin Xu, Jingyi Zheng, Boris Düdder, Tijs Slaats, and Yongluan Zhou
2024/303
Single Pass Client-Preprocessing Private Information Retrieval
Arthur Lazzaretti and Charalampos Papamanthou
2024/302
Simple constructions of linear-depth t-designs and pseudorandom unitaries
Tony Metger, Alexander Poremba, Makrand Sinha, and Henry Yuen
2024/301
Recommendations for the Design and Validation of a Physical True Random Number Generator Integrated in an Electronic Device
David Lubicz and Viktor FIscher
2024/300
Diving Deep into the Preimage Security of AES-like Hashing
Shiyao Chen, Jian Guo, Eik List, Danping Shi, and Tianyu Zhang
2024/299
Divide and Surrender: Exploiting Variable Division Instruction Timing in HQC Key Recovery Attacks
Robin Leander Schröder, Stefan Gast, and Qian Guo
2024/298
New Models for the Cryptanalysis of ASCON
Mathieu Degré, Patrick Derbez, Lucie Lahaye, and André Schrottenloher
2024/297
Accelerating Training and Enhancing Security Through Message Size Optimization in Symmetric Cryptography
ABHISAR, Madhav Yadav, and Girish Mishra
2024/296
Attacking ECDSA with Nonce Leakage by Lattice Sieving: Bridging the Gap with Fourier Analysis-based Attacks
Yiming Gao, Jinghui Wang, Honggang Hu, and Binang He
2024/295
An Efficient Hash Function for Imaginary Class Groups
Kostas Kryptos Chalkias, Jonas Lindstrøm, and Arnab Roy
2024/294
Multiplex: TBC-based Authenticated Encryption with Sponge-Like Rate
Thomas Peters, Yaobin Shen, and François-Xavier Standaert
2024/293
Registered Attribute-Based Signature
Yijian Zhang, Jun Zhao, Ziqi Zhu, Junqing Gong, and Jie Chen
2024/292
IDEA-DAC: Integrity-Driven Editing for Accountable Decentralized Anonymous Credentials via ZK-JSON
Shuhao Zheng, Zonglun Li, Junliang Luo, Ziyue Xin, and Xue Liu
2024/291
Quantum Pseudorandomness Cannot Be Shrunk In a Black-Box Way
Samuel Bouaziz--Ermann and Garazi Muguruza
2024/290
Secure Integrated Sensing and Communication Under Correlated Rayleigh Fading
Martin Mittelbach, Rafael F. Schaefer, Matthieu Bloch, Aylin Yener, and Onur Gunlu
2024/289
SoK: Parameterization of Fault Adversary Models - Connecting Theory and Practice
Dilara Toprakhisar, Svetla Nikova, and Ventzislav Nikov
2024/288
A generic algorithm for efficient key recovery in differential attacks – and its associated tool
Christina Boura, Nicolas David, Patrick Derbez, Rachelle Heim Boissier, and María Naya-Plasencia
2024/287
CAPABARA: A Combined Attack on CAPA
Dilara Toprakhisar, Svetla Nikova, and Ventzislav Nikov
2024/286
Efficient Zero-Knowledge Arguments and Digital Signatures via Sharing Conversion in the Head
Jules Maire and Damien Vergnaud
2024/285
Mirrored Commitment: Fixing ``Randomized Partial Checking'' and Applications
Paweł Lorek, Moti Yung, and Filip Zagórski
2024/284
Practical Improvements to Statistical Ineffective Fault Attacks
Barış Ege, Bob Swinkels, Dilara Toprakhisar, and Praveen Kumar Vadnala
2024/283
Toward Malicious Constant-Rate 2PC via Arithmetic Garbling
Carmit Hazay and Yibin Yang
2024/282
A Concrete Analysis of Wagner's $k$-List Algorithm over $\mathbb{Z}_p$
Antoine Joux, Hunter Kippen, and Julian Loss
2024/281
Polynomial Commitments from Lattices: Post-Quantum Security, Fast Verification and Transparent Setup
Valerio Cini, Giulio Malavolta, Ngoc Khanh Nguyen, and Hoeteck Wee
2024/280
HARTS: High-Threshold, Adaptively Secure, and Robust Threshold Schnorr Signatures
Renas Bacho, Julian Loss, Gilad Stern, and Benedikt Wagner
2024/279
Polynomial-Time Key-Recovery Attack on the ${\tt NIST}$ Specification of ${\tt PROV}$
River Moreira Ferreira and Ludovic Perret
2024/278
Circle STARKs
Ulrich Haböck, David Levit, and Shahar Papini
2024/277
Fault Attacks on UOV and Rainbow
Juliane Krämer and Mirjam Loiero
2024/276
Reduce and Prange: Revisiting Prange's ISD for Solving LPN/RSD over Large Fields
Jiseung Kim and Changmin Lee
2024/275
The Multi-user Constrained PRF Security of Generalized GGM Trees for MPC and Hierarchical Wallets
Chun Guo, Xiao Wang, Xiang Xie, and Yu Yu
2024/274
Amortized Large Look-up Table Evaluation with Multivariate Polynomials for Homomorphic Encryption
Heewon Chung, Hyojun Kim, Young-Sik Kim, and Yongwoo Lee
2024/273
Information-Theoretic 2-Party Computation from Additive Somewhat Homomorphic Encryption
Jonathan Trostle
2024/272
Deep Learning Based Analysis of Key Scheduling Algorithm of Advanced Ciphers
Narendra Kumar Patel and Hemraj Shobharam Lamkuche
2024/271
Understanding User-Perceived Security Risks and Mitigation Strategies in the Web3 Ecosystem
Janice Jianing Si, Tanusree Sharma, and Kanye Ye Wang
2024/270
YPIR: High-Throughput Single-Server PIR with Silent Preprocessing
Samir Jordan Menon and David J. Wu
2024/269
A note on PUF-Based Robust and Anonymous Authentication and Key Establishment Scheme for V2G Networks
Milad Seddigh and Seyed Hamid Baghestani
2024/268
A New Approach to Generic Lower Bounds: Classical/Quantum MDL, Quantum Factoring, and More
Minki Hhan
2024/267
zkPi: Proving Lean Theorems in Zero-Knowledge
Evan Laufer, Alex Ozdemir, and Dan Boneh
2024/266
WhisPIR: Stateless Private Information Retrieval with Low Communication
Leo de Castro, Kevin Lewi, and Edward Suh
2024/265
Beyond the circuit: How to Minimize Foreign Arithmetic in ZKP Circuits
Michele Orrù, George Kadianakis, Mary Maller, and Greg Zaverucha
2024/264
Extractable Witness Encryption for KZG Commitments and Efficient Laconic OT
Nils Fleischhacker, Mathias Hall-Andersen, and Mark Simkin
2024/263
Threshold Encryption with Silent Setup
Sanjam Garg, Dimitris Kolonelos, Guru-Vamsi Policharla, and Mingyuan Wang
2024/262
Note on the cryptanalysis of Speedy
Tim Beyne and Addie Neyt
2024/261
Election Eligibility with OpenID: Turning Authentication into Transferable Proof of Eligibility
Véronique Cortier, Alexandre Debant, Anselme Goetschmann, and Lucca Hirschi
2024/260
Kleptographic Attacks against Implicit Rejection
Antoine Joux, Julian Loss, and Benedikt Wagner
2024/259
Anonymity on Byzantine-Resilient Decentralized Computing
Kehao Ma, Minghui Xu, Yihao Guo, Lukai Cui, Shiping Ni, Shan Zhang, Weibing Wang, Haiyong Yang, and Xiuzhen Cheng
2024/258
SoK: Decentralized Storage Network
Chuanlei Li, Minghui Xu, Jiahao Zhang, Hechuan Guo, and Xiuzhen Cheng
2024/257
LatticeFold: A Lattice-based Folding Scheme and its Applications to Succinct Proof Systems
Dan Boneh and Binyi Chen
2024/256
Fiat-Shamir for Bounded-Depth Adversaries
Liyan Chen, Yilei Chen, Zikuan Huang, Nuozhou Sun, Tianqi Yang, and Yiding Zhang
2024/255
Revisiting Differential-Linear Attacks via a Boomerang Perspective With Application to AES, Ascon, CLEFIA, SKINNY, PRESENT, KNOT, TWINE, WARP, LBlock, Simeck, and SERPENT
Hosein Hadipour, Patrick Derbez, and Maria Eichlseder
2024/254
Adaptive Security in SNARGs via iO and Lossy Functions
Brent Waters and Mark Zhandry
2024/253
2PC-MPC: Emulating Two Party ECDSA in Large-Scale MPC
Offir Friedman, Avichai Marmor, Dolev Mutzari, Omer Sadika, Yehonatan C. Scaly, Yuval Spiizer, and Avishay Yanai
2024/252
Faster Signatures from MPC-in-the-Head
Dung Bui, Eliana Carozza, Geoffroy Couteau, Dahmun Goudarzi, and Antoine Joux
2024/251
Communication-Optimal Convex Agreement
Diana Ghinea, Chen-Da Liu-Zhang, and Roger Wattenhofer
2024/250
Exploring the Six Worlds of Gröbner Basis Cryptanalysis: Application to Anemoi
Katharina Koschatko, Reinhard Lüftenegger, and Christian Rechberger
2024/249
Robust Additive Randomized Encodings from IO and Pseudo-Non-linear Codes
Nir Bitansky and Sapir Freizeit
2024/248
FRIDA: Data Availability Sampling from FRI
Mathias Hall-Andersen, Mark Simkin, and Benedikt Wagner
2024/247
Fault-Resistant Partitioning of Secure CPUs for System Co-Verification against Faults
Simon Tollec, Vedad Hadžić, Pascal Nasahl, Mihail Asavoae, Roderick Bloem, Damien Couroussé, Karine Heydemann, Mathieu Jan, and Stefan Mangard
2024/246
OCash: Fully Anonymous Payments between Blockchain Light Clients
Adam Blatchley Hansen, Jesper Buus Nielsen, and Mark Simkin
2024/245
Linear-Communication Asynchronous Complete Secret Sharing with Optimal Resilience
Xiaoyu Ji, Junru Li, and Yifan Song
2024/244
Don’t Use It Twice! Solving Relaxed Linear Code Equivalence Problems
Alessandro Budroni, Jesús-Javier Chi-Domínguez, Giuseppe D'Alconzo, Antonio J. Di Scala, and Mukul Kulkarni
2024/243
Towards Achieving Asynchronous MPC with Linear Communication and Optimal Resilience
Vipul Goyal, Chen-Da Liu-Zhang, and Yifan Song
2024/242
Perfectly-Secure MPC with Constant Online Communication Complexity
Yifan Song and Xiaxi Ye
2024/241
Consecutive Adaptor Signature Scheme: From Two-Party to N-Party Settings
Kaisei Kajita, Go Ohtake, and Tsuyoshi Takagi
2024/240
Implementation of Cryptanalytic Programs Using ChatGPT
Nobuyuki Sugio
2024/239
Simulation-Secure Threshold PKE from Standard (Ring-)LWE
Hiroki Okada and Tsuyoshi Takagi
2024/238
A Single Trace Fault Injection Attack on Hedged CRYSTALS-Dilithium
Sönke Jendral
2024/237
Collusion-Resilience in Transaction Fee Mechanism Design
Hao Chung, Tim Roughgarden, and Elaine Shi
2024/236
Public-Key Cryptography through the Lens of Monoid Actions
Hart Montgomery and Sikhar Patranabis
2024/235
Pseudorandom Error-Correcting Codes
Miranda Christ and Sam Gunn
2024/234
Bare PAKE: Universally Composable Key Exchange from just Passwords
Manuel Barbosa, Kai Gellert, Julia Hesse, and Stanislaw Jarecki
2024/233
Cayley hashing with cookies
Vladimir Shpilrain and Bianca Sosnovski
2024/232
On the Security of Nova Recursive Proof System
Hyeonbum Lee and Jae Hong Seo
2024/231
Need for Speed: Leveraging the Power of Functional Encryption for Resource-Constrained Devices
Eugene Frimpong, Alexandros Bakas, Camille Foucault, and Antonis Michalas
2024/230
Analysis of Layered ROLLO-I: A BII-LRPC code-based KEM
Seongtaek Chee, Kyung Chul Jeong, Tanja Lange, Nari Lee, Alex Pellegrini, and Hansol Ryu
2024/229
Strong Batching for Non-Interactive Statistical Zero-Knowledge
Changrui Mu, Shafik Nassar, Ron D. Rothblum, and Prashant Nalini Vasudevan
2024/228
On the Untapped Potential of the Quantum FLT-based Inversion
Ren Taguchi and Atsushi Takayasu
2024/227
Adaptively Sound Zero-Knowledge SNARKs for UP
Surya Mathialagan, Spencer Peters, and Vinod Vaikuntanathan
2024/226
Attribute-based Keyed (Fully) Homomorphic Encryption
Keita Emura, Shingo Sato, and Atsushi Takayasu
2024/225
Universal Computational Extractors from Lattice Assumptions
Yilei Chen and Xinyu Mao
2024/224
Amplification of Non-Interactive Zero Knowledge, Revisited
Nir Bitansky and Nathan Geier
2024/223
Game-Theoretically Fair Distributed Sampling
Sri AravindaKrishnan Thyagarajan, Ke Wu, and Pratik Soni
2024/222
Reducing the Number of Qubits in Quantum Factoring
Clémence Chevignard, Pierre-Alain Fouque, and André Schrottenloher
2024/221
Mastic: Private Weighted Heavy-Hitters and Attribute-Based Metrics
Dimitris Mouris, Christopher Patton, Hannah Davis, Pratik Sarkar, and Nektarios Georgios Tsoutsos
2024/220
Security of Symmetric Ratchets and Key Chains - Implications for Protocols like TLS 1.3, Signal, and PQ3
John Preuß Mattsson
2024/219
Singular points of UOV and VOX
Pierre Pébereau
2024/218
Lightweight Leakage-Resilient PRNG from TBCs using Superposition
Mustafa Khairallah, Srinivasan Yadhunathan, and Shivam Bhasin
2024/217
Hardware Acceleration of the Prime-Factor and Rader NTT for BGV Fully Homomorphic Encryption
David Du Pont, Jonas Bertels, Furkan Turan, Michiel Van Beirendonck, and Ingrid Verbauwhede
2024/216
Rate-1 Fully Local Somewhere Extractable Hashing from DDH
Pedro Branco, Nico Döttling, Akshayaram Srinivasan, and Riccardo Zanotto
2024/215
Batch PIR and Labeled PSI with Oblivious Ciphertext Compression
Alexander Bienstock, Sarvar Patel, Joon Young Seo, and Kevin Yeo
2024/214
Distributed Fiat-Shamir Transform: from Threshold Identification Protocols to Signatures
Michele Battagliola and Andrea Flamini
2024/213
A Note on Adversarial Online Complexity in Security Proofs of Duplex-Based Authenticated Encryption Modes
Charlotte Lefevre
2024/212
Analysis of a Programmable Quantum Annealer as a Random Number Generator
Elijah Pelofske
2024/211
INSPECT: Investigating Supply Chain and Cyber-Physical Security of Battery Systems
Tao Zhang, Shang Shi, Md Habibur Rahman, Nitin Varshney, Akshay Kulkarni, Farimah Farahmandi, and Mark Tehranipoor
2024/210
Rollerblade: Replicated Distributed Protocol Emulation on Top of Ledgers
Dionysis Zindros, Apostolos Tzinas, and David Tse
2024/209
General Adversary Structures in Byzantine Agreement and Multi-Party Computation with Active and Omission Corruption
Konstantinos Brazitikos and Vassilis Zikas
2024/208
Asymmetric Cryptography from Number Theoretic Transformations
Samuel Lavery
2024/207
NIZKs with Maliciously Chosen CRS: Subversion Advice-ZK and Accountable Soundness
Prabhanjan Ananth, Gilad Asharov, Vipul Goyal, Hadar Kaner, Pratik Soni, and Brent Waters
2024/206
Kronos: A Secure and Generic Sharding Blockchain Consensus with Optimized Overhead
Yizhong Liu, Andi Liu, Yuan Lu, Zhuocheng Pan, Yinuo Li, Jianwei Liu, Song Bian, and Mauro Conti
2024/205
A Generalized Distributed RSA Key Generation
ChihYun Chuang, IHung Hsu, and TingFang Lee
2024/204
PerfOMR: Oblivious Message Retrieval with Reduced Communication and Computation
Zeyu Liu, Eran Tromer, and Yunhao Wang
2024/203
Application-Aware Approximate Homomorphic Encryption: Configuring FHE for Practical Use
Andreea Alexandru, Ahmad Al Badawi, Daniele Micciancio, and Yuriy Polyakov
2024/202
Fully Homomorphic Encryption beyond IND-CCA1 Security: Integrity through Verifiability
Mark Manulis and Jérôme Nguyen
2024/201
Breaking the decisional Diffie-Hellman problem in totally non-maximal imaginary quadratic orders
Antonio Sanso
2024/200
A Better Proof-of-Work Fork Choice Rule
Karl Kreder, Shreekara Shastry, Apostolos Tzinas, Sriram Vishwanath, and Dionysis Zindros
2024/199
Formal Security Proofs via Doeblin Coefficients: Optimal Side-channel Factorization from Noisy Leakage to Random Probing
Julien Béguinot, Wei Cheng, Sylvain Guilley, and Olivier Rioul
2024/198
Distributed Randomness using Weighted VUFs
Sourav Das, Benny Pinkas, Alin Tomescu, and Zhuolun Xiang
2024/197
Alba: The Dawn of Scalable Bridges for Blockchains
Giulia Scaffino, Lukas Aumayr, Mahsa Bastankhah, Zeta Avarikioti, and Matteo Maffei
2024/196
Subfield attack: leveraging composite-degree extensions in the Quotient Ring transform
Pierre Pébereau
2024/195
PQC-AMX: Accelerating Saber and FrodoKEM on the Apple M1 and M3 SoCs
Décio Luiz Gazzoni Filho, Guilherme Brandão, Gora Adj, Arwa Alblooshi, Isaac A. Canales-Martínez, Jorge Chávez-Saab, and Julio López
2024/194
Helium: Scalable MPC among Lightweight Participants and under Churn
Christian Mouchet, Sylvain Chatel, Apostolos Pyrgelis, and Carmela Troncoso
2024/193
MQ Does Not Reduce to TUOV
Laura Maddison
2024/192
Direct FSS Constructions for Branching Programs and More from PRGs with Encoded-Output Homomorphism
Elette Boyle, Lisa Kohl, Zhe Li, and Peter Scholl
2024/191
A Simpler and More Efficient Reduction of DLog to CDH for Abelian Group Actions
Steven Galbraith, Yi-Fu Lai, and Hart Montgomery
2024/190
Constructing Committing and Leakage-Resilient Authenticated Encryption
Patrick Struck and Maximiliane Weishäupl
2024/189
ZeroAuction: Zero-Deposit Sealed-bid Auction via Delayed Execution
Haoqian Zhang, Michelle Yeo, Vero Estrada-Galinanes, and Bryan Ford
2024/188
HomeRun: High-efficiency Oblivious Message Retrieval, Unrestricted
Yanxue Jia, Varun Madathil, and Aniket Kate
2024/187
On the bijectivity of the map $\chi$
Anna-Maurin Graner, Björn Kriepke, Lucas Krompholz, and Gohar M. Kyureghyan
2024/186
RAD-FS: Remote Timing and Power SCA Security in DVFS-Augmented Ultra-Low-Power Embedded Systems
Daniel Dobkin, Nimrod Cever, and Itamar Levi
2024/185
Vortex: A List Polynomial Commitment and its Application to Arguments of Knowledge
Alexandre Belling, Azam Soleimanian, and Bogdan Ursu
2024/184
Threshold Raccoon: Practical Threshold Signatures from Standard Lattice Assumptions
Rafael del Pino, Shuichi Katsumata, Mary Maller, Fabrice Mouhartem, Thomas Prest, and Markku-Juhani Saarinen
2024/183
On Security Proofs of Existing Equivalence Class Signature Schemes
Balthazar Bauer, Georg Fuchsbauer, and Fabian Regen
2024/182
FileDES: A Secure, Scalable and Succinct Decentralized Encrypted Storage Network
Minghui Xu, Jiahao Zhang, Hechuan Guo, Xiuzhen Cheng, Dongxiao Yu, Qin Hu, Yijun Li, and Yipu Wu
2024/181
Functional Bootstrapping for Packed Ciphertexts via Homomorphic LUT Evaluation
Dongwon Lee, Seonhong Min, and Yongsoo Song
2024/180
Exploiting RPMB authentication in a closed source TEE implementation
Aya Fukami, Richard Buurke, and Zeno Geradts
2024/179
Traitor Tracing without Trusted Authority from Registered Functional Encryption
Pedro Branco, Russell W. F. Lai, Monosij Maitra, Giulio Malavolta, Ahmadreza Rahimi, and Ivy K. Y. Woo
2024/178
Fast Public-Key Silent OT and More from Constrained Naor-Reingold
Dung Bui, Geoffroy Couteau, Pierre Meyer, Alain Passelègue, and Mahshid Riahinia
2024/177
Registered Functional Encryption for Quadratic Functions from MDDH
Qiaohan Chu, Li Lin, Chen Qian, and Jie Chen
2024/176
The impact of data-heavy, post-quantum TLS 1.3 on the Time-To-Last-Byte of real-world connections
Panos Kampanakis and Will Childs-Klein
2024/175
Lossy Cryptography from Code-Based Assumptions
Quang Dao and Aayush Jain
2024/174
QPP and HPPK: Unifying Non-Commutativity for Quantum-Secure Cryptography with Galois Permutation Group
Randy Kuang
2024/173
Constant-Size zk-SNARKs in ROM from Falsifiable Assumptions
Helger Lipmaa, Roberto Parisella, and Janno Siim
2024/172
Relaxed Functional Bootstrapping: A New Perspective on BGV/BFV Bootstrapping
Zeyu Liu and Yunhao Wang
2024/171
Approximate Methods for the Computation of Step Functions in Homomorphic Encryption
Tairong Huang, Shihe Ma, Anyu Wang, and XiaoYun Wang
2024/170
Train Wisely: Multifidelity Bayesian Optimization Hyperparameter Tuning in Side-Channel Analysis
Trevor Yap Hong Eng, Shivam Bhasin, and Léo Weissbart
2024/169
Machine Learning based Blind Side-Channel Attacks on PQC-based KEMs - A Case Study of Kyber KEM
Prasanna Ravi, Dirmanto Jap, Shivam Bhasin, and Anupam Chattopadhyay
2024/168
Dragon: Decentralization at the cost of Representation after Arbitrary Grouping and Its Applications to Sub-cubic DKG and Interactive Consistency
Hanwen Feng, Zhenliang Lu, and Qiang Tang
2024/167
Creating from Noise: Trace Generations Using Diffusion Model for Side-Channel Attack
Trevor Yap and Dirmanto Jap
2024/166
A Practical MinRank Attack Against VOX
Hao Guo and Jintai Ding
2024/165
Adaptively-Sound Succinct Arguments for NP from Indistinguishability Obfuscation
Brent Waters and David J. Wu
2024/164
Faster BGV Bootstrapping for Power-of-Two Cyclotomics through Homomorphic NTT
Shihe Ma, Tairong Huang, Anyu Wang, and Xiaoyun Wang
2024/163
On Tweakable Correlation Robust Hashing against Key Leakages
Chun Guo, Xiao Wang, Kang Yang, and Yu Yu
2024/162
Zero-Knowledge Proofs of Training for Deep Neural Networks
Kasra Abbaszadeh, Christodoulos Pappas, Jonathan Katz, and Dimitrios Papadopoulos
2024/161
zkMatrix: Batched Short Proof for Committed Matrix Multiplication
Mingshu Cong, Tsz Hon Yuen, and Siu Ming Yiu
2024/160
LightDAG: A Low-latency DAG-based BFT Consensus through Lightweight Broadcast
Xiaohai Dai, Guanxiong Wang, Jiang Xiao, Zhengxuan Guo, Rui Hao, Xia Xie, and Hai Jin
2024/159
Logstar: Efficient Linear* Time Secure Merge
Suvradip Chakraborty, Stanislav Peceny, Srinivasan Raghuraman, and Peter Rindal
2024/158
HiSE: Hierarchical (Threshold) Symmetric-key Encryption
Pousali Dey, Pratyay Mukherjee, Swagata Sasmal, and Rohit Sinha
2024/157
Delphi: sharing assessments of cryptographic assumptions
Jeroen van de Graaf and Arjen K. Lenstra
2024/156
Homomorphic sign evaluation with a RNS representation of integers
Philippe Chartier, Michel Koskas, Mohammed Lemou, and Florian Méhats
2024/155
Fully Homomorphic Encryption on large integers
Philippe Chartier, Michel Koskas, Mohammed Lemou, and Florian Méhats
2024/154
Broadcast Encryption using Sum-Product decomposition of Boolean functions
Aurélien Dupin and Simon Abelard
2024/153
Revisiting the Slot-to-Coefficient Transformation for BGV and BFV
Robin Geelen
2024/152
Equivalence of Generalised Feistel Networks
Patrick Derbez and Marie Euler
2024/151
Improving Linear Key Recovery Attacks using Walsh Spectrum Puncturing
Antonio Flórez-Gutiérrez and Yosuke Todo
2024/150
SALSA FRESCA: Angular Embeddings and Pre-Training for ML Attacks on Learning With Errors
Samuel Stevens, Emily Wenger, Cathy Yuanchen Li, Niklas Nolte, Eshika Saxena, Francois Charton, and Kristin Lauter
2024/149
Evict+Spec+Time: Exploiting Out-of-Order Execution to Improve Cache-Timing Attacks
Shing Hing William Cheng, Chitchanok Chuengsatiansup, Daniel Genkin, Dallas McNeil, Toby Murray, Yuval Yarom, and Zhiyuan Zhang
2024/148
Preliminary Cryptanalysis of the Biscuit Signature Scheme
Charles Bouillaguet and Julia Sauvage
2024/147
Prime Masking vs. Faults - Exponential Security Amplification against Selected Classes of Attacks
Thorben Moos, Sayandeep Saha, and François-Xavier Standaert
2024/146
Computing Orientations from the Endomorphism Ring of Supersingular Curves and Applications
Jonathan Komada Eriksen and Antonin Leroux
2024/145
Practical Batch Proofs of Exponentiation
Charlotte Hoffmann, Pavel Hubáček, and Svetlana Ivanova
2024/144
Efficient (3,3)-isogenies on fast Kummer surfaces
Maria Corte-Real Santos, Craig Costello, and Benjamin Smith
2024/143
Scalable Collaborative zk-SNARK: Fully Distributed Proof Generation and Malicious Security
Xuanming Liu, Zhelei Zhou, Yinghao Wang, Bingsheng Zhang, and Xiaohu Yang
2024/142
GradedDAG: An Asynchronous DAG-based BFT Consensus with Lower Latency
Xiaohai Dai, Zhaonan Zhang, Jiang Xiao, Jingtao Yue, Xia Xie, and Hai Jin
2024/141
Secure Statistical Analysis on Multiple Datasets: Join and Group-By
Gilad Asharov, Koki Hamada, Dai Ikarashi, Ryo Kikuchi, Ariel Nof, Benny Pinkas, and Junichi Tomida
2024/140
Efficient ECDSA-based Adaptor Signature for Batched Atomic Swaps
Binbin Tu, Min Zhang, and Yu Chen
2024/139
Efficient Arithmetic in Garbled Circuits
David Heath
2024/138
Correction Fault Attacks on Randomized CRYSTALS-Dilithium
Elisabeth Krahmer, Peter Pessl, Georg Land, and Tim Güneysu
2024/137
Sleepy Consensus in the Known Participation Model
Chenxu Wang, Sisi Duan, Minghui Xu, Feng Li, and Xiuzhen Cheng
2024/136
Secure Transformer Inference Made Non-interactive
Jiawen Zhang, Xinpeng Yang, Lipeng He, Kejia Chen, Wen-jie Lu, Yinghao Wang, Xiaoyang Hou, Jian Liu, Kui Ren, and Xiaohu Yang
2024/135
A Closer Look at the Belief Propagation Algorithm in Side-Channel-Assisted Chosen-Ciphertext Attacks
Kexin Qiao, Siwei Sun, Zhaoyang Wang, Zehan Wu, Junjie Cheng, An Wang, and Liehuang Zhu
2024/134
Byzantine Fault Tolerance with Non-Determinism, Revisited
Yue Huang, Huizhong Li, Yi Sun, and Sisi Duan
2024/133
Optimizing Implementations of Boolean Functions
Meltem Sonmez Turan
2024/132
SimpleFT: A Simple Byzantine Fault Tolerant Consensus
Rui Hao, Chenglong Yi, Weiqi Dai, and Zhaonan Zhang
2024/131
Practical Post-Quantum Signatures for Privacy
Sven Argo, Tim Güneysu, Corentin Jeudy, Georg Land, Adeline Roux-Langlois, and Olivier Sanders
2024/130
HADES: Automated Hardware Design Exploration for Cryptographic Primitives
Fabian Buschkowski, Georg Land, Jan Richter-Brockmann, Pascal Sasdrich, and Tim Güneysu
2024/129
Finite Key OTP Functionality: Ciphers That Hold Off Attackers Smarter Than Their Designers
Gideon Samid
2024/128
Non-Binding (Designated Verifier) Signature
Ehsan Ebrahimi
2024/127
Attacks Against the INDCPA-D Security of Exact FHE Schemes
Jung Hee Cheon, Hyeongmin Choe, Alain Passelègue, Damien Stehlé, and Elias Suvanto
2024/126
Monte Carlo Tree Search for automatic differential characteristics search: application to SPECK
Emanuele Bellini, David Gerault, Matteo Protopapa, and Matteo Rossi
2024/125
New self-orthogonal codes from weakly regular plateaued functions and their application in LCD codes
Melike Çakmak, Ahmet Sınak, and Oğuz Yayla
2024/124
Perceived Information Revisited II: Information-Theoretical Analysis of Deep-Learning Based Side-Channel Attacks
Akira Ito, Rei Ueno, and Naofumi Homma
2024/123
Memory Checking Requires Logarithmic Overhead
Elette Boyle, Ilan Komargodski, and Neekon Vafa
2024/122
SPRITE: Secure and Private Routing in Payment Channel Networks
Gaurav Panwar, Roopa Vishwanathan, George Torres, and Satyajayant Misra
2024/121
An acceleration of the AKS prime identification algorithm
Stephen Meredith Williams
2024/120
K-Waay: Fast and Deniable Post-Quantum X3DH without Ring Signatures
Daniel Collins, Loïs Huguenin-Dumittan, Ngoc Khanh Nguyen, Nicolas Rolin, and Serge Vaudenay
2024/119
R3PO: Reach-Restricted Reactive Program Obfuscation and its Application to MA-ABE
Kaartik Bhushan, Sai Lakshmi Bhavana Obbattu, Manoj Prabhakaran, and Rajeev Raghunath
2024/118
Data Privacy Made Easy: Enhancing Applications with Homomorphic Encryption
Charles Gouert and Nektarios Georgios Tsoutsos
2024/117
Breaking HWQCS: a code-based signature scheme from high weight QC-LDPC codes
Alex Pellegrini and Giovanni Tognolini
2024/116
On the practical CPAD security of “exact” and threshold FHE schemes and libraries
Marina Checri, Renaud Sirdey, Aymen Boudguiga, and Jean-Paul Bultel
2024/115
Accelerating BGV Bootstrapping for Large $p$ Using Null Polynomials Over $\mathbb{Z}_{p^e}$
Shihe Ma, Tairong Huang, Anyu Wang, and Xiaoyun Wang
2024/114
X2X: Low-Randomness and High-Throughput A2B and B2A Conversions for $d+1$ shares in Hardware
Quinten Norga, Jan-Pieter D'Anvers, Suparna Kundu, and Ingrid Verbauwhede
2024/113
Improved Linear Key Recovery Attacks on PRESENT
Wenhui Wu, Muzhou Li, and Meiqin Wang
2024/112
pqm4: Benchmarking NIST Additional Post-Quantum Signature Schemes on Microcontrollers
Matthias J. Kannwischer, Markus Krausz, Richard Petri, and Shang-Yi Yang
2024/111
A Novel Power Analysis Attack against CRYSTALS-Dilithium Implementation
Yong Liu, Yuejun Liu, Yongbin Zhou, Yiwen Gao, Zehua Qiao, and Huaxin Wang
2024/110
Cryptanalysis of the SNOVA signature scheme
Peigen Li and Jintai Ding
2024/109
Simpler and Faster BFV Bootstrapping for Arbitrary Plaintext Modulus from CKKS
Jaehyung Kim, Jinyeong Seo, and Yongsoo Song
2024/108
Some Improvements for the PIOP for ZeroCheck
Angus Gruen
2024/107
ELEKTRA: Efficient Lightweight multi-dEvice Key TRAnsparency
Julia Len, Melissa Chase, Esha Ghosh, Daniel Jost, Balachandar Kesavan, and Antonio Marcedone
2024/106
A Trust-based Recommender System over Arbitrarily Partitioned Data with Privacy
Ibrahim Yakut and Huseyin Polat
2024/105
Differential cryptanalysis with SAT, SMT, MILP, and CP: a detailed comparison for bit-oriented primitives
Emanuele Bellini, Alessandro De Piccoli, Mattia Formenti, David Gerault, Paul Huynh, Simone Pelizzola, Sergio Polese, and Andrea Visconti
2024/104
AnonPSI: An Anonymity Assessment Framework for PSI
Bo Jiang, Jian Du, and Qiang Yan
2024/103
ChaCha related 64 bit oriented ARX cipher
Daniel Nager
2024/102
Laconic Branching Programs from the Diffie-Hellman Assumption
Sanjam Garg, Mohammad Hajiabadi, Peihan Miao, and Alice Murphy
2024/101
Unconditional Security using (Random) Anonymous Bulletin Board
Albert Yu, Hai H. Nguyen, Aniket Kate, and Hemanta K. Maji
2024/100
IrisLock: Iris Biometric Key Derivation with 42 bits of security
Sohaib Ahmad, Sixia Chen, Luke Demarest, Benjamin Fuller, Caleb Manicke, Alexander Russell, and Amey Shukla
2024/099
Snarktor: A Decentralized Protocol for Scaling SNARKs Verification in Blockchains
Alberto Garoffolo, Dmytro Kaidalov, and Roman Oliynykov
2024/098
Theoretical differential fault attacks on FLIP and FiLIP
Pierrick Méaux and Dibyendu Roy
2024/097
Improved All-but-One Vector Commitment with Applications to Post-Quantum Signatures
Dung Bui, Kelong Cong, and Cyprien Delpech de Saint Guilhem
2024/096
Revisiting the security analysis of SNOVA
Yasuhiko Ikematsu and Rika Akiyama
2024/095
ConvKyber: Unleashing the Power of AI Accelerators for Faster Kyber with Novel Iteration-based Approaches
Tian Zhou, Fangyu Zheng, Guang Fan, Lipeng Wan, Wenxu Tang, Yixuan Song, Yi Bian, and Jingqiang Lin
2024/094
Chosen-Ciphertext Secure Dual-Receiver Encryption in the Standard Model Based on Post-Quantum Assumptions
Laurin Benz, Wasilij Beskorovajnov, Sarai Eilebrecht, Roland Gröll, Maximilian Müller, and Jörn Müller-Quade
2024/093
Short Code-based One-out-of-Many Proofs and Applications
Xindong Liu and Li-Ping Wang
2024/092
Call Me By My Name: Simple, Practical Private Information Retrieval for Keyword Queries
Sofía Celi and Alex Davidson
2024/091
On historical Multivariate Cryptosystems and their restorations as instruments of Post-Quantum Cryptography
Vasyl Ustimenko
2024/090
Starlit: Privacy-Preserving Federated Learning to Enhance Financial Fraud Detection
Aydin Abadi, Bradley Doyle, Francesco Gini, Kieron Guinamard, Sasi Kumar Murakonda, Jack Liddell, Paul Mellor, Steven J. Murdoch, Mohammad Naseri, Hector Page, George Theodorakopoulos, and Suzanne Weller
2024/089
Two-party GOST in two parts: fruitless search and fruitful synthesis
Liliya Akhmetzyanova, Evgeny Alekseev, Alexandra Babueva, Lidiia Nikiforova, and Stanislav Smyshlyaev
2024/088
Enabling PERK and other MPC-in-the-Head Signatures on Resource-Constrained Devices
Slim Bettaieb, Loïc Bidoux, Alessandro Budroni, Marco Palumbi, and Lucas Pandolfo Perin
2024/087
Tree-based Lookup Table on Batched Encrypted Queries using Homomorphic Encryption
Jung Hee Cheon, Hyeongmin Choe, and Jai Hyun Park
2024/086
On Hilbert-Poincaré series of affine semi-regular polynomial sequences and related Gröbner bases
Momonari Kudo and Kazuhiro Yokoyama
2024/085
Simultaneously simple universal and indifferentiable hashing to elliptic curves
Dmitrii Koshelev
2024/084
Efficient Instances of Docked Double Decker With AES, and Application to Authenticated Encryption
Christoph Dobraunig, Krystian Matusiewicz, Bart Mennink, and Alexander Tereschenko
2024/083
Layout Graphs, Random Walks and the t-wise Independence of SPN Block Ciphers
Tianren Liu, Angelos Pelecanos, Stefano Tessaro, and Vinod Vaikuntanathan
2024/082
Quantum State Obfuscation from Classical Oracles
James Bartusek, Zvika Brakerski, and Vinod Vaikuntanathan
2024/081
SuperFL: Privacy-Preserving Federated Learning with Efficiency and Robustness
Yulin Zhao, Hualin Zhou, and Zhiguo Wan
2024/080
Memory adds no cost to lattice sieving for computers in 3 or more spatial dimensions
Samuel Jaques
2024/079
On Modular Algorithms and Butterfly Operations in Number Theoretic Transform
Yanze Yang, Yiran Jia, and Guangwu Xu
2024/078
Formal Security Analysis of the OpenID FAPI 2.0: Accompanying a Standardization Process
Pedram Hosseyni, Ralf Kuesters, and Tim Würtele
2024/077
OBSCURE: Versatile Software Obfuscation from a Lightweight Secure Element
Darius Mercadier, Viet Sang Nguyen, Matthieu Rivain, and Aleksei Udovenko
2024/076
A provably masked implementation of BIKE Key Encapsulation Mechanism
Loïc Demange and Mélissa Rossi
2024/075
Succinct Verification of Compressed Sigma Protocols in the Updatable SRS setting
Moumita Dutta, Chaya Ganesh, and Neha Jawalkar
2024/074
PRIDA: PRIvacy-preserving Data Aggregation with multiple data customers
Beyza Bozdemir, Betül Aşkın Özdemir, and Melek Önen
2024/073
A Comparative Examination of Network and Contract-Based Blockchain Storage Solutions for Decentralized Applications
Lipeng He
2024/072
1/0 Shades of UC: Photonic Side-Channel Analysis of Universal Circuits
Dev M. Mehta, Mohammad Hashemi, Domenic Forte, Shahin Tajik, and Fatemeh Ganji
2024/071
Too Hot To Be True: Temperature Calibration for Higher Confidence in NN-assisted Side-channel Analysis
Seyedmohammad Nouraniboosjin and Fatemeh Ganji
2024/070
Hints from Hertz: Dynamic Frequency Scaling Side-Channel Analysis of Number Theoretic Transform in Lattice-Based KEMs
Tianrun Yu, Chi Cheng, Zilong Yang, Yingchen Wang, Yanbin Pan, and Jian Weng
2024/069
SDitH in Hardware
Sanjay Deshpande, James Howe, Jakub Szefer, and Dongze Yue
2024/068
Laconic Function Evaluation, Functional Encryption and Obfuscation for RAMs with Sublinear Computation
Fangqi Dong, Zihan Hao, Ethan Mook, and Daniel Wichs
2024/067
A Refined Hardness Estimation of LWE in Two-step Mode
Wenwen Xia, Leizhang Wang, Geng Wang, Dawu Gu, and Baocang Wang
2024/066
Exploiting the Central Reduction in Lattice-Based Cryptography
Tolun Tosun, Amir Moradi, and Erkay Savas
2024/065
Privacy-preserving Anti-Money Laundering using Secure Multi-Party Computation
Marie Beth van Egmond, Vincent Dunning, Stefan van den Berg, Thomas Rooijakkers, Alex Sangers, Ton Poppe, and Jan Veldsink
2024/064
Extreme Algebraic Attacks
Pierrick Méaux and Qingju Wang
2024/063
A Study of Soft Analytical Side-Channel Attacks on Secure Hash Algorithms
Julien Maillard, Thomas Hiscock, Maxime Lecomte, and Christophe Clavier
2024/062
Double Difficulties, Defense in Depth A succinct authenticated key agreement protocol
WenBin Hsieh
2024/061
Partial Key Exposure Attack on Common Prime RSA
Mengce Zheng
2024/060
The Insecurity of Masked Comparisons: SCAs on ML-KEM’s FO-Transform
Julius Hermelink, Kai-Chun Ning, Richard Petri, and Emanuele Strieder
2024/059
CrISA-X: Unleashing Performance Excellence in Lightweight Symmetric Cryptography for Extendable and Deeply Embedded Processors
Oren Ganon and Itamar Levi
2024/058
Constrained Pseudorandom Functions for Inner-Product Predicates from Weaker Assumptions
Sacha Servan-Schreiber
2024/057
Elastic MSM: A Fast, Elastic and Modular Preprocessing Technique for Multi-Scalar Multiplication Algorithm on GPUs
Xudong Zhu, Haoqi He, Zhengbang Yang, Yi Deng, Lutan Zhao, and Rui Hou
2024/056
Zero-Knowledge Proofs for SIDH variants with Masked Degree or Torsion
Youcef Mokrani and David Jao
2024/055
Multi-Hop Fine-Grained Proxy Re-Encryption
Yunxiao Zhou, Shengli Liu, and Shuai Han
2024/054
FEASE: Fast and Expressive Asymmetric Searchable Encryption
Long Meng, Liqun Chen, Yangguang Tian, Mark Manulis, and Suhui Liu
2024/053
Anonymous Homomorphic IBE with Application to Anonymous Aggregation
Michael Clear, Ciaran McGoldrick, and Hitesh Tewari
2024/052
Simple Vs Vectorial: Exploiting Structural Symmetry to Beat the ZeroSum Distinguisher Applications to SHA3, Xoodyak and Bash
SAHIBA SURYAWANSHI, Shibam Ghosh, Dhiman Saha, and Prathamesh Ram
2024/051
Limits on Authenticated Encryption Use in TLS
Atul Luykx and Kenneth G. Paterson
2024/050
Do You Need a Zero Knowledge Proof?
Jens Ernstberger, Stefanos Chaliasos, Liyi Zhou, Philipp Jovanovic, and Arthur Gervais
2024/049
CL-SCA: Leveraging Contrastive Learning for Profiled Side-Channel Analysis
Annv Liu, An Wang, Shaofei Sun, Congming Wei, Yaoling Ding, Yongjuan Wang, and Liehuang Zhu
2024/048
Computational Differential Privacy for Encrypted Databases Supporting Linear Queries
Ferran Alborch Escobar, Sébastien Canard, Fabien Laguillaumie, and Duong Hieu Phan
2024/047
On Efficient and Secure Compression Modes for Arithmetization-Oriented Hashing
Elena Andreeva, Rishiraj Bhattacharyya, Arnab Roy, and Stefano Trevisani
2024/046
Quantum-Secure Hybrid Communication for Aviation Infrastructure
Benjamin Dowling and Bhagya Wimalasiri
2024/045
A Low-Latency High-Order Arithmetic to Boolean Masking Conversion
Jiangxue Liu, Cankun Zhao, Shuohang Peng, Bohan Yang, Hang Zhao, Xiangdong Han, Min Zhu, Shaojun Wei, and Leibo Liu
2024/044
Adaptive Distributional Security for Garbling Schemes with $\mathcal{O}(|x|)$ Online Complexity
Estuardo Alpírez Bock, Chris Brzuska, Pihla Karanko, Sabine Oechsner, and Kirthivaasan Puniamurthy
2024/043
Fuzzy Identity Based Encryption with a flexible threshold value
Sedigheh Khajouei-Nejad, Sam Jabbehdari, Hamid Haj Seyyed Javadi, and Seyed Mohammad Hossein Moattar
2024/042
Foundations of Anonymous Signatures: Formal Definitions, Simplified Requirements, and a Construction Based on General Assumptions
Jan Bobolz, Jesus Diaz, and Markulf Kohlweiss
2024/041
SASTA: Ambushing Hybrid Homomorphic Encryption Schemes with a Single Fault
Aikata Aikata, Ahaan Dabholkar, Dhiman Saha, and Sujoy Sinha Roy
2024/040
ReSolveD: Shorter Signatures from Regular Syndrome Decoding and VOLE-in-the-Head
Hongrui Cui, Hanlin Liu, Di Yan, Kang Yang, Yu Yu, and Kaiyi Zhang
2024/039
X-Wing: The Hybrid KEM You’ve Been Looking For
Manuel Barbosa, Deirdre Connolly, João Diogo Duarte, Aaron Kaiser, Peter Schwabe, Karoline Varner, and Bas Westerbaan
2024/038
On Computing the Multidimensional Scalar Multiplication on Elliptic Curves
Walid Haddaji, Loubna Ghammam, Nadia El Mrabet, and Leila Ben Abdelghani
2024/037
Computing $2$-isogenies between Kummer lines
Damien Robert and Nicolas Sarkis
2024/036
Blink: Breaking Lattice-Based Schemes Implemented in Parallel with Chosen-Ciphertext Attack
Jian Wang, Weiqiong Cao, Hua Chen, and Haoyuan Li
2024/035
A New Approach to Efficient and Secure Fixed-point Computation
Tore Kasper Frederiksen, Jonas Lindstrøm, Mikkel Wienberg Madsen, and Anne Dorte Spangsberg
2024/034
How (not) to hash into class groups of imaginary quadratic fields?
István András Seres, Péter Burcsi, and Péter Kutas
2024/033
Security analysis and improvements on a semi-quantum electronic voting protocol
Qiu Shujing, Xin Xiangjun, Zheng Qian, Li Chaoyang, and Li Fagen
2024/032
Verifiable FHE via Lattice-based SNARKs
Shahla Atapoor, Karim Baghery, Hilder V. L. Pereira, and Jannik Spiessens
2024/031
Feldman's Verifiable Secret Sharing for a Dishonest Majority
Yi-Hsiu Chen and Yehuda Lindell
2024/030
Quantum Oblivious LWE Sampling and Insecurity of Standard Model Lattice-Based SNARKs
Thomas Debris-Alazard, Pouria Fallahpour, and Damien Stehlé
2024/029
YouChoose: A Lightweight Anonymous Proof of Account Ownership
Aarav Varshney, Prashant Agrawal, and Mahabir Prasad Jhanwar
2024/028
Lattice-Based Functional Commitments: Fast Verification and Cryptanalysis
Hoeteck Wee and David J. Wu
2024/027
Updatable, Aggregatable, Succinct Mercurial Vector Commitment from Lattice
Hongxiao Wang, Siu-Ming Yiu, Yanmin Zhao, and Zoe L. Jiang
2024/026
Towards Compact Identity-based Encryption on Ideal Lattices
Huiwen Jia, Yupu Hu, Chunming Tang, and Lin Wang
2024/025
Bitcoin Clique: Channel-free Off-chain Payments using Two-Shot Adaptor Signatures
Siavash Riahi and Orfeas Stefanos Thyfronitis Litos
2024/024
FlexHi: A Flexible Hierarchical Threshold Signature Scheme
Muhammed Ali Bingol, Sermin Kocaman, Ali Dogan, and Sibel Kurt Toplu
2024/023
CCA Security with Short AEAD Tags
Mustafa Khairallah
2024/022
Fully Dynamic Attribute-Based Signatures for Circuits from Codes
San Ling, Khoa Nguyen, Duong Hieu Phan, Khai Hanh Tang, Huaxiong Wang, and Yanhong Xu
2024/021
Designing homomorphic encryptions with rational functions
Gerald Gavin and Sandrine Tainturier
2024/020
EROR: Efficient Repliable Onion Routing with Strong Provable Privacy
Michael Klooß, Andy Rupp, Daniel Schadt, Thorsten Strufe, and Christiane Weis
2024/019
Benchmark Performance of Homomorphic Polynomial Public Key Cryptography for Key Encapsulation and Digital Signature Schemes
Randy Kuang, Maria Perepechaenko, Dafu Lou, and Brinda Tank
2024/018
Smaller Sphincs+
Scott Fluhrer and Quynh Dang
2024/017
PT-symmetric mapping of three states and its implementation on a cloud quantum processor
Yaroslav Balytskyi, Yevgen Kotukh, Gennady Khalimov, and Sang-Yoon Chang
2024/016
Reducing the computational complexity of fuzzy identity-based encryption from lattice
Sedigheh Khajouei-Nejad, Hamid Haj Seyyed Javadi, Sam Jabbehdari, and Seyed Mohammad Hossein Moattar
2024/015
Unconditionally secure MPC for Boolean circuits with constant online communication
Zhenkai Hu, Kang Yang, and Yu Yu
2024/014
A Lattice-based Accountable Subgroup Multi-signature Scheme with Verifiable Group Setup
Ahmet Ramazan Ağırtaş and Oğuz YAYLA
2024/013
A note on ``intelligent drone-assisted robust lightweight multi-factor authentication for military zone surveillance in the 6G era''
Zhengjun Cao and Lihua Liu
2024/012
Two-Round ID-PAKE with strong PFS and single pairing operation
Behnam Zahednejad and Gao Chong-zhi
2024/011
MetaDORAM: Info-Theoretic Distributed ORAM with Less Communication
Brett Hemenway Falk, Daniel Noble, and Rafail Ostrovsky
2024/010
On the tropical two-sided discrete logarithm and a key exchange protocol based on the tropical algebra of pairs
Sulaiman Alhussaini, Craig Collett, and Serge˘ı Sergeev
2024/009
Distributed Protocols for Oblivious Transfer and Polynomial Evaluation
Aviad Ben Arie and Tamir Tassa
2024/008
SoK: Methods for Sampling Random Permutations in Post-Quantum Cryptography
Alessandro Budroni, Isaac A. Canales-Martínez, and Lucas Pandolfo Perin
2024/007
Password Protected Universal Thresholdizer
Sabyasachi Dutta, Partha Sarathi Roy, Reihaneh Safavi-Naini, and Willy Susilo
2024/006
Towards general-purpose program obfuscation via local mixing
Ran Canetti, Claudio Chamon, Eduardo Mucciolo, and Andrei Ruckenstein
2024/005
The Multiple Millionaires' Problem: New Algorithmic Approaches and Protocols
Tamir Tassa and Avishay Yanai
2024/004
Practical Two-party Computational Differential Privacy with Active Security
Fredrik Meisingseth, Christian Rechberger, and Fabian Schmid
2024/003
Simple Soundness Proofs
Alex Kampa
2024/002
Fast polynomial multiplication using matrix multiplication accelerators with applications to NTRU on Apple M1/M3 SoCs
Décio Luiz Gazzoni Filho, Guilherme Brandão, and Julio López
2024/001
On short digital signatures with Eulerian transformations
Vasyl Ustimenko
2023/1973
Combinatorially Homomorphic Encryption
Yuval Ishai, Eyal Kushnir, and Ron D. Rothblum
2023/1972
Hard Languages in $\mathsf{NP} \cap \mathsf{coNP}$ and NIZK Proofs from Unstructured Hardness
Riddhi Ghosal, Yuval Ishai, Alexis Korb, Eyal Kushilevitz, Paul Lou, and Amit Sahai
2023/1971
The Planck Constant and Quantum Fourier Transformation
Zhengjun Cao and Zhenfu Cao
2023/1970
Efficient Hardware Implementation for Maiorana-McFarland type Functions
Anupam Chattopadhyay, Subhamoy Maitra, Bimal Mandal, Manmatha Roy, and Deng Tang
2023/1969
Secure and Practical Functional Dependency Discovery in Outsourced Databases
Xinle Cao, Yuhan Li, Dmytro Bogatov, Jian Liu, and Kui Ren
2023/1968
Evaluating the security of CRYSTALS-Dilithium in the quantum random oracle model
Kelsey A. Jackson, Carl A. Miller, and Daochen Wang
2023/1967
Monotone Policy BARGs from BARGs and Additively Homomorphic Encryption
Shafik Nassar, Brent Waters, and David J. Wu
2023/1966
How to Make Rational Arguments Practical and Extractable
Matteo Campanelli, Chaya Ganesh, and Rosario Gennaro
2023/1965
More Efficient Public-Key Cryptography with Leakage and Tamper Resilience
Shuai Han, Shengli Liu, and Dawu Gu
2023/1964
Maypoles: Lightning Striking Twice
Clara Shikhelman
2023/1963
A Small Serving of Mash: (Quantum) Algorithms for SPDH-Sign with Small Parameters
Andrew Mendelsohn, Edmund Dable-Heath, and Cong Ling
2023/1962
A Survey of Polynomial Multiplications for Lattice-Based Cryptosystems
Vincent Hwang
2023/1961
On The Practical Advantage of Committing Challenges in Zero-Knowledge Protocols
David Naccache and Ofer Yifrach-Stav
2023/1960
Post Quantum Sphinx
David Anthony Stainton
2023/1959
On the notion of carries of numbers $2^n-1$ and Scholz conjecture
Theophilus Agama
2023/1958
Revisiting Pairing-friendly Curves with Embedding Degrees 10 and 14
Yu Dai, Debiao He, Cong Peng, Zhijian Yang, and Chang-an Zhao
2023/1957
Chosen Ciphertext Security via BARGs
Takahiro Matsuda
2023/1956
A Signature Scheme from Full-Distance Syndrome Decoding
Abdelhaliem Babiker
2023/1955
Barrett Multiplication for Dilithium on Embedded Devices
Vincent Hwang, YoungBeom Kim, and Seog Chung Seo
2023/1954
Fiat-Shamir Goes Tropical
Rémi Géraud-Stewart, David Naccache, and Ofer Yifrach-Stav
2023/1953
Efficient quantum algorithms for some instances of the semidirect discrete logarithm problem
Muhammad Imran and Gábor Ivanyos
2023/1952
Overview and Discussion of Attacks on CRYSTALS-Kyber
Stone Li
2023/1951
Protection Against Subversion Corruptions via Reverse Firewalls in the plain Universal Composability Framework
Paula Arnold, Sebastian Berndt, Jörn Müller-Quade, and Astrid Ottenhues
2023/1950
GigaDORAM: Breaking the Billion Address Barrier
Brett Falk, Rafail Ostrovsky, Matan Shtepel, and Jacob Zhang
2023/1949
HELIOPOLIS: Verifiable Computation over Homomorphically Encrypted Data from Interactive Oracle Proofs is Practical
Diego F. Aranha, Anamaria Costache, Antonio Guimarães, and Eduardo Soria-Vazquez
2023/1948
PriDe CT: Towards Public Consensus, Private Transactions, and Forward Secrecy in Decentralized Payments
Yue Guo, Harish Karthikeyan, Antigoni Polychroniadou, and Chaddy Huussin
2023/1947
Using Predicate Extension for Predicate Encryption to Generically Obtain Chosen-Ciphertext Security and Signatures
Marloes Venema and Leon Botros
2023/1946
SnarkFold: Efficient Proof Aggregation from Incrementally Verifiable Computation and Applications
Xun Liu, Shang Gao, Tianyu Zheng, Yu Guo, and Bin Xiao
2023/1945
The Fiat--Shamir Transformation of $(\Gamma_1,\dots,\Gamma_\mu)$-Special-Sound Interactive Proofs
Thomas Attema, Serge Fehr, Michael Klooß, and Nicolas Resch
2023/1944
Revisiting The Multiple of Property for SKINNY The Exact Computation of the number of right pairs
Hanbeom Shin, Insung Kim, Sunyeop Kim, Seonggyeom Kim, Deukjo Hong, Jaechul Sung, and Seokhie Hong
2023/1943
Distinguisher and Related-Key Attack on HALFLOOP-96
Jinpeng Liu and Ling Sun
2023/1942
Traceable mixnets
Prashant Agrawal, Abhinav Nakarmi, Mahabir Prasad Jhanwar, Subodh Vishnu Sharma, and Subhashis Banerjee
2023/1941
Upgrading Fuzzy Extractors
Chloe Cachet, Ariel Hamlin, Maryam Rezapour, and Benjamin Fuller
2023/1940
Concrete Time/Memory Trade-Offs in Generalised Stern’s ISD Algorithm
Sreyosi Bhattacharyya and Palash Sarkar
2023/1939
Applications of Neural Network-Based AI in Cryptography
Abderrahmane Nitaj and Tajjeeddine Rachidi
2023/1938
Batch Arguments to NIZKs from One-Way Functions
Eli Bradley, Brent Waters, and David J. Wu
2023/1937
Revocable Quantum Digital Signatures
Tomoyuki Morimae, Alexander Poremba, and Takashi Yamakawa
2023/1936
LERNA: Secure Single-Server Aggregation via Key-Homomorphic Masking
Hanjun Li, Huijia Lin, Antigoni Polychroniadou, and Stefano Tessaro
2023/1935
The Splitting Field of $Y^n-2$, Two-Variable NTT and Lattice-Based Cryptography
Wenzhe Yang
2023/1934
More efficient comparison protocols for MPC
Wicher Malten, Mehmet Ugurbil, and Miguel de Vega
2023/1933
Keeping Up with the KEMs: Stronger Security Notions for KEMs and automated analysis of KEM-based protocols
Cas Cremers, Alexander Dax, and Niklas Medinger
2023/1932
Multipars: Reduced-Communication MPC over Z2k
Sebastian Hasler, Pascal Reisert, Marc Rivinius, and Ralf Küsters
2023/1931
Single-Trace Side-Channel Attacks on CRYSTALS-Dilithium: Myth or Reality?
Ruize Wang, Kalle Ngo, Joel Gärtner, and Elena Dubrova
2023/1930
Toward A Practical Multi-party Private Set Union
Jiahui Gao, Son Nguyen, and Ni Trieu
2023/1929
Cryptography from Planted Graphs: Security with Logarithmic-Size Messages
Damiano Abram, Amos Beimel, Yuval Ishai, Eyal Kushilevitz, and Varun Narayanan
2023/1928
Unconditionally Secure Quantum Bit Commitment and Quantum Oblivious Transfer
Ping Wang, Yikang Lei, and Yiting Su
2023/1927
Holepunch: Fast, Secure File Deletion with Crash Consistency
Zachary Ratliff, Wittmann Goh, Abe Wieland, James Mickens, and Ryan Williams
2023/1926
NOTRY: deniable messaging with retroactive avowal
Faxing Wang, Shaanan Cohney, Riad Wahby, and Joseph Bonneau
2023/1925
VDOO: A Short, Fast, Post-Quantum Multivariate Digital Signature Scheme
Anindya ganguly, Angshuman Karmakar, and Nitin Saxena
2023/1924
Analyzing the complexity of reference post-quantum software: the case of lattice-based KEMs
Daniel J. Bernstein
2023/1923
Differential Fault Attack on Ascon Cipher
Amit Jana
2023/1922
One for All, All for Ascon: Ensemble-based Deep Learning Side-channel Analysis
Azade Rezaeezade, Abraham Basurto-Becerra, Léo Weissbart, and Guilherme Perin
2023/1921
Automated Issuance of Post-Quantum Certificates: a New Challenge
Alexandre Augusto Giron, Frederico Schardong, Lucas Pandolfo Perin, Ricardo Custódio, Victor Valle, and Víctor Mateu
2023/1920
Camel: E2E Verifiable Instant Runoff Voting without Tallying Authorities
Luke Harrison, Samiran Bag, and Feng Hao
2023/1919
When and How to Aggregate Message Authentication Codes on Lossy Channels?
Eric Wagner, Martin Serror, Klaus Wehrle, and Martin Henze
2023/1918
FANNG-MPC: Framework for Artificial Neural Networks and Generic MPC
Najwa Aaraj, Abdelrahaman Aly, Tim Güneysu, Chiara Marcolla, Johannes Mono, Rogerio Paludo, Iván Santos-González, Mireia Scholz, Eduardo Soria-Vazquez, Victor Sucasas, and Ajith Suresh
2023/1917
Regularized PolyKervNets: Optimizing Expressiveness and Efficiency for Private Inference in Deep Neural Networks
Toluwani Aremu
2023/1916
Sing a song of Simplex
Victor Shoup
2023/1915
Efficient Post-Quantum Secure Deterministic Threshold Wallets from Isogenies
Poulami Das, Andreas Erwig, Michael Meyer, and Patrick Struck
2023/1914
Efficient Low-Latency Masking of Ascon without Fresh Randomness
Srinidhi Hari Prasad, Florian Mendel, Martin Schläffer, and Rishub Nagpal
2023/1913
Breaking RSA Authentication on Zynq-7000 SoC and Beyond: Identification of Critical Security Flaw in FSBL Software
Prasanna Ravi, Arpan Jati, and Shivam Bhasin
2023/1912
Dishonest Majority Multiparty Computation over Matrix Rings
Hongqing Liu, Chaoping Xing, Chen Yuan, and Taoxu Zou
2023/1911
Non-Interactive Classical Verification of Quantum Depth: A Fine-Grained Characterization
Nai-Hui Chia and Shih-Han Hung
2023/1910
Failed crypto: Matrices over non-standard arithmetic
Daniel R. L. Brown
2023/1909
Ratel: MPC-extensions for Smart Contracts
Yunqi Li, Kyle Soska, Zhen Huang, Sylvain Bellemare, Mikerah Quintyne-Collins, Lun Wang, Xiaoyuan Liu, Dawn Song, and Andrew Miller
2023/1908
PARScoin: A Privacy-preserving, Auditable, and Regulation-friendly Stablecoin
Amirreza Sarencheh, Aggelos Kiayias, and Markulf Kohlweiss
2023/1907
Integral Cryptanalysis Using Algebraic Transition Matrices
Tim Beyne and Michiel Verbauwhede
2023/1906
Exploring SIDH-based Signature Parameters
Andrea Basso, Mingjie Chen, Tako Boris Fouotsa, Péter Kutas, Abel Laval, Laurane Marco, and Gustave Tchoffo Saah
2023/1905
Oops, I did it again revisited: another look at reusing one-time signatures
Scott Fluhrer
2023/1904
Generalized Kotov-Ushakov Attack on Tropical Stickel Protocol Based on Modified Tropical Circulant Matrices
Sulaiman Alhussaini, Craig Collett, and Serge˘ı Sergeev
2023/1903
Quarantined-TreeKEM: a Continuous Group Key Agreement for MLS, Secure in Presence of Inactive Users
Céline Chevalier, Guirec Lebrun, Ange Martinelli, and Abdul Rahman Taleb
2023/1902
A Transaction-Level Model for Blockchain Privacy
François-Xavier Wicht, Zhipeng Wang, Duc V. Le, and Christian Cachin
2023/1901
Middle-Products of Skew Polynomials and Learning with Errors
Cong Ling and Andrew Mendelsohn
2023/1900
Conan: Distributed Proofs of Compliance for Anonymous Data Collection
Mingxun Zhou, Elaine Shi, and Giulia Fanti
2023/1899
Allowing Blockchain Loans with Low Collateral
Tom Azoulay, Uri Carl, and Ori Rottenstreich
2023/1898
An Empirical Study of Cross-chain Arbitrage in Decentralized Exchanges
Ori Mazor and Ori Rottenstreich
2023/1897
PRAC: Round-Efficient 3-Party MPC for Dynamic Data Structures
Sajin Sasy, Adithya Vadapalli, and Ian Goldberg
2023/1896
Selective Delegation of Attributes in Mercurial Signature Credentials
Colin Putman and Keith M. Martin
2023/1895
The Patching Landscape of Elisabeth-4 and the Mixed Filter Permutator Paradigm
Clément Hoffmann, Pierrick Méaux, and François-Xavier Standaert
2023/1894
Hardness of Range Avoidance and Remote Point for Restricted Circuits via Cryptography
Yilei Chen and Jiatu Li
2023/1893
BOLT: Privacy-Preserving, Accurate and Efficient Inference for Transformers
Qi Pang, Jinhao Zhu, Helen Möllering, Wenting Zheng, and Thomas Schneider
2023/1892
Asymptotics of hybrid primal lattice attacks
Daniel J. Bernstein
2023/1891
In-depth Correlation Power Analysis Attacks on a Hardware Implementation of CRYSTALS-Dilithium
Huaxin Wang, Yiwen Gao, Yuejun Liu, Qian Zhang, and Yongbin Zhou
2023/1890
Aegis: A Lightning Fast Privacy-preserving Machine Learning Platform against Malicious Adversaries
Tianpei Lu, Bingsheng Zhang, Lichun Li, and Kui Ren
2023/1889
Fully Parallel, One-Cycle Random Shuffling for Efficient Countermeasure against Side Channel Attack and its Complexity Verification.
Jong-Yeon Park, Dongsoo Lee, Seonggyeom Kim, Wonil lee, Bo Gyeong Kang, and Kouichi Sakurai
2023/1888
Reverie: an end-to-end accumulation scheme from Cyclefold
Lev Soukhanov
2023/1887
GRandLine: Adaptively Secure DKG and Randomness Beacon with (Log-)Quadratic Communication Complexity
Renas Bacho, Christoph Lenzen, Julian Loss, Simon Ochsenreither, and Dimitrios Papachristoudis
2023/1886
Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
Sebastian Angel, Eleftherios Ioannidis, Elizabeth Margolin, Srinath Setty, and Jess Woods
2023/1885
Falcon Takes Off - A Hardware Implementation of the Falcon Signature Scheme
Michael Schmid, Dorian Amiet, Jan Wendler, Paul Zbinden, and Tao Wei
2023/1884
Multi-Signatures for Ad-hoc and Privacy-Preserving Group Signing
Anja Lehmann and Cavit Özbay
2023/1883
The statistical nature of leakage in SSE schemes and its role in passive attacks
Marc Damie, Jean-Benoist Leger, Florian Hahn, and Andreas Peter
2023/1882
Lattice Based Signatures with Additional Functionalities
Swati Rawal, Sahadeo Padhye, and Debiao He
2023/1881
Blockchain Governance via Sharp Anonymous Multisignatures
Wonseok Choi, Xiangyu Liu, and Vassilis Zikas
2023/1880
Cryptanalysis of Lattice-Based Sequentiality Assumptions and Proofs of Sequential Work
Chris Peikert and Yi Tang
2023/1879
A Multiparty Commutative Hashing Protocol based on the Discrete Logarithm Problem
Daniel Zentai, Mihail Plesa, and Robin Frot
2023/1878
Predicting performance for post-quantum encrypted-file systems
Daniel J. Bernstein
2023/1877
Security Analysis of an Image Encryption Scheme Based on a New Secure Variant of Hill Cipher and 1D Chaotic Maps
George Teseleanu
2023/1876
Thwarting Last-Minute Voter Coercion
Rosario Giustolisi, Maryam Sheikhi Garjan, and Carsten Schuermann
2023/1875
The Blockwise Rank Syndrome Learning problem and its applications to cryptography
Nicolas Aragon, Pierre Briaud, Victor Dyseryn, Philippe Gaborit, and Adrien Vinçotte
2023/1874
Security Analysis of an Image Encryption Based on the Kronecker Xor Product, the Hill Cipher and the Sigmoid Logistic Map
George Teseleanu
2023/1873
SoK: Post-Quantum TLS Handshake
Nouri Alnahawi, Johannes Müller, Jan Oupický, and Alexander Wiesmaier
2023/1872
Integral Multiset: A Novel Framework for Integral Attacks over Finite Fields
Weizhe Wang and Deng Tang
2023/1871
B2T: The Third Logical Value of a Bit
Dipesh, Vishesh Mishra, and Urbi chatterjee
2023/1870
An Improved Method for Evaluating Secret Variables and Its Application to WAGE
Weizhe Wang, Haoyang Wang, and Deng Tang
2023/1869
Accountable Bulletin Boards: Definition and Provably Secure Implementation
Mike Graf, Ralf Küsters, Daniel Rausch, Simon Egger, Marvin Bechtold, and Marcel Flinspach
2023/1868
COMMON: Order Book with Privacy
Albert Garreta, Adam Gągol, Aikaterini-Panagiota Stouka, Damian Straszak, and Michal Zajac
2023/1867
Different Flavours of HILL Pseudoentropy and Yao Incompressibility Entropy
Pihla Karanko
2023/1866
When NTT Meets SIS: Efficient Side-channel Attacks on Dilithium and Kyber
Zehua Qiao, Yuejun Liu, Yongbin Zhou, Mingyao Shao, and Shuo Sun
2023/1865
Projective Space Stern Decoding and Application to SDitH
Kevin Carrier, Valérian Hatey, and Jean-Pierre Tillich
2023/1864
Cache Side-Channel Attacks Through Electromagnetic Emanations of DRAM Accesses
Julien Maillard, Thomas Hiscock, Maxime Lecomte, and Christophe Clavier
2023/1863
Efficient Secure Multiparty Computation for Multidimensional Arithmetics and Its Application in Privacy-Preserving Biometric Identification
Dongyu Wu, Bei Liang, Zijie Lu, and Jintai Ding
2023/1862
Analyzing UTXO-Based Blockchain Privacy Threats
Simin Ghesmati, Walid Fdhila, and Edgar Weippl
2023/1861
Automatic Verification of Cryptographic Block Function Implementations with Logical Equivalence Checking
Li-Chang Lai, Jiaxiang Liu, Xiaomu Shi, Ming-Hsien Tsai, Bow-Yaw Wang, and Bo-Yin Yang
2023/1860
EstraNet: An Efficient Shift-Invariant Transformer Network for Side-Channel Analysis
Suvadeep Hajra, Siddhartha Chowdhury, and Debdeep Mukhopadhyay
2023/1859
XorSHAP: Privacy-Preserving Explainable AI for Decision Tree Models
Dimitar Jetchev and Marius Vuille
2023/1858
A Novel Power-Sum PRG with Applications to Lattice-Based zkSNARKs
Charanjit S Jutla, Eamonn W. Postlethwaite, and Arnab Roy
2023/1857
A Simple and Efficient Framework of Proof Systems for NP
Yuyu Wang, Chuanjie Su, Jiaxin Pan, and Yu Chen
2023/1856
Optimizing AES Threshold Implementation under the Glitch-Extended Probing Model
Fu Yao, Hua Chen, Yongzhuang Wei, Enes Pasalic, Feng Zhou, and Limin Fan
2023/1855
Demystifying DeFi MEV Activities in Flashbots Bundle
Zihao Li, Jianfeng Li, Zheyuan He, Xiapu Luo, Ting Wang, Xiaoze Ni, Wenwu Yang, Xi Chen, and Ting Chen
2023/1854
A note on quantum approximate optimization algorithm
Zhengjun Cao
2023/1853
Report on evaluation of KpqC candidates
Jolijn Cottaar, Kathrin Hövelmanns, Andreas Hülsing, Tanja Lange, Mohammad Mahzoun, Alex Pellegrini, Alberto Ravagnani, Sven Schäge, Monika Trimoska, and Benne de Weger
2023/1852
Reduction from sparse LPN to LPN, Dual Attack 3.0
Kévin Carrier, Thomas Debris-Alazard, Charles Meyer-Hilfiger, and Jean-Pierre Tillich
2023/1851
Quantum Security of the UMTS-AKA Protocol and its Primitives, Milenage and TUAK
Paul Frixons, Sébastien Canard, and Loïc Ferreira
2023/1850
Accurate Score Prediction for Dual-Sieve Attacks
Léo Ducas and Ludo N. Pulles
2023/1849
Lattice-based Programmable Hash Functions and Applications
Jiang Zhang, Yu Chen, and Zhenfeng Zhang
2023/1848
Breach Extraction Attacks: Exposing and Addressing the Leakage in Second Generation Compromised Credential Checking Services
Dario Pasquini, Danilo Francati, Giuseppe Ateniese, and Evgenios M. Kornaropoulos
2023/1847
Cycle Structure and Observability of Two Types of Galois NFSRs
Xianghan Wang, Jianghua Zhong, and Dongdai Lin
2023/1846
New Security Proofs and Complexity Records for Advanced Encryption Standard
Orhun Kara
2023/1845
Compact Issuer-Hiding Authentication, Application to Anonymous Credential
Olivier Sanders and Jacques Traoré
2023/1844
Unconditionally Secure Commitments with Quantum Auxiliary Inputs
Tomoyuki Morimae, Barak Nehoran, and Takashi Yamakawa
2023/1843
Zero-day vulnerability prevention with recursive feature elimination and ensemble learning
Mike Nkongolo Wa Nkongolo
2023/1842
Leverage Staking with Liquid Staking Derivatives (LSDs): Opportunities and Risks
Xihan Xiong, Zhipeng Wang, Xi Chen, William Knottenbelt, and Michael Huth
2023/1841
Unclonable Cryptography with Unbounded Collusions and Impossibility of Hyperefficient Shadow Tomography
Alper Çakan and Vipul Goyal
2023/1840
Unconditionally secure quantum commitments with preprocessing
Luowen Qian
2023/1839
Ring-LWE Hardness Based on Non-invertible Ideals
Charanjit S. Jutla and Chengyu Lin
2023/1838
Quantifying risks in cryptographic selection processes
Daniel J. Bernstein
2023/1837
More forging (and patching) of tropical signatures
Daniel R. L. Brown and Chris Monico
2023/1836
An Incremental PoSW for General Weight Distributions
Hamza Abusalah and Valerio Cini
2023/1835
ID-CAKE: Identity-based Cluster Authentication and Key Exchange Scheme for Message Broadcasting and Batch Verification in VANETs
Apurva K Vangujar, Alia Umrani, and Paolo Palmieri
2023/1834
BBB PRP Security of the Lai-Massey Mode
Ritam Bhaumik and Mohammad Amin Raeisi
2023/1833
Cryptanalysis of QARMAv2
Hosein Hadipour and Yosuke Todo
2023/1832
A Note On the Universality of Black-box MKtP Solvers
Noam Mazor and Rafael Pass
2023/1831
A CP-based Automatic Tool for Instantiating Truncated Differential Characteristics - Extended Version
François Delobel, Patrick Derbez, Arthur Gontier, Loïc Rouquette, and Christine Solnon
2023/1830
Vector Commitments with Efficient Updates
Ertem Nusret Tas and Dan Boneh
2023/1829
End-to-End Encrypted Zoom Meetings: Proving Security and Strengthening Liveness
Yevgeniy Dodis, Daniel Jost, Balachandar Kesavan, and Antonio Marcedone
2023/1828
Sender-Anamorphic Encryption Reformulated: Achieving Robust and Generic Constructions
Yi Wang, Rongmao Chen, Xinyi Huang, and Moti Yung
2023/1827
Key Exchange in the Post-Snowden Era: UC Secure Subversion-Resilient PAKE
Suvradip Chakraborty, Lorenzo Magliocco, Bernardo Magri, and Daniele Venturi
2023/1826
Load-Balanced Server-Aided MPC in Heterogeneous Computing
Yibiao Lu, Bingsheng Zhang, and Kui Ren
2023/1825
Towards Unclonable Cryptography in the Plain Model
Céline Chevalier, Paul Hermouet, and Quoc-Huy Vu
2023/1824
Learning with Errors over Group Rings Constructed by Semi-direct Product
Jiaqi Liu and Fang-Wei Fu
2023/1823
PQC-NN: Post-Quantum Cryptography Neural Network
Abel C. H. Chen
2023/1822
Rectangular Attack on VOX
Gilles Macario-Rat, Jacques Patarin, Benoit Cogliati, Jean-Charles Faugère, Pierre-Alain Fouque, Louis Gouin, Robin Larrieu, and Brice Minaud
2023/1821
Cryptanalysis of TS-Hash
Aleksei Udovenko
2023/1820
Chipmunk: Better Synchronized Multi-Signatures from Lattices
Nils Fleischhacker, Gottfried Herold, Mark Simkin, and Zhenfei Zhang
2023/1819
Beyond MPC-in-the-Head: Black-Box Constructions of Short Zero-Knowledge Proofs
Carmit Hazay, Muthuramakrishnan Venkitasubramaniam, and Mor Weiss
2023/1818
On Instantiating Unleveled Fully-Homomorphic Signatures from Falsifiable Assumptions
Romain Gay and Bogdan Ursu
2023/1817
Authenticating Medications with QR-Codes and Compact Digital Signatures
Julien Jainsky, David Naccache, Bassem Ouni, and Ofer Yifrach-Stav
2023/1816
ASOZ: a decentralized payment system with privacy preserving and auditing on public blockchain
Tianjian Liu, Dawei Zhang, Wei Wang, and Chang Chen
2023/1815
Accelerating Polynomial Multiplication for RLWE using Pipelined FFT
Neil Thanawala, Hamid Nejatollahi, and Nikil Dutt
2023/1814
Easy-ABE: An Easy Ciphertext-Policy Attribute-Based Encryption
Ahmad Khoureich Ka
2023/1813
Early Stopping for Any Number of Corruptions
Julian Loss and Jesper Buus Nielsen
2023/1812
The NTT and residues of a polynomial modulo factors of $X^{2^d} + 1$
Sahil Sharma
2023/1811
A note on Failing gracefully: Completing the picture for explicitly rejecting Fujisaki-Okamoto transforms using worst-case correctness
Kathrin Hövelmanns and Christian Majenz
2023/1810
Pairing-Free Blind Signatures from Standard Assumptions in the ROM
Julia Kastner, Ky Nguyen, and Michael Reichle
2023/1809
PURED: A unified framework for resource-hard functions
Alex Biryukov and Marius Lombard-Platet
2023/1808
Small Stretch Problem of the DCT Scheme and How to Fix it
Yuchao Chen, Tingting Guo, Lei Hu, Lina Shang, Shuping Mao, and Peng Wang
2023/1807
Entrada to Secure Graph Convolutional Networks
Nishat Koti, Varsha Bhat Kukkala, Arpita Patra, and Bhavish Raj Gopal
2023/1806
Fast and Designated-verifier Friendly zkSNARKs in the BPK Model
Xudong Zhu, Xuyang Song, and Yi Deng
2023/1805
On the Security of Rate-limited Privacy Pass
Hien Chu, Khue Do, and Lucjan Hanzlik
2023/1804
Fully Malicious Authenticated PIR
Marian Dietz and Stefano Tessaro
2023/1803
Design of a Linear Layer Optimised for Bitsliced 32-bit Implementation
Gaëtan Leurent and Clara Pernot
2023/1802
Sublinear-Communication Secure Multiparty Computation does not require FHE
Elette Boyle, Geoffroy Couteau, and Pierre Meyer
2023/1801
ForgedAttributes: An Existential Forgery Vulnerability of CMS and PKCS#7 Signatures
Falko Strenzke
2023/1800
Algebraic Attack on FHE-Friendly Cipher HERA Using Multiple Collisions
Fukang Liu, Abul Kalam, Santanu Sarkar, and Willi Meier
2023/1799
BabySpartan: Lasso-based SNARK for non-uniform computation
Srinath Setty and Justin Thaler
2023/1798
Somewhat Homomorphic Encryption based on Random Codes
Carlos Aguilar-Melchor, Victor Dyseryn, and Philippe Gaborit
2023/1797
A Modular Approach to Unclonable Cryptography
Prabhanjan Ananth and Amit Behera
2023/1796
Fault Attacks Sensitivity of Public Parameters in the Dilithium Verification
Andersson Calle Viera, Alexandre Berzati, and Karine Heydemann
2023/1795
Efficiently Testable Circuits without Conductivity
Mirza Ahad Baig, Suvradip Chakraborty, Stefan Dziembowski, Małgorzata Gałązka, Tomasz Lizurej, and Krzysztof Pietrzak
2023/1794
Secret-Shared Shuffle with Malicious Security
Xiangfu Song, Dong Yin, Jianli Bai, Changyu Dong, and Ee-Chien Chang
2023/1793
Accountable Multi-Signatures with Constant Size Public Keys
Dan Boneh, Aditi Partap, and Brent Waters
2023/1792
Sloth: Key Stretching and Deniable Encryption using Secure Elements on Smartphones
Daniel Hugenroth, Alberto Sonnino, Sam Cutler, and Alastair R. Beresford
2023/1791
Decentralized Compromise-Tolerant Public Key Management Ecosystem with Threshold Validation
Jamal Mosakheil and Kan Yang
2023/1790
Compromising sensitive information through Padding Oracle and Known Plaintext attacks in Encrypt-then-TLS scenarios
Daniel Espinoza Figueroa
2023/1789
Fast and Secure Oblivious Stable Matching over Arithmetic Circuits
Arup Mondal, Priyam Panda, Shivam Agarwal, Abdelrahaman Aly, and Debayan Gupta
2023/1788
Homomorphic Multiple Precision Multiplication for CKKS and Reduced Modulus Consumption
Jung Hee Cheon, Wonhee Cho, Jaehyung Kim, and Damien Stehlé
2023/1787
Updatable Privacy-Preserving Blueprints
Bernardo David, Felix Engelmann, Tore Frederiksen, Markulf Kohlweiss, Elena Pagnin, and Mikhail Volkhov
2023/1786
CASE: A New Frontier in Public-Key Authenticated Encryption
Shashank Agrawal, Shweta Agrawal, Manoj Prabhakaran, Rajeev Raghunath, and Jayesh Singla
2023/1785
There Is Always a Way Out! Destruction-Resistant Key Management: Formal Definition and Practical Instantiation
Yuan Zhang, Yaqing Song, Shiyu Li, Weijia Li, Zeqi Lai, and Qiang Tang
2023/1784
Succinct Arguments over Towers of Binary Fields
Benjamin E. Diamond and Jim Posen
2023/1783
An efficient quantum parallel repetition theorem and applications
John Bostanci, Luowen Qian, Nicholas Spooner, and Henry Yuen
2023/1782
A Solution to a Conjecture on the Maps $\chi_n^{(k)}$
Kamil Otal
2023/1781
A Lattice Attack on CRYSTALS-Kyber with Correlation Power Analysis
Yen-Ting Kuo and Atsushi Takayasu
2023/1780
Pairing-Free Blind Signatures from CDH Assumptions
Rutchathon Chairattana-Apirom, Stefano Tessaro, and Chenzhi Zhu
2023/1779
Privacy-Preserving Cross-Facility Early Warning for Unknown Epidemics
Shiyu Li, Yuan Zhang, Yaqing Song, Fan Wu, Feng Lyu, Kan Yang, and Qiang Tang
2023/1778
Immunizing Backdoored PRGs
Marshall Ball, Yevgeniy Dodis, and Eli Goldin
2023/1777
SoK: Collusion-resistant Multi-party Private Set Intersections in the Semi-honest Model
Jelle Vos, Mauro Conti, and Zekeriya Erkin
2023/1776
Watermarks in the Sand: Impossibility of Strong Watermarking for Generative Models
Hanlin Zhang, Benjamin L. Edelman, Danilo Francati, Daniele Venturi, Giuseppe Ateniese, and Boaz Barak
2023/1775
Beyond Security: Achieving Fairness in Mailmen-Assisted Timed Data Delivery
Shiyu Li, Yuan Zhang, Yaqing Song, Hongbo Liu, Nan Cheng, Hongwei Li, Dahai Tao, and Kan Yang
2023/1774
Decentralized Private Steam Aggregation from Lattices
Uddipana Dowerah and Aikaterini Mitrokotsa
2023/1773
Scalable and Adaptively Secure Any-Trust Distributed Key Generation and All-hands Checkpointing
Hanwen Feng, Tiancheng Mai, and Qiang Tang
2023/1772
Robust Combiners and Universal Constructions for Quantum Cryptography
Taiga Hiroka, Fuyuki Kitagawa, Ryo Nishimaki, and Takashi Yamakawa
2023/1771
A note on ``HAKECC: highly efficient authentication and key agreement scheme based on ECDH for RFID in IOT environment''
Zhengjun Cao
2023/1770
On the Feasibility of E2E Verifiable Online Voting - A Case Study From Durga Puja Trial
Horia Druliac, Matthew Bardsley, Chris Riches, Christian Dunn, Luke Harrison, Bimal Roy, and Feng Hao
2023/1769
A Comprehensive Survey on Non-Invasive Fault Injection Attacks
Amit Mazumder Shuvo, Tao Zhang, Farimah Farahmandi, and Mark Tehranipoor
2023/1768
Homomorphic Polynomial Public Key Cryptography for Quantum-secure Digital Signature
Randy Kuang, Maria Perepechaenko, Mahmoud Sayed, and Dafu Lou
2023/1767
The Impact of Hash Primitives and Communication Overhead for Hardware-Accelerated SPHINCS+
Patrick Karl, Jonas Schupp, and Georg Sigl
2023/1766
Introducing Clapoti(s): Evaluating the isogeny class group action in polynomial time
Aurel Page and Damien Robert
2023/1765
The Non-Uniform Perebor Conjecture for Time-Bounded Kolmogorov Complexity is False
Noam Mazor and Rafael Pass
2023/1764
Distributed Differential Privacy via Shuffling vs Aggregation: a Curious Study
Yu Wei, Jingyu Jia, Yuduo Wu, Changhui Hu, Changyu Dong, Zheli Liu, Xiaofeng Chen, Yun Peng, and Shaowei Wang
2023/1763
Secure Transformer Inference
Mu Yuan, Lan Zhang, Guoliang Xing, and Xiang-Yang Li
2023/1762
ZKSMT: A VM for Proving SMT Theorems in Zero Knowledge
Daniel Luick, John Kolesar, Timos Antonopoulos, William R. Harris, James Parker, Ruzica Piskac, Eran Tromer, Xiao Wang, and Ning Luo
2023/1761
Guardianship in Group Key Exchange for Limited Environments
Elsie Mestl Fondevik, Britta Hale, and Xisen Tian
2023/1760
Biscuit: New MPCitH Signature Scheme from Structured Multivariate Polynomials
Luk Bettale, Delaram Kahrobaei, Ludovic Perret, and Javier Verbel
2023/1759
Non-Interactive Zero-Knowledge Functional Proofs
Gongxian Zeng, Junzuo Lai, Zhengan Huang, Linru Zhang, Xiangning Wang, Kwok-Yan Lam, Huaxiong Wang, and Jian Weng
2023/1758
Pulsar: Secure Steganography for Diffusion Models
Tushar M. Jois, Gabrielle Beck, and Gabriel Kaptchuk
2023/1757
Adaptively Secure Consensus with Linear Complexity and Constant Round under Honest Majority in the Bare PKI Model, and Separation Bounds from the Idealized Message-Authentication Model
Matthieu Rambaud
2023/1756
How to Use Quantum Indistinguishability Obfuscation
Andrea Coladangelo and Sam Gunn
2023/1755
Random Beacons in Monte Carlo: Efficient Asynchronous Random Beacon without Threshold Cryptography
Akhil Bandarupalli, Adithya Bhat, Saurabh Bagchi, Aniket Kate, and Michael Reiter
2023/1754
That’s not my Signature! Fail-Stop Signatures for a Post-Quantum World
Cecilia Boschini, Hila Dahari, Moni Naor, and Eyal Ronen
2023/1753
Formal verification of the post-quantum security properties of IKEv2 PPK (RFC 8784) using the Tamarin Prover
Sophie Stevens
2023/1752
Secure Encryption and Key Exchange using Arbiter PUF
Raja Adhithan Radhakrishnan
2023/1750
A Statistical Verification Method of Random Permutations for Hiding Countermeasure Against Side-Channel Attacks
Jong-Yeon Park, Jang-Won Ju, Wonil Lee, Bo-Gyeong Kang, Yasuyuki Kachi, and Kouichi Sakurai
2023/1749
Dora: A Simple Approach to Zero-Knowledge for RAM Programs
Aarushi Goel, Mathias Hall-Andersen, and Gabriel Kaptchuk
2023/1748
Forging tropical signatures
Lorenz Panny
2023/1747
An Algorithmic Approach to $(2,2)$-isogenies in the Theta Model and Applications to Isogeny-based Cryptography
Pierrick Dartois, Luciano Maino, Giacomo Pope, and Damien Robert
2023/1746
A masking method based on orthonormal spaces, protecting several bytes against both SCA and FIA with a reduced cost
Claude Carlet, Abderrahman Daif, Sylvain Guilley, and Cédric Tavernier
2023/1745
New Public-Key Cryptosystem Blueprints Using Matrix Products in $\mathbb F_p$
Remi Geraud-Stewart and David Naccache
2023/1744
Don't Eject the Impostor: Fast Three-Party Computation With a Known Cheater (Full Version)
Andreas Brüggemann, Oliver Schick, Thomas Schneider, Ajith Suresh, and Hossein Yalame
2023/1743
Explicit Lower Bounds for Communication Complexity of PSM for Concrete Functions
Kazumasa Shinagawa and Koji Nuida
2023/1742
Round-Optimal Black-Box Multiparty Computation from Polynomial-Time Assumptions
Michele Ciampi, Rafail Ostrovsky, Luisa Siniscalchi, and Hendrik Waldner
2023/1741
Pseudorandom Isometries
Prabhanjan Ananth, Aditya Gulati, Fatih Kaleoglu, and Yao-Ting Lin
2023/1740
Evaluation of Arithmetic Sum-of-Products Expressions in Linear Secret Sharing Schemes with a Non-Interactive Computation Phase
Miguel de Vega, Andrei Lapets, Stanislaw Jarecki, Wicher Malten, Mehmet Ugurbil, and Wyatt Howe
2023/1739
Broadcast-Optimal Four-Round MPC in the Plain Model
Michele Ciampi, Ivan Damgård, Divya Ravi, Luisa Siniscalchi, Yu Xia, and Sophia Yakoubov
2023/1738
Byzantine Agreement Decomposed: Honest Majority Asynchronous Atomic Broadcast from Reliable Broadcast
Simon Holmgaard Kamp and Jesper Buus Nielsen
2023/1737
On the Security of Succinct Interactive Arguments from Vector Commitments
Alessandro Chiesa, Marcel Dall'Agnol, Ziyi Guan, and Nicholas Spooner
2023/1736
Aloha-HE: A Low-Area Hardware Accelerator for Client-Side Operations in Homomorphic Encryption
Florian Krieger, Florian Hirner, Ahmet Can Mert, and Sujoy Sinha Roy
2023/1735
Exploiting the Symmetry of $\mathbb{Z}^n$: Randomization and the Automorphism Problem
Kaijie Jiang, Anyu Wang, Hengyi Luo, Guoxiao Liu, Yang Yu, and Xiaoyun Wang
2023/1734
Signatures with Memory-Tight Security in the Quantum Random Oracle Model
Keita Xagawa
2023/1733
Hintless Single-Server Private Information Retrieval
Baiyu Li, Daniele Micciancio, Mariana Raykova, and Mark Schultz-Wu
2023/1732
On the Masking-Friendly Designs for Post-Quantum Cryptography
Suparna Kundu, Angshuman Karmakar, and Ingrid Verbauwhede
2023/1731
A practical key-recovery attack on LWE-based key- encapsulation mechanism schemes using Rowhammer
Puja Mondal, Suparna Kundu, Sarani Bhattacharya, Angshuman Karmakar, and Ingrid Verbauwhede
2023/1730
Construction-D lattice from Garcia-Stichtenoth tower code
Elena Kirshanova and Ekaterina Malygina
2023/1729
CompactTag: Minimizing Computation Overheads in Actively-Secure MPC for Deep Neural Networks
Yongqin Wang, Pratik Sarkar, Nishat Koti, Arpita Patra, and Murali Annavaram
2023/1728
Simulation-Secure Threshold PKE from LWE with Polynomial Modulus
Daniele Micciancio and Adam Suhl
2023/1727
A Formal Treatment of Envelope Encryption
Shoichi Hirose and Kazuhiko Minematsu
2023/1726
CSIDH with Level Structure
Steven D. Galbraith, Derek Perrin, and José Felipe Voloch
2023/1725
Few-weight linear codes over $\mathbb{F}_p$ from $t$-to-one mappings
René Rodríguez-Aldama
2023/1724
Accountability for Misbehavior in Threshold Decryption via Threshold Traitor Tracing
Dan Boneh, Aditi Partap, and Lior Rotem
2023/1723
Deterministic Byzantine Agreement with Adaptive $O(n\cdot f)$ Communication
Fatima Elsheimy, Giorgos Tsimos, and Charalampos Papamanthou
2023/1722
Quantitative Fault Injection Analysis
Jakob Feldtkeller, Tim Güneysu, and Patrick Schaumont
2023/1721
Optimizing S-box Implementations Using SAT Solvers: Revisited
Fuxin Zhang and Zhenyu Huang
2023/1720
Towards the Impossibility of Quantum Public Key Encryption with Classical Keys from One-Way Functions
Samuel Bouaziz--Ermann, Alex B. Grilo, Damien Vergnaud, and Quoc-Huy Vu
2023/1719
MQ on my Mind: Post-Quantum Signatures from the Non-Structured Multivariate Quadratic Problem
Ryad Benadjila, Thibauld Feneuil, and Matthieu Rivain
2023/1718
Improved Attacks on LowMC with Algebraic Techniques
Yimeng Sun, Jiamin Cui, and Meiqin Wang
2023/1717
A Framework for Resilient, Transparent, High-throughput, Privacy-Enabled Central Bank Digital Currencies
Elli Androulaki, Marcus Brandenburger, Angelo De Caro, Kaoutar Elkhiyaoui, Alexandros Filios, Liran Funaro, Yacov Manevich, Senthilnathan Natarajan, and Manish Sethi
2023/1716
Attribute-Based Encryption for Circuits of Unbounded Depth from Lattices: Garbled Circuits of Optimal Size, Laconic Functional Evaluation, and More
Yao-Ching Hsieh, Huijia Lin, and Ji Luo
2023/1715
Lattice-based Public Key Encryption with Authorized Keyword Search: Construction, Implementation, and Applications
Shiyuan Xu, Yibo Cao, Xue Chen, Yu Guo, Yuer Yang, Fangda Guo, and Siu-Ming Yiu
2023/1714
On Parallel Repetition of PCPs
Alessandro Chiesa, Ziyi Guan, and Burcu Yıldız
2023/1713
High-assurance zeroization
Santiago Arranz Olmos, Gilles Barthe, Ruben Gonzalez, Benjamin Grégoire, Vincent Laporte, Jean-Christophe Léchenet, Tiago Oliveira, and Peter Schwabe
2023/1712
Beyond Volume Pattern: Storage-Efficient Boolean Searchable Symmetric Encryption with Suppressed Leakage
Feng Li, Jianfeng Ma, Yinbin Miao, Pengfei Wu, and Xiangfu Song
2023/1711
Passive SSH Key Compromise via Lattices
Keegan Ryan, Kaiwen He, George Arnold Sullivan, and Nadia Heninger
2023/1710
Malleable Commitments from Group Actions and Zero-Knowledge Proofs for Circuits based on Isogenies
Mingjie Chen, Yi-Fu Lai, Abel Laval, Laurane Marco, and Christophe Petit
2023/1709
Signal Leakage Attack Meets Depth First Search: an Improved Approach on DXL Key Exchange Protocol
Zhiwei Li, Jun Xu, and Lei Hu
2023/1708
Algebraic properties of the maps $\chi_n$
Jan Schoone and Joan Daemen
2023/1707
Analysis of four protocols based on tropical circulant matrices
Ivan Buchinskiy, Matvei Kotov, and Alexander Treier
2023/1706
Breaking two PSI-CA protocols in polynomial time
Yang Tan and Bo Lv
2023/1705
BaseFold: Efficient Field-Agnostic Polynomial Commitment Schemes from Foldable Codes
Hadas Zeilberger, Binyi Chen, and Ben Fisch
2023/1704
On Overidealizing Ideal Worlds: Xor of Two Permutations and its Applications
Wonseok Choi, Minki Hhan, Yu Wei, and Vassilis Zikas
2023/1703
Memory Checking for Parallel RAMs
Surya Mathialagan
2023/1702
On Quantum Simulation-Soundness
Behzad Abdolmaleki, Céline Chevalier, Ehsan Ebrahimi, Giulio Malavolta, and Quoc-Huy Vu
2023/1701
Improved Search for Integral, Impossible-Differential and Zero-Correlation Attacks: Application to Ascon, ForkSKINNY, SKINNY, MANTIS, PRESENT and QARMAv2
Hosein Hadipour, Simon Gerhalter, Sadegh Sadeghi, and Maria Eichlseder
2023/1700
Scalable Mixed-Mode MPC
Radhika Garg, Kang Yang, Jonathan Katz, and Xiao Wang
2023/1699
Oblivious Homomorphic Encryption
Osman Biçer and Christian Tschudin
2023/1698
Another Look at Side-Channel Resistant Encoding Schemes
Xiaolu Hou, Jakub Breier, and Mladen Kovačević
2023/1697
Full Round Distinguishing and Key-Recovery Attacks on SAND-2 (Full version)
Zhuolong Zhang, Shiyao Chen, Wei Wang, and Meiqin Wang
2023/1696
A note on ``a novel authentication and key agreement scheme for Internet of Vehicles''
Zhengjun Cao
2023/1695
Implementing Arbitrary Maps over Small Finite Domains using Ring Addition and Scalar Multiplication
Andrei Lapets
2023/1694
Predicate Aggregate Signatures and Applications
Tian Qiu and Qiang Tang
2023/1693
Elementary Remarks on Some Quadratic Based Identity Based Encryption Schemes
George Teseleanu and Paul Cotan
2023/1692
Traitor Tracing Revisited: New Attackers, Stronger Security Model and New Construction
Xu An Wang, Lunhai Pan, Hao Liu, and Xiaoyuan Yang
2023/1691
Some Results on Related Key-IV Pairs of Espresso
George Teseleanu
2023/1690
Efficient VOLE based Multi-Party PSI with Lower Communication Cost
Shuqing Zhang
2023/1689
Revisiting the Boomerang Attack from a Perspective of 3-differential
Libo Wang, Ling Song, Baofeng Wu, Mostafizar Rahman, and Takanori Isobe
2023/1688
Faster Complete Formulas for the GLS254 Binary Curve
Thomas Pornin
2023/1687
Admissible Parameter Sets and Complexity Estimation of Crossbred Algorithm
Shuhei Nakamura
2023/1686
The Quantum Decoding Problem
André Chailloux and Jean-Pierre Tillich
2023/1685
MPC in the head using the subfield bilinear collision problem
Janik Huth and Antoine Joux
2023/1684
Nomadic: Normalising Maliciously-Secure Distance with Cosine Similarity for Two-Party Biometric Authentication
Nan Cheng, Melek Önen, Aikaterini Mitrokotsa, Oubaïda Chouchane, Massimiliano Todisco, and Alberto Ibarrondo
2023/1683
Nibbling MAYO: Optimized Implementations for AVX2 and Cortex-M4
Ward Beullens, Fabio Campos, Sofía Celi, Basil Hess, and Matthias J. Kannwischer
2023/1682
Selective Opening Security in the Quantum Random Oracle Model, Revisited
Jiaxin Pan and Runzhi Zeng
2023/1681
The Need for MORE: Unsupervised Side-channel Analysis with Single Network Training and Multi-output Regression
Ioana Savu, Marina Krček, Guilherme Perin, Lichao Wu, and Stjepan Picek
2023/1680
On the cryptographic properties of weightwise affine and weightwise quadratic functions
Pierrick Méaux and Yassine Ozaim
2023/1679
Plug Your Volt: Protecting Intel Processors against Dynamic Voltage Frequency Scaling based Fault Attacks
Nimish Mishra, Rahul Arvind Mool, Anirban Chakraborty, and Debdeep Mukhopadhyay
2023/1678
BumbleBee: Secure Two-party Inference Framework for Large Transformers
Wen-jie Lu, Zhicong Huang, Zhen Gu, Jingyu Li, Jian Liu, Cheng Hong, Kui Ren, Tao Wei, and WenGuang Chen
2023/1677
Multi-Theorem Fiat-Shamir Transform from Correlation-Intractable Hash Functions
Michele Ciampi and Yu Xia
2023/1676
FutORAMa: A Concretely Efficient Hierarchical Oblivious RAM
Gilad Asharov, Ilan Komargodski, and Yehuda Michelson
2023/1675
Another Look at Differential-Linear Attacks
Orr Dunkelman and Ariel Weizman
2023/1674
Carry Your Fault: A Fault Propagation Attack on Side-Channel Protected LWE-based KEM
Suparna Kundu, Siddhartha Chowdhury, Sayandeep Saha, Angshuman Karmakar, Debdeep Mukhopadhyay, and Ingrid Verbauwhede
2023/1673
Designing Full-Rate Sponge based AEAD modes
Bishwajit Chakraborty, Nilanjan Datta, and Mridul Nandi
2023/1672
Fine-grained Policy Constraints for Distributed Point Function
Keyu Ji, Bingsheng Zhang, and Kui Ren
2023/1671
A note on ``SCPUAK: smart card-based secure protocol for remote user authentication and key agreement''
Zhengjun Cao and Lihua Liu
2023/1670
Unbalanced Private Set Intersection from Homomorphic Encryption and Nested Cuckoo Hashing
Jörn Kußmaul, Matthew Akram, and Anselme Tueno
2023/1669
$\Pi$: A Unified Framework for Verifiable Secret Sharing
Karim Baghery
2023/1668
Arithmetization Oriented Encryption
Tomer Ashur and Al Kindi
2023/1667
Unleashing the Power of Differential Fault Attacks on QARMAv2
Soumya Sahoo, Debasmita Chakraborty, and Santanu Sarkar
2023/1666
MiRitH: Efficient Post-Quantum Signatures from MinRank in the Head
Gora Adj, Stefano Barbero, Emanuele Bellini, Andre Esser, Luis Rivera-Zamarripa, Carlo Sanna, Javier Verbel, and Floyd Zweydinger
2023/1665
Model Stealing Attacks On FHE-based Privacy-Preserving Machine Learning through Adversarial Examples
Bhuvnesh Chaturvedi, Anirban Chakraborty, Ayantika Chatterjee, and Debdeep Mukhopadhyay
2023/1664
On the Complexity and Admissible Parameters of the Crossbred Algorithm in $\mathbb{F}_{q\geq2}$
João Diogo Duarte
2023/1663
Proof-of-Work-based Consensus in Expected-Constant Time
Juan Garay, Aggelos Kiayias, and Yu Shen
2023/1662
Families of prime-order endomorphism-equipped embedded curves on pairing-friendly curves
Antonio Sanso and Youssef El Housni
2023/1661
Publicly-Detectable Watermarking for Language Models
Jaiden Fairoze, Sanjam Garg, Somesh Jha, Saeed Mahloujifar, Mohammad Mahmoody, and Mingyuan Wang
2023/1660
FaBFT: Flexible Asynchronous BFT Protocol Using DAG
Yu Song, Yu Long, Xian Xu, and Dawu Gu
2023/1659
Partial Sums Meet FFT: Improved Attack on 6-Round AES
Orr Dunkelman, Shibam Ghosh, Nathan Keller, Gaetan Leurent, Avichai Marmor, and Victor Mollimard
2023/1658
On the Security of Triplex- and Multiplex-type Constructions with Smaller Tweaks
Nilanjan Datta, Avijit Dutta, Eik List, and Sougata Mandal
2023/1657
PQCMC: Post-Quantum Cryptography McEliece-Chen Implicit Certificate Scheme
Abel C. H. Chen
2023/1656
Privacy-Preserving Digital Vaccine Passport
Thai Duong, Jiahui Gao, Duong Hieu Phan, and Ni Trieu
2023/1655
Approximate Lower Bound Arguments
Pyrros Chaidos, Aggelos Kiayias, Leonid Reyzin, and Anatoliy Zinovyev
2023/1654
On Gaussian sampling, smoothing parameter and application to signatures
Thomas Espitau, Alexandre Wallet, and Yang Yu
2023/1653
QCB is Blindly Unforgeable
Jannis Leuther and Stefan Lucks
2023/1652
On Sigma-Protocols and (packed) Black-Box Secret Sharing Schemes
Claudia Bartoli and Ignacio Cascudo
2023/1651
Publicly Verifiable Secret Sharing over Class Groups and Applications to DKG and YOSO
Ignacio Cascudo and Bernardo David
2023/1650
An Efficient Algorithm for Solving the MQ Problem using Hilbert Series
Kosuke Sakata and Tsuyoshi Takagi
2023/1649
A New Framework for Fast Homomorphic Matrix Multiplication
Xiaopeng Zheng, Hongbo Li, and Dingkang Wang
2023/1648
On-Chain Timestamps Are Accurate
Apostolos Tzinas, Srivatsan Sridhar, and Dionysis Zindros
2023/1647
Who Watches the Watchers: Attacking Glitch Detection Circuits
Amund Askeland, Svetla Nikova, and Ventzislav Nikov
2023/1646
Security Bounds for Proof-Carrying Data from Straightline Extractors
Alessandro Chiesa, Ziyi Guan, Shahar Samocha, and Eylon Yogev
2023/1645
The Dilemma and Prospects of Academic Misconduct in Digital Forensics--A Case Study to Wan's Improved Scheme
Chenglian Liu and Sonia Chien-I Chen
2023/1644
An End-to-End Framework for Private DGA Detection as a Service
Ricardo Jose Menezes Maia, Dustin Ray, Sikha Pentyala, Rafael Dowsley, Martine De Cock, Anderson C. A. Nascimento, and Ricardo Jacobi
2023/1643
Oblivious Turing Machine
Sofiane Azogagh, Victor Delfour, and Marc-Olivier Killijian
2023/1642
A New Perspective on Key Switching for BGV-like Schemes
Johannes Mono and Tim Güneysu
2023/1641
PSKPIR: Symmetric Keyword Private Information Retrieval based on PSI with Payload
Zuodong Wu, Dawei Zhang, Yong Li, and Xu Han
2023/1640
Quantum Key Leasing for PKE and FHE with a Classical Lessor
Orestis Chardouvelis, Vipul Goyal, Aayush Jain, and Jiahui Liu
2023/1639
Analysis of a Quantum Attack on the Blum-Micali Pseudorandom Number Generator
Tingfei Feng
2023/1638
The One-Wayness of Jacobi Signatures
Henry Corrigan-Gibbs and David J. Wu
2023/1637
Algorithmic Views of Vectorized Polynomial Multipliers – NTRU
Han-Ting Chen, Yi-Hua Chung, Vincent Hwang, and Bo-Yin Yang
2023/1636
Unbalanced Circuit-PSI from Oblivious Key-Value Retrieval
Meng Hao, Weiran Liu, Liqiang Peng, Hongwei Li, Cong Zhang, Hanxiao Chen, and Tianwei Zhang
2023/1635
Oblivious issuance of proofs
Michele Orrù, Stefano Tessaro, Greg Zaverucha, and Chenzhi Zhu
2023/1634
On the (In)Security of the BUFF Transform
Jelle Don, Serge Fehr, Yu-Hsuan Huang, and Patrick Struck
2023/1633
One-time and Revocable Ring Signature with Logarithmic Size in Blockchain
Yang Li, Wei Wang, Dawei Zhang, and Xu Han
2023/1632
On Decompositions of Permutations in Quadratic Functions
Samuele Andreoli, Enrico Piccione, Lilya Budaghyan, Pantelimon Stănică, and Svetla Nikova
2023/1631
ASKPIR: Authorized Symmetric Keyword Privacy Information Retrieval Protocol Based on DID
Zuodong Wu, Dawei Zhang, Yong Li, and Xu Han
2023/1630
Crystalor: Recoverable Memory Encryption Mechanism with Optimized Metadata Structure
Rei Ueno, Hiromichi Haneda, Naofumi Homma, Akiko Inoue, and Kazuhiko Minematsu
2023/1629
A Note on ``A Time-Sensitive Token-Based Anonymous Authentication and Dynamic Group Key Agreement Scheme for Industry 5.0''
Zhengjun Cao and Lihua Liu
2023/1628
Cryptanalysis of the Peregrine Lattice-Based Signature Scheme
Xiuhan Lin, Moeto Suzuki, Shiduo Zhang, Thomas Espitau, Yang Yu, Mehdi Tibouchi, and Masayuki Abe
2023/1627
Defeating Low-Cost Countermeasures against Side-Channel Attacks in Lattice-based Encryption - A Case Study on Crystals-Kyber
Prasanna Ravi, Thales Paiva, Dirmanto Jap, Jan-Pieter D'Anvers, and Shivam Bhasin
2023/1626
Et tu, Brute? SCA Assisted CCA using Valid Ciphertexts - A Case Study on HQC KEM
Thales Paiva, Prasanna Ravi, Dirmanto Jap, Shivam Bhasin, Sayan Das, and Anupam Chattopadhyay
2023/1625
SPA-GPT: General Pulse Tailor for Simple Power Analysis Based on Reinforcement Learning
Ziyu Wang, Yaoling Ding, An Wang, Yuwei Zhang, Congming Wei, Shaofei Sun, and Liehuang Zhu
2023/1624
On the (Not So) Surprising Impact of Multi-Path Payments on Performance and Privacy in the Lightning Network
Charmaine Ndolo and Florian Tschorsch
2023/1623
Concrete Analysis of Quantum Lattice Enumeration
Shi Bai, Maya-Iggy van Hoof, Floyd B. Johnson, Tanja Lange, and Tran Ngo
2023/1622
Max Attestation Matters: Making Honest Parties Lose Their Incentives in Ethereum PoS
Mingfei Zhang, Rujia Li, and Sisi Duan
2023/1621
Withdrawable Signature: How to Call off a Signature
Xin Liu, Joonsang Baek, and Willy Susilo
2023/1620
Commitments from Quantum One-Wayness
Dakshita Khurana and Kabir Tomer
2023/1619
Pai: Private Retrieval with Constant Online Time, Communication, and Client-Side Storage for Data Marketplace
Shuaishuai Li, Weiran Liu, Liqiang Peng, Cong Zhang, Xinwei Gao, Aiping Liang, Lei Zhang, Dongdai Lin, and Yuan Hong
2023/1618
Improved algorithms for finding fixed-degree isogenies between supersingular elliptic curves
Benjamin Benčina, Péter Kutas, Simon-Philipp Merz, Christophe Petit, Miha Stopar, and Charlotte Weitkämper
2023/1617
Designing Efficient and Flexible NTT Accelerators
Ahmet MALAL
2023/1616
DeVoS: Deniable Yet Verifiable Vote Updating
Johannes Mueller, Balazs Pejo, and Ivan Pryvalov
2023/1615
Order vs. Chaos: A Language Model Approach for Side-channel Attacks
Praveen Kulkarni, Vincent Verneuil, Stjepan Picek, and Lejla Batina
2023/1614
New proof systems and an OPRF from CSIDH
Cyprien Delpech de Saint Guilhem and Robi Pedersen
2023/1613
Toothpicks: More Efficient Fork-Free Two-Round Multi-Signatures
Jiaxin Pan and Benedikt Wagner
2023/1612
Mitigating MEV via Multiparty Delay Encryption
Amirhossein Khajehpour, Hanzaleh Akbarinodehi, Mohammad Jahanara, and Chen Feng
2023/1611
Power circuits: a new arithmetization for GKR-styled sumcheck
Lev Soukhanov
2023/1610
An Efficient ZK Compiler from SIMD Circuits to General Circuits
Dung Bui, Haotian Chu, Geoffroy Couteau, Xiao Wang, Chenkai Weng, Kang Yang, and Yu Yu
2023/1609
How to Prove Statements Obliviously?
Sanjam Garg, Aarushi Goel, and Mingyuan Wang
2023/1608
Can Alice and Bob Guarantee Output to Carol?
Bar Alon, Eran Omri, and Muthuramakrishnan Venkitasubramaniam
2023/1607
Crust: Verifiable and Efficient Private Information Retrieval With Sublinear Online Time
Yinghao Wang, Xuanming Liu, Jiawen Zhang, Jian Liu, and Xiaohu Yang
2023/1606
Efficient Lattice-based Sublinear Arguments for R1CS without Aborts
Intak Hwang, Jinyeong Seo, and Yongsoo Song
2023/1605
Three Party Secure Computation with Friends and Foes
Bar Alon, Amos Beimel, and Eran Omri
2023/1604
Manifold Learning Side-Channel Attacks against Masked Cryptographic Implementations
Jianye Gao, Xinyao Li, Changhai Ou, Zhu Wang, and Fei Yan
2023/1603
Breaking Parallel ROS: Implication for Isogeny and Lattice-based Blind Signatures
Shuichi Katsumata, Yi-Fu Lai, and Michael Reichle
2023/1602
A one-query lower bound for unitary synthesis and breaking quantum cryptography
Alex Lombardi, Fermi Ma, and John Wright
2023/1601
The Uber-Knowledge Assumption: A Bridge to the AGM
Balthazar Bauer, Pooya Farshim, Patrick Harasser, and Markulf Kohlweiss
2023/1600
Compress: Generate Small and Fast Masked Pipelined Circuits
Gaëtan Cassiers, Barbara Gigerl, Stefan Mangard, Charles Momin, and Rishub Nagpal
2023/1599
Boomy: Batch Opening Of Multivariate polYnomial commitment
Thomas Lavaur and Jérôme Lacan
2023/1598
Lightweight but Not Easy: Side-channel Analysis of the Ascon Authenticated Cipher on a 32-bit Microcontroller
Léo Weissbart and Stjepan Picek
2023/1597
Computational FHE Circuit Privacy for Free
Anamaria Costache, Lea Nürnberger, and Tjerand Silde
2023/1596
A Black Box Attack Using Side Channel Analysis and Hardware Trojans
Raja Adhithan Radhakrishnan
2023/1595
CDLS: Proving Knowledge of Committed Discrete Logarithms with Soundness
Sofia Celi, Shai Levin, and Joe Rowell
2023/1594
Secure Noise Sampling for DP in MPC with Finite Precision
Hannah Keller, Helen Möllering, Thomas Schneider, Oleksandr Tkachenko, and Liang Zhao
2023/1593
Multi-Party Homomorphic Secret Sharing and Sublinear MPC from Sparse LPN
Quang Dao, Yuval Ishai, Aayush Jain, and Huijia Lin
2023/1592
Analysis of one semi-quantum-honest key agreement scheme in MSTSA structure without entanglement
Zhengjun Cao and Lihua Liu
2023/1591
One-way Functions and Hardness of (Probabilistic) Time-Bounded Kolmogorov Complexity w.r.t. Samplable Distributions
Yanyi Liu and Rafael Pass
2023/1590
Single trace HQC shared key recovery with SASCA
Guillaume Goy, Julien Maillard, Philippe Gaborit, and Antoine Loiseau
2023/1589
Optimized Homomorphic Evaluation of Boolean Functions
Nicolas Bon, David Pointcheval, and Matthieu Rivain
2023/1588
M&M'S: Mix and Match Attacks on Schnorr-type Blind Signatures with Repetition
Khue Do, Lucjan Hanzlik, and Eugenio Paracucchi
2023/1587
A Single-Trace Message Recovery Attack on a Masked and Shuffled Implementation of CRYSTALS-Kyber
Sönke Jendral, Kalle Ngo, Ruize Wang, and Elena Dubrova
2023/1586
On the Round Complexity of Asynchronous Crusader Agreement
Ittai Abraham, Naama Ben-David, Gilad Stern, and Sravya Yandamuri
2023/1585
How to Rationally Select Your Delegatee in PoS
Yuzhe Zhang, Qin Wang, Shiping Chen, and Chen Wang
2023/1584
How to Garble Mixed Circuits that Combine Boolean and Arithmetic Computations
Hanjun Li and Tianren Liu
2023/1583
Realizing Flexible Broadcast Encryption: How to Broadcast to a Public-Key Directory
Rachit Garg, George Lu, Brent Waters, and David J. Wu
2023/1582
Time-Lock Puzzles with Efficient Batch Solving
Jesko Dujmovic, Rachit Garg, and Giulio Malavolta
2023/1581
CryptoZoo: A Viewer for Reduction Proofs
Chris Brzuska, Christoph Egger, and Kirthivaasan Puniamurthy
2023/1580
Algorithmic Views of Vectorized Polynomial Multipliers – NTRU Prime
Vincent Hwang, Chi-Ting Liu, and Bo-Yin Yang
2023/1579
KiloNova: Non-Uniform PCD with Zero-Knowledge Property from Generic Folding Schemes
Tianyu Zheng, Shang Gao, Yu Guo, and Bin Xiao
2023/1578
A Scalable Coercion-resistant Voting Scheme for Blockchain Decision-making
Zeyuan Yin, Bingsheng Zhang, Andrii Nastenko, Roman Oliynykov, and Kui Ren
2023/1577
Asymptotics and Improvements of Sieving for Codes
Léo Ducas, Andre Esser, Simona Etinski, and Elena Kirshanova
2023/1576
Towards Optimally Small Smoothness Bounds for Cryptographic-Sized Twin Smooth Integers and their Isogeny-based Applications
Bruno Sterner
2023/1575
SoK: Web3 Recovery Mechanisms
Panagiotis Chatzigiannis, Konstantinos Chalkias, Aniket Kate, Easwar Vivek Mangipudi, Mohsen Minaei, and Mainack Mondal
2023/1574
Efficient Pre-processing PIR Without Public-Key Cryptography
Ashrujit Ghoshal, Mingxun Zhou, and Elaine Shi
2023/1573
Threshold Computation in the Head: Improved Framework for Post-Quantum Signatures and Zero-Knowledge Arguments
Thibauld Feneuil and Matthieu Rivain
2023/1572
Faulting Winternitz One-Time Signatures to forge LMS, XMSS, or SPHINCS+ signatures
Alexander Wagner, Vera Wesselkamp, Felix Oberhansl, Marc Schink, and Emanuele Strieder
2023/1571
Key Filtering in Cube Attacks from the Implementation Aspect
Hao Fan, Yonglin Hao, Qingju Wang, Xinxin Gong, and Lin Jiao
2023/1570
Jackpot: Non-Interactive Aggregatable Lotteries
Nils Fleischhacker, Mathias Hall-Andersen, Mark Simkin, and Benedikt Wagner
2023/1569
Advancing Scalability in Decentralized Storage: A Novel Approach to Proof-of-Replication via Polynomial Evaluation
Giuseppe Ateniese, Foteini Baldimtsi, Matteo Campanelli, Danilo Francati, and Ioanna Karantaidou
2023/1568
Not Just Regular Decoding: Asymptotics and Improvements of Regular Syndrome Decoding Attacks
Andre Esser and Paolo Santini
2023/1567
Depth-Optimized Quantum Implementation of ARIA
Yujin Yang, Kyungbae Jang, Yujin Oh, and Hwajeong Seo
2023/1566
Optimized Quantum Implementation of SEED
Yujin Oh, Kyungbae Jang, Yujin Yang, and Hwajeong Seo
2023/1565
Finding Shortest Vector Using Quantum NV Sieve on Grover
Hyunji Kim, Kyoungbae Jang, Yujin Oh, Woojin Seok, Wonhuck Lee, Kwangil Bae, Ilkwon Sohn, and Hwajeong Seo
2023/1564
Fast Blind Rotation for Bootstrapping FHEs
Binwu Xiang, Jiang Zhang, Yi Deng, Yiran Dai, and Dengguo Feng
2023/1563
Formal Analysis of Non-profiled Deep-learning Based Side-channel Attacks
Akira Ito, Rei Ueno, Rikuma Tanaka, and Naofumi Homma
2023/1562
Generalized Implicit Factorization Problem
Yansong Feng, Abderrahmane Nitaj, and Yanbin Pan
2023/1561
LLM for SoC Security: A Paradigm Shift
Dipayan Saha, Shams Tarek, Katayoon Yahyaei, Sujan Kumar Saha, Jingbo Zhou, Mark Tehranipoor, and Farimah Farahmandi
2023/1560
Check Alternating Patterns: A Physical Zero-Knowledge Proof for Moon-or-Sun
Samuel Hand, Alexander Koch, Pascal Lafourcade, Daiki Miyahara, and Léo Robert
2023/1559
AprèsSQI: Extra Fast Verification for SQIsign Using Extension-Field Signing
Maria Corte-Real Santos, Jonathan Komada Eriksen, Michael Meyer, and Krijn Reijnders
2023/1558
StaTI: Protecting against Fault Attacks Using Stable Threshold Implementations
Siemen Dhooghe, Artemii Ovchinnikov, and Dilara Toprakhisar
2023/1557
Revisit Two Memoryless State-Recovery Cryptanalysis Methods on A5/1
Yanbin Xu, Yonglin Hao, and Mingxing Wang
2023/1556
Better Safe than Sorry: Recovering after Adversarial Majority
Srivatsan Sridhar, Dionysis Zindros, and David Tse
2023/1555
Polynomial IOPs for Memory Consistency Checks in Zero-Knowledge Virtual Machines
Yuncong Zhang, Shi-Feng Sun, Ren Zhang, and Dawu Gu
2023/1554
Cornucopia: Distributed randomness beacons at scale
Miranda Christ, Kevin Choi, and Joseph Bonneau
2023/1553
Adaptively Secure BLS Threshold Signatures from DDH and co-CDH
Sourav Das and Ling Ren
2023/1552
Doubly Efficient Batched Private Information Retrieval
Xiuquan Ding, Giulio Malavolta, and Tianwei Zhang
2023/1551
Evaluating GPT-4’s Proficiency in Addressing Cryptography Examinations
Vasily Mikhalev, Nils Kopal, and Bernhard Esslinger
2023/1550
A Thorough Evaluation of RAMBAM
Daniel Lammers, Amir Moradi, Nicolai Müller, and Aein Rezaei Shahmirzadi
2023/1549
Signature-Free Atomic Broadcast with Optimal $O(n^2)$ Messages and $O(1)$ Expected Time
Xiao Sui, Xin Wang, and Sisi Duan
2023/1548
Cheater Identification on a Budget: MPC with Identifiable Abort from Pairwise MACs
Carsten Baum, Nikolas Melissaris, Rahul Rachuri, and Peter Scholl
2023/1547
Further Improvements of the Estimation of Key Enumeration with Applications to Solving LWE
Alessandro Budroni and Erik Mårtensson
2023/1546
PERFORMANCE EVALUATION OF MACHINE LEARNING ALGORITHMS FOR INTRUSION DETECTION SYSTEM
Sudhanshu Sekhar Tripathy and Bichitrananda Behera
2023/1545
Exploiting Small-Norm Polynomial Multiplication with Physical Attacks: Application to CRYSTALS-Dilithium
Olivier Bronchain, Melissa Azouaoui, Mohamed ElGhamrawy, Joost Renes, and Tobias Schneider
2023/1544
Arithmetic PCA for Encrypted Data
Jung Hee Cheon, Hyeongmin Choe, Saebyul Jung, Duhyeong Kim, Dah Hoon Lee, and Jai Hyun Park
2023/1543
Switching the Top Slice of the Sandwich with Extra Filling Yields a Stronger Boomerang for NLFSR-based Block Ciphers
Amit Jana, Mostafizar Rahman, Dhiman Saha, and Goutam Paul
2023/1542
Don’t Forget Pairing-Friendly Curves with Odd Prime Embedding Degrees
Yu Dai, Fangguo Zhang, and Chang-an Zhao
2023/1541
TMVP-based Polynomial Convolution for Saber and Sable on GPU using CUDA-cores and Tensor-cores
Muhammad Asfand Hafeez, Wai-Kong Lee, Angshuman Karmakar, and Seong Oun Hwang
2023/1540
A Note on ``a two-factor security authentication scheme for wireless sensor networks in IoT environments''
Zhengjun Cao and Lihua Liu
2023/1539
ELCA: Introducing Enterprise-level Cryptographic Agility for a Post-Quantum Era
Dimitrios Sikeridis, David Ott, Sean Huntley, Shivali Sharma, Vasantha Kumar Dhanasekar, Megha Bansal, Akhilesh Kumar, Anwitha U N, Daniel Beveridge, and Sairam Veeraswamy
2023/1538
Unclonable Commitments and Proofs
Vipul Goyal, Giulio Malavolta, and Justin Raizes
2023/1537
DEFEND: Towards Verifiable Delay Functions from Endomorphism Rings
Knud Ahrens and Jens Zumbrägel
2023/1536
Leaky McEliece: Secret Key Recovery From Highly Erroneous Side-Channel Information
Marcus Brinkmann, Chitchanok Chuengsatiansup, Alexander May, Julian Nowakowski, and Yuval Yarom
2023/1535
A Total Break of the 3WISE Digital Signature Scheme
Daniel Smith-Tone
2023/1534
Evolving Secret Sharing Made Short
Danilo Francati and Daniele Venturi
2023/1533
On Linear Equivalence, Canonical Forms, and Digital Signatures
Tung Chou, Edoardo Persichetti, and Paolo Santini
2023/1532
Unclonable Non-Interactive Zero-Knowledge
Ruta Jawale and Dakshita Khurana
2023/1531
Towards Practical Transciphering for FHE with Setup Independent of the Plaintext Space
Pierrick Méaux, Jeongeun Park, and Hilder V. L. Pereira
2023/1530
Proofs of Space with Maximal Hardness
Leonid Reyzin
2023/1529
Shufflecake: Plausible Deniability for Multiple Hidden Filesystems on Linux
Elia Anzuoni and Tommaso Gagliardoni
2023/1528
Unmodified Half-Gates is Adaptively Secure - So is Unmodified Three-Halves
Xiaojie Guo, Kang Yang, Xiao Wang, Yu Yu, and Zheli Liu
2023/1527
Adaptive Garbled Circuits and Garbled RAM from Non-Programmable Random Oracles
Cruz Barnum, David Heath, Vladimir Kolesnikov, and Rafail Ostrovsky
2023/1526
Polynomial Time Cryptanalytic Extraction of Neural Network Models
Isaac A. Canales-Martínez, Jorge Chavez-Saab, Anna Hambitzer, Francisco Rodríguez-Henríquez, Nitin Satpute, and Adi Shamir
2023/1525
Committing AE from Sponges: Security Analysis of the NIST LWC Finalists
Juliane Krämer, Patrick Struck, and Maximiliane Weishäupl
2023/1524
SoK: Signatures With Randomizable Keys
Sofía Celi, Scott Griffy, Lucjan Hanzlik, Octavio Perez Kempner, and Daniel Slamanig
2023/1523
On the Privacy of Sublinear-Communication Jaccard Index Estimation via Min-hash Sketching
Seung Geol Choi, Dana Dachman-Soled, Mingyu Liang, Linsheng Liu, and Arkady Yerukhimovich
2023/1522
cuML-DSA: Optimized Signing Procedure and Server-Oriented GPU Design for ML-DSA
Shiyu Shen, Hao Yang, Wenqian Li, and Yunlei Zhao
2023/1521
A reduced set of submatrices for a faster evaluation of the MDS property of a circulant matrix with entries that are powers of two
Dragan Lambić
2023/1520
Kirby: A Robust Permutation-Based PRF Construction
Charlotte Lefevre, Yanis Belkheyar, and Joan Daemen
2023/1519
Accountable Decryption made Formal and Practical
Rujia Li, Yuanzhao Li, Qin Wang, Sisi Duan, Qi Wang, and Mark Ryan
2023/1518
Lookup Arguments: Improvements, Extensions and Applications to Zero-Knowledge Decision Trees
Matteo Campanelli, Antonio Faonio, Dario Fiore, Tianyu Li, and Helger Lipmaa
2023/1517
Threshold Implementations with Non-Uniform Inputs
Siemen Dhooghe and Artemii Ovchinnikov
2023/1516
On the Viability of Open-Source Financial Rails: Economic Security of Permissionless Consensus
Jacob D. Leshno, Rafael Pass, and Elaine Shi
2023/1515
OPTIKS: An Optimized Key Transparency System
Julia Len, Melissa Chase, Esha Ghosh, Kim Laine, and Radames Cruz Moreno
2023/1514
Leakage-Free Probabilistic Jasmin Programs
José Bacelar Almeida, Denis Firsov, Tiago Oliveira, and Dominique Unruh
2023/1513
Making an Asymmetric PAKE Quantum-Annoying by Hiding Group Elements
Marcel Tiepelt, Edward Eaton, and Douglas Stebila
2023/1512
List Oblivious Transfer and Applications to Round-Optimal Black-Box Multiparty Coin Tossing
Michele Ciampi, Rafail Ostrovsky, Luisa Siniscalchi, and Hendrik Waldner
2023/1511
Lower bound of costs of formulas to compute image curves of $3$-isogenies in the framework of generalized Montgomery coordinates
Tomoki Moriya, Hiroshi Onuki, Yusuke Aikawa, and Tsuyoshi Takagi
2023/1510
Towards Practical Doubly-Efficient Private Information Retrieval
Hiroki Okada, Rachel Player, Simon Pohmann, and Christian Weinert
2023/1509
Efficient and Usable Coercion-Resistant E-Voting on the Blockchain
Neyire Deniz Sarier
2023/1508
Provable Dual Attacks on Learning with Errors
Amaury Pouly and Yixin Shen
2023/1507
Efficient Agreement Over Byzantine Gossip
Ran Cohen, Julian Loss, and Tal Moran
2023/1506
IS-CUBE: An isogeny-based compact KEM using a boxed SIDH diagram
Tomoki Moriya
2023/1505
PQ.V.ALU.E: Post-Quantum RISC-V Custom ALU Extensions on Dilithium and Kyber
Konstantina Miteloudi, Joppe Bos, Olivier Bronchain, Björn Fay, and Joost Renes
2023/1504
Algebraic Group Model with Oblivious Sampling
Helger Lipmaa, Roberto Parisella, and Janno Siim
2023/1503
zk-Bench: A Toolset for Comparative Evaluation and Performance Benchmarking of SNARKs
Jens Ernstberger, Stefanos Chaliasos, George Kadianakis, Sebastian Steinhorst, Philipp Jovanovic, Arthur Gervais, Benjamin Livshits, and Michele Orrù
2023/1502
(In)security of stream ciphers against quantum annealing attacks on the example of the Grain 128 and Grain 128a ciphers
Michał Wroński, Elżbieta Burek, and Mateusz Leśniak
2023/1501
Space-Efficient and Noise-Robust Quantum Factoring
Seyoon Ragavan and Vinod Vaikuntanathan
2023/1500
Holographic SNARGs for P and Batch-NP from (Polynomially Hard) Learning with Errors
Susumu Kiyoshima
2023/1499
Linearly-Homomorphic Signatures for Short Randomizable Proofs of Subset Membership
David Pointcheval
2023/1498
LWE with Quantum Amplitudes: Algorithm, Hardness, and Oblivious Sampling
Yilei Chen, Zihan Hu, Qipeng Liu, Han Luo, and Yaxin Tu
2023/1497
A note on ``authenticated key agreement protocols for dew-assisted IoT systems''
Zhengjun Cao and Lihua Liu
2023/1496
A Privacy-preserving Central Bank Ledger for Central Bank Digital Currency
Chan Wang Mong Tikvah
2023/1495
Key Committing Security Analysis of AEGIS
Takanori Isobe and Mostafizar Rahman
2023/1494
Committing authenticated encryption based on SHAKE
Joan Daemen, Silvia Mella, and Gilles Van Assche
2023/1493
Measuring the Concentration of Control in Contemporary Ethereum
Simon Brown
2023/1492
A Quantum Approach for Reducing Communications in Classical Cryptographic Primitives
Jiayu Zhang
2023/1491
Subversion-Resilient Signatures without Random Oracles
Pascal Bemmann, Sebastian Berndt, and Rongmao Chen
2023/1490
Formulations and Constructions of Remote State Preparation with Verifiability, with Applications
Jiayu Zhang
2023/1489
To Broadcast or Not to Broadcast: Decision-Making Strategies for Mining Empty Blocks
Chon Kit Lao, Rui Jiang, Luyao Zhang, Fan Zhang, and Ye Wang
2023/1488
SCALLOP-HD: group action from 2-dimensional isogenies
Mingjie Chen, Antonin Leroux, and Lorenz Panny
2023/1487
A Novel Mathematical Formal Proof in Unreliability Protocol with XOR in Two's Complement System
Chenglian Liu and Sonia Chien-I Chen
2023/1486
RC4OK. An improvement of the RC4 stream cipher
Khovayko O. and Schelkunov D.
2023/1485
How to Physically Hold Your Bitcoins ?
Houda Ferradi, Antoine Houssais, and David Naccache
2023/1484
Blind signatures from Zero knowledge in the Kummer variety
Paulo L. Barreto, Devin D. Reich, Marcos A. Simplicio Jr., and Gustavo H. M. Zanon
2023/1483
Lower Bounds on Anonymous Whistleblowing
Willy Quach, LaKyah Tyner, and Daniel Wichs
2023/1482
Twinkle: Threshold Signatures from DDH with Full Adaptive Security
Renas Bacho, Julian Loss, Stefano Tessaro, Benedikt Wagner, and Chenzhi Zhu
2023/1481
A Total Break of the Scrap Digital Signature Scheme
Daniel Smith-Tone
2023/1480
The Pre-Shared Key Modes of HPKE
Joël Alwen, Jonas Janneck, Eike Kiltz, and Benjamin Lipp
2023/1479
Rational Broadcast Protocols against Timid Adversaries
Keigo Yamashita and Kenji Yasunaga
2023/1478
Succinct Proofs and Linear Algebra
Alex Evans and Guillermo Angeris
2023/1477
G+G: A Fiat-Shamir Lattice Signature Based on Convolved Gaussians
Julien Devevey, Alain Passelègue, and Damien Stehlé
2023/1476
Auditable Obfuscation
Shalini Banerjee and Steven D. Galbraith
2023/1475
Tropical cryptography III: digital signatures
Jiale Chen, Dima Grigoriev, and Vladimir Shpilrain
2023/1474
Efficacy and Mitigation of the Cryptanalysis on AIM
Seongkwang Kim, Jincheol Ha, Mincheol Son, and Byeonghak Lee
2023/1473
Cicada: A framework for private non-interactive on-chain auctions and voting
Noemi Glaeser, István András Seres, Michael Zhu, and Joseph Bonneau
2023/1472
Naysayer proofs
István András Seres, Noemi Glaeser, and Joseph Bonneau
2023/1471
NTRU in Quaternion Algebras of Bounded Discriminant
Cong Ling and Andrew Mendelsohn
2023/1470
Zero-Knowledge Systems from MPC-in-the-Head and Oblivious Transfer
Cyprien Delpech de Saint Guilhem, Ehsan Ebrahimi, and Barry van Leeuwen
2023/1469
SLAP: Succinct Lattice-Based Polynomial Commitments from Standard Assumptions
Martin R. Albrecht, Giacomo Fenzi, Oleksandra Lapiha, and Ngoc Khanh Nguyen
2023/1468
QFESTA: Efficient Algorithms and Parameters for FESTA using Quaternion Algebras
Kohei Nakagawa and Hiroshi Onuki
2023/1467
GPU Acceleration of High-Precision Homomorphic Computation Utilizing Redundant Representation
Shintaro Narisada, Hiroki Okada, Kazuhide Fukushima, Shinsaku Kiyomoto, and Takashi Nishide
2023/1466
On Black-Box Verifiable Outsourcing
Amit Agarwal, Navid Alamati, Dakshita Khurana, Srinivasan Raghuraman, and Peter Rindal
2023/1465
Too Close for Comfort? Measuring Success of Sampled-Data Leakage Attacks Against Encrypted Search
Dominique Dittert, Thomas Schneider, and Amos Treiber
2023/1464
Round-Robin is Optimal: Lower Bounds for Group Action Based Protocols
Daniele Cozzo and Emanuele Giunta
2023/1463
Aurora: Leaderless State-Machine Replication with High Throughput
Hao Lu, Jian Liu, and Kui Ren
2023/1462
High-precision RNS-CKKS on fixed but smaller word-size architectures: theory and application
Rashmi Agrawal, Jung Ho Ahn, Flavio Bergamaschi, Ro Cammarota, Jung Hee Cheon, Fillipe D. M. de Souza, Huijing Gong, Minsik Kang, Duhyeong Kim, Jongmin Kim, Hubert de Lassus, Jai Hyun Park, Michael Steiner, and Wen Wang
2023/1461
Do Private Transaction Pools Mitigate Frontrunning Risk?
Agostino Capponi, Ruizhe Jia, and Ye Wang
2023/1460
Rigorous Foundations for Dual Attacks in Coding Theory
Charles Meyer-Hilfiger and Jean-Pierre Tillich
2023/1459
Identity-Based Threshold Signatures from Isogenies
Shahla Atapoor
2023/1458
A Further Study of Vectorial Dual-Bent Functions
Jiaxin Wang, Fang-Wei Fu, Yadi Wei, and Jing Yang
2023/1457
Provable Security Analysis of the Secure Remote Password Protocol
Dennis Dayanikli and Anja Lehmann
2023/1456
The Generating Series of Support Minors MinRank Ideals
Daniel Smith-Tone
2023/1455
Efficient Secure Two Party ECDSA
Sermin Kocaman and Younes Talibi Alaoui
2023/1454
Scalable Off-Chain Auctions
Mohsen Minaei, Duc V. Le, Ranjit Kumaresan, Andrew Beams, Pedro Moreno-Sanchez, Yibin Yang, Srinivasan Raghuraman, Panagiotis Chatzigiannis, and Mahdi Zamani
2023/1453
Preimage and Collision Attacks on Reduced Ascon Using Algebraic Strategies
Qinggan Fu, Ye Luo, Qianqian Yang, and Ling Song
2023/1452
Commitments with Efficient Zero-Knowledge Arguments from Subset Sum Problems
Jules Maire and Damien Vergnaud
2023/1451
Counting Unpredictable Bits: A Simple PRG from One-way Functions
Noam Mazor and Rafael Pass
2023/1450
Post-Quantum Fully Homomorphic Encryption with Group Ring Homomorphisms
Christopher Leonardi and Maya Gusak
2023/1449
Truncated Differential Cryptanalysis: New Insights and Application to QARMAv1-n and QARMAv2-64
Zahra Ahmadian, Akram Khalesi, Dounia M'foukh, Hossein Moghimi, and María Naya-Plasencia
2023/1448
The supersingular endomorphism ring problem given one endomorphism
Arthur Herlédan Le Merdy and Benjamin Wesolowski
2023/1447
Practical Round-Optimal Blind Signatures in the ROM from Standard Assumptions
Shuichi Katsumata, Michael Reichle, and Yusuke Sakai
2023/1446
HE$^3$DB: An Efficient and Elastic Encrypted Database Via Arithmetic-And-Logic Fully Homomorphic Encryption
Song Bian, Zhou Zhang, Haowen Pan, Ran Mao, Zian Zhao, Yier Jin, and Zhenyu Guan
2023/1445
HEIR: A Unified Representation for Cross-Scheme Compilation of Fully Homomorphic Computation
Song Bian, Zian Zhao, Zhou Zhang, Ran Mao, Kohei Suenaga, Yier Jin, Zhenyu Guan, and Jianwei Liu
2023/1444
On Time-Space Lower Bounds for Finding Short Collisions in Sponge Hash Functions
Akshima, Xiaoqi Duan, Siyao Guo, and Qipeng Liu
2023/1443
Security with Functional Re-Encryption from CPA
Yevgeniy Dodis, Shai Halevi, and Daniel Wichs
2023/1442
Everlasting ROBOT: the Marvin Attack
Hubert Kario
2023/1441
Out of the Box Testing
Hubert Kario
2023/1440
Comment on Enhanced DNA and ElGamal cryptosystem for secure data storage and retrieval in cloud
Chenglian Liu and Sonia Chien-I Chen
2023/1439
Dynamic Security Aspects of Onion Routing
Alessandro Melloni, Martijn Stam, and Øyvind Ytrehus
2023/1438
Private Web Search with Tiptoe
Alexandra Henzinger, Emma Dauterman, Henry Corrigan-Gibbs, and Nickolai Zeldovich
2023/1437
KpqBench: Performance and Implementation Security Analysis of KpqC Competition Round 1 Candidates
YongRyeol Choi, MinGi Kim, YoungBeom Kim, JinGyo Song, JaeHwan Jin, HeeSeok Kim, and Seog Chung Seo
2023/1436
Cryptanalysis of Elisabeth-4
Henri Gilbert, Rachelle Heim Boissier, Jérémy Jean, and Jean-René Reinhard
2023/1435
Identity-Based Matchmaking Encryption, Revisited: Improved Constructions with Strong Security
Sohto Chiku, Keitaro Hashimoto, Keisuke Hara, and Junji Shikata
2023/1434
An Efficient Strong Asymmetric PAKE Compiler Instantiable from Group Actions
Ian McQuoid and Jiayu Xu
2023/1433
A polynomial-time attack on instances of M-SIDH and FESTA
Wouter Castryck and Frederik Vercauteren
2023/1432
Populating the Zoo of Rugged Pseudorandom Permutations
Jean Paul Degabriele and Vukašin Karadžić
2023/1431
Forgery Attacks on Several Beyond-Birthday-Bound Secure MACs
Yaobin Shen, François-Xavier Standaert, and Lei Wang
2023/1430
A note on ``ISG-SLAS: secure and lightweight authentication and key agreement scheme for industrial smart grid using fuzzy extractor''
Zhengjun Cao and Lihua Liu
2023/1429
Leveraging GPU in Homomorphic Encryption: Framework Design and Analysis of BFV Variants
Shiyu Shen, Hao Yang, Wangchen Dai, Lu Zhou, Zhe Liu, and Yunlei Zhao
2023/1428
XNET: A Real-Time Unified Secure Inference Framework Using Homomorphic Encryption
Hao Yang, Shiyu Shen, Siyang Jiang, Lu Zhou, Wangchen Dai, and Yunlei Zhao
2023/1427
Efficient Hardware RNS Decomposition for Post-Quantum Signature Scheme FALCON
Samuel Coulon, Pengzhou He, Tianyou Bao, and Jiafeng Xie
2023/1426
Arithmetic Circuit Implementations of S-boxes for SKINNY and PHOTON in MPC
Aysajan Abidin, Erik Pohle, and Bart Preneel
2023/1425
Popping “R-propping”: breaking hardness assumptions for matrix groups over F_{2^8}
Fernando Virdia
2023/1424
PRIVATON - Privacy Preserving Automaton for Proof of Computations
Bala Subramanyan
2023/1423
Quantum Lattice Enumeration in Limited Depth
Nina Bindel, Xavier Bonnetain, Marcel Tiepelt, and Fernando Virdia
2023/1422
Tight Security Bound of 2k-LightMAC Plus
Nilanjan Datta, Avijit Dutta, and Samir Kundu
2023/1421
Efficient Secure Storage with Version Control and Key Rotation
Long Chen, Hui Guo, Ya-Nan Li, and Qiang Tang
2023/1420
Rogue-Instance Security for Batch Knowledge Proofs
Gil Segev, Amit Sharabi, and Eylon Yogev
2023/1419
Improving the Rectangle Attack on GIFT-64
Yincen Chen, Nana Zhang, Xuanyu Liang, Ling Song, Qianqian Yang, and Zhuohui Feng
2023/1418
Short Concurrent Covert Authenticated Key Exchange (Short cAKE)
Karim Eldafrawy, Nicholas Genise, and Stanislaw Jarecki
2023/1417
Improved Quantum Circuits for AES: Reducing the Depth and the Number of Qubits
Qun Liu, Bart Preneel, Zheng Zhao, and Meiqin Wang
2023/1416
On Black-Box Knowledge-Sound Commit-And-Prove SNARKs
Helger Lipmaa
2023/1415
Generalized Fuzzy Password-Authenticated Key Exchange from Error Correcting Codes
Jonathan Bootle, Sebastian Faller, Julia Hesse, Kristina Hostáková, and Johannes Ottenhues
2023/1414
Differential-Linear Approximation Semi-Unconstrained Searching and Partition Tree: Application to LEA and Speck
Yi Chen, Zhenzhen Bao, and Hongbo Yu
2023/1413
Scalable Multi-party Private Set Union from Multi-Query Secret-Shared Private Membership Test
Xiang Liu and Ying Gao
2023/1412
Algebraic isomorphic spaces of ideal lattices, reduction of Ring-SIS problem, and new reduction of Ring-LWE problem
Zhuang Shan, Leyou Zhang, Qing Wu, and Qiqi Lai
2023/1411
zk-SNARKs from Codes with Rank Metrics
Xuan-Thanh Do, Dang-Truong Mac, and Quoc-Huy Vu
2023/1410
Two Algorithms for Fast GPU Implementation of NTT
Ali Şah Özcan and Erkay Savaş
2023/1409
Solving the Hidden Number Problem for CSIDH and CSURF via Automated Coppersmith
Jonas Meers and Julian Nowakowski
2023/1408
Correlation Cube Attack Revisited: Improved Cube Search and Superpoly Recovery Techniques
Jianhua Wang, Lu Qin, and Baofeng Wu
2023/1407
Fully Homomorphic Encryption-Based Protocols for Enhanced Private Set Intersection Functionalities
JINGWEI HU, Junyan Chen, Wangchen Dai, and Huaxiong Wang
2023/1406
Sigmabus: Binding Sigmas in Circuits for Fast Curve Operations
George Kadianakis, Mary Maller, and Andrija Novakovic
2023/1405
Lattice-based Succinct Arguments from Vanishing Polynomials
Valerio Cini, Russell W. F. Lai, and Giulio Malavolta
2023/1404
(Verifiable) Delay Functions from Lucas Sequences
Charlotte Hoffmann, Pavel Hubáček, Chethan Kamath, and Tomáš Krňák
2023/1403
Searching for ELFs in the Cryptographic Forest
Marc Fischlin and Felix Rohrbach
2023/1402
Fully Homomorphic Encryption: A Mathematical Introduction
Sara Logsdon
2023/1401
On the Multi-User Security of LWE-based NIKE
Roman Langrehr
2023/1400
Efficient Updatable Public-Key Encryption from Lattices
Calvin Abou Haidar, Alain Passelègue, and Damien Stehlé
2023/1399
The supersingular Endomorphism Ring and One Endomorphism problems are equivalent
Aurel Page and Benjamin Wesolowski
2023/1398
To attest or not to attest, this is the question – Provable attestation in FIDO2
Nina Bindel, Nicolas Gama, Sandra Guasch, and Eyal Ronen
2023/1397
Algebraic Attacks on Round-Reduced RAIN and Full AIM-III
Kaiyi Zhang, Qingju Wang, Yu Yu, Chun Guo, and Hongrui Cui
2023/1396
Parallel Hardware for Isogeny-based VDF: Attacker's Perspective
David Jacquemin, Anisha Mukherjee, Ahmet Can Mert, and Sujoy Sinha Roy
2023/1395
Generic SCARE: reverse engineering without knowing the algorithm nor the machine
Ronan Lashermes and Hélène Le Bouder
2023/1394
Incrementally Verifiable Computation via Rate-1 Batch Arguments
Omer Paneth and Rafael Pass
2023/1393
OpenVoting: Recoverability from Failures in Dual Voting
Prashant Agrawal, Kabir Tomer, Abhinav Nakarmi, Mahabir Prasad Jhanwar, Subodh Sharma, and Subhashis Banerjee
2023/1392
Robust Publicly Verifiable Covert Security: Limited Information Leakage and Guaranteed Correctness with Low Overhead
Yi Liu, Junzuo Lai, Qi Wang, Xianrui Qin, Anjia Yang, and Jian Weng
2023/1391
More Insight on Deep Learning-aided Cryptanalysis
Zhenzhen Bao, Jinyu Lu, Yiran Yao, and Liu Zhang
2023/1390
Comparse: Provably Secure Formats for Cryptographic Protocols
Théophile Wallez, Jonathan Protzenko, and Karthikeyan Bhargavan
2023/1389
Cuckoo Commitments: Registration-Based Encryption and Key-Value Map Commitments for Large Spaces
Dario Fiore, Dimitris Kolonelos, and Paola de Perthuis
2023/1388
Sigma Protocols from Verifiable Secret Sharing and Their Applications
Min Zhang, Yu Chen, Chuanzhou Yao, and Zhichao Wang
2023/1387
Blockwise Rank Decoding Problem and LRPC Codes: Cryptosystems with Smaller Sizes
Yongcheng Song, Jiang Zhang, Xinyi Huang, and Wei Wu
2023/1386
Improving Privacy of Anonymous Proof-of-Stake Protocols
Shichen Wu, Zhiying Song, Puwen Wei, Peng Tang, and Quan Yuan
2023/1385
WhatsUpp with Sender Keys? Analysis, Improvements and Security Proofs
David Balbás, Daniel Collins, and Phillip Gajland
2023/1384
Application of Mordell-Weil lattices with large kissing numbers to acceleration of multi-scalar multiplication on elliptic curves
Dmitrii Koshelev
2023/1383
Registered ABE via Predicate Encodings
Ziqi Zhu, Kai Zhang, Junqing Gong, and Haifeng Qian
2023/1382
HELM: Navigating Homomorphic Encryption through Gates and Lookup Tables
Charles Gouert, Dimitris Mouris, and Nektarios Georgios Tsoutsos
2023/1381
Sometimes You Can’t Distribute Random-Oracle-Based Proofs
Jack Doerner, Yashvanth Kondi, and Leah Namisa Rosenbloom
2023/1380
Tighter Security for Generic Authenticated Key Exchange in the QROM
Jiaxin Pan, Benedikt Wagner, and Runzhi Zeng
2023/1379
GLEVIAN and VIGORNIAN: Robust beyond-birthday AEAD modes
Peter Campbell
2023/1378
Advisor-Verifier-Prover Games and the Hardness of Information Theoretic Cryptography
Benny Applebaum and Oded Nir
2023/1377
Janus: Fast Privacy-Preserving Data Provenance For TLS 1.3
Jan Lauinger, Jens Ernstberger, Andreas Finkenzeller, and Sebastian Steinhorst
2023/1376
Bootstrapping Homomorphic Encryption via Functional Encryption
Nir bitansky and Tomer Solomon
2023/1375
DeepCover DS28C36: A Hardware Vulnerability Identification and Exploitation Using T-Test and Double Laser Fault Injection
Karim M. Abdellatif and Olivier Hériveaux
2023/1374
On Weighted-Sum Orthogonal Latin Squares and Secret Sharing
Koji Nuida and Tomoko Adachi
2023/1373
Reframing and Extending the Random Probing Expandibility to Make Probing-Secure Compilers Tolerate a Constant Noise
Giuseppe Manzoni
2023/1372
Cryptographic Key Exchange: An Innovation Outlook
Gideon Samid
2023/1371
Oracle Recording for Non-Uniform Random Oracles, and its Applications
Minki Hhan and Aaram Yun
2023/1370
Ideal-SVP is Hard for Small-Norm Uniform Prime Ideals
Joël Felderhoff, Alice Pellet-Mary, Damien Stehlé, and Benjamin Wesolowski
2023/1369
Ramp hyper-invertible matrices and their applications to MPC protocols
Hongqing Liu, Chaoping Xing, Yanjiang Yang, and Chen Yuan
2023/1368
Towards post-quantum secure PAKE - A tight security proof for OCAKE in the BPR model
Nouri Alnahawi, Kathrin Hövelmanns, Andreas Hülsing, Silvia Ritsch, and Alexander Wiesmaier
2023/1367
Practical Constructions for Single Input Functionality against a Dishonest Majority
Zhelei Zhou, Bingsheng Zhang, Hong-Sheng Zhou, and Kui Ren
2023/1366
Compact Frequency Estimators in Adversarial Environments
Sam A. Markelon, Mia Filić, and Thomas Shrimpton
2023/1365
On The Black-Box Complexity of Correlation Intractability
Nico Döttling and Tamer Mour
2023/1364
Convex Consensus with Asynchronous Fallback
Andrei Constantinescu, Diana Ghinea, Roger Wattenhofer, and Floris Westermann
2023/1363
Amortized NISC over $\mathbb{Z}_{2^k}$ from RMFE
Fuchun Lin, Chaoping Xing, Yizhou Yao, and Chen Yuan
2023/1362
Comments on certain past cryptographic flaws affecting fully encrypted censorship circumvention protocols
David Fifield
2023/1361
Let's Go Eevee! A Friendly and Suitable Family of AEAD Modes for IoT-to-Cloud Secure Computation
Amit Singh Bhati, Erik Pohle, Aysajan Abidin, Elena Andreeva, and Bart Preneel
2023/1360
Payment Splitting in Lightning Network as a Mitigation Against Balance Discovery Attacks
Gijs van Dam
2023/1359
Automated Meet-in-the-Middle Attack Goes to Feistel
Qingliang Hou, Xiaoyang Dong, Lingyue Qin, Guoyan Zhang, and Xiaoyun Wang
2023/1358
The Locality of Memory Checking
Weijie Wang, Yujie Lu, Charalampos Papamanthou, and Fan Zhang
2023/1357
Multimixer-128: Universal Keyed Hashing Based on Integer Multiplication
Koustabh Ghosh, Parisa Amiri Eliasi, and Joan Daemen
2023/1356
Small Private Key Attack Against a Family of RSA-like Cryptosystems
George Teseleanu and Paul Cotan
2023/1355
Security Proofs for Key-Alternating Ciphers with Non-Independent Round Permutations
Liqing Yu, Yusai Wu, Yu Yu, Zhenfu Cao, and Xiaolei Dong
2023/1354
Privacy Preserving Feature Selection for Sparse Linear Regression
Adi Akavia, Ben Galili, Hayim Shaul, Mor Weiss, and Zohar Yakhini
2023/1353
Automatic Search Model for Related-Tweakey Impossible Differential Cryptanalysis
Huiqin Chen, Yongqiang Li, Xichao Hu, Zhengbin Liu, Lin Jiao, and Mingsheng Wang
2023/1352
ACE-HoT: Accelerating an extreme amount of symmetric Cipher Evaluations for High-Order avalanche Tests
Emanuele Bellini, Juan Grados, Mohamed Rachidi, Nitin Satpute, Joan Daemen, and Solane Elhirch
2023/1351
Bicameral and Auditably Private Signatures
Khoa Nguyen, Partha Sarathi Roy, Willy Susilo, and Yanhong Xu
2023/1350
On the Security of KZG Commitment for VSS
Atsuki Momose, Sourav Das, and Ling Ren
2023/1349
Communication Lower Bounds of Key-Agreement Protocols via Density Increment Arguments
Mi-Ying (Miryam) Huang, Xinyu Mao, Guangxu Yang, and Jiapeng Zhang
2023/1348
Adaptively Secure (Aggregatable) PVSS and Application to Distributed Randomness Beacons
Renas Bacho and Julian Loss
2023/1347
Decentralised Repeated Modular Squaring Service Revisited: Attack and Mitigation
Aydin Abadi
2023/1346
Street Rep: A Privacy-Preserving Reputation Aggregation System
Christophe Hauser, Shirin Nilizadeh, Yan Shoshitaishvili, Ni Trieu, Srivatsan Ravi, Christopher Kruegel, and Giovanni Vigna
2023/1345
Experimenting with Zero-Knowledge Proofs of Training
Sanjam Garg, Aarushi Goel, Somesh Jha, Saeed Mahloujifar, Mohammad Mahmoody, Guru-Vamsi Policharla, and Mingyuan Wang
2023/1344
Analyzing the Real-World Security of the Algorand Blockchain
Fabrice Benhamouda, Erica Blum, Jonathan Katz, Derek Leung, Julian Loss, and Tal Rabin
2023/1343
Universally Composable Auditable Surveillance
Valerie Fetzer, Michael Klooß, Jörn Müller-Quade, Markus Raiber, and Andy Rupp
2023/1342
Modular Sumcheck Proofs with Applications to Machine Learning and Image Processing
David Balbás, Dario Fiore, Maria Isabel González Vasco, Damien Robissout, and Claudio Soriente
2023/1341
Combined Private Circuits - Combined Security Refurbished
Jakob Feldtkeller, Tim Güneysu, Thorben Moos, Jan Richter-Brockmann, Sayandeep Saha, Pascal Sasdrich, and François-Xavier Standaert
2023/1340
Methods for Masking CRYSTALS-Kyber Against Side-Channel Attacks
Sıla ÖZEREN and Oğuz YAYLA
2023/1339
FlexiRand: Output Private (Distributed) VRFs and Application to Blockchains
Aniket Kate, Easwar Vivek Mangipudi, Siva Mardana, and Pratyay Mukherjee
2023/1338
Lanturn: Measuring Economic Security of Smart Contracts Through Adaptive Learning
Kushal Babel, Mojan Javaheripi, Yan Ji, Mahimna Kelkar, Farinaz Koushanfar, and Ari Juels
2023/1337
SoK: Public Key Encryption with Openings
Carlo Brunetta, Hans Heum, and Martijn Stam
2023/1336
Riggs: Decentralized Sealed-Bid Auctions
Nirvan Tyagi, Arasu Arun, Cody Freitag, Riad Wahby, Joseph Bonneau, and David Mazières
2023/1335
Antrag: Annular NTRU Trapdoor Generation
Thomas Espitau, Thi Thu Quyen Nguyen, Chao Sun, Mehdi Tibouchi, and Alexandre Wallet
2023/1334
A Generic Construction of Tightly Secure Password-based Authenticated Key Exchange
Jiaxin Pan and Runzhi Zeng
2023/1333
Neutrosophic Boolean Function and Rejection Sampling in Post Quantum Cryptography
Shashi Kant Pandey
2023/1332
Abuse-Resistant Location Tracking: Balancing Privacy and Safety in the Offline Finding Ecosystem
Harry Eldridge, Gabrielle Beck, Matthew Green, Nadia Heninger, and Abhishek Jain
2023/1331
Pantheon: Private Retrieval from Public Key-Value Store
Ishtiyaque Ahmad, Divyakant Agrawal, Amr El Abbadi, and Trinabh Gupta
2023/1330
Notes on Small Private Key Attacks on Common Prime RSA
Mengce Zheng
2023/1329
Layered Symbolic Security Analysis in DY$^\star$
Karthikeyan Bhargavan, Abhishek Bichhawat, Pedram Hosseyni, Ralf Kuesters, Klaas Pruiksma, Guido Schmitz, Clara Waldmann, and Tim Würtele
2023/1328
Optimizing HE operations via Level-aware Key-switching Framework
Intak Hwang, Jinyeong Seo, and Yongsoo Song
2023/1327
Fine-Grained Secure Attribute-Based Encryption
Yuyu Wang, Jiaxin Pan, and Yu Chen
2023/1326
Accio: Variable-Amount, Optimized-Unlinkable and NIZK-Free Off-Chain Payments via Hubs
Zhonghui Ge, Jiayuan Gu, Chenke Wang, Yu Long, Xian Xu, and Dawu Gu
2023/1325
The Grant Negotiation and Authorization Protocol: Attacking, Fixing, and Verifying an Emerging Standard
Florian Helmschmidt, Pedram Hosseyni, Ralf Kuesters, Klaas Pruiksma, Clara Waldmann, and Tim Würtele
2023/1324
Fine-Grained Proxy Re-Encryption: Definitions & Constructions from LWE
Yunxiao Zhou, Shengli Liu, Shuai Han, and Haibin Zhang
2023/1323
MAFIA: Protecting the Microarchitecture of Embedded Systems Against Fault Injection Attacks
Thomas Chamelot, Damien Couroussé, and Karine Heydemann
2023/1322
Boosting the Performance of High-Assurance Cryptography: Parallel Execution and Optimizing Memory Access in Formally-Verified Line-Point Zero-Knowledge
Samuel Dittmer, Karim Eldefrawy, Stéphane Graham-Lengrand, Steve Lu, Rafail Ostrovsky, and Vitor Pereira
2023/1321
Generic Constructions of Compact and Tightly Selective-Opening Secure Public-key Encryption Schemes
Jiaxin Pan, Benedikt Wagner, and Runzhi Zeng
2023/1320
Practical Privacy-Preserving Machine Learning using Fully Homomorphic Encryption
Michael Brand and Gaëtan Pradel
2023/1319
On the Black-Box Separation Between Ring Signatures and Public Key Encryptions
Kyosuke Yamashita and Keisuke Hara
2023/1318
Two-Round Threshold Lattice-Based Signatures from Threshold Homomorphic Encryption
Kamil Doruk Gur, Jonathan Katz, and Tjerand Silde
2023/1317
Pisces: Private and Compliable Cryptocurrency Exchange
Ya-Nan Li, Tian Qiu, and Qiang Tang
2023/1316
Communication Lower Bounds for Cryptographic Broadcast Protocols
Erica Blum, Elette Boyle, Ran Cohen, and Chen-Da Liu-Zhang
2023/1315
LedgerLocks: A Security Framework for Blockchain Protocols Based on Adaptor Signatures
Erkan Tairi, Pedro Moreno-Sanchez, and Clara Schneidewind
2023/1314
Cryptanalysis of HALFLOOP Block Ciphers: Destroying HALFLOOP-24
Gregor Leander, Shahram Rasoolzadeh, and Lukas Stennes
2023/1313
Hashing into quadratic residues modulo a safe prime composite
Sietse Ringers
2023/1312
Efficient Multiplicative-to-Additive Function from Joye-Libert Cryptosystem and Its Application to Threshold ECDSA
Haiyang Xue, Man Ho Au, Mengling Liu, Kwan Yin Chan, Handong Cui, Xiang Xie, Tsz Hon Yuen, and Chengru Zhang
2023/1311
Are continuous stop-and-go mixnets provably secure?
Debajyoti Das, Claudia Diaz, Aggelos Kiayias, and Thomas Zacharias
2023/1310
FHEDA: Efficient Circuit Synthesis with Reduced Bootstrapping for Torus FHE
Animesh Singh, Smita Das, Anirban Chakraborty, Rajat Sadhukhan, Ayantika Chatterjee, and Debdeep Mukhopadhyay
2023/1309
A Lattice-based Publish-Subscribe Communication Protocol using Accelerated Homomorphic Encryption Primitives
Anes Abdennebi and Erkay Savaş
2023/1308
How to Recover a Cryptographic Secret From the Cloud
David Adei, Chris Orsini, Alessandra Scafuro, and Tanner Verber
2023/1307
Constant-Round Private Decision Tree Evaluation for Secret Shared Data
Nan Cheng, Naman Gupta, Aikaterini Mitrokotsa, Hiraku Morita, and Kazunari Tozawa
2023/1306
Single-query Quantum Hidden Shift Attacks
Xavier Bonnetain and André Schrottenloher
2023/1305
About “$k$-bit security” of MACs based on hash function Streebog
Vitaly Kiryukhin
2023/1304
Homomorphic polynomial evaluation using Galois structure and applications to BFV bootstrapping
Hiroki Okada, Rachel Player, and Simon Pohmann
2023/1303
On security aspects of CRISP
Vitaly Kiryukhin
2023/1302
Revisiting the Differential Meet-In-The-Middle Cryptanalysis
Ling Song, Qianqian Yang, and Huimin Liu
2023/1301
Short Paper: Accountable Safety Implies Finality
Joachim Neu, Ertem Nusret Tas, and David Tse
2023/1300
Device-Oriented Group Messaging: A Formal Cryptographic Analysis of Matrix’ Core
Martin R. Albrecht, Benjamin Dowling, and Daniel Jones
2023/1299
A New RSA Variant Based on Elliptic Curves
Maher Boudabra and Abderrahmane Nitaj
2023/1298
NEV: Faster and Smaller NTRU Encryption using Vector Decoding
Jiang Zhang, Dengguo Feng, and Di Yan
2023/1297
Entropic Quasigroup Based Secret Agreement Using Large Order Automorphisms
Daniel Nager
2023/1296
A note on ``blockchain-assisted authentication and key agreement scheme for fog-based smart grid''
Zhengjun Cao and Lihua Liu
2023/1295
Towards Minimizing Non-linearity in Type-II Generalized Feistel Networks
Yuqing Zhao, Chun Guo, and Weijia Wang
2023/1294
PrivMail: A Privacy-Preserving Framework for Secure Emails
Gowri R Chandran, Raine Nieminen, Thomas Schneider, and Ajith Suresh
2023/1293
Applications of Finite non-Abelian Simple Groups to Cryptography in the Quantum Era
María Isabel González Vasco, Delaram Kahrobaei, and Eilidh McKemmie
2023/1292
Enhancing Data Security: A Study of Grain Cipher Encryption using Deep Learning Techniques
Payal, Pooja, and Girish Mishra
2023/1291
On the Invalidity of LV16/Lin17 Obfuscation Schemes Revisited
Yupu Hu, Siyue Dong, Baocang Wang, and Xingting Dong
2023/1290
Comparative Analysis of ResNet and DenseNet for Differential Cryptanalysis of SPECK 32/64 Lightweight Block Cipher
Ayan Sajwan and Girish Mishra
2023/1289
Fully Tally-Hiding Verifiable E-Voting for Real-World Elections with Seat-Allocations
Carmen Wabartha, Julian Liedtke, Nicolas Huber, Daniel Rausch, and Ralf Kuesters
2023/1288
An erf Analog for Discrete Gaussian Sampling
Nicolas Gama, Anand Kumar Narayanan, Ryder LiuLin, and Dongze Yue
2023/1287
To extend or not to extend: Agile Masking Instructions for PQC
Markus Krausz, Georg Land, Florian Stolz, Dennis Naujoks, Jan Richter-Brockmann, Tim Güneysu, and Lucie Kogelheide
2023/1286
Quantum Attacks on Hash Constructions with Low Quantum Random Access Memory
Xiaoyang Dong, Shun Li, Phuong Pham, and Guoyan Zhang
2023/1285
Waffle: An Online Oblivious Datastore for Protecting Data Access Patterns
Sujaya Maiyya, Sharath Vemula, Divyakant Agrawal, Amr El Abbadi, and Florian Kerschbaum
2023/1284
Improving logarithmic derivative lookups using GKR
Shahar Papini and Ulrich Haböck
2023/1283
A Univariate Attack against the Limited-Data Instance of Ciminion
Augustin Bariant
2023/1282
Proof-Carrying Data from Multi-folding Schemes
Zibo Zhou, Zongyang Zhang, Zhiyu Zhang, and Jin Dong
2023/1281
Leveraging Machine Learning for Bidding Strategies in Miner Extractable Value (MEV) Auctions
Christoffer Raun, Benjamin Estermann, Liyi Zhou, Kaihua Qin, Roger Wattenhofer, Arthur Gervais, and Ye Wang
2023/1280
Quantum Security of TNT
Shuping Mao, Zhiyu Zhang, Lei Hu, Luying Li, and Peng Wang
2023/1279
General Non-interactive Quantum Commitments Are Compatible with Quantum Rewinding
Jun Yan
2023/1278
Compositional Formal Verification of Zero-Knowledge Circuits
Alessandro Coglio, Eric McCarthy, Eric Smith, Collin Chin, Pranav Gaddamadugu, and Michel Dellepere
2023/1277
Dually Computable Cryptographic Accumulators and Their Application to Attribute Based Encryption
Anaïs Barthoulot, Olivier Blazy, and Sébastien Canard
2023/1276
Witness Authenticating NIZKs and Applications
Hanwen Feng and Qiang Tang
2023/1275
Post-Quantum Asynchronous Remote Key Generation for FIDO2 Account Recovery
Jacqueline Brendel, Sebastian Clermont, and Marc Fischlin
2023/1274
ACABELLA: Automated (Crypt)analysis of Attribute-Based Encryption Leveraging Linear Algebra
Antonio de la Piedra, Marloes Venema, and Greg Alpár
2023/1273
Fait Accompli Committee Selection: Improving the Size-Security Tradeoff of Stake-Based Committees
Peter Gaži, Aggelos Kiayias, and Alexander Russell
2023/1272
Tight Security of TNT and Beyond: Attacks, Proofs and Possibilities for the Cascaded LRW Paradigm
Ashwin Jha, Mustafa Khairallah, Mridul Nandi, and Abishanka Saha
2023/1271
Pianist: Scalable zkRollups via Fully Distributed Zero-Knowledge Proofs
Tianyi Liu, Tiancheng Xie, Jiaheng Zhang, Dawn Song, and Yupeng Zhang
2023/1270
Computational Wiretap Coding from Indistinguishability Obfuscation
Yuval Ishai, Aayush Jain, Paul Lou, Amit Sahai, and Mark Zhandry
2023/1269
SIGMA: Secure GPT Inference with Function Secret Sharing
Kanav Gupta, Neha Jawalkar, Ananta Mukherjee, Nishanth Chandran, Divya Gupta, Ashish Panwar, and Rahul Sharma
2023/1268
Finding Orientations of Supersingular Elliptic Curves and Quaternion Orders
Sarah Arpin, James Clements, Pierrick Dartois, Jonathan Komada Eriksen, Péter Kutas, and Benjamin Wesolowski
2023/1267
Whipping the MAYO Signature Scheme using Hardware Platforms
Florian Hirner, Michael Streibl, Florian Krieger, Ahmet Can Mert, and Sujoy Sinha Roy
2023/1266
Automatic Preimage Attack Framework on \ascon Using a Linearize-and-Guess Approach
Huina Li, Le He, Shiyao Chen, Jian Guo, and Weidong Qiu
2023/1265
Key-Agreement with Perfect Completeness from Random Oracles
Noam Mazor
2023/1264
An optimization of the addition gate count in Plonkish circuits
Steve Thakur
2023/1263
Quantum security analysis of Wave
Johanna Loyer
2023/1262
Phoenixx: Linear consensus with random sampling
David Chaum, Bernardo Cardoso, William Carter, Mario Yaksetig, and Baltasar Aroso
2023/1261
Faster constant-time evaluation of the Kronecker symbol with application to elliptic curve hashing
Diego F. Aranha, Benjamin Salling Hvass, Bas Spitters, and Mehdi Tibouchi
2023/1260
Public-Key Encryption from Average Hard NP Language
Hongda Li, Peifang Ni, and Yao Zan
2023/1259
Nonlinear computations on FinTracer tags
Michael Brand, Tania Churchill, and Carsten Friedrich
2023/1258
Efficient Oblivious Sorting and Shuffling for Hardware Enclaves
Tianyao Gu, Yilei Wang, Bingnan Chen, Afonso Tinoco, Elaine Shi, and Ke Yi
2023/1257
Batchman and Robin: Batched and Non-batched Branching for Interactive ZK
Yibin Yang, David Heath, Carmit Hazay, Vladimir Kolesnikov, and Muthuramakrishnan Venkitasubramaniam
2023/1256
On Soundness Notions for Interactive Oracle Proofs
Alexander R. Block, Albert Garreta, Pratyush Ranjan Tiwari, and Michał Zając
2023/1255
A flexible Snark via the monomial basis
Steve Thakur
2023/1254
LaKey: Efficient Lattice-Based Distributed PRFs Enable Scalable Distributed Key Management
Matthias Geihs and Hart Montgomery
2023/1253
Ordering Transactions with Bounded Unfairness: Definitions, Complexity and Constructions
Aggelos Kiayias, Nikos Leonardos, and Yu Shen
2023/1252
Towards Private Deep Learning-based Side-Channel Analysis using Homomorphic Encryption
Fabian Schmid, Shibam Mukherjee, Stjepan Picek, Marc Stöttinger, Fabrizio De Santis, and Christian Rechberger
2023/1251
Verifiable random function from the Deuring correspondence and higher dimensional isogenies
Antonin Leroux
2023/1250
Revealable Functional Commitments: How to Partially Reveal a Secret Function
Bharath Namboothiry
2023/1249
On the Black-Box Impossibility of Multi-Designated Verifiers Signature Schemes from Ring Signature Schemes
Kyosuke Yamashita and Keisuke Hara
2023/1248
A Note on ``Authenticated Key Agreement Protocol for Secure Communication Establishment in Vehicle-to-Grid Environment With FPGA Implementation''
Zhengjun Cao and Lihua Liu
2023/1247
Representations of Group Actions and their Applications in Cryptography
Giuseppe D'Alconzo and Antonio J. Di Scala
2023/1246
Automated Analysis of Protocols that use Authenticated Encryption: How Subtle AEAD Differences can impact Protocol Security
Cas Cremers, Alexander Dax, Charlie Jacomme, and Mang Zhao
2023/1245
Probabilistic Related-Key Statistical Saturation Cryptanalysis
Muzhou Li, Nicky Mouha, Ling Sun, and Meiqin Wang
2023/1244
HERMES: Efficient Ring Packing using MLWE Ciphertexts and Application to Transciphering
Youngjin Bae, Jung Hee Cheon, Jaehyung Kim, Jai Hyun Park, and Damien Stehlé
2023/1243
Multi-Stage Group Key Distribution and PAKEs: Securing Zoom Groups against Malicious Servers without New Security Elements
Cas Cremers, Eyal Ronen, and Mang Zhao
2023/1242
Cascading Four Round LRW1 is Beyond Birthday Bound Secure
Nilanjan Datta, Shreya Dey, Avijit Dutta, and Sougata Mandal
2023/1241
Post-Quantum Single Secret Leader Election (SSLE) From Publicly Re-randomizable Commitments
Dan Boneh, Aditi Partap, and Lior Rotem
2023/1240
$\mathsf{FREPack}$: Improved SNARK Frontend for Highly Repetitive Computations
Sriram Sridhar and Yinuo Zhang
2023/1239
CSI-Otter: Isogeny-based (Partially) Blind Signatures from the Class Group Action with a Twist
Shuichi Katsumata, Yi-Fu Lai, Jason T. LeGrow, and Ling Qin
2023/1238
A remark on the Independence Heuristic in the Dual Attack
Andreas Wiemers, Stephan Ehlen, and Kaveh Bashiri
2023/1237
More Balanced Polynomials: Cube Attacks on 810- and 825-Round Trivium with Practical Complexities
Hao Lei, Jiahui He, Kai Hu, and Meiqin Wang
2023/1236
Waks-On/Waks-Off: Fast Oblivious Offline/Online Shuffling and Sorting with Waksman Networks
Sajin Sasy, Aaron Johnson, Ian Goldberg
2023/1235
LOL: A Highly Flexible Framework for Designing Stream Ciphers
Dengguo Feng, Lin Jiao, Yonglin Hao, Qunxiong Zheng, Wenling Wu, Wenfeng Qi, Lei Zhang, Liting Zhang, Siwei Sun, and Tian Tian
2023/1234
Practical Key-Extraction Attacks in Leading MPC Wallets
Nikolaos Makriyannis, Oren Yomtov, and Arik Galansky
2023/1233
Tight Security of TNT: Reinforcing Khairallah's Birthday-bound Attack
Ashwin Jha, Mridul Nandi, and Abishanka Saha
2023/1232
Privacy-Preserving Outsourced Certificate Validation
Tarek Galal, Anja Lehmann
2023/1231
PMNS revisited for consistent redundancy and equality test
Fangan Yssouf Dosso, Alexandre Berzati, Nadia El Mrabet, and Julien Proy
2023/1230
Almost Tight Multi-User Security under Adaptive Corruptions from LWE in the Standard Model
Shuai Han, Shengli Liu, Zhedong Wang, Dawu Gu
2023/1229
Two Remarks on Torsion-Point Attacks in Isogeny-Based Cryptography
Francesco Sica
2023/1228
Snowblind: A Threshold Blind Signature in Pairing-Free Groups
Elizabeth Crites, Chelsea Komlo, Mary Maller, Stefano Tessaro, Chenzhi Zhu
2023/1227
Parallel SAT Framework to Find Clustering of Differential Characteristics and Its Applications
Kosei Sakamoto, Ryoma Ito, Takanori Isobe
2023/1226
SoK: Privacy-Preserving Smart Contract
Huayi Qi, Minghui Xu, Dongxiao Yu, and Xiuzhen Cheng
2023/1225
One-Message Secure Reductions: On the Cost of Converting Correlations
Yuval Ishai, Mahimna Kelkar, Varun Narayanan, Liav Zafar
2023/1224
Theoretical analysis of decoding failure rate of non-binary QC-MDPC codes
Kirill Vedenev, Yury Kosolapov
2023/1223
Improved Circuit Synthesis with Multi-Value Bootstrapping for FHEW-like Schemes
Johannes Mono, Kamil Kluczniak, and Tim Güneysu
2023/1222
Pay Less for Your Privacy: Towards Cost-Effective On-Chain Mixers
Zhipeng Wang, Marko Cirkovic, Duc V. Le, William Knottenbelt, and Christian Cachin
2023/1221
Non-distributable key-sharing protocol with particular emphasis on the Internet of Things
Mario Mastriani
2023/1220
Quasilinear Masking to Protect ML-KEM Against Both SCA and FIA
Pierre-Augustin Berthet, Yoan Rougeolle, Cédric Tavernier, Jean-Luc Danger, and Laurent Sauvage
2023/1219
A Note on “Secure Quantized Training for Deep Learning”
Marcel Keller, Ke Sun
2023/1218
Arke: Scalable and Byzantine Fault Tolerant Privacy-Preserving Contact Discovery
Nicolas Mohnblatt, Alberto Sonnino, Kobi Gurkan, and Philipp Jovanovic
2023/1217
Jolt: SNARKs for Virtual Machines via Lookups
Arasu Arun, Srinath Setty, Justin Thaler
2023/1216
Unlocking the lookup singularity with Lasso
Srinath Setty, Justin Thaler, Riad Wahby
2023/1215
Authentica: A Secure Authentication Mechanism using a Software-defined Unclonable Function
Ripon Patgiri and Laiphrakpam Dolendro Singh
2023/1214
Verifiable Verification in Cryptographic Protocols
Marc Fischlin, Felix Günther
2023/1213
Fallen Sanctuary: A Higher-Order and Leakage-Resilient Rekeying Scheme
Rei Ueno, Naofumi Homma, Akiko Inoue, and Kazuhiko Minematsu
2023/1212
CLRW1$^{3}$ is not Secure Beyond the Birthday Bound: Breaking TNT with ${O(2^{n/2})}$ queries
Mustafa Khairallah
2023/1211
Optimal Flexible Consensus and its Application to Ethereum
Joachim Neu, Srivatsan Sridhar, Lei Yang, and David Tse
2023/1210
Decentralized Finance (DeFi): A Survey
Erya Jiang, Bo Qin, Qin Wang, Zhipeng Wang, Qianhong Wu, Jian Weng, Xinyu Li, Chenyang Wang, Yuhang Ding, and Yanran Zhang
2023/1209
Infinite families of minimal binary codes via Krawtchouk polynomials
Xiaoni Du, René Rodríguez, Hao Wu
2023/1208
Mutator Sets and their Application to Scalable Privacy
Alan Szepieniec, Thorkil Værge
2023/1207
DeFi Auditing: Mechanisms, Effectiveness, and User Perceptions
Ding Feng, Rupert Hitsch, Kaihua Qin, Arthur Gervais, Roger Wattenhofer, Yaxing Yao, Ye Wang
2023/1206
Decentralized Threshold Signatures for Blockchains with Non-Interactive and Transparent Setup
Kwangsu Lee
2023/1205
On the security of REDOG
Tanja Lange, Alex Pellegrini, and Alberto Ravagnani
2023/1204
On Fully-Secure Honest Majority MPC without $n^2$ Round Overhead
Daniel Escudero, Serge Fehr
2023/1203
Collaborative Privacy-Preserving Analysis of Oncological Data using Multiparty Homomorphic Encryption
Ravit Geva, Alexander Gusev, Yuriy Polyakov, Lior Liram, Oded Rosolio, Andreea Alexandru, Nicholas Genise, Marcelo Blatt, Zohar Duchin, Barliz Waissengrin, Dan Mirelman, Felix Bukstein, Deborah T. Blumenthal, Ido Wolf, Sharon Pelles-Avraham, Tali Schaffer, Lee A. Lavi, Daniele Micciancio, Vinod Vaikuntanathan, Ahmad Al Badawi, Shafi Goldwasser
2023/1202
Extension of Shannon's theory of ciphers based on Latin rectangles
Karel BURDA
2023/1201
Privacy-preserving edit distance computation using secret-sharing two-party computation
Hernán Darío Vanegas Madrigal, Daniel Cabarcas Jaramillo, Diego F. Aranha
2023/1200
Shining Light on the Shadow: Full-round Practical Distinguisher for Lightweight Block Cipher Shadow
Sunyeop Kim, Myoungsu Shin, Seonkyu Kim, Hanbeom Shin, Insung Kim, Donggeun Kwon, Dongjae Lee, Seonggyeom Kim, Deukjo Hong, Jaechul Sung, Seokhie Hong
2023/1199
RSA Blind Signatures with Public Metadata
Ghous Amjad, Kevin Yeo, Moti Yung
2023/1198
A Methodology to Achieve Provable Side-Channel Security in Real-World Implementations
Sonia Belaïd, Gaëtan Cassiers, Camille Mutschler, Matthieu Rivain, Thomas Roche, François-Xavier Standaert, and Abdul Rahman Taleb
2023/1197
Towards a Quantum-resistant Weak Verifiable Delay Function
Thomas Decru, Luciano Maino, Antonio Sanso
2023/1196
Verifiable Secret Sharing Simplified
Sourav Das, Zhuolun Xiang, Alin Tomescu, Alexander Spiegelman, Benny Pinkas, and Ling Ren
2023/1195
PicoEMP: A Low-Cost EMFI Platform Compared to BBI and Voltage Fault Injection using TDC and External VCC Measurements
Colin O'Flynn
2023/1194
HI-Kyber: A novel high-performance implementation scheme of Kyber based on GPU
Xinyi Ji, Jiankuo Dong, Pinchang Zhang, Deng Tonggui, Hua Jiafeng, Fu Xiao
2023/1193
An Anonymous Authenticated Key Agreement Protocol Secure in Partially Trusted Registration Server Scenario for Multi-Server Architectures
Inam ul Haq, Jian Wang, Youwen Zhu, Sheharyar Nasir
2023/1192
CycleFold: Folding-scheme-based recursive arguments over a cycle of elliptic curves
Abhiram Kothapalli, Srinath Setty
2023/1191
Attribute-Based Multi-Input FE (and more) for Attribute-Weighted Sums
Shweta Agrawal, Junichi Tomida, Anshu Yadav
2023/1190
REED: Chiplet-Based Accelerator for Fully Homomorphic Encryption
Aikata Aikata, Ahmet Can Mert, Sunmin Kwon, Maxim Deryabin, and Sujoy Sinha Roy
2023/1189
PAP: A Privacy-Preserving Authentication Scheme with Anonymous Payment for V2G Networks
Xiaohan Yue, Xue Bi, Haibo Yang, Shi Bai, and Yuan He
2023/1188
A Novel CCA Attack for NTRU+ KEM
Joohee Lee, Minju Lee, Hansol Ryu, and Jaehui Park
2023/1187
Broadcast-Optimal Two Round MPC with Asynchronous Peer-to-Peer Channels
Ivan Damgård, Divya Ravi, Luisa Siniscalchi, Sophia Yakoubov
2023/1186
Faster cellular automata cryptosystems with neighbor sequences
Kittiphop Phalakarn, Athasit Surarerks
2023/1185
SwiftRange: A Short and Efficient Zero-Knowledge Range Argument For Confidential Transactions and More
Nan Wang, Sid Chi-Kin Chau, and Dongxi Liu
2023/1184
STAMP-Single Trace Attack on M-LWE Pointwise Multiplication in Kyber
Bolin Yang, Prasanna Ravi, Fan Zhang, Ao Shen, and Shivam Bhasin
2023/1183
Delegated Time-Lock Puzzle
Aydin Abadi, Dan Ristea, Steven J. Murdoch
2023/1182
Long Paper: Provable Secure Parallel Gadgets
Francesco Berti, Sebastian Faust, and Maximilian Orlt
2023/1181
A Relational Credential System from $q$-SDH-based Graph Signatures
Syh-Yuan Tan, Ioannis Sfyrakis, Thomas Gross
2023/1180
Exploring Blockchain Technology through a Modular Lens: A Survey
Minghui Xu, Yihao Guo, Chunchi Liu, Qin Hu, Dongxiao Yu, Zehui Xiong, Dusit Niyato, Xiuzhen Cheng
2023/1179
A Systematic Study of Data Augmentation for Protected AES Implementations
Huimin Li, Guilherme Perin
2023/1178
Towards Open Scan for the Open-source Hardware
Leonid Azriel, Avi Mendelson
2023/1177
DualDory: Logarithmic-Verifier Linkable Ring Signatures through Preprocessing
Jonathan Bootle, Kaoutar Elkhiyaoui, Julia Hesse, Yacov Manevich
2023/1176
Composable Oblivious Pseudo-Random Functions via Garbled Circuits
Sebastian Faller, Astrid Ottenhues, and Johannes Ottenhues
2023/1175
Fast batched asynchronous distributed key generation
Jens Groth and Victor Shoup
2023/1174
zkDL: Efficient Zero-Knowledge Proofs of Deep Learning Training
Haochen Sun, Tonghe Bai, Jason Li, and Hongyang Zhang
2023/1173
Round-Optimal Black-Box MPC in the Plain Model
Yuval Ishai, Dakshita Khurana, Amit Sahai, Akshayaram Srinivasan
2023/1172
Communication and Round Efficient Parallel Broadcast Protocols
Ittai Abraham, Kartik Nayak, Nibesh Shrestha
2023/1171
Arena: Multi-leader Synchronous Byzantine Fault Tolerance
Hao Lu, Jian Liu, Kui Ren
2023/1170
Two-Round Adaptively Secure MPC from Isogenies, LPN, or CDH
Navid Alamati, Hart Montgomery, Sikhar Patranabis, Pratik Sarkar
2023/1169
Efficient Oblivious Evaluation Protocol and Conditional Disclosure of Secrets for DFA
Kittiphop Phalakarn, Nuttapong Attrapadung, Kanta Matsuura
2023/1168
Evolving Homomorphic Secret Sharing for Hierarchical Access Structures
Kittiphop Phalakarn, Vorapong Suppakitpaisarn, Nuttapong Attrapadung, Kanta Matsuura
2023/1167
Constructive $t$-secure Homomorphic Secret Sharing for Low Degree Polynomials
Kittiphop Phalakarn, Vorapong Suppakitpaisarn, Nuttapong Attrapadung, Kanta Matsuura
2023/1166
Malicious Secure, Structure-Aware Private Set Intersection
Gayathri Garimella, Mike Rosulek, Jaspal Singh
2023/1165
On the Security of Universal Re-Encryption
Fabio Banfi, Ueli Maurer, Silvia Ritsch
2023/1164
Swiper: a new paradigm for efficient weighted distributed protocols
Andrei Tonkikh and Luciano Freitas
2023/1163
Evaluating KpqC Algorithm Submissions: Balanced and Clean Benchmarking Approach
Hyeokdong Kwon, Minjoo Sim, Gyeongju Song, Minwoo Lee, Hwajeong Seo
2023/1162
Reduction of Search-LWE Problem to Integer Programming Problem
Masaaki Shirase
2023/1161
Benchmarking the Setup of Updatable zk-SNARKs
Karim Baghery, Axel Mertens, Mahdi Sedaghat
2023/1160
Not optimal but efficient: a distinguisher based on the Kruskal-Wallis test
Yan Yan, Arnab Roy, and Elisabeth Oswald
2023/1159
Semi-Honest 2-Party Faithful Truncation from Two-Bit Extraction
Huan Zou, Yuting Xiao, and Rui Zhang
2023/1158
Improved Polynomial Secret-Sharing Schemes
Amos Beimel, Oriol Farràs, and Or Lasri
2023/1157
Quantum Cryptanalysis of OTR and OPP: Attacks on Confidentiality, and Key-Recovery
Melanie Jauch, Varun Maram
2023/1156
Instant Zero Knowledge Proof of Reserve
Trevor Conley, Nilsso Diaz, Diego Espada, Alvin Kuruvilla, Stenton Mayone, and Xiang Fu
2023/1155
Secure Function Extensions to Additively Homomorphic Cryptosystems
Mounika Pratapa and Aleksander Essex
2023/1154
Quantum Secure Threshold Private Set Intersection Protocol for IoT-Enabled Privacy Preserving Ride-Sharing Application
Tapaswini Mohanty, Vikas Srivastava, Sumit Kumar Debnath, Ashok Kumar Das, Biplab Sikdar
2023/1153
A Multivariate Based Provably Secure Certificateless Signature Scheme with Applications to the Internet of Medical Things
Vikas Srivastava, Sumit Kumar Debnath
2023/1152
Haze and Daze: Compliant Privacy Mixers
Stanislaw Baranski, Maya Dotan, Ayelet Lotem, and Margarita Vald
2023/1151
High-speed Implementation of AIM symmetric primitives within AIMer digital signature
Minwoo Lee, Kyungbae Jang, Hyeokdong Kwon, Minjoo Sim, Gyeongju Song, Hwajeong Seo
2023/1150
Optimized Quantum Circuit for Quantum Security Strength Analysis of Argon2
Gyeongju Song, Siwoo Eum, Hyeokdong Kwon, Minjoo Sim, Minwoo Lee, Hwajeong Seo
2023/1149
Analysis of Parallel Implementation of Pilsung Block Cipher On Graphics Processing Unit
Siwoo Eum, Hyunjun Kim, Minho Song, Hwajeong Seo
2023/1148
Post Quantum Fuzzy Stealth Signatures and Applications
Sihang Pu, Sri AravindaKrishnan Thyagarajan, Nico Döttling, Lucjan Hanzlik
2023/1147
CipherGPT: Secure Two-Party GPT Inference
Xiaoyang Hou, Jian Liu, Jingyu Li, Yuhan Li, Wen-jie Lu, Cheng Hong, and Kui Ren
2023/1146
Structured Encryption for Indirect Addressing
Ruth Ng, Alexander Hoover, David Cash, Eileen Ee
2023/1145
Instantiating the Hash-Then-Evaluate Paradigm: Strengthening PRFs, PCFs, and OPRFs.
Chris Brzuska, Geoffroy Couteau, Christoph Egger, Pihla Karanko, and Pierre Meyer
2023/1144
Abuse Reporting for Metadata-Hiding Communication Based on Secret Sharing
Saba Eskandarian
2023/1143
Combined Fault and Leakage Resilience: Composability, Constructions and Compiler
Sebastian Berndt, Thomas Eisenbarth, Sebastian Faust, Marc Gourjon, Maximilian Orlt, Okan Seker
2023/1142
On the Efficiency of Generic, Quantum Cryptographic Constructions
Keita Xagawa
2023/1141
Composable Gadgets with Reused Fresh Masks $-$ First-Order Probing-Secure Hardware Circuits with only 6 Fresh Masks
David Knichel, Amir Moradi
2023/1140
Quantum Circuit Designs of Point Doubling Operation for Binary Elliptic Curves
Harashta Tatimma Larasati, Howon Kim
2023/1139
Optimal Load-Balanced Scalable Distributed Agreement
Yuval Gelles, Ilan Komargodski
2023/1138
Invisible Warning Line: Efficient and Generic Regulation for Anonymous Cryptocurrencies
Rui Gao
2023/1137
A New Sieving Approach for Solving the HNP with One Bit of Nonce by Using Built-in Modulo Arithmetic
Yao Sun, Shuai Chang
2023/1136
Secure Multiparty Computation with Identifiable Abort from Vindicating Release
Ran Cohen, Jack Doerner, Yashvanth Kondi, and abhi shelat
2023/1135
HaMAYO: A Fault-Tolerant Reconfigurable Hardware Implementation of the MAYO Signature Scheme
Oussama Sayari, Soundes Marzougui, Thomas Aulbach, Juliane Krämer, and Jean-Pierre Seifert
2023/1134
Randomness Generation for Secure Hardware Masking - Unrolled Trivium to the Rescue
Gaëtan Cassiers, Loïc Masure, Charles Momin, Thorben Moos, Amir Moradi, and François-Xavier Standaert
2023/1133
Algebraic Attacks on RAIN and AIM Using Equivalent Representations
Fukang Liu, Mohammad Mahzoun, Morten Øygarden, and Willi Meier
2023/1132
Cryptanalysis and Improvement of a Flexible and Lightweight Group Authentication Scheme
Ali Rezapour, Zahra Ahmadian
2023/1131
One vector to rule them all: Key recovery from one vector in UOV schemes
Pierre Pébereau
2023/1130
Asynchronous Agreement on a Core Set in Constant Expected Time and More Efficient Asynchronous VSS and MPC
Ittai Abraham, Gilad Asharov, Arpita Patra, and Gilad Stern
2023/1129
All You Need Is Fault: Zero-Value Attacks on AES and a New $\lambda$-Detection M&M
Haruka Hirata, Daiki Miyahara, Victor Arribas, Yang Li, Noriyuki Miura, Svetla Nikova, and Kazuo Sakiyama
2023/1128
Leaking Secrets in Homomorphic Encryption with Side-Channel Attacks
Furkan Aydin, Aydin Aysu
2023/1127
TariScript: Bringing dynamic scripting to Mimblewimble
Cayle Sharrock, Schalk van Heerden
2023/1126
Non-Observable Quantum Random Oracle Model
Navid Alamati, Varun Maram, Daniel Masny
2023/1125
Finding short integer solutions when the modulus is small
Léo Ducas, Thomas Espitau, Eamonn W. Postlethwaite
2023/1124
An Algebraic Approach to Circulant Column Parity Mixers
Robert Christian Subroto
2023/1123
On the Cost of Post-Compromise Security in Concurrent Continuous Group-Key Agreement
Benedikt Auerbach, Miguel Cueto Noval, Guillermo Pascual-Perez, and Krzysztof Pietrzak
2023/1122
Frequency-revealing attacks against Frequency-hiding Order-preserving Encryption
Xinle Cao, Jian Liu, Yongsheng Shen, Xiaohua Ye, Kui Ren
2023/1121
SoK: Public Randomness
Alireza Kavousi, Zhipeng Wang, and Philipp Jovanovic
2023/1120
TVA: A multi-party computation system for secure and expressive time series analytics
Muhammad Faisal, Jerry Zhang, John Liagouris, Vasiliki Kalavri, Mayank Varia
2023/1119
Outsider-Anonymous Broadcast Encryption with Keyword Search: Generic Construction, CCA Security, and with Sublinear Ciphertexts
Keita Emura, Kaisei Kajita, and Go Ohtake
2023/1118
Practically-exploitable Vulnerabilities in the Jitsi Video Conferencing System
Robertas Maleckas, Kenneth G. Paterson, Martin R. Albrecht
2023/1117
Mask Compression: High-Order Masking on Memory-Constrained Devices
Markku-Juhani O. Saarinen, Mélissa Rossi
2023/1116
Applying system of equations to factor semiprime numbers
Yonatan Zilpa
2023/1115
Two Shuffles Make a RAM: Improved Constant Overhead Zero Knowledge RAM
Yibin Yang and David Heath
2023/1114
On iterated punctured Grover
Cezary Pilaszewicz and Marian Margraf
2023/1113
Breaking the Hutton 2 challenge
Thomas Kaeding
2023/1112
Tornado Vote: Anonymous Blockchain-Based Voting
Robert Muth, Florian Tschorsch
2023/1111
Optimized stream-cipher-based transciphering by means of functional-bootstrapping
Adda-Akram Bendoukha, Pierre-Emmanuel Clet, Aymen Boudguiga, Renaud Sirdey
2023/1110
Breaking Free: Leakage Model-free Deep Learning-based Side-channel Analysis
Lichao Wu, Amir Ali-pour, Azade Rezaeezade, Guilherme Perin, Stjepan Picek
2023/1109
An End-to-end Plaintext-based Side-channel Collision Attack without Trace Segmentation
Lichao Wu, Sébastien Tiran, Guilherme Perin, Stjepan Picek
2023/1108
It's a Kind of Magic: A Novel Conditional GAN Framework for Efficient Profiling Side-channel Analysis (Extended Version)
Sengim Karayalcin, Marina Krcek, Lichao Wu, Stjepan Picek, and Guilherme Perin
2023/1107
Verifiable Timed Proxy Signatures and Multi-signatures
Duygu Ozden, Oğuz Yayla
2023/1106
ProtoGalaxy: Efficient ProtoStar-style folding of multiple instances
Liam Eagen and Ariel Gabizon
2023/1105
MAPLE: A Metadata-Hiding Policy-Controllable Encrypted Search Platform with Minimal Trust
Tung Le, Thang Hoang
2023/1104
An Efficient Unicode encoded in UTF-16 text cryptography based on the AES algorithm
Sushmit Jahan Rose, Umut Ozkaya, Sabina Yasmin, Suraiya Jabin, Robiul Hasan, Elias Kabir
2023/1103
Practical Large-Scale Proof-of-Stake Asynchronous Total-Order Broadcast
Orestis Alpos, Christian Cachin, Simon Holmgaard Kamp, Jesper Buus Nielsen
2023/1102
Coercion Mitigation for Voting Systems with Trackers: A Selene Case Study
Kristian Gjøsteen, Thomas Haines, and Morten Rotvold Solberg
2023/1101
$\mathcal{S}_0$-equivalent classes, a new direction to find better weightwise perfectly balanced functions, and more
Agnese Gini, Pierrick Méaux
2023/1100
Shift-invariance Robustness of Convolutional Neural Networks in Side-channel Analysis
Marina Krček, Lichao Wu, Guilherme Perin, Stjepan Picek
2023/1099
A Digital Identity in the Hands of Swiss Citizens
Jean-Luc Beuchat and Valon Rexhepi
2023/1098
$\textsf{Asterisk}$: Super-fast MPC with a Friend
Banashri Karmakar, Nishat Koti, Arpita Patra, Sikhar Patranabis, Protik Paul, and Divya Ravi
2023/1097
Quantum Money from Abelian Group Actions
Mark Zhandry
2023/1096
White-Box Block Cipher Implementation Based on LS-Design
Hatice Kübra Güner, Ceyda Mangır, Oğuz Yayla
2023/1095
Chosen-Key Distinguishing Attacks on Full AES-192, AES-256, Kiasu-BC, and More
Xiaoyang Dong, Shun Li, Phuong Pham
2023/1094
Round Optimal Fully Secure Distributed Key Generation
Jonathan Katz
2023/1093
Properties of Lattice Isomorphism as a Cryptographic Group Action
Benjamin Benčina, Alessandro Budroni, Jesús-Javier Chi-Domínguez, and Mukul Kulkarni
2023/1092
The wrong use of FESTA trapdoor functions leads to an adaptive attack
Tomoki Moriya and Hiroshi Onuki
2023/1091
On Derandomizing Yao's Weak-to-Strong OWF Construction
Chris Brzuska, Geoffroy Couteau, Pihla Karanko, Felix Rohrbach
2023/1090
Bulletproofs With Stochastic Equation Sets
Michael Brand, Benoit Poletti
2023/1089
Security-Performance Tradeoff in DAG-based Proof-of-Work Blockchain Protocols
Shichen Wu, Puwen Wei, Ren Zhang, and Bowen Jiang
2023/1088
Building Hard Problems by Combining Easy Ones
Riddhi Ghosal and Amit Sahai
2023/1087
Moving a Step of ChaCha in Syncopated Rhythm
Shichang Wang, Meicheng Liu, Shiqi Hou, Dongdai Lin
2023/1086
On One-way Functions and the Worst-case Hardness of Time-Bounded Kolmogorov Complexity
Yanyi Liu and Rafael Pass
2023/1085
Fuzzy Deduplication Scheme Supporting Pre-verification of Label Consistency
Zehui Tang, Shengke Zeng, Tao Li, Shuai Cheng, Haoyu Zheng
2023/1084
A Side-Channel Attack on a Masked Hardware Implementation of CRYSTALS-Kyber
Yanning Ji, Elena Dubrova
2023/1083
Keyed Sum of Permutations: a simpler RP-based PRF
Ferdinand Sibleyras, Yosuke Todo
2023/1082
Intmax2: A ZK-rollup with Minimal Onchain Data and Computation Costs Featuring Decentralized Aggregators
Erik Rybakken, Leona Hioki, and Mario Yaksetig
2023/1081
ARITHMETIZATION-ORIENTED APN FUNCTIONS
Lilya Budaghyan, Mohit Pal
2023/1080
ACORN-QRE: Specification and Analysis of a Method of Generating Secure One-time Pads for Use in Encryption
Roy S Wikramaratna
2023/1079
Foundations of Data Availability Sampling
Mathias Hall-Andersen, Mark Simkin, and Benedikt Wagner
2023/1078
Bypassing Android isolation with fuel gauges: new risks with advanced power ICs
Vincent Giraud, David Naccache
2023/1077
Taming Adaptivity in YOSO Protocols: The Modular Way
Ran Canetti, Sebastian Kolby, Divya Ravi, Eduardo Soria-Vazquez, Sophia Yakoubov
2023/1076
Non-Interactive Threshold BBS+ From Pseudorandom Correlations
Sebastian Faust, Carmit Hazay, David Kretzler, Leandro Rometsch, and Benjamin Schlosser
2023/1075
Streebog as a Random Oracle
Liliya Akhmetzyanova, Alexandra Babueva, Andrey Bozhko
2023/1074
From MLWE to RLWE: A Differential Fault Attack on Randomized & Deterministic Dilithium
Mohamed ElGhamrawy, Melissa Azouaoui, Olivier Bronchain, Joost Renes, Tobias Schneider, Markus Schönauer, Okan Seker, and Christine van Vredendaal
2023/1073
The Reality of Backdoored S-Boxes - An Eye Opener
Shah Fahd, Mehreen Afzal, Waseem Iqbal, Dawood Shah, Ijaz Khalid
2023/1072
Simple and Practical Amortized Sublinear Private Information Retrieval using Dummy Subsets
Ling Ren, Muhammad Haris Mughees, and Sun I
2023/1071
Fiat-Shamir Security of FRI and Related SNARKs
Alexander R. Block, Albert Garreta, Jonathan Katz, Justin Thaler, Pratyush Ranjan Tiwari, and Michał Zając
2023/1070
Unlinkable Policy-Compliant Signatures for Compliant and Decentralized Anonymous Payments
Christian Badertscher, Mahdi Sedaghat, and Hendrik Waldner
2023/1069
DuckyZip: Provably Honest Global Linking Service
Nadim Kobeissi
2023/1068
Optical Cryptanalysis: Recovering Cryptographic Keys from Power LED Light Fluctuations
Ben Nassi, Ofek Vayner, Etay Iluz, Dudi Nassi, Or Hai Cohen, Jan Jancar, Daniel Genkin, Eran Tromer, Boris Zadov, Yuval Elovici
2023/1067
How to Compile Polynomial IOP into Simulation-Extractable SNARKs: A Modular Approach
Markulf Kohlweiss, Mahak Pancholi, Akira Takahashi
2023/1066
Efficient Arguments and Proofs for Batch Arithmetic Circuit Satisfiability
Jieyi Long
2023/1065
A Note on ``A Lightweight and Privacy-Preserving Mutual Authentication and Key Agreement Protocol for Internet of Drones Environment''
Zhengjun Cao, Lihua Liu
2023/1064
Decoding Quasi-Cyclic codes is NP-complete
Ernesto Dominguez Fiallo, Pablo Freyre Arrozarena, Luis Ramiro Piñeiro
2023/1063
DiStefano: Decentralized Infrastructure for Sharing Trusted Encrypted Facts and Nothing More
Sofía Celi, Alex Davidson, Hamed Haddadi, Gonçalo Pestana, and Joe Rowell
2023/1062
IOPs with Inverse Polynomial Soundness Error
Gal Arnon, Alessandro Chiesa, and Eylon Yogev
2023/1061
BlindPerm: Efficient MEV Mitigation with an Encrypted Mempool and Permutation
Alireza Kavousi, Duc V. Le, Philipp Jovanovic, and George Danezis
2023/1060
Auditable Attribute-Based Credentials Scheme and Its Application in Contact Tracing
Pengfei Wang, Xiangyu Su, Mario Larangeira, and Keisuke Tanaka
2023/1059
Provably Secure Blockchain Protocols from Distributed Proof-of-Deep-Learning
Xiangyu Su, Mario Larangeira, Keisuke Tanaka
2023/1058
Universal Amplification of KDM Security: From 1-Key Circular to Multi-Key KDM
Brent Waters, Daniel Wichs
2023/1057
ZK-for-Z2K: MPC-in-the-Head Zero-Knowledge Proofs for $\mathbb{Z}_{2^k}$
Lennart Braun, Cyprien Delpech de Saint Guilhem, Robin Jadoul, Emmanuela Orsini, Nigel P. Smart, and Titouan Tanguy
2023/1056
DIDO: Data Provenance from Restricted TLS 1.3 Websites
Kwan Yin Chan, Handong Cui, Tsz Hon Yuen
2023/1055
OccPoIs: Points of Interest based on Neural Network's Key Recovery in Side-Channel Analysis through Occlusion
Trevor Yap, Shivam Bhasin, and Stjepan Picek
2023/1054
Quantum Complexity for Discrete Logarithms and Related Problems
Minki Hhan, Takashi Yamakawa, and Aaram Yun
2023/1053
ASMesh: Anonymous and Secure Messaging in Mesh Networks Using Stronger, Anonymous Double Ratchet
Alexander Bienstock, Paul Rösler, and Yi Tang
2023/1052
A quantum algorithm for semidirect discrete logarithm problem on elliptic curves
Muhammad Imran
2023/1051
Automated Analysis of Halo2 Circuits
Fatemeh Heidari Soureshjani, Mathias Hall-Andersen, MohammadMahdi Jahanara, Jeffrey Kam, Jan Gorzny, Mohsen Ahmadvand
2023/1050
SNARGs for Monotone Policy Batch NP
Zvika Brakerski, Maya Farber Brodsky, Yael Tauman Kalai, Alex Lombardi, Omer Paneth
2023/1049
Public-Key Encryption, Local Pseudorandom Generators, and the Low-Degree Method
Andrej Bogdanov, Pravesh Kothari, Alon Rosen
2023/1048
An Algorithm for Persistent Homology Computation Using Homomorphic Encryption
Dominic Gold, Koray Karabina, Francis C. Motta
2023/1047
Private Coin Verifiable Delay Function
Peter Chvojka
2023/1046
Zero-Value Filtering for Accelerating Non-Profiled Side-Channel Attack on Incomplete NTT based Implementations of Lattice-based Cryptography
Tolun Tosun and Erkay Savas
2023/1045
XHash: Efficient STARK-friendly Hash Function
Tomer Ashur, Amit Singh Bhati, Al Kindi, Mohammad Mahzoun, and Léo Perrin
2023/1044
AKE Zoo: 100 two-party protocols (to be continued)
Evgeny Alekseev, Alexandra Babueva, Olga Zazykina
2023/1043
An Analysis of Requirements and Privacy Threats in Mobile Data Donations
Leonie Reichert
2023/1042
A Side-Channel Attack on a Bitsliced Higher-Order Masked CRYSTALS-Kyber Implementation
Ruize Wang, Martin Brisfors, Elena Dubrova
2023/1041
Random Oracle Combiners: Breaking the Concatenation Barrier for Collision-Resistance
Yevgeniy Dodis, Niels Ferguson, Eli Goldin, Peter Hall, Krzysztof Pietrzak
2023/1040
E2E near-standard and practical authenticated transciphering
Ehud Aharoni, Nir Drucker, Gilad Ezov, Eyal Kushnir, Hayim Shaul, and Omri Soceanu
2023/1039
SoK: Privacy-Preserving Signatures
Alishah Chator, Matthew Green, Pratyush Ranjan Tiwari
2023/1038
PQC Cloudization: Rapid Prototyping of Scalable NTT/INTT Architecture to Accelerate Kyber
Mojtaba Bisheh-Niasar, Daniel Lo, Anjana Parthasarathy, Blake Pelton, Bharat Pillilli, Bryan Kelly
2023/1037
ARC-FSM-G: Automatic Security Rule Checking for Finite State Machine at the Netlist Abstraction
Rasheed Kibria, Farimah Farahmandi, Mark Tehranipoor
2023/1036
Reduction of the secret key length in the perfect cipher by data compression and randomisation
Boris Ryabko
2023/1035
Short Signatures from Regular Syndrome Decoding in the Head
Eliana Carozza, Geoffroy Couteau, Antoine Joux
2023/1034
Transaction Fairness in Blockchains, Revisited
Rujia Li, Xuanwei Hu, Qin Wang, Sisi Duan, Qi Wang
2023/1033
OWF Candidates Based on: Xors, Error Detection Codes, Permutations, Polynomials, Interaction and Nesting
Paweł Cyprys, Shlomi Dolev, and Oded Margalit
2023/1032
Zero Knowledge Virtual Machine step by step
Tim Dokchitser, Alexandr Bulkin
2023/1031
Security Analysis of a Color Image Encryption Scheme Based on a Fractional‑Order Hyperchaotic System
George Teseleanu
2023/1030
Depth-Optimized Implementation of ASCON Quantum Circuit
Yujin Oh, Kyungbae Jang, Anubhab Baksi, and Hwajeong Seo
2023/1029
hodlCoin: A Financial Game
Joachim Zahnentferner
2023/1028
Revocable IBE with En-DKER from Lattices: A Novel Approach for Lattice Basis Delegation
Qi Wang, Haodong Huang, Juyan Li, and Qi Yuan
2023/1027
State Machines across Isomorphic Layer 2 Ledgers
Maxim Jourenko, Mario Larangeira
2023/1026
Implementation and performance of a RLWE-based commitment scheme and ZKPoK for its linear and multiplicative relations
Ramiro Martínez, Paz Morillo, Sergi Rovira
2023/1025
Monolith: Circuit-Friendly Hash Functions with New Nonlinear Layers for Fast and Constant-Time Implementations
Lorenzo Grassi, Dmitry Khovratovich, Reinhard Lüftenegger, Christian Rechberger, Markus Schofnegger, and Roman Walch
2023/1024
Timed Secret Sharing
Alireza Kavousi, Aydin Abadi, and Philipp Jovanovic
2023/1023
An STP-based model toward designing S-boxes with good cryptographic properties
Zhenyu Lu, Sihem Mesnager, Tingting Cui, Yanhong Fan, Meiqin Wang
2023/1022
Zombie: Middleboxes that Don’t Snoop
Collin Zhang, Zachary DeStefano, Arasu Arun, Joseph Bonneau, Paul Grubbs, and Michael Walfish
2023/1021
EDEN - a practical, SNARK-friendly combinator VM and ISA
Logan Allen, Brian Klatt, Philip Quirk, Yaseen Shaikh
2023/1020
At Last! A Homomorphic AES Evaluation in Less than 30 Seconds by Means of TFHE
Daphné Trama, Pierre-Emmanuel Clet, Aymen Boudguiga, and Renaud Sirdey
2023/1019
The many faces of Schnorr
Victor Shoup
2023/1018
SDFA: Statistical-Differential Fault Attack on Linear Structured SBox-Based Ciphers
Amit Jana, Anup Kumar Kundu, and Goutam Paul
2023/1017
Stronger Lower Bounds for Leakage-Resilient Secret Sharing
Charlotte Hoffmann and Mark Simkin
2023/1016
Aggregate Signatures with Versatile Randomization and Issuer-Hiding Multi-Authority Anonymous Credentials
Omid Mir, Balthazar Bauer, Scott Griffy, Anna Lysyanskaya, Daniel Slamanig
2023/1015
Fast Unbalanced Private Computing on (Labeled) Set Intersection with Cardinality
Binbin Tu, Xiangling Zhang, Yujie Bai, and Yu Chen
2023/1014
An Efficient Data-Independent Priority Queue and its Application to Dark Pools
Sahar Mazloom, Benjamin E. Diamond, Antigoni Polychroniadou, Tucker Balch
2023/1013
Best of Both Worlds: Revisiting the Spymasters Double Agent Problem
Anasuya Acharya, Carmit Hazay, Oxana Poburinnaya, and Muthuramakrishnan Venkitasubramaniam
2023/1012
Arithmetic Sketching
Dan Boneh, Elette Boyle, Henry Corrigan-Gibbs, Niv Gilboa, Yuval Ishai
2023/1011
A Framework for Statistically Sender Private OT with Optimal Rate
Pedro Branco, Nico Döttling, Akshayaram Srinivasan
2023/1010
End-to-end Privacy Preserving Training and Inference for Air Pollution Forecasting with Data from Rival Fleets
Gauri Gupta, Krithika Ramesh, Anwesh Bhattacharya, Divya Gupta, Rahul Sharma, Nishanth Chandran, Rijurekha Sen
2023/1009
PSI with computation or Circuit-PSI for Unbalanced Sets from Homomorphic Encryption
Yongha Son, Jinhyuck Jeong
2023/1008
Cryptanalysis of rank-metric schemes based on distorted Gabidulin codes
Pierre Briaud, Pierre Loidreau
2023/1007
On Provable White-Box Security in the Strong Incompressibility Model
Estuardo Alpirez Bock, Chris Brzuska, Russell W. F. Lai
2023/1006
Reusable Secure Computation in the Plain Model
Vipul Goyal, Akshayaram Srinivasan, Mingyuan Wang
2023/1005
BLAC: A Blockchain-based Lightweight Access Control Scheme in Vehicular Social Networks
Yuting Zuo, Li Xu, Yuexin Zhang, Chenbin Zhao, Zhaozhe Kang
2023/1004
On the Non-Malleability of ECVRF in the Algebraic Group Model
Willow Barkan-Vered, Franklin Harding, Jonathan Keller, Jiayu Xu
2023/1003
Concurrent Asynchronous Byzantine Agreement in Expected-Constant Rounds, Revisited
Ran Cohen, Pouyan Forghani, Juan Garay, Rutvik Patel, and Vassilis Zikas
2023/1002
Oblivious Transfer from Rerandomizable PKE
Shuaishuai Li, Cong Zhang, Dongdai Lin
2023/1001
Oblivious Accumulators
Foteini Baldimtsi, Ioanna Karantaidou, Srinivasan Raghuraman
2023/1000
Private Timestamps and Selective Verification of Notarised Data on a Blockchain
Enrique Larraia, Owen Vaughan
2023/999
Enforcing Data Geolocation Policies in Public Cloud using Trusted Computing
Syed Zair Abbas, Mudassar Aslam
2023/998
Tiresias: Large Scale, Maliciously Secure Threshold Paillier
Offir Friedman, Avichai Marmor, Dolev Mutzari, Yehonatan C. Scaly, Yuval Spiizer, and Avishay Yanai
2023/997
An extension of Overbeck's attack with an application to cryptanalysis of Twisted Gabidulin-based schemes.
Alain Couvreur, Ilaria Zappatore
2023/996
Publicly Verifiable Zero-Knowledge and Post-Quantum Signatures From VOLE-in-the-Head
Carsten Baum, Lennart Braun, Cyprien Delpech de Saint Guilhem, Michael Klooß, Emmanuela Orsini, Lawrence Roy, Peter Scholl
2023/995
Fast and Frobenius: Rational Isogeny Evaluation over Finite Fields
Gustavo Banegas, Valerie Gilchrist, Anaëlle Le Dévéhat, Benjamin Smith
2023/994
A proposal for quantum GRS algorithm and the cryptanalysis for ROLLO and RQC
Asuka Wakasugi, Mitsuru Tada
2023/993
A note on ``a multi-instance cancelable fingerprint biometric based secure session key agreement protocol employing elliptic curve cryptography and a double hash function''
Zhengjun Cao, Lihua Liu
2023/992
VSS from Distributed ZK Proofs and Applications
Shahla Atapoor, Karim Baghery, Daniele Cozzo, and Robi Pedersen
2023/991
Fast ORAM with Server-aided Preprocessing and Pragmatic Privacy-Efficiency Trade-off
Vladimir Kolesnikov, Stanislav Peceny, Ni Trieu, and Xiao Wang
2023/990
Privacy Preserving Records Sharing using Blockchain and Format Preserving Encryption
Sai Sandilya Konduru, Vishal Saraswat
2023/989
Detection of Password Reuse and Credential Stuffing: A Server-side Approach
Sai Sandilya Konduru, Sweta Mishra
2023/988
On the Hardness of Scheme-Switching Between SIMD FHE Schemes
Karim Eldefrawy, Nicholas Genise, Nathan Manohar
2023/987
Fuzzification-based Feature Selection for Enhanced Website Content Encryption
Mike Wa Nkongolo
2023/986
Efficient Private Multiset ID Protocols
Cong Zhang, Weiran Liu, Bolin Ding, Dongdai Lin
2023/985
On the Two-sided Permutation Inversion Problem
Gorjan Alagic, Chen Bai, Alexander Poremba, and Kaiyan Shi
2023/984
Generating Supersingular Elliptic Curves over $\mathbb{F}_p$ with Unknown Endomorphism Ring
Youcef Mokrani and David Jao
2023/983
Secure Range-Searching Using Copy-And-Recurse
Eyal Kushnir, Guy Moshkowich, and Hayim Shaul
2023/982
On the 32-Character Zodiac Cipher
Floe Foxon
2023/981
Practical and Efficient FHE-based MPC
Nigel P. Smart
2023/980
Trivial Transciphering With Trivium and TFHE
Thibault Balenbois, Jean-Baptiste Orfila, and Nigel P. Smart
2023/979
New Secret Keys for Enhanced Performance in (T)FHE
Loris Bergerat, Ilaria Chillotti, Damien Ligier, Jean-Baptiste Orfila, Adeline Roux-Langlois, and Samuel Tap
2023/978
$\textsf{PAE}$: Towards More Efficient and BBB-secure AE From a Single Public Permutation
Arghya Bhattacharjee, Ritam Bhaumik, Avijit Dutta, Eik List
2023/977
Timed Commitments Revisited
Miguel Ambrona, Marc Beunardeau, Raphaël R. Toledo
2023/976
Updatable Public Key Encryption with Strong CCA Security: Security Analysis and Efficient Generic Construction
Kyoichi Asano and Yohei Watanabe
2023/975
Design of Blockchain-Based Many-to-Many Anonymous Data Sharing Scheme
Esra Günsay, Burcu E. Karakaş, N. Gamze Orhon Kılıç, Oğuz Yayla
2023/974
MuxProofs: Succinct Arguments for Machine Computation from Vector Lookups
Zijing Di, Lucas Xia, Wilson Nguyen, and Nirvan Tyagi
2023/973
Demystifying Just-in-Time (JIT) Liquidity Attacks on Uniswap V3
Xihan Xiong, Zhipeng Wang, William Knottenbelt, and Michael Huth
2023/972
Security of Hybrid Key Establishment using Concatenation
Adam Petcher, Matthew Campagna
2023/971
Defining and Controlling Information Leakage in US Equities Trading
Arthur Americo, Allison Bishop, Paul Cesaretti, Garrison Grogan, Adam McKoy, Robert Moss, Lisa Oakley, Marcel Ribeiro, Mohammad Shokri
2023/970
A Note on Non-Interactive Zero-Knowledge from CDH
Geoffroy Couteau, Abhishek Jain, Zhengzhong Jin, Willy Quach
2023/969
Revisiting the Nova Proof System on a Cycle of Curves
Wilson Nguyen, Dan Boneh, Srinath Setty
2023/968
SALSA VERDE: a machine learning attack on Learning with Errors with sparse small secrets
Cathy Yuanchen Li, Emily Wenger, Zeyuan Allen-Zhu, Francois Charton, and Kristin Lauter
2023/967
SoK: Data Sovereignty
Jens Ernstberger, Jan Lauinger, Fatima Elsheimy, Liyi Zhou, Sebastian Steinhorst, Ran Canetti, Andrew Miller, Arthur Gervais, Dawn Song
2023/966
eLIMInate: a Leakage-focused ISE for Masked Implementation
Hao Cheng, Daniel Page, and Weijia Wang
2023/965
Post-Quantum Secure Over-the-Air Update of Automotive Systems
Joppe W. Bos, Alexander Dima, Alexander Kiening, Joost Renes
2023/964
Lightweight Authentication of Web Data via Garble-Then-Prove
Xiang Xie, Kang Yang, Xiao Wang, and Yu Yu
2023/963
An invariant of the round function of QARMAv2-64
Tim Beyne
2023/962
Access structures induced by polymatroids with extreme rank function
Mieczysław Kula
2023/961
Testudo: Linear Time Prover SNARKs with Constant Size Proofs and Square Root Size Universal Setup
Matteo Campanelli, Nicolas Gailly, Rosario Gennaro, Philipp Jovanovic, Mara Mihali, Justin Thaler
2023/960
Beyond-Full-Round Integral Distinguisher of NIST Lightweight Cryptography Competition Finalist TinyJAMBU
Akram Khalesi, Zahra Ahmadian
2023/959
Randomness Recoverable Secret Sharing Schemes
Mohammad Hajiabadi, Shahram Khazaei, and Behzad Vahdani
2023/958
Faster TFHE Bootstrapping with Block Binary Keys
Changmin Lee, Seonhong Min, Jinyeong Seo, Yongsoo Song
2023/957
BASS: Boolean Automorphisms Signature Scheme
Dima Grigoriev, Ilia Ilmer, Alexey Ovchinnikov, and Vladimir Shpilrain
2023/956
Speculative Denial-of-Service Attacks in Ethereum
Aviv Yaish, Kaihua Qin, Liyi Zhou, Aviv Zohar, and Arthur Gervais
2023/955
Succinct Computational Secret Sharing
Benny Applebaum, Amos Beimel, Yuval Ishai, Eyal Kushilevitz, Tianren Liu, Vinod Vaikuntanathan
2023/954
Zombies and Ghosts: Optimal Byzantine Agreement in the Presence of Omission Faults
Julian Loss and Gilad Stern
2023/953
Towards Generic MPC Compilers via Variable Instruction Set Architectures (VISAs)
Yibin Yang, Stanislav Peceny, David Heath, and Vladimir Kolesnikov
2023/952
Limits on Adaptive Security for Attribute-Based Encryption
Zvika Brakerski and Stav Medina
2023/951
Latency-First Smart Contract: Overclock the Blockchain for a while
Huayi Qi, Minghui Xu, Xiuzhen Cheng, Weifeng Lyu
2023/950
A new approach based on quadratic forms to attack the McEliece cryptosystem
Alain Couvreur, Rocco Mora, and Jean-Pierre Tillich
2023/949
Generalized word-oriented feedback shift registers
Susil Kumar Bishoi
2023/948
Compact Circuits for Efficient Mobius Transform
Subhadeep Banik and Francesco Regazzoni
2023/947
Concrete Security from Worst-Case to Average-Case Lattice Reductions
Joel Gärtner
2023/946
Compressing Encrypted Data Over Small Fields
Nils Fleischhacker, Kasper Green Larsen, Mark Simkin
2023/945
One-Way Functions vs. TFNP: Simpler and Improved
Lukáš Folwarczný, Mika Göös, Pavel Hubáček, Gilbert Maystre, Weiqiang Yuan
2023/944
BALoo: First and Efficient Countermeasure dedicated to Persistent Fault Attacks
Pierre-Antoine Tissot, Lilian Bossuet, Vincent Grosso
2023/943
Correlated-Output Differential Privacy and Applications to Dark Pools
James Hsin-yu Chiang, Bernardo David, Mariana Gama, and Christian Janos Lebeda
2023/942
Proactive Secret Sharing with Constant Communication
Brett Hemenway Falk, Daniel Noble, Tal Rabin
2023/941
Constant Input Attribute Based (and Predicate) Encryption from Evasive and Tensor LWE
Shweta Agrawal, Melissa Rossi, Anshu Yadav, and Shota Yamada
2023/940
CryptAttackTester: high-assurance attack analysis
Daniel J. Bernstein and Tung Chou
2023/939
Speeding up elliptic computations for Ethereum Account Abstraction
Renaud Dubois
2023/938
Musketeer: Incentive-Compatible Rebalancing for Payment Channel Networks
Zeta Avarikioti, Stefan Schmid, Samarth Tiwari
2023/937
WESP: An encryption method that, as the key size increases, require an exponentially growing time to break
Sam Widlund
2023/936
Conditional Cube Key Recovery Attack on Round-Reduced Xoodyak
Mohammad Vaziri, Vesselin Velichkov
2023/935
Stealthy Logic Misuse for Power Analysis Attacks in Multi-Tenant FPGAs (Extended Version)
Vincent Meyers, Dennis R. E. Gnad, Nguyen Minh Dang, Falk Schellenberg, Amir Moradi, Mehdi B. Tahoori
2023/934
To Pass or Not to Pass: Privacy-Preserving Physical Access Control
Jesús García-Rodríguez, Stephan Krenn, Daniel Slamanig
2023/933
More Efficient Post-Quantum Electronic Voting from NTRU
Patrick Hough, Caroline Sandsbråten, and Tjerand Silde
2023/932
On the (Im)possibility of Time-Lock Puzzles in the Quantum Random Oracle Model
Abtin Afshar, Kai-Min Chung, Yao-Ching Hsieh, Yao-Ting Lin, Mohammad Mahmoody
2023/931
Compact Identity Based Encryption Based on n^{th} - Residuosity Assumption
Sree Vivek S, S. Sharmila Deva Selvi, Ramarathnam Venkatesan, C. Pandu Rangan
2023/930
Lattice-Based Succinct Arguments for NP with Polylogarithmic-Time Verification
Jonathan Bootle, Alessandro Chiesa, Katerina Sotiraki
2023/929
The QARMAv2 Family of Tweakable Block Ciphers
Roberto Avanzi, Subhadeep Banik, Orr Dunkelman, Maria Eichlseder, Shibam Ghosh, Marcel Nageler, and Francesco Regazzoni
2023/928
On vectorial functions mapping strict affine subspaces of their domain into strict affine subspaces of their co-domain, and the strong D-property
Claude Carlet and Enrico Piccione
2023/927
Collision Entropy Estimation in a One-Line Formula
Alessandro Gecchele
2023/926
Analysis of the security of the PSSI problem and cryptanalysis of the Durandal signature scheme
Nicolas Aragon, Victor Dyseryn, Philippe Gaborit
2023/925
Homomorphic Indistinguishability Obfuscation and its Applications
Kaartik Bhushan, Venkata Koppula, Manoj Prabhakaran
2023/924
Generalized Initialization of the Duplex Construction
Christoph Dobraunig, Bart Mennink
2023/923
Video-Based Cryptanalysis: Extracting Cryptographic Keys from Video Footage of a Device’s Power LED
Ben Nassi, Etay Iluz, Or Cohen, Ofek Vayner, Dudi Nassi, Boris Zadov, Yuval Elovici
2023/922
mR$_{\text{LWE}}$-CP-ABE a revocable CP-ABE for Post-Quantum Cryptography
Marco Cianfriglia, Elia Onofri, Marco Pedicini
2023/921
Efficient Card-Based Millionaires' Protocols via Non-Binary Input Encoding
Koji Nuida
2023/920
Beware Your Standard Cells! On Their Role in Static Power Side-Channel Attacks
Jitendra Bhandari, Likhitha Mankali, Mohammed Nabeel, Ozgur Sinanoglu, Ramesh Karri, and Johann Knechtel
2023/919
Threshold Private Set Intersection with Better Communication Complexity
Satrajit Ghosh, Mark Simkin
2023/918
Invertible Bloom Lookup Tables with Less Memory and Randomness
Nils Fleischhacker, Kasper Green Larsen, Maciej Obremski, Mark Simkin
2023/917
Zeromorph: Zero-Knowledge Multilinear-Evaluation Proofs from Homomorphic Univariate Commitments
Tohru Kohrita and Patrick Towa
2023/916
Unlinkability and Interoperability in Account-Based Universal Payment Channels
Mohsen Minaei, Panagiotis Chatzigiannis, Shan Jin, Srinivasan Raghuraman, Ranjit Kumaresan, Mahdi Zamani, Pedro Moreno-Sanchez
2023/915
Attribute-based Single Sign-On: Secure, Private, and Efficient
Tore Kasper Frederiksen, Julia Hesse, Bertram Poettering, Patrick Towa
2023/914
Limits in the Provable Security of ECDSA Signatures
Dominik Hartmann, Eike Kiltz
2023/913
Hidden Stream Ciphers and TMTO Attacks on TLS 1.3, DTLS 1.3, QUIC, and Signal
John Preuß Mattsson
2023/912
Randomness of random in Cisco ASA
Ryad Benadjila, Arnaud Ebalard
2023/911
General Results of Linear Approximations over Finite Abelian Groups
Zhongfeng Niu, Siwei Sun, Hailun Yan, Qi Wang
2023/910
Amortized Functional Bootstrapping in less than 7ms, with $\tilde{O}(1)$ polynomial multiplications
Zeyu Liu and Yunhao Wang
2023/909
Efficient 3PC for Binary Circuits with Application to Maliciously-Secure DNN Inference
Yun Li, Yufei Duan, Zhicong Huang, Cheng Hong, Chao Zhang, Yifan Song
2023/908
A Hardware-Software Co-Design for the Discrete Gaussian Sampling of FALCON Digital Signature
Emre Karabulut, Aydin Aysu
2023/907
Efficient Zero Knowledge for Regular Language
Michael Raymond, Gillian Evers, Jan Ponti, Diya Krishnan, and Xiang Fu
2023/906
Optimal Broadcast Encryption and CP-ABE from Evasive Lattice Assumptions
Hoeteck Wee
2023/905
$\mathsf{zkSaaS}$: Zero-Knowledge SNARKs as a Service
Sanjam Garg, Aarushi Goel, Abhishek Jain, Guru-Vamsi Policharla, Sruthi Sekar
2023/904
Pseudorandom Strings from Pseudorandom Quantum States
Prabhanjan Ananth, Yao-Ting Lin, and Henry Yuen
2023/903
Near-Optimal Oblivious Key-Value Stores for Efficient PSI, PSU and Volume-Hiding Multi-Maps
Alexander Bienstock, Sarvar Patel, Joon Young Seo, Kevin Yeo
2023/902
SublonK: Sublinear Prover PlonK
Arka Rai Choudhuri, Sanjam Garg, Aarushi Goel, Sruthi Sekar, Rohit Sinha
2023/901
Secure Multiparty Computation with Free Branching
Aarushi Goel, Mathias Hall-Andersen, Aditya Hegde, Abhishek Jain
2023/900
What If Alice Wants Her Story Told?
Anindya Bhandari, Allison Bishop
2023/899
Practical Schnorr Threshold Signatures Without the Algebraic Group Model
Hien Chu, Paul Gerhart, Tim Ruffing, and Dominique Schröder
2023/898
Leaking-Cascade: an Optimal Construction for KEM Hybridization
Céline Chevalier, Guirec Lebrun, and Ange Martinelli
2023/897
On the Impossibility of Algebraic NIZK In Pairing-Free Groups
Emanuele Giunta
2023/896
Improved Gadgets for the High-Order Masking of Dilithium
Jean-Sébastien Coron, François Gérard, Matthias Trannoy, and Rina Zeitoun
2023/895
ModHE: Modular Homomorphic Encryption Using Module Lattices: Potentials and Limitations
Anisha Mukherjee, Aikata Aikata, Ahmet Can Mert, Yongwoo Lee, Sunmin Kwon, Maxim Deryabin, and Sujoy Sinha Roy
2023/894
Differentially Private Selection from Secure Distributed Computing
Ivan Damgård, Hannah Keller, Boel Nelson, Claudio Orlandi, Rasmus Pagh
2023/893
Diversity Algorithms for Laser Fault Injection
Marina Krček and Thomas Ordas
2023/892
Suboptimality in DeFi
Aviv Yaish, Maya Dotan, Kaihua Qin, Aviv Zohar, and Arthur Gervais
2023/891
When is Slower Block Propagation More Profitable for Large Miners?
Zhichun Lu, Ren Zhang
2023/890
Efficient Evaluation of Frequency Test for Overlapping Vectors Statistic
Krzysztof MAŃK
2023/889
A note on ``LAKAF: lightweight authentication and key agreement framework for smart grid network''
Zhengjun Cao, Lihua Liu
2023/888
Further results on several classes of optimal ternary cyclic codes with minimum distance four
Qian Liu, Xiaobei Dong, Ximeng Liu, Jian Zou
2023/887
Pairwise and Parallel: Enhancing the Key Mismatch Attacks on Kyber and Beyond
Mingyao Shao, Yuejun Liu, Yongbin Zhou
2023/886
Reductions from module lattices to free module lattices, and application to dequantizing module-LLL
Gabrielle De Micheli, Daniele Micciancio, Alice Pellet-Mary, Nam Tran
2023/885
Vectorized and Parallel Computation of Large Smooth-Degree Isogenies using Precedence-Constrained Scheduling
Kittiphon Phalakarn, Vorapong Suppakitpaisarn, Francisco Rodríguez-Henríquez, M. Anwar Hasan
2023/884
Near Collision Attack Against Grain v1
Subhadeep Banik, Daniel Collins, Willi Meier
2023/883
Prouff & Rivain’s Formal Security Proof of Masking, Revisited: Tight Bounds in the Noisy Leakage Model
Loïc Masure and François-Xavier Standaert
2023/882
Expand-Convolute Codes for Pseudorandom Correlation Generators from LPN
Srinivasan Raghuraman, Peter Rindal, Titouan Tanguy
2023/881
Strict Linear Lookup Argument
Xiang Fu
2023/880
On Active Attack Detection in Messaging with Immediate Decryption
Khashayar Barooti, Daniel Collins, Simone Colombo, Loı̈s Huguenin-Dumittan, and Serge Vaudenay
2023/879
On cubic-like bent Boolean functions
Claude Carlet and Irene Villa
2023/878
Introducing two Low-Latency Cipher Families: Sonic and SuperSonic
Yanis Belkheyar, Joan Daemen, Christoph Dobraunig, Santosh Ghosh, Shahram Rasoolzadeh
2023/877
Public-Key Encryption with Quantum Keys
Khashayar Barooti, Alex B. Grilo, Loïs Huguenin-Dumittan, Giulio Malavolta, Or Sattath, Quoc-Huy Vu, and Michael Walter
2023/876
Circular Multiplicative Modular Exponentiation: A New Public Key Exchange Algorithm
Michele Fabbrini
2023/875
The Power of Undirected Rewindings for Adaptive Security
Dennis Hofheinz, Julia Kastner, and Karen Klein
2023/874
Distributed Broadcast Encryption from Bilinear Groups
Dimitris Kolonelos, Giulio Malavolta, and Hoeteck Wee
2023/873
Digital signature schemes using non-square matrices or scrap automorphisms
Jiale Chen, Dima Grigoriev, Vladimir Shpilrain
2023/872
Conjunctive Searchable Symmetric Encryption from Hard Lattices
Debadrita Talapatra, Sikhar Patranabis, and Debdeep Mukhopadhyay
2023/871
Improved Multi-User Security Using the Squared-Ratio Method
Yu Long Chen, Wonseok Choi, Changmin Lee
2023/870
Additive Randomized Encodings and Their Applications
Shai Halevi, Yuval Ishai, Eyal Kushilevitz, Tal Rabin
2023/869
UniPlonk: Plonk with Universal Verifier
Shumo Chu, Brandon H. Gomes, Francisco Hernandez Iglesias, Todd Norton, Duncan Tebbs
2023/868
Data Independent Order Policy Enforcement: Limitations and Solutions
Sarisht Wadhwa, Luca Zanolini, Francesco D'Amato, Aditya Asgaonkar, Chengrui Fang, Fan Zhang, and Kartik Nayak
2023/867
Secure Logging in between Theory and Practice: Security Analysis of the Implementation of Forward Secure Log Sealing in Journald
Felix Dörre, Astrid Ottenhues
2023/866
Decoding LTFs in the Generic Group Model
Dennis Hofheinz, Julia Kastner, Akin Ünal, Bogdan Ursu
2023/865
A Closer Look at the S-box: Deeper Analysis of Round-Reduced ASCON-HASH
Xiaorui Yu, Fukang Liu, Gaoli Wang, Siwei Sun, Willi Meier
2023/864
Compact Selective Opening Security From LWE
Dennis Hofheinz, Kristina Hostáková, Julia Kastner, Karen Klein, and Akin Ünal
2023/863
On the (Im)possibility of Distributed Samplers: Lower Bounds and Party-Dynamic Constructions
Damiano Abram, Maciej Obremski, and Peter Scholl
2023/862
Tighter QCCA-Secure Key Encapsulation Mechanism with Explicit Rejection in the Quantum Random Oracle Model
Jiangxia Ge, Tianshu Shan, Rui Xue
2023/861
When Messages are Keys: Is HMAC a dual-PRF?
Matilda Backendal, Mihir Bellare, Felix Günther, Matteo Scarlata
2023/860
Security-Preserving Distributed Samplers: How to Generate any CRS in One Round without Random Oracles
Damiano Abram, Brent Waters, Mark Zhandry
2023/859
Cutting the GRASS: Threshold GRoup Action Signature Schemes
Michele Battagliola, Giacomo Borin, Alessio Meneghetti, and Edoardo Persichetti
2023/858
Effective Pairings in Isogeny-based Cryptography
Krijn Reijnders
2023/857
SoK: Vector OLE-Based Zero-Knowledge Protocols
Carsten Baum, Samuel Dittmer, Peter Scholl, Xiao Wang
2023/856
The Query-Complexity of Preprocessing Attacks
Ashrujit Ghoshal, Stefano Tessaro
2023/855
$\mathsf{Mercury}$: Constant-Round Protocols for Multi-Party Computation with Rationals
Luke Harmon and Gaetan Delavignette
2023/854
On Optimal Tightness for Key Exchange with Full Forward Secrecy via Key Confirmation
Kai Gellert, Kristian Gjøsteen, Håkon Jacobsen, and Tibor Jager
2023/853
How to Bind Anonymous Credentials to Humans
Julia Hesse, Nitin Singh, Alessandro Sorniotti
2023/852
Revisiting Oblivious Top-$k$ Selection with Applications to Secure $k$-NN Classification
Kelong Cong, Robin Geelen, Jiayi Kang, and Jeongeun Park
2023/851
Advancing the Meet-in-the-Filter Technique: Applications to CHAM and KATAN
Alex Biryukov, Je Sen Teh, and Aleksei Udovenko
2023/850
Revisiting the Constant-sum Winternitz One-time Signature with Applications to SPHINCS+ and XMSS
Kaiyi Zhang, Hongrui Cui, Yu Yu
2023/849
Towards Topology-Hiding Computation from Oblivious Transfer
Marshall Ball, Alexander Bienstock, Lisa Kohl, and Pierre Meyer
2023/848
Extending Updatable Encryption: Public Key, Tighter Security and Signed Ciphertexts
Chen Qian, Yao Jiang Galteland, Gareth T. Davies
2023/847
A New Formulation of the Linear Equivalence Problem and Shorter LESS Signatures
Edoardo Persichetti and Paolo Santini
2023/846
Lattice-Based Polynomial Commitments: Towards Asymptotic and Concrete Efficiency
Giacomo Fenzi, Hossein Moghaddas, and Ngoc Khanh Nguyen
2023/845
Correlated Pseudorandomness from the Hardness of Quasi-Abelian Decoding
Maxime Bombar, Geoffroy Couteau, Alain Couvreur, Clément Ducros
2023/844
Inferring Bivariate Polynomials for Homomorphic Encryption Application
Diana Maimut, George Teseleanu
2023/843
Security Analysis of the WhatsApp End-to-End Encrypted Backup Protocol
Gareth T. Davies, Sebastian Faller, Kai Gellert, Tobias Handirk, Julia Hesse, Máté Horváth, Tibor Jager
2023/842
Advanced Composition Theorems for Differential Obliviousness
Mingxun Zhou, Mengshi Zhao, T-H. Hubert Chan, and Elaine Shi
2023/841
The curious case of the half-half Bitcoin ECDSA nonces
Dylan Rowe, Joachim Breitner, Nadia Heninger
2023/840
Revisiting the Indifferentiability of the Sum of Permutations
Aldo Gunsing, Ritam Bhaumik, Ashwin Jha, Bart Mennink, Yaobin Shen
2023/839
On Linear Communication Complexity for (Maximally) Fluid MPC
Alexander Bienstock, Daniel Escudero, Antigoni Polychroniadou
2023/838
How to Recover a Secret with O(n) Additions
Benny Applebaum, Oded Nir, and Benny Pinkas
2023/837
Faster coercion-resistant e-voting by encrypted sorting
Diego F. Aranha, Michele Battagliola, Lawrence Roy
2023/836
Covercrypt: an Efficient Early-Abort KEM for Hidden Access Policies with Traceability from the DDH and LWE
Théophile Brézot, Paola de Perthuis, and David Pointcheval
2023/835
Unifying Freedom and Separation for Tight Probing-Secure Composition
Sonia Belaïd, Gaëtan Cassiers, Matthieu Rivain, Abdul Rahman Taleb
2023/834
Discrete Logarithm Factory
Haetham AL ASWAD, Cécile PIERROT, and Emmanuel THOMÉ
2023/833
Anonymous, Timed and Revocable Proxy Signatures
Ghada Almashaqbeh and Anca Nitulescu
2023/832
Unstoppable Wallets: Chain-assisted Threshold ECDSA and its Applications
Guy Zyskind, Avishay Yanai, Alex "Sandy" Pentland
2023/831
Automated Generation of Masked Nonlinear Components: From Lookup Tables to Private Circuits
Lixuan Wu, Yanhong Fan, Bart Preneel, Weijia Wang, Meiqin Wang
2023/830
HPPC: Hidden Product of Polynomial Composition
Borja Gomez Rodriguez
2023/829
TGh: A TEE/GC Hybrid Enabling Confidential FaaS Platforms
James Choncholas, Ketan Bhardwaj, Ada Gavrilovska
2023/828
Optimized Discrete Logarithm Computation for Faster Square Roots in Finite Fields
Thomas Pornin
2023/827
On Concurrent Multi-Party Quantum Computation
Vipul Goyal, Xiao Liang, Giulio Malavolta
2023/826
Ring/Module Learning with Errors under Linear Leakage -- Hardness and Applications
Zhedong Wang, Qiqi Lai, and Feng-Hao Liu
2023/825
Oblivious Identity-based Encryption (IBE Secure Against an Adversarial KGC)
Katerina Mitrokotsa, Sayantan Mukherjee, Jenit Tomy
2023/824
Reed-Solomon Codes over the Circle Group
Ulrich Haböck, Daniel Lubarov, Jacqueline Nabaglo
2023/823
Lattice-based Authenticated Key Exchange with Tight Security
Jiaxin Pan, Benedikt Wagner, Runzhi Zeng
2023/822
Cryptanalysis of Symmetric Primitives over Rings and a Key Recovery Attack on Rubato
Lorenzo Grassi, Irati Manterola Ayala, Martha Norberg Hovd, Morten Øygarden, Håvard Raddum, Qingju Wang
2023/821
Securing IoT Devices with Fast and Energy Efficient Implementation of PRIDE and PRESENT Ciphers
Vijay Dahiphale, Hrishikesh Raut, Gaurav Bansod, and Devendra Dahiphale
2023/820
Network Agnostic MPC with Statistical Security
Ananya Appan, Ashish Choudhury
2023/819
NNBits: Bit Profiling with a Deep Learning Ensemble Based Distinguisher
Anna Hambitzer, David Gerault, Yun Ju Huang, Najwa Aaraj, Emanuele Bellini
2023/818
Generalized Special-Sound Interactive Proofs and their Knowledge Soundness
Thomas Attema, Serge Fehr, and Nicolas Resch
2023/817
Oblivious Transfer with Constant Computational Overhead
Elette Boyle, Geoffroy Couteau, Niv Gilboa, Yuval Ishai, Lisa Kohl, Nicolas Resch, Peter Scholl
2023/816
Simplified Modeling of MITM Attacks for Block Ciphers: new (Quantum) Attacks
André Schrottenloher and Marc Stevens
2023/815
Noah's Ark: Efficient Threshold-FHE Using Noise Flooding
Morten Dahl, Daniel Demmler, Sarah El Kazdadi, Arthur Meyre, Jean-Baptiste Orfila, Dragos Rotaru, Nigel P. Smart, Samuel Tap, and Michael Walter
2023/814
A Note on ``Privacy-Preserving Multi-Keyword Searchable Encryption for Distributed Systems''
Zhengjun Cao, Lihua Liu
2023/813
Bayesian Leakage Analysis: A Framework for Analyzing Leakage in Encrypted Search
Seny Kamara, Tarik Moataz
2023/812
How to Use (Plain) Witness Encryption: Registered ABE, Flexible Broadcast, and More
Cody Freitag, Brent Waters, David J. Wu
2023/811
Limits of Breach-Resistant and Snapshot-Oblivious RAMs
Giuseppe Persiano, Kevin Yeo
2023/810
MAPLE: MArkov Process Leakage attacks on Encrypted Search
Seny Kamara, Abdelkarim Kati, Tarik Moataz, Jamie DeMaria, Andrew Park, Amos Treiber
2023/809
Password-Based Credentials with Security against Server Compromise
Dennis Dayanikli, Anja Lehmann
2023/808
Generic-Group Lower Bounds via Reductions Between Geometric-Search Problems: With and Without Preprocessing
Benedikt Auerbach, Charlotte Hoffmann, and Guillermo Pascual-Perez
2023/807
Ready to SQI? Safety First! Towards a constant-time implementation of isogeny-based signature, SQIsign
David Jacquemin, Anisha Mukherjee, Péter Kutas, and Sujoy SINHA ROY
2023/806
SNACKs for Proof-of-Space Blockchains
Hamza Abusalah
2023/805
New Bounds on the Local Leakage Resilience of Shamir's Secret Sharing Scheme
Ohad Klein, Ilan Komargodski
2023/804
Falkor: Federated Learning Secure Aggregation Powered by AES-CTR GPU Implementation
Mariya Georgieva Belorgey, Sofia Dandjee, Nicolas Gama, Dimitar Jetchev, Dmitry Mikushin
2023/803
"Tesla Cryptography:" Powering Up Security with Other Than Mathematical Complexity
Gideon Samid
2023/802
Constant-Round Arguments from One-Way Functions
Noga Amit, Guy Rothblum
2023/801
We Are on the Same Side. Alternative Sieving Strategies for the Number Field Sieve
Charles Bouillaguet, Ambroise Fleury, Pierre-Alain Fouque, Paul Kirchner
2023/800
Vector Commitments With Proofs of Smallness: Short Range Proofs and More
Benoit Libert
2023/799
Twin Column Parity Mixers and Gaston - A New Mixing Layer and Permutation
Solane El Hirch, Joan Daemen, Raghvendra Rohit, Rusydi H. Makarim
2023/798
Generalized Hybrid Search and Applications
Alexandru Cojocaru, Juan Garay, and Fang Song
2023/797
Entropy Suffices for Guessing Most Keys
Timo Glaser, Alexander May, and Julian Nowakowski
2023/796
Generic Security of the Ascon Mode: On the Power of Key Blinding
Charlotte Lefevre and Bart Mennink
2023/795
Bit-Security Preserving Hardness Amplification
Shun Watanabe and Kenji Yasunaga
2023/794
Areion: Highly-Efficient Permutations and Its Applications (Extended Version)
Takanori Isobe, Ryoma Ito, Fukang Liu, Kazuhiko Minematsu, Motoki Nakahashi, Kosei Sakamoto, and Rentaro Shiba
2023/793
Optimizations and Practicality of High-Security CSIDH
Fabio Campos, Jorge Chavez-Saab, Jesús-Javier Chi-Domínguez, Michael Meyer, Krijn Reijnders, Francisco Rodríguez-Henríquez, Peter Schwabe, and Thom Wiggers
2023/792
On the Fujisaki-Okamoto transform: from Classical CCA Security to Quantum CCA Security
Jiangxia Ge, Tianshu Shan, Rui Xue
2023/791
New SIDH Countermeasures for a More Efficient Key Exchange
Andrea Basso and Tako Boris Fouotsa
2023/790
Optimally Secure Tweakable Block Ciphers with a Large Tweak from n-bit Block Ciphers
Yaobin Shen, François-Xavier Standaert
2023/789
Where are the constants? New Insights On The Role of Round Constant Addition in The SymSum Distinguisher
Sahiba Suryawanshi, Dhiman Saha
2023/787
Private Proof-of-Stake Blockchains using Differentially-private Stake Distortion
Chenghong Wang, David Pujo, Kartik Nayak, Ashwin Machanavajjhala
2023/786
Blockchain Transaction Censorship: (In)secure and (In)efficient?
Zhipeng Wang, Xihan Xiong, William J. Knottenbelt
2023/785
Generation of two ''independent'' points on an elliptic curve of $j$-invariant $\neq 0, 1728$
Dmitrii Koshelev
2023/784
History-Free Sequential Aggregation of Hash-and-Sign Signatures
Alessio Meneghetti and Edoardo Signorini
2023/783
Breaking the power-of-two barrier: noise estimation for BGV in NTT-friendly rings
Andrea Di Giusto and Chiara Marcolla
2023/782
Coefficient Grouping for Complex Affine Layers
Fukang Liu, Lorenzo Grassi, Clémence Bouvier, Willi Meier, Takanori Isobe
2023/781
$\mathsf{Skye}$: An Expanding PRF based Fast KDF and its Applications
Amit Singh Bhati, Antonin Dufka, Elena Andreeva, Arnab Roy, and Bart Preneel
2023/780
An Anonymous Multireceiver Hybrid Signcryption for Broadcast Communication
Alia Umrani, Apurva K Vangujar, and Paolo Palmieri
2023/779
Hidden Stabilizers, the Isogeny To Endomorphism Ring Problem and the Cryptanalysis of pSIDH
Mingjie Chen, Muhammad Imran, Gábor Ivanyos, Péter Kutas, Antonin Leroux, and Christophe Petit
2023/778
Bounded Verification for Finite-Field-Blasting (In a Compiler for Zero Knowledge Proofs)
Alex Ozdemir, Riad S. Wahby, Fraser Brown, Clark Barrett
2023/777
Too Many Hints - When LLL Breaks LWE
Alexander May and Julian Nowakowski
2023/776
Quantum Attacks on Type-1 Generalized Feistel Schemes
Hong-Wei Sun, Bin-Bin Cai, Su-Juan Qin, Qiao-Yan Wen, Fei Gao
2023/775
Exact Security Analysis of ASCON
Bishwajit Chakraborty, Chandranan Dhar, and Mridul Nandi
2023/774
Tagged Chameleon Hash from Lattices and Application to Redactable Blockchain
Yiming Li and Shengli Liu
2023/773
An update on Keccak performance on ARMv7-M
Alexandre Adomnicai
2023/772
Classical and Quantum Meet-in-the-Middle Nostradamus Attacks on AES-like Hashing
Zhiyu Zhang, Siwei Sun, Caibing Wang, Lei Hu
2023/771
Revisiting Key Decomposition Techniques for FHE: Simpler, Faster and More Generic
Mariya Georgieva Belorgey, Sergiu Carpov, Nicolas Gama, Sandra Guasch, and Dimitar Jetchev
2023/770
Towards compressed permutation oracles
Dominique Unruh
2023/769
Brakedown's expander code
Ulrich Haböck
2023/768
Owl: An Augmented Password-Authenticated Key Exchange Scheme
Feng Hao, Samiran Bag, Liqun Chen, and Paul C. van Oorschot
2023/767
LFHE: Fully Homomorphic Encryption with Bootstrapping Key Size Less than a Megabyte
Andrey Kim, Yongwoo Lee, Maxim Deryabin, Jieun Eom, Rakyong Choi
2023/766
Lattice-based Commit-Transferrable Signatures and Applications to Anonymous Credentials
Qiqi Lai, Chongshen Chen, Feng-Hao Liu, Anna Lysyanskaya, and Zhedong Wang
2023/765
Threshold ECDSA in Three Rounds
Jack Doerner, Yashvanth Kondi, Eysa Lee, and abhi shelat
2023/764
Subversion-Resilient Authenticated Encryption without Random Oracles
Pascal Bemmann, Sebastian Berndt, Denis Diemert, Thomas Eisenbarth, Tibor Jager
2023/763
Undetectable Watermarks for Language Models
Miranda Christ, Sam Gunn, Or Zamir
2023/762
How to Design Fair Protocols in the Multi-Blockchain Setting
Sivanarayana Gaddam, Ranjit Kumaresan, Srinivasan Raghuraman, Rohit Sinha
2023/761
Nimble: Rollback Protection for Confidential Cloud Services (extended version)
Sebastian Angel, Aditya Basu, Weidong Cui, Trent Jaeger, Stella Lau, Srinath Setty, Sudheesh Singanamalla
2023/760
Time to Bribe: Measuring Block Construction Market
Anton Wahrstätter, Liyi Zhou, Kaihua Qin, Davor Svetinovic, Arthur Gervais
2023/759
Efficient TFHE Bootstrapping in the Multiparty Setting
Jeongeun Park and Sergi Rovira
2023/758
Scaling Mobile Private Contact Discovery to Billions of Users
Laura Hetz, Thomas Schneider, and Christian Weinert
2023/757
A Note on ``On the Design of Mutual Authentication and Key Agreement Protocol in Internet of Vehicles-Enabled Intelligent Transportation System''
Zhengjun Cao, Lihua Liu
2023/756
SDitH in the QROM
Carlos Aguilar-Melchor, Andreas Hülsing, David Joseph, Christian Majenz, Eyal Ronen, and Dongze Yue
2023/755
The security of Kyber's FO-transform
Manuel Barbosa, Andreas Hülsing
2023/754
Batch Proofs are Statistically Hiding
Nir Bitansky, Chethan Kamath, Omer Paneth, Ron Rothblum, and Prashant Nalini Vasudevan
2023/753
A Faster Software Implementation of SQISign
Kaizhan Lin, Weize Wang, Zheng Xu, and Chang-An Zhao
2023/752
Schnorr protocol in Jasmin
José Bacelar Almeida, Denis Firsov, Tiago Oliveira, Dominique Unruh
2023/751
Scalable Agreement Protocols with Optimal Optimistic Efficiency
Yuval Gelles and Ilan Komargodski
2023/750
BAKSHEESH: Similar Yet Different From GIFT
Anubhab Baksi, Jakub Breier, Anupam Chattopadhyay, Tomáš Gerlich, Sylvain Guilley, Naina Gupta, Takanori Isobe, Arpan Jati, Petr Jedlicka, Hyunjun Kim, Fukang Liu, Zdeněk Martinásek, Kosei Sakamoto, Hwajeong Seo, Rentaro Shiba, Ritu Ranjan Shrivastwa
2023/749
Note on Subversion-Resilient Key Exchange
Magnus Ringerud
2023/748
Towards the Links of Cryptanalytic Methods on MPC/FHE/ZK-Friendly Symmetric-Key Primitives
Shiyao Chen, Chun Guo, Jian Guo, Li Liu, Meiqin Wang, Puwen Wei, Zeyu Xu
2023/747
Key-Range Attribute-Based Signatures for Range of Inner Product and Its Applications
Masahito Ishizaka
2023/746
Homomorphic Signatures for Subset and Superset Mixed Predicates and Its Applications
Masahito Ishizaka, Kazuhide Fukushima
2023/745
PSI from ring-OLE
Wutichai Chongchitmate, Yuval Ishai, Steve Lu, Rafail Ostrovsky
2023/744
On Extremal Algebraic Graphs and implementations of new cubic Multivariate Public Keys
Vasyl Ustimenko, Tymoteusz Chojecki, Michal Klisowski
2023/743
On Sustainable Ring-based Anonymous Systems
Sherman S. M. Chow, Christoph Egger, Russell W. F. Lai, Viktoria Ronge, Ivy K. Y. Woo
2023/742
Finding Desirable Substitution Box with SASQUATCH
Manas Wadhwa, Anubhab Baksi, Kai Hu, Anupam Chattopadhyay, Takanori Isobe, Dhiman Saha
2023/741
The Referendum Problem in Anonymous Voting for Decentralized Autonomous Organizations
Artem Grigor, Vincenzo Iovino, Giuseppe Visconti
2023/740
Practical Robust DKG Protocols for CSIDH
Shahla Atapoor, Karim Baghery, Daniele Cozzo, Robi Pedersen
2023/739
SMAUG: Pushing Lattice-based Key Encapsulation Mechanisms to the Limits
Jung Hee Cheon, Hyeongmin Choe, Dongyeon Hong, and MinJune Yi
2023/738
Extremal algebraic graphs, quadratic multivariate public keys and temporal rules
Vasyl Ustimenko, Aneta Wróblewska
2023/737
Differential properties of integer multiplication
Koustabh Ghosh, Joan Daemen
2023/736
Private Eyes: Zero-Leakage Iris Searchable Encryption
Julie Ha, Chloe Cachet, Luke Demarest, Sohaib Ahmad, and Benjamin Fuller
2023/735
Towards a Privacy-preserving Attestation for Virtualized Networks
Ghada Arfaoui, Thibaut Jacques, Marc Lacoste, Cristina Onete, and Léo Robert
2023/734
TLS → Post-Quantum TLS: Inspecting the TLS landscape for PQC adoption on Android
Dimitri Mankowski, Thom Wiggers, Veelasha Moonsamy
2023/733
On implemented graph based generator of cryptographically strong pseudorandom sequences of multivariate nature
Vasyl Ustimenko, Tymoteusz Chojecki
2023/732
VerifMSI: Practical Verification of Hardware and Software Masking Schemes Implementations
Quentin L. Meunier, Abdul Rahman Taleb
2023/731
Fast Exhaustive Search for Polynomial Systems over F3
Bo-Yin Yang, Wei-Jeng Wang, Shang-Yi Yang, Char-Shin Miou, Chen-Mou Cheng
2023/730
The Problem of Half Round Key XOR
Anubhab Baksi
2023/729
Compact Lattice Gadget and Its Applications to Hash-and-Sign Signatures
Yang Yu, Huiwen Jia, Xiaoyun Wang
2023/728
SoK: Distributed Randomness Beacons
Kevin Choi, Aathira Manoj, Joseph Bonneau
2023/727
Safeguarding Physical Sneaker Sale Through a Decentralized Medium
Marwan Zeggari, Aydin Abadi, Renaud Lambiotte, Mohamad Kassab
2023/726
A Note on ``A Secure Anonymous D2D Mutual Authentication and Key Agreement Protocol for IoT''
Zhengjun Cao, Lihua Liu
2023/725
On Perfect Linear Approximations and Differentials over Two-Round SPNs
Christof Beierle, Patrick Felke, Gregor Leander, Patrick Neumann, Lukas Stennes
2023/724
Not so Difficult in the End: Breaking the Lookup Table-based Affine Masking Scheme
Lichao Wu, Guilherme Perin, and Stjepan Picek
2023/723
Non-Interactive Commitment from Non-Transitive Group Actions
Giuseppe D'Alconzo, Andrea Flamini, and Andrea Gangemi
2023/722
Composing Bridges
Mugurel Barcau, Vicentiu Pasol, George C Turcas
2023/721
A Fast RLWE-Based IPFE Library and its Application to Privacy-Preserving Biometric Authentication
Supriya Adhikary, Angshuman Karmakar
2023/720
MUSES: Efficient Multi-User Searchable Encrypted Database
Tung Le, Rouzbeh Behnia, Jorge Guajardo, and Thang Hoang
2023/719
Lower Bounds for Lattice-based Compact Functional Encryption
Erkan Tairi and Akın Ünal
2023/718
A Guide to the Design of Digital Signatures based on Cryptographic Group Actions
Giacomo Borin, Edoardo Persichetti, Paolo Santini, Federico Pintore, and Krijn Reijnders
2023/717
Generic Error SDP and Generic Error CVE
Felice Manganiello, Freeman Slaughter
2023/716
Towards High-speed ASIC Implementations of Post-Quantum Cryptography
Malik Imran, Aikata Aikata, Sujoy Sinha Roy, Samuel pagliarini
2023/715
SOK: Research Motivations of Public-Key Cryptography
Fuchun Guo, Willy Susilo, Xiaofeng Chen, Peng Jiang, Jianchang Lai, and Zhen Zhao
2023/714
A Two-Party Hierarchical Deterministic Wallets in Practice
ChihYun Chuang, IHung Hsu, TingFang Lee
2023/713
KAIME : Central Bank Digital Currency with Realistic and Modular Privacy
Ali Dogan and Kemal Bicakci
2023/712
Optimizing Attribute-based Encryption for Circuits using Compartmented Access Structures
Alexandru Ionita
2023/711
On the Quantum Security of HAWK
Serge Fehr, Yu-Hsuan Huang
2023/710
PriFHEte: Achieving Full-Privacy in Account-based Cryptocurrencies is Possible
Varun Madathil and Alessandra Scafuro
2023/709
Migrating Applications to Post-Quantum Cryptography: Beyond Algorithm Replacement
Alexandre Augusto Giron
2023/708
Kyber terminates
Manuel Barbosa, Peter Schwabe
2023/707
Concurrent Security of Anonymous Credentials Light, Revisited
Julia Kastner, Julian Loss, and Omar Renawi
2023/706
Two-Message Authenticated Key Exchange from Public-Key Encryption
You Lyu, Shengli Liu
2023/705
Deniable Cryptosystems: Simpler Constructions and Achieving Leakage Resilience
Zhiyuan An, Haibo Tian, Chao Chen, Fangguo Zhang
2023/704
Asymmetric Multi-Party Computation
Vipul Goyal, Chen-Da Liu-Zhang, Rafail Ostrovsky
2023/703
BQP $\neq$ QMA
Ping Wang, Yiting Su
2023/702
Building Unclonable Cryptography: A Tale of Two No-cloning Paradigms
Ghada Almashaqbeh, Rohit Chatterjee
2023/701
Differential Privacy for Free? Harnessing the Noise in Approximate Homomorphic Encryption
Tabitha Ogilvie
2023/700
PIE: $p$-adic Encoding for High-Precision Arithmetic in Homomorphic Encryption
Luke Harmon, Gaetan Delavignette, Arnab Roy, David Silva
2023/699
Lattice-based, more general anti-leakage model and its application in decentralization
Xiaokang Dai, Jingwei Chen, Wenyuan Wu, and Yong Feng
2023/698
A public-key based secure quantum-communication protocol using entangled qubits
S Murugesh
2023/697
NFT Trades in Bitcoin with Off-chain Receipts
Mehmet Sabir Kiraz, Enrique Larraia, Owen Vaughan
2023/696
Universal Hashing Based on Field Multiplication and (Near-)MDS Matrices
Koustabh Ghosh, Jonathan Fuchs, Parisa Amiri Eliasi, Joan Daemen
2023/695
Non-Interactive Zero-Knowledge from Non-Interactive Batch Arguments
Jeffrey Champion, David J. Wu
2023/694
VeriVoting: A decentralized, verifiable and privacy-preserving scheme for weighted voting
Xiaohan Yue
2023/693
LeakyOhm: Secret Bits Extraction using Impedance Analysis
Saleh Khalaj Monfared, Tahoura Mosavirik, and Shahin Tajik
2023/692
On the Invalidity of LV16/Lin17 Obfuscation Schemes
Yupu Hu, Siyue Dong, Baocang Wang, and Xingting Dong
2023/691
Weak Fiat-Shamir Attacks on Modern Proof Systems
Quang Dao, Jim Miller, Opal Wright, Paul Grubbs
2023/690
Invertible Quadratic Non-Linear Functions over $\mathbb F_p^n$ via Multiple Local Maps
Ginevra Giordani, Lorenzo Grassi, Silvia Onofri, Marco Pedicini
2023/689
Abraxas: Throughput-Efficient Hybrid Asynchronous Consensus
Erica Blum, Jonathan Katz, Julian Loss, Kartik Nayak, and Simon Ochsenreither
2023/688
Applications of Timed-release Encryption with Implicit Authentication
Angelique Faye Loe, Liam Medley, Christian O'Connell, Elizabeth A. Quaglia
2023/687
SoK: Delay-based Cryptography
Liam Medley, Angelique Faye Loe, Elizabeth A. Quaglia
2023/686
Efficient Accelerator for NTT-based Polynomial Multiplication
Raziyeh Salarifard and Hadi Soleimany
2023/685
Third-Party Private Set Intersection
Foo Yee Yeo, Jason H. M. Ying
2023/684
A note on ``a lightweight mutual authentication and key agreement protocol for remote surgery application in Tactile Internet environment''
Zhengjun Cao, Lihua Liu
2023/683
MPC with Low Bottleneck-Complexity: Information-Theoretic Security and More
Hannah Keller, Claudio Orlandi, Anat Paskin-Cherniavsky, Divya Ravi
2023/682
Divide and Rule: DiFA - Division Property Based Fault Attacks on PRESENT and GIFT
Anup Kumar Kundu, Shibam Ghosh, Dhiman Saha, Mostafizar Rahman
2023/681
Benchmarking ZK-Circuits in Circom
Colin Steidtmann, Sanjay Gollapudi
2023/680
Private Polynomial Commitments and Applications to MPC
Rishabh Bhadauria, Carmit Hazay, Muthuramakrishnan Venkitasubramaniam, Wenxuan Wu, Yupeng Zhang
2023/679
ParBFT: Faster Asynchronous BFT Consensus with a Parallel Optimistic Path
Xiaohai Dai, Bolin Zhang, Hai Jin, and Ling Ren
2023/678
A 334µW 0.158mm2 ASIC for Post-Quantum Key-Encapsulation Mechanism Saber with Low-latency Striding Toom-Cook Multiplication Extended Version
Archisman Ghosh, Jose Maria Bermudo Mera, Angshuman Karmakar, Debayan Das, Santosh Ghosh, Ingrid Verbauwhede, Shreyas Sen
2023/677
Secure Context Switching of Masked Software Implementations
Barbara Gigerl, Robert Primas, Stefan Mangard
2023/676
From Unbalanced to Perfect: Implementation of Low Energy Stream Ciphers
Jikang Lin, Jiahui He, Yanhong Fan, Meiqin Wang
2023/675
Efficient and Secure Quantile Aggregation of Private Data Streams
Xiao Lan, Hongjian Jin, Hui Guo, Xiao Wang
2023/674
An Efficient Strategy to Construct a Better Differential on Multiple-Branch-Based Designs: Application to Orthros
Kazuma Taka, Tatusya Ishikawa, Kosei Sakamoto, Takanori Isobe
2023/673
Tracing Quantum State Distinguishers via Backtracking
Mark Zhandry
2023/672
SigRec: Automatic Recovery of Function Signatures in Smart Contracts
Ting Chen, Zihao Li, Xiapu Luo, Xiaofeng Wang, Ting Wang, Zheyuan He, Kezhao Fang, Yufei Zhang, Hang Zhu, Hongwei Li, Yan Cheng, Xiaosong Zhang
2023/671
Proving knowledge of isogenies – A survey
Ward Beullens, Luca De Feo, Steven D. Galbraith, Christophe Petit
2023/670
Behemoth: transparent polynomial commitment scheme with constant opening proof size and verifier time
István András Seres and Péter Burcsi
2023/669
Classical substitution ciphers and group theory
Thomas Kaeding
2023/668
Statement-Oblivious Threshold Witness Encryption
Sebastian Faust, Carmit Hazay, David Kretzler, Benjamin Schlosser
2023/667
New Bounds on the Accuracy of Majority Voting for Multi-Class Classification
Sina Aeeneh
2023/666
Arithmetization of predicates into Halo 2 using application specific trace types
Morgan Thomas
2023/665
On the Feasibility of Identity-based Encryption with Equality Test against Insider Attacks
Keita Emura
2023/664
MPC in the head for isomorphisms and group actions
Antoine Joux
2023/663
NTWE: A Natural Combination of NTRU and LWE
Joel Gärtner
2023/662
Unconditionally Secure Multiparty Computation for Symmetric Functions with Low Bottleneck Complexity
Reo Eriguchi
2023/661
Study of Arithmetization Methods for STARKs
Tiago Martins, João Farinha
2023/660
FESTA: Fast Encryption from Supersingular Torsion Attacks
Andrea Basso, Luciano Maino, and Giacomo Pope
2023/659
Exploring Decryption Failures of BIKE: New Class of Weak Keys and Key Recovery Attacks
Tianrui Wang, Anyu Wang, and Xiaoyun Wang
2023/658
A note on ``faster and efficient cloud-server-aided data de-duplication scheme with an authenticated key agreement for Industrial Internet-of-Things''
Zhengjun Cao, Lihua Liu
2023/657
Ou: Automating the Parallelization of Zero-Knowledge Protocols
Yuyang Sang, Ning Luo, Samuel Judson, Ben Chaimberg, Timos Antonopoulos, Xiao Wang, Ruzica Piskac, Zhong Shao
2023/656
Formalizing Soundness Proofs of SNARKs
Bolton Bailey, Andrew Miller
2023/655
TandaPay Whistleblowing Communities: Shifting Workplace Culture Towards Zero-Tolerance Sexual Harassment Policies
Joshua Davis, Dr. Rashid Minhas, Michelle Casario, William Bentley, and Kevin Cosby
2023/654
Griffin: Towards Mixed Multi-Key Homomorphic Encryption
Thomas Schneider, Hossein Yalame, Michael Yonli
2023/653
Muckle+: End-to-End Hybrid Authenticated Key Exchanges
Sonja Bruckner, Sebastian Ramacher, and Christoph Striecks
2023/652
ScionFL: Efficient and Robust Secure Quantized Aggregation
Yaniv Ben-Itzhak, Helen Möllering, Benny Pinkas, Thomas Schneider, Ajith Suresh, Oleksandr Tkachenko, Shay Vargaftik, Christian Weinert, Hossein Yalame, and Avishay Yanai
2023/651
Stealth Key Exchange and Confined Access to the Record Protocol Data in TLS 1.3
Marc Fischlin
2023/650
Pseudorandom Correlation Functions from Variable-Density LPN, Revisited
Geoffroy Couteau, Clément Ducros
2023/649
FinTracer: A privacy-preserving mechanism for tracing electronic money
Michael Brand, Hamish Ivey-Law, Tania Churchill
2023/648
Collatz Computation Sequence for Sufficient Large Integers is Random
Wei Ren
2023/647
Efficient FHE-based Privacy-Enhanced Neural Network for AI-as-a-Service
Kwok-Yan Lam, Xianhui Lu, Linru Zhang, Xiangning Wang, Huaxiong Wang, Si Qi Goh
2023/646
A Note on ``Secure Multifactor Authenticated Key Agreement Scheme for Industrial IoT''
Zhengjun Cao, Lihua Liu
2023/645
Fast and Accurate: Efficient Full-Domain Functional Bootstrap and Digit Decomposition for Homomorphic Computation
Shihe Ma, Tairong Huang, Anyu Wang, Qixian Zhou, and Xiaoyun Wang
2023/644
Improved Distributed RSA Key Generation Using the Miller-Rabin Test
Jakob Burkhardt, Ivan Damgård, Tore Frederiksen, Satrajit Ghosh, and Claudio Orlandi
2023/643
Privacy-Preserving Regular Expression Matching using Nondeterministic Finite Automata
Ning Luo, Chenkai Weng, Jaspal Singh, Gefei Tan, Ruzica Piskac, Mariana Raykova
2023/642
PELTA -- Shielding Multiparty-FHE against Malicious Adversaries
Sylvain Chatel, Christian Mouchet, Ali Utkan Sahin, Apostolos Pyrgelis, Carmela Troncoso, Jean-Pierre Hubaux
2023/641
Accelerated Encrypted Execution of General-Purpose Applications
Charles Gouert, Vinu Joseph, Steven Dalton, Cedric Augonnet, Michael Garland, Nektarios Georgios Tsoutsos
2023/640
A Direct Key Recovery Attack on SIDH
Luciano Maino, Chloe Martindale, Lorenz Panny, Giacomo Pope, Benjamin Wesolowski
2023/639
OPRFs from Isogenies: Designs and Analysis
Lena Heimberger, Tobias Hennerbichler, Fredrik Meisingseth, Sebastian Ramacher, and Christian Rechberger
2023/638
Classification of All $t$-Resilient Boolean Functions with $t+4$ Variables
Shahram Rasoolzadeh
2023/637
Padding-based forgeries in the mode XOCB
Jean Liénardy
2023/636
Multi-Armed SPHINCS+
Gustavo Banegas, Florian Caullery
2023/635
Cassiopeia: Practical On-Chain Witness Encryption
Schwinn Saereesitthipitak, Dionysis Zindros
2023/634
Polynomial Hashing over Prime Order Fields
Sreyosi Bhattacharyya, Kaushik Nath, and Palash Sarkar
2023/633
From Substitution Box To Threshold
Anubhab Baksi, Sylvain Guilley, Ritu-Ranjan Shrivastwa, and Sofiane Takarabt
2023/632
High-Throughput Deep Convolutional Neural Networks on Fully Homomorphic Encryption Using Channel-By-Channel Packing
Jung Hee Cheon, Minsik Kang, Taeseong Kim, Junyoung Jung, Yongdong Yeo
2023/631
Optimization of Functional Bootstrap with Large LUT and Packing Key Switching
KeYi Liu, Chungen Xu, Bennian Dou, Lei Xu
2023/630
Proximity Testing with Logarithmic Randomness
Benjamin E. Diamond and Jim Posen
2023/629
Publicly Auditable Functional Encryption
Vlasis Koutsos, Dimitrios Papadopoulos
2023/628
SEC: Symmetric Encrypted Computation via Fast Look-ups
Debadrita Talapatra, Nimish Mishra, Arnab Bag, Sikhar Patranabis, and Debdeep Mukhopadhyay
2023/627
Conflict Checkable and Decodable Codes and Their Applications
Benny Applebaum, Eliran Kachlon
2023/626
Sprints: Intermittent Blockchain PoW Mining
Michael Mirkin, Lulu Zhou, Ittay Eyal, and Fan Zhang
2023/625
Efficient Information-Theoretic Distributed Point Function with General Output Groups
Junru Li, Pengzhen Ke, Liang Feng Zhang
2023/624
HAETAE: Shorter Lattice-Based Fiat-Shamir Signatures
Jung Hee Cheon, Hyeongmin Choe, Julien Devevey, Tim Güneysu, Dongyeon Hong, Markus Krausz, Georg Land, Marc Möller, Damien Stehlé, and MinJune Yi
2023/623
Toward Practical Lattice-based Proof of Knowledge from Hint-MLWE
Duhyeong Kim, Dongwon Lee, Jinyeong Seo, and Yongsoo Song
2023/622
CLAASP: a Cryptographic Library for the Automated Analysis of Symmetric Primitives
Emanuele Bellini, David Gerault, Juan Grados, Yun Ju Huang, Mohamed Rachidi, Sharwan Tiwari, Rusydi H. Makarim
2023/621
On APN functions whose graphs are maximal Sidon sets
Claude Carlet
2023/620
ProtoStar: Generic Efficient Accumulation/Folding for Special Sound Protocols
Benedikt Bünz and Binyi Chen
2023/619
Fast Enumeration Algorithm for Multivariate Polynomials over General Finite Fields
Hiroki Furue, Tsuyoshi Takagi
2023/618
Hardware Acceleration of FHEW
Jonas Bertels, Michiel Van Beirendonck, Furkan Turan, Ingrid Verbauwhede
2023/617
Quantum Implementation of ASCON Linear Layer
Soham Roy, Anubhab Baksi, Anupam Chattopadhyay
2023/616
vetKeys: How a Blockchain Can Keep Many Secrets
Andrea Cerulli, Aisling Connolly, Gregory Neven, Franz-Stefan Preiss, Victor Shoup
2023/615
Multi-Client Inner Product Encryption: Function-Hiding Instantiations Without Random Oracles
Elaine Shi, Nikhil Vanjani
2023/614
Comprehensive Preimage Security Evaluations on Rijndael-based Hashing
Tianyu Zhang
2023/613
Computational Quantum Secret Sharing
Alper Cakan, Vipul Goyal, Chen-Da Liu-Zhang, João Ribeiro
2023/612
Cryptanalysis of SPEEDY
Jinliang Wang, Chao Niu, Qun Liu, Muzhou Li, Bart Preneel, Meiqin Wang
2023/611
A Comparison of Multi-task learning and Single-task learning Approaches
Thomas Marquet and Elisabeth Oswald
2023/610
A Needle in the Haystack: Inspecting Circuit Layout to Identify Hardware Trojans
Xingyu Meng, Abhrajit Sengupta, Kanad Basu
2023/609
Enabling Two-Party Secure Computation on Set Intersection
Ferhat Karakoç, Alptekin Küpçü
2023/608
Publicly Verifiable Auctions with Privacy
Paul Germouty, Enrique Larraia, Wei Zhang
2023/607
Security analysis of the Milenage-construction based on a PRF
Alexander Maximov, Mats Näslund
2023/606
Novel Approach to Cryptography Implementation using ChatGPT
Hyeokdong Kwon, Minjoo Sim, Gyeongju Song, Minwoo Lee, Hwajeong Seo
2023/605
The Principal–Agent Problem in Liquid Staking
Apostolos Tzinas, Dionysis Zindros
2023/604
Pushing the Limit of Vectorized Polynomial Multiplication for NTRU Prime
Vincent Hwang
2023/603
TFHE Public-Key Encryption Revisited
Marc Joye
2023/602
Threshold BBS+ Signatures for Distributed Anonymous Credential Issuance
Jack Doerner, Yashvanth Kondi, Eysa Lee, abhi shelat, LaKyah Tyner
2023/601
Threshold Cryptosystems Based on $2^k$-th Power Residue Symbols
George Teseleanu
2023/600
Improving and Automating BFV Parameters Selection: An Average-Case Approach
Beatrice Biasioli, Chiara Marcolla, Marco Calderini, and Johannes Mono
2023/599
A Note on a CBC-Type Mode of Operation
George Teseleanu
2023/598
Threshold Signatures from Inner Product Argument: Succinct, Weighted, and Multi-threshold
Sourav Das, Philippe Camacho, Zhuolun Xiang, Javier Nieto, Benedikt Bunz, and Ling Ren
2023/597
FedVS: Straggler-Resilient and Privacy-Preserving Vertical Federated Learning for Split Models
Songze Li, Duanyi Yao, Jin Liu
2023/596
Time Complexities of Multiple-precision Modular Operations and Related Ratios
Shenghui Su, Ping Luo
2023/595
SPDH-Sign: towards Efficient, Post-quantum Group-based Signatures
Christopher Battarbee, Delaram Kahrobaei, Ludovic Perret, Siamak F. Shahandashti
2023/594
Semidirect Product Key Exchange: the State of Play
Christopher Battarbee, Delaram Kahrobaei, Siamak F. Shahandashti
2023/593
Implementing and Optimizing Matrix Triples with Homomorphic Encryption
Johannes Mono, Tim Güneysu
2023/592
Blockchain Large Language Models
Yu Gai, Liyi Zhou, Kaihua Qin, Dawn Song, Arthur Gervais
2023/591
Post-Quantum Public-key Authenticated Searchable Encryption with Forward Security: General Construction, and Applications
Shiyuan Xu, Yibo Cao, Xue Chen, Yanmin Zhao, and Siu-Ming Yiu
2023/590
Reconsidering Generic Composition: the modes A10, A11 and A12 are insecure
Francesco Berti
2023/589
$\texttt{CryptographicEstimators}$: a Software Library for Cryptographic Hardness Estimation
Andre Esser, Javier Verbel, Floyd Zweydinger, Emanuele Bellini
2023/588
Wave Parameter Selection
Nicolas Sendrier
2023/587
Proof-Carrying Data From Arithmetized Random Oracles
Megan Chen, Alessandro Chiesa, Tom Gur, Jack O'Connor, Nicholas Spooner
2023/586
A Novel Preprocessing-Free Proofless Verifiable Computation Scheme from Integer Factoring
Alex Dalton, David Thomas, and Peter Cheung
2023/585
Two Party Fair Exchange
Alex Dalton, David Thomas, and Peter Cheung
2023/584
General-Purpose Secure Conflict-free Replicated Data Types
Bernardo Portela, Hugo Pacheco, Pedro Jorge, Rogério Pontes
2023/583
Reusable, Instant and Private Payment Guarantees for Cryptocurrencies
Akash Madhusudan, Mahdi Sedaghat, Samarth Tiwari, Kelong Cong, Bart Preneel
2023/582
New NTRU Records with Improved Lattice Bases
Elena Kirshanova, Alexander May, Julian Nowakowski
2023/581
A security analysis on MQ-Sign
Yasuhiko Ikematsu, Hyungrok Jo, Takanori Yasuda
2023/580
Neural-Linear Attack Based on Distribution Data and Its Application on DES
Rui Zhou, Ming Duan, Qi Wang, Qianqiong Wu, Sheng Guo, Lulu Guo, Zheng Gong
2023/579
Revealing the Secrets of Radio-Enabled Embedded Systems: on extraction of raw information from any on-board signal through RF
Erez Danieli, Menachem Goldzweig, Moshe Avital, Itamar Levi
2023/578
DORAM revisited: Maliciously secure RAM-MPC with logarithmic overhead
Brett Falk, Daniel Noble, Rafail Ostrovsky, Matan Shtepel, and Jacob Zhang
2023/577
Exploring Formal Methods for Cryptographic Hash Function Implementations
Nicky Mouha
2023/576
IGD-ScoreChain: A Lightweight and Scalable Blockchain Based on Node Sharding for the Internet of Things
Elnaz Mehraein and Reza Nourmohammadi
2023/575
On Central Bank Digital Currency: A composable treatment
István Vajda
2023/574
A Randomized Bit Generator using Algebraic Number Theory
Ajay Dabral
2023/573
HyperNova: Recursive arguments for customizable constraint systems
Abhiram Kothapalli and Srinath Setty
2023/572
Scalable Private Signaling
Sashidhar Jakkamsetti, Zeyu Liu, and Varun Madathil
2023/571
Fine-Grained Non-Interactive Key-Exchange: Constructions and Lower Bounds
Abtin Afshar, Geoffroy Couteau, Mohammad Mahmoody, Elahe Sadeghi
2023/570
Black-Box Separations for Non-Interactive Commitments in a Quantum World
Kai-Min Chung, Yao-Ting Lin, Mohammad Mahmoody
2023/569
From Polynomial IOP and Commitments to Non-malleable zkSNARKs
Antonio Faonio, Dario Fiore, Markulf Kohlweiss, Luigi Russo, and Michal Zajac
2023/568
Enhancing the Privacy of Machine Learning via faster arithmetic over Torus FHE
Marc Titus Trifan, Alexandru Nicolau, Alexander Veidenbaum
2023/567
hinTS: Threshold Signatures with Silent Setup
Sanjam Garg, Abhishek Jain, Pratyay Mukherjee, Rohit Sinha, Mingyuan Wang, Yinuo Zhang
2023/566
Improved Differential Cryptanalysis on SPECK Using Plaintext Structures
Zhuohui Feng, Ye Luo, Chao Wang, Qianqian Yang, Zhiquan Liu, Ling Song
2023/565
Decentralized Multi-Authority Attribute-Based Inner-Product FE: Large Universe and Unbounded
Pratish Datta, Tapas Pal
2023/564
Secure Computation with Shared EPR Pairs (Or: How to Teleport in Zero-Knowledge)
James Bartusek, Dakshita Khurana, Akshayaram Srinivasan
2023/563
FUSE – Flexible File Format and Intermediate Representation for Secure Multi-Party Computation
Lennart Braun, Moritz Huppert, Nora Khayata, Thomas Schneider, Oleksandr Tkachenko
2023/562
Cryptanalysis of Strong Physically Unclonable Functions
Liliya Kraleva, Mohammad Mahzoun, Raluca Posteuca, Dilara Toprakhisar, Tomer Ashur, Ingrid Verbauwhede
2023/561
vr$^2$FHE- Securing FHE from Reaction-based Key Recovery Attacks
Bhuvnesh Chaturvedi, Anirban Chakraborty, Ayantika Chatterjee, Debdeep Mukhopadhyay
2023/560
A Framework for Practical Anonymous Credentials from Lattices
Jonathan Bootle, Vadim Lyubashevsky, Ngoc Khanh Nguyen, Alessandro Sorniotti
2023/559
Weakening Assumptions for Publicly-Verifiable Deletion
James Bartusek, Dakshita Khurana, Giulio Malavolta, Alexander Poremba, and Michael Walter
2023/558
A Multireceiver Certificateless Signcryption (MCLS) Scheme
Alia Umrani, Apurva K Vangujar, and Paolo Palmieri
2023/557
Detect, Pack and Batch: Perfectly-Secure MPC with Linear Communication and Constant Expected Time
Ittai Abraham, Gilad Asharov, Shravani Patil, Arpita Patra
2023/556
Quantum-access Security of Hash-based Signature Schemes
Quan Yuan, Mehdi Tibouchi, Masayuki Abe
2023/555
SAFEFL: MPC-friendly Framework for Private and Robust Federated Learning
Till Gehlhar, Felix Marx, Thomas Schneider, Ajith Suresh, Tobias Wehrle, Hossein Yalame
2023/554
Hybrid Encryption Scheme based on Polar Codes
Reza Hooshmand
2023/553
Concrete Quantum Cryptanalysis of Binary Elliptic Curves via Addition Chain
Ren Taguchi, Atsushi Takayasu
2023/552
Customizable constraint systems for succinct arguments
Srinath Setty, Justin Thaler, Riad Wahby
2023/551
Breaking DPA-protected Kyber via the pair-pointwise multiplication
Estuardo Alpirez Bock, Gustavo Banegas, Chris Brzuska, Łukasz Chmielewski, Kirthivaasan Puniamurthy, and Milan Šorf
2023/550
New Baselines for Local Pseudorandom Number Generators by Field Extensions
Akin Ünal
2023/549
Weak instances of class group action based cryptography via self-pairings
Wouter Castryck, Marc Houben, Simon-Philipp Merz, Marzio Mula, Sam van Buuren, Frederik Vercauteren
2023/548
Compartment-based and Hierarchical Threshold Delegated Verifiable Accountable Subgroup Multi-signatures
Ahmet Ramazan Ağırtaş, Oğuz Yayla
2023/547
Certifying Zero-Knowledge Circuits with Refinement Types
Junrui Liu, Ian Kretz, Hanzhi Liu, Bryan Tan, Jonathan Wang, Yi Sun, Luke Pearson, Anders Miltner, Işıl Dillig, and Yu Feng
2023/546
Horizontal Correlation Attack on Classic McEliece
Brice Colombier, Vincent Grosso, Pierre-Louis Cayrel, Vlad-Florin Drăgoi
2023/545
Improved Universal Thresholdizer from Iterative Shamir Secret Sharing
Jung Hee Cheon, Wonhee Cho, and Jiseung Kim
2023/544
PARMESAN: Parallel ARithMEticS over ENcrypted data
Jakub Klemsa, Melek Önen
2023/543
Pseudorandomness with Proof of Destruction and Applications
Amit Behera, Zvika Brakerski, Or Sattath, and Omri Shmueli
2023/542
A multistep strategy for polynomial system solving over finite fields and a new algebraic attack on the stream cipher Trivium
Roberto La Scala, Federico Pintore, Sharwan K. Tiwari, and Andrea Visconti
2023/541
Algorithmic Views of Vectorized Polynomial Multipliers for NTRU and NTRU Prime (Long Paper)
Han-Ting Chen, Yi-Hua Chung, Vincent Hwang, Chi-Ting Liu, Bo-Yin Yang
2023/540
MAYO: Optimized Implementation with Revised Parameters for ARMv7-M
Arianna Gringiani, Alessio Meneghetti, Edoardo Signorini, Ruggero Susella
2023/539
Dlog is Practically as Hard (or Easy) as DH – Solving Dlogs via DH Oracles on EC Standards
Alexander May and Carl Richard Theodor Schneider
2023/538
Publicly Verifiable Deletion from Minimal Assumptions
Fuyuki Kitagawa, Ryo Nishimaki, and Takashi Yamakawa
2023/537
Algebraic Cryptanalysis of HADES Design Strategy: Application to POSEIDON and Poseidon2
Tomer Ashur, Thomas Buschman, and Mohammad Mahzoun
2023/536
Lightweight Asynchronous Verifiable Secret Sharing with Optimal Resilience
Victor Shoup and Nigel P. Smart
2023/535
Practical Randomized Lattice Gadget Decomposition With Application to FHE
Sohyun Jeon, Hyang-Sook Lee, Jeongeun Park
2023/534
Group Oblivious Message Retrieval
Zeyu Liu, Eran Tromer, and Yunhao Wang
2023/533
Injection-Secure Structured and Searchable Symmetric Encryption
Ghous Amjad, Seny Kamara, Tarik Moataz
2023/532
HLG: A framework for computing graphs in Residue Number System and its application in Fully Homomorphic Encryption
Shuang Wu, Chunhuan Zhao, Ye Yuan, Shuzhou Sun, Jie Li, Yamin Liu
2023/531
Practical Randomness Measure Tool
Boaz Shahar
2023/530
Breaking and Fixing Garbled Circuits when a Gate has Duplicate Input Wires
Raine Nieminen, Thomas Schneider
2023/529
Secure Communication in Dynamic Incomplete Networks
Ivan Damgård, Divya Ravi, Daniel Tschudi, Sophia Yakoubov
2023/528
NP-Hardness of Approximating Meta-Complexity: A Cryptographic Approach
Yizhi Huang, Rahul Ilango, Hanlin Ren
2023/527
Squirrel: A Scalable Secure Two-Party Computation Framework for Training Gradient Boosting Decision Tree
Wen-jie Lu, Zhicong Huang, Qizhi Zhang, Yuchen Wang, and Cheng Hong
2023/526
Context Discovery and Commitment Attacks: How to Break CCM, EAX, SIV, and More
Sanketh Menda, Julia Len, Paul Grubbs, Thomas Ristenpart
2023/525
Error Correction and Ciphertext Quantization in Lattice Cryptography
Daniele Micciancio, Mark Schultz
2023/524
AI Resistant (AIR) Cryptography
Gideon Samid
2023/523
Adding more parallelism to the AEGIS authenticated encryption algorithms
Frank Denis
2023/522
SAFE: Sponge API for Field Elements
JP Aumasson, Dmitry Khovratovich, Bart Mennink, Porçu Quine
2023/521
TREBUCHET: Fully Homomorphic Encryption Accelerator for Deep Computation
David Bruce Cousins, Yuriy Polyakov, Ahmad Al Badawi, Matthew French, Andrew Schmidt, Ajey Jacob, Benedict Reynwar, Kellie Canida, Akhilesh Jaiswal, Clynn Mathew, Homer Gamil, Negar Neda, Deepraj Soni, Michail Maniatakos, Brandon Reagen, Naifeng Zhang, Franz Franchetti, Patrick Brinich, Jeremy Johnson, Patrick Broderick, Mike Franusich, Bo Zhang, Zeming Cheng, Massoud Pedram
2023/520
Generic Security of the SAFE API and Its Applications
Dmitry Khovratovich, Mario Marhuenda Beltrán, and Bart Mennink
2023/519
Generalized Inverse Binary Matrix Construction with PKC Application
Farshid Haidary Makoui, Thomas Aaron Guliver
2023/518
Weak-Diffusion Structure: Meet-in-the-Middle Attacks on Sponge-based Hashing Revisited
Lingyue Qin, Boxin Zhao, Jialiang Hua, Xiaoyang Dong, Xiaoyun Wang
2023/517
Kavach: Lightweight masking techniques for polynomial arithmetic in lattice-based cryptography
Aikata Aikata, Andrea Basso, Gaetan Cassiers, Ahmet Can Mert, Sujoy Sinha Roy
2023/516
3-Party Secure Computation for RAMs: Optimal and Concretely Efficient
Atsunori Ichikawa, Ilan Komargodski, Koki Hamada, Ryo Kikuchi, Dai Ikarashi
2023/515
stoRNA: Stateless Transparent Proofs of Storage-time
Reyhaneh Rabaninejad, Behzad Abdolmaleki, Giulio Malavolta, Antonis Michalas, Amir Nabizadeh
2023/514
Black-Box Reusable NISC with Random Oracles
Yuval Ishai, Dakshita Khurana, Amit Sahai, Akshayaram Srinivasan
2023/513
Sublinear Secure Computation from New Assumptions
Elette Boyle, Geoffroy Couteau, Pierre Meyer
2023/512
Automated Detection of Underconstrained Circuits for Zero-Knowledge Proofs
Shankara Pailoor, Yanju Chen, Franklyn Wang, Clara Rodríguez, Jacob Van Gaffen, Jason Morton, Michael Chu, Brian Gu, Yu Feng, Isil Dillig
2023/511
$\text{MP}\ell\circ \mathrm{C}$: Privacy-Preserving IP Verification Using Logic Locking and Secure Multiparty Computation
Dimitris Mouris, Charles Gouert, and Nektarios Georgios Tsoutsos
2023/510
Continuously Non-Malleable Codes from Authenticated Encryptions in 2-Split-State Model
Anit Kumar Ghosal and Dipanwita Roychowdhury
2023/509
Non-malleable Codes from Authenticated Encryption in Split-State Model
Anit Kumar Ghosal, Dipanwita Roychowdhury
2023/508
Computing Isogenies of Power-Smooth Degrees Between PPAVs
Jesús-Javier Chi-Domínguez, Amalia Pizarro-Madariaga, and Edgardo Riquelme
2023/507
Low Memory Attacks on Small Key CSIDH
Jesús-Javier Chi-Domínguez, Andre Esser, Sabrina Kunzweiler, Alexander May
2023/506
Energy Consumption Evaluation of Post-Quantum TLS 1.3 for Resource-Constrained Embedded Devices
George Tasopoulos, Charis Dimopoulos, Apostolos P. Fournaris, Raymond K. Zhao, Amin Sakzad, Ron Steinfeld
2023/505
Side-Channel Analysis of Integrate-and-Fire Neurons within Spiking Neural Networks
Matthias Probst, Manuel Brosch, Georg Sigl
2023/504
Private Computation Based On Polynomial Operation
Shuailiang Hu
2023/503
Neural Network Quantisation for Faster Homomorphic Encryption
Wouter Legiest, Furkan Turan, Michiel Van Beirendonck, Jan-Pieter D'Anvers, and Ingrid Verbauwhede
2023/502
Laconic Function Evaluation for Turing Machines
Nico Döttling, Phillip Gajland, Giulio Malavolta
2023/501
New Ways to Garble Arithmetic Circuits
Marshall Ball, Hanjun Li, Huijia Lin, Tianren Liu
2023/500
Robust Quantum Public-Key Encryption with Applications to Quantum Key Distribution
Giulio Malavolta and Michael Walter
2023/499
FLUTE: Fast and Secure Lookup Table Evaluations (Full Version)
Andreas Brüggemann, Robin Hundt, Thomas Schneider, Ajith Suresh, Hossein Yalame
2023/498
Subset-optimized BLS Multi-signature with Key Aggregation
Foteini Baldimtsi, Konstantinos Kryptos Chalkias, Francois Garillot, Jonas Lindstrom, Ben Riva, Arnab Roy, Mahdi Sedaghat, Alberto Sonnino, Pun Waiwitlikhit, and Joy Wang
2023/497
Upper bounding the number of bent functions using 2-row bent rectangles
Sergey Agievich
2023/496
Evaluating the Security of Block Ciphers Against Zero-correlation Linear Attack in the Distinguishers Aspect
Xichao Hu, Yongqiang Li, Lin Jiao, Zhengbin Liu, Mingsheng Wang
2023/495
On the algebraic immunity of weightwise perfectly balanced functions
Agnese Gini and Pierrick Méaux
2023/494
Spartan and Bulletproofs are simulation-extractable (for free!)
Quang Dao, Paul Grubbs
2023/493
Force: Highly Efficient Four-Party Privacy-Preserving Machine Learning on GPU
Tianxiang Dai, Li Duan, Yufan Jiang, Yong Li, Fei Mei, and Yulian Sun
2023/492
Batch Signatures, Revisited
Carlos Aguilar-Melchor, Martin R. Albrecht, Thomas Bailleux, Nina Bindel, James Howe, Andreas Hülsing, David Joseph, Marc Manzano
2023/491
On the Security of Blind Signatures in the Multi-Signer Setting
Samuel Bedassa Alemu, Julia Kastner
2023/490
Quantum Public-Key Encryption with Tamper-Resilient Public Keys from One-Way Functions
Fuyuki Kitagawa, Tomoyuki Morimae, Ryo Nishimaki, and Takashi Yamakawa
2023/489
Shorter and Faster Identity-Based Signatures with Tight Security in the (Q)ROM from Lattices
Eric Sageloli, Pierre Pébereau, Pierrick Méaux, Céline Chevalier
2023/488
$k$-SUM in the Sparse Regime
Shweta Agrawal, Sagnik Saha, Nikolaj Ignatieff Schwartzbach, Akhil Vanukuri, and Prashant Nalini Vasudevan
2023/487
On the State of Crypto-Agility
Nouri Alnahawi, Nicolai Schmitt, Alexander Wiesmaier, Andreas Heinemann, Tobias Grasmeyer
2023/486
Flamingo: Multi-Round Single-Server Secure Aggregation with Applications to Private Federated Learning
Yiping Ma, Jess Woods, Sebastian Angel, Antigoni Polychroniadou, and Tal Rabin
2023/485
Practically-exploitable Cryptographic Vulnerabilities in Matrix
Martin R. Albrecht, Sofía Celi, Benjamin Dowling, Daniel Jones
2023/484
SCA Evaluation and Benchmarking of Finalists in the NIST Lightweight Cryptography Standardization Process
Kamyar Mohajerani, Luke Beckwith, Abubakr Abdulgadir, Eduardo Ferrufino, Jens-Peter Kaps, Kris Gaj
2023/483
Unbounded Predicate Inner Product Functional Encryption from Pairings
Uddipana Dowerah, Subhranil Dutta, Aikaterini Mitrokotsa, Sayantan Mukherjee, Tapas Pal
2023/482
Homomorphic Trapdoors for Identity-based and Group Signatures
Buvana Ganesh, Apurva Vangujar, Alia Umrani, Paolo Palmieri
2023/481
A Framework for UC Secure Privacy Preserving Biometric Authentication using Efficient Functional Encryption
Johannes Ernst, Aikaterini Mitrokotsa
2023/480
Practical Homomorphic Evaluation of Block-Cipher-Based Hash Functions with Applications
Adda-Akram Bendoukha, Oana Stan, Renaud Sirdey, Nicolas Quero, Luciano Freitas
2023/479
Spherical Gaussian Leftover Hash Lemma via the Rényi Divergence
Hiroki Okada, Kazuhide Fukushima, Shinsaku Kiyomoto, Tsuyoshi Takagi
2023/478
TENET : Sublogarithmic Proof and Sublinear Verifier Inner Product Argument without a Trusted Setup
Hyeonbum Lee, Jae Hong Seo
2023/477
Separations among formulations of non-malleable encryption under valid ciphertext condition
Yodai Watanabe
2023/476
A private set intersection protocol based on multi-party quantum computation for greatest common divisor
Muhammad Imran
2023/475
The Jacobi Symbol Problem for Quadratic Congruences and Applications to Cryptography
Ferucio Laurențiu Țiplea
2023/474
eSTARK: Extending STARKs with Arguments
Héctor Masip-Ardevol, Marc Guzmán-Albiol, Jordi Baylina-Melé, Jose Luis Muñoz-Tapia
2023/473
Owl: Compositional Verification of Security Protocols via an Information-Flow Type System
Joshua Gancher, Sydney Gibson, Pratap Singh, Samvid Dharanikota, Bryan Parno
2023/472
Deep Bribe: Predicting the Rise of Bribery in Blockchain Mining with Deep RL
Roi Bar-Zur, Danielle Dori, Sharon Vardi, Ittay Eyal, Aviv Tamar
2023/471
Compact Aggregate Signature from Module-Lattices
Toi Tomita and Junji Shikata
2023/470
GeT a CAKE: Generic Transformations from Key Encaspulation Mechanisms to Password Authenticated Key Exchanges
Hugo Beguinet, Céline Chevalier, David Pointcheval, Thomas Ricosset, and Mélissa Rossi
2023/469
Four Attacks and a Proof for Telegram
Martin R. Albrecht, Lenka Mareková, Kenneth G. Paterson, Igors Stepanovs
2023/468
A new approach on IoT security: n-out-of-n
Tuğberk KOCATEKİN, Cafer ÇALIŞKAN
2023/467
Secure Floating-Point Training
Deevashwer Rathee, Anwesh Bhattacharya, Divya Gupta, Rahul Sharma, Dawn Song
2023/466
Don't be Dense: Efficient Keyword PIR for Sparse Databases
Sarvar Patel, Joon Young Seo, Kevin Yeo
2023/465
RPU: The Ring Processing Unit
Deepraj Soni, Negar Neda, Naifeng Zhang, Benedict Reynwar, Homer Gamil, Benjamin Heyman, Mohammed Nabeel Thari Moopan, Ahmad Al Badawi, Yuriy Polyakov, Kellie Canida, Massoud Pedram, Michail Maniatakos, David Bruce Cousins, Franz Franchetti, Matthew French, Andrew Schmidt, Brandon Reagen
2023/464
A Generic Construction of an Anonymous Reputation System and Instantiations from Lattices
Johannes Blömer, Jan Bobolz, and Laurens Porzenheim
2023/463
Simplex Consensus: A Simple and Fast Consensus Protocol
Benjamin Y Chan, Rafael Pass
2023/462
Overdrive LowGear 2.0: Reduced-Bandwidth MPC without Sacrifice
Sebastian Hasler, Toomas Krips, Ralf Küsters, Pascal Reisert, Marc Rivinius
2023/461
Deep Learning based Differential Classifier of PRIDE and RC5
Debranjan Pal, Upasana Mandal, Abhijit Das, Dipanwita Roy Chowdhury
2023/460
A unified construction of weightwise perfectly balanced Boolean functions
Qinglan Zhao, Mengran Li, Zhixiong Chen, Baodong Qin, Dong Zheng
2023/459
SCMA: Plaintext Classification Assisted Side Channel Spectral Modulation Attacks. Towards Noise-insensitive SCA Attacks...
Moshe Avital, Itamar Levi
2023/458
Non-interactive Universal Arguments
Nir Bitansky, Omer Paneth, Dana Shamir, Tomer Solomon
2023/457
Registered FE beyond Predicates: (Attribute-Based) Linear Functions and more
Pratish Datta, Tapas Pal, and Shota Yamada
2023/456
Generalised Asynchronous Remote Key Generation for Pairing-based Cryptosystems
Nick Frymann, Daniel Gardham, Mark Manulis, Hugo Nartz
2023/455
Tri-State Circuits: A Circuit Model that Captures RAM
David Heath, Vladimir Kolesnikov, and Rafail Ostrovsky
2023/454
Wireless-channel Key Exchange
Afonso Arriaga, Petra Sala, Marjan Škrobot
2023/453
An algebraic attack for forging signatures of MPPK/DS
Hao Guo
2023/452
Piano: Extremely Simple, Single-Server PIR with Sublinear Server Computation
Mingxun Zhou, Andrew Park, Elaine Shi, and Wenting Zheng
2023/451
Non-interactive VSS using Class Groups and Application to DKG
Aniket Kate, Easwar Vivek Mangipudi, Pratyay Mukherjee, Hamza Saleem, and Sri Aravinda Krishnan Thyagarajan
2023/450
Unlocking doors from half a continent away: A relay attack against HID Seos
Sam Haskins, Trevor Stevado
2023/449
Multidimensional Approximate Agreement with Asynchronous Fallback
Diana Ghinea, Chen-Da Liu-Zhang, Roger Wattenhofer
2023/448
Generalized Inverse Matrix Construction for Code Based Cryptography
Farshid Haidary Makoui, T. Aaron Gulliver
2023/447
Provable Lattice Reduction of $\mathbb Z^n$ with Blocksize $n/2$
Léo Ducas
2023/446
Phoenix: Hash-and-Sign with Aborts from Lattice Gadgets
Corentin Jeudy, Adeline Roux-Langlois, and Olivier Sanders
2023/445
Fully Adaptive Schnorr Threshold Signatures
Elizabeth Crites, Chelsea Komlo, and Mary Maller
2023/444
Compact Bounded-Collusion Identity-based Encryption via Group Testing
Shingo Sato, Junji Shikata
2023/443
Abstraction Model of Probing and DFA Attacks on Block Ciphers
Yuiko Matsubara, Daiki Miyahara, Yohei Watanabe, Mitsugu Iwamoto, Kazuo Sakiyama
2023/442
Non-interactive privacy-preserving naive Bayes classifier using homomorphic encryption
Jingwei Chen, Yong Feng, Yang Liu, Wenyuan Wu, Guanci Yang
2023/441
Unconditionally secure ciphers with a short key for a source with unknown statistics
Boris Ryabko
2023/440
On the Possibility of a Backdoor in the Micali-Schnorr Generator
Hannah Davis, Matthew Green, Nadia Heninger, Keegan Ryan, Adam Suhl
2023/439
Standard Model Time-Lock Puzzles: Defining Security and Constructing via Composition
Karim Eldefrawy, Sashidhar Jakkamsetti, Ben Terner, Moti Yung
2023/438
Minimal $p$-ary codes via the direct sum of functions, non-covering permutations and subspaces of derivatives
René Rodríguez, Enes Pasalic, Fengrong Zhang, and Yongzhuang Wei
2023/437
Interoperable Private Attribution: A Distributed Attribution and Aggregation Protocol
Benjamin Case, Richa Jain, Alex Koshelev, Andy Leiserson, Daniel Masny, Thurston Sandberg, Ben Savage, Erik Taubeneck, Martin Thomson, Taiki Yamaguchi
2023/436
SQISignHD: New Dimensions in Cryptography
Pierrick Dartois, Antonin Leroux, Damien Robert, and Benjamin Wesolowski
2023/435
Optimal Security Notion for Decentralized Multi-Client Functional Encryption
Ky Nguyen, Duong Hieu Phan, David Pointcheval
2023/434
The Self-Anti-Censorship Nature of Encryption: On the Prevalence of Anamorphic Cryptography
Mirek Kutylowski, Giuseppe Persiano, Duong Hieu Phan, Moti Yung, Marcin Zawada
2023/433
Efficiency of SIDH-based signatures (yes, SIDH)
Wissam Ghantous, Federico Pintore, Mattia Veroni
2023/432
Practical key-recovery attack on MQ-Sign
Thomas Aulbach, Simona Samardjiska, and Monika Trimoska
2023/431
Ruffle: Rapid 3-party shuffle protocols
Pranav Shriram A, Nishat Koti, Varsha Bhat Kukkala, Arpita Patra, Bhavish Raj Gopal, Somya Sangal
2023/430
QuantumCharge: Post-Quantum Cryptography for Electric Vehicle Charging
Dustin Kern, Christoph Krauß, Timm Lauser, Nouri Alnahawi, Alexander Wiesmaier, Ruben Niederhagen
2023/429
CPU to FPGA Power Covert Channel in FPGA-SoCs
Mathieu Gross, Robert Kunzelmann, Georg Sigl
2023/428
Security analysis of the Classic McEliece, HQC and BIKE schemes in low memory
Yu Li and Li-Ping Wang
2023/427
SPRINT: High-Throughput Robust Distributed Schnorr Signatures
Fabrice Benhamouda, Shai Halevi, Hugo Krawczyk, Yiping Ma, and Tal Rabin
2023/426
A Tightly Secure Identity-based Signature Scheme from Isogenies
Hyungrok Jo, Shingo Sato, Junji Shikata
2023/425
Generic Construction of Dual-Server Public Key Authenticated Encryption with Keyword Search
Keita Emura
2023/424
A Duality Between One-Way Functions and Average-Case Symmetry of Information
Shuichi Hirahara, Rahul Ilango, Zhenjian Lu, Mikito Nanashima, Igor C. Oliveira
2023/423
A Note on Hybrid Signature Schemes
Nina Bindel, Britta Hale
2023/422
A Differential Fault Attack against Deterministic Falcon Signatures
Sven Bauer, Fabrizio De Santis
2023/421
Interactive Oracle Arguments in the QROM and Applications to Succinct Verification of Quantum Computation
Islam Faisal
2023/420
Making Classical (Threshold) Signatures Post-Quantum for Single Use on a Public Ledger
Laurane Marco, Abdullah Talayhan, Serge Vaudenay
2023/419
Asynchronous Remote Key Generation for Post-Quantum Cryptosystems from Lattices
Nick Frymann, Daniel Gardham, Mark Manulis
2023/418
The Round Complexity of Statistical MPC with Optimal Resiliency
Benny Applebaum, Eliran Kachlon, Arpita Patra
2023/417
Multivariate Correlation Attacks and the Cryptanalysis of LFSR-based Stream Ciphers
Isaac A. Canales-Martínez and Igor Semaev
2023/416
Single Instance Self-Masking via Permutations
Asaf Cohen, Paweł Cyprys, and Shlomi Dolev
2023/415
Maximally-Fluid MPC with Guaranteed Output Delivery
Giovanni Deligios, Aarushi Goel, Chen-Da Liu-Zhang
2023/414
Post-Quantum Privacy Pass via Post-Quantum Anonymous Credentials
Guru-Vamsi Policharla, Bas Westerbaan, Armando Faz-Hernández, Christopher A Wood
2023/413
Accelerating HE Operations from Key Decomposition Technique
Miran Kim, Dongwon Lee, Jinyeong Seo, and Yongsoo Song
2023/412
Generic Construction of Forward Secure Public Key Authenticated Encryption with Keyword Search
Keita Emura
2023/411
An Overview of Hash Based Signatures
Vikas Srivastava, Anubhab Baksi, Sumit Kumar Debnath
2023/410
Unbounded Leakage-Resilience and Intrusion-Detection in a Quantum World
Alper Cakan, Vipul Goyal, Chen-Da Liu-Zhang, and João Ribeiro
2023/409
Multi-Instance Randomness Extraction and Security against Bounded-Storage Mass Surveillance
Jiaxin Guan, Daniel Wichs, Mark Zhandry
2023/408
Machine-Checked Security for $\mathrm{XMSS}$ as in RFC 8391 and $\mathrm{SPHINCS}^{+}$
Manuel Barbosa, François Dupressoir, Benjamin Grégoire, Andreas Hülsing, Matthias Meijers, and Pierre-Yves Strub
2023/407
Game Theoretical Analysis of DAG-Ledgers Backbone
Yackolley Amoussou-Guenou, Simone Galimberti, and Maria Potop-Butucaru
2023/406
Quasi-linear masking to protect against both SCA and FIA
Claude Carlet, Abderrahman Daif, Sylvain Guilley, and Cédric Tavernier
2023/405
CaSCaDE: (Time-Based) Cryptography from Space Communications DElay
Carsten Baum, Bernardo David, Elena Pagnin, and Akira Takahashi
2023/404
Efficient Laconic Cryptography from Learning With Errors
Nico Döttling, Dimitris Kolonelos, Russell W. F. Lai, Chuanwei Lin, Giulio Malavolta, Ahmadreza Rahimi
2023/403
Real-World Deniability in Messaging
Daniel Collins, Simone Colombo, and Loïs Huguenin-Dumittan
2023/402
Discretization Error Reduction for Torus Fully Homomorphic Encryption
Kang Hoon Lee, Ji Won Yoon
2023/401
Generic Construction of Broadcast Authenticated Encryption with Keyword Search
Keita Emura
2023/400
Prime Match: A Privacy-Preserving Inventory Matching System
Antigoni Polychroniadou, Gilad Asharov, Benjamin Diamond, Tucker Balch, Hans Buehler, Richard Hua, Suwen Gu, Greg Gimler, Manuela Veloso
2023/399
High Throughput Lattice-based Signatures on GPUs: Comparing Falcon and Mitaka
Wai-Kong Lee, Raymond K. Zhao, Ron Steinfeld, Amin Sakzad, Seong Oun Hwang
2023/398
A New Linear Distinguisher for Four-Round AES
Tomer Ashur, Erik Takke
2023/397
Extended Abstract: HotStuff-2: Optimal Two-Phase Responsive BFT
Dahlia Malkhi, Kartik Nayak
2023/396
Monomial Isomorphism for Tensors and Applications to Code Equivalence Problems
Giuseppe D'Alconzo
2023/395
Registered (Inner-Product) Functional Encryption
Danilo Francati, Daniele Friolo, Monosij Maitra, Giulio Malavolta, Ahmadreza Rahimi, and Daniele Venturi
2023/394
Fork-Resilient Continuous Group Key Agreement
Joël Alwen, Marta Mularczyk, and Yiannis Tselekounis
2023/393
cqlin: Efficient linear operations on KZG commitments with cached quotients
Liam Eagen and Ariel Gabizon
2023/392
Locally Covert Learning
Justin Holmgren, Ruta Jawale
2023/391
Additional Modes for ASCON
Rhys Weatherley
2023/390
Hashing to elliptic curves through Cipolla–Lehmer–Müller’s square root algorithm
Dmitrii Koshelev
2023/389
TIDAL: Practical Collisions on State-Reduced Keccak Variants
Sahiba Suryawanshi, Dhiman Saha, Shashwat jaiswal
2023/388
Non-Interactive Blind Signatures for Random Messages
Lucjan Hanzlik
2023/387
Constrained Pseudorandom Functions from Homomorphic Secret Sharing
Geoffroy Couteau, Pierre Meyer, Alain Passelègue, Mahshid Riahinia
2023/386
Interoperability in End-to-End Encrypted Messaging
Julia Len, Esha Ghosh, Paul Grubbs, Paul Rösler
2023/385
Zero Knowledge Protocols and Signatures from the Restricted Syndrome Decoding Problem
Marco Baldi, Sebastian Bitzer, Alessio Pavoni, Paolo Santini, Antonia Wachter-Zeh, and Violetta Weger
2023/384
Origami: Fold a Plonk for Ethereum’s VDF
zhenfei zhang
2023/383
The Prospect of a New Cryptography: Extensive use of non-algorithmic randomness competes with mathematical complexity
Gideon Samid
2023/382
On Homomorphic Secret Sharing from Polynomial-Modulus LWE
Thomas Attema, Pedro Capitão, Lisa Kohl
2023/381
Nakamoto Consensus under Bounded Processing Capacity
Lucianna Kiffer, Joachim Neu, Srivatsan Sridhar, Aviv Zohar, and David Tse
2023/380
Security Analysis of Signature Schemes with Key Blinding
Edward Eaton, Tancrède Lepoint, Christopher A. Wood
2023/379
Asymmetric Quantum Secure Multi-Party Computation With Weak Clients Against Dishonest Majority
Theodoros Kapourniotis, Elham Kashefi, Dominik Leichtle, Luka Music, Harold Ollivier
2023/378
SGXonerated: Finding (and Partially Fixing) Privacy Flaws in TEE-based Smart Contract Platforms Without Breaking the TEE
Nerla Jean-Louis, Yunqi Li, Yan Ji, Harjasleen Malvai, Thomas Yurek, Sylvain Bellemare, and Andrew Miller
2023/377
FuLeeca: A Lee-based Signature Scheme
Stefan Ritterhoff, Georg Maringer, Sebastian Bitzer, Violetta Weger, Patrick Karl, Thomas Schamberger, Jonas Schupp, Antonia Wachter-Zeh
2023/376
Efficient computation of $(3^n,3^n)$-isogenies
Thomas Decru, Sabrina Kunzweiler
2023/375
Accelerating exp-log based finite field multiplication
Nicolas Belleville
2023/374
Practical-Time Related-Key Attack on GOST with Secret S-boxes
Orr Dunkelman, Nathan Keller, Ariel Weizman
2023/373
Consensus Algorithm Using Transaction History for Cryptocurrency
Yuuki Komi, Takayuki Tatekawa
2023/372
Practically Solving LPN in High Noise Regimes Faster Using Neural Networks
Haozhe Jiang, Kaiyue Wen, Yilei Chen
2023/371
PACIFIC: Privacy-preserving automated contact tracing scheme featuring integrity against cloning
Scott Griffy, Anna Lysyanskaya
2023/370
Publicly-Verifiable Deletion via Target-Collapsing Functions
James Bartusek, Dakshita Khurana, and Alexander Poremba
2023/369
LURK: Lambda, the Ultimate Recursive Knowledge
Nada Amin, John Burnham, François Garillot, Rosario Gennaro, Chhi'mèd Künzang, Daniel Rogozin, Cameron Wong
2023/368
AI Attacks AI: Recovering Neural Network architecture from NVDLA using AI-assisted Side Channel Attack
Naina Gupta, Arpan Jati, Anupam Chattopadhyay
2023/367
Practical Attacks on Small Private Exponent RSA: New Records and New Insights
Qiang Li, Qun-xiong Zheng, and Wen-feng Qi
2023/366
Efficient Homomorphic Evaluation of Arbitrary Uni/Bivariate Integer Functions and Their Applications
Daisuke Maeda, Koki Morimura, Shintaro Narisada, Kazuhide Fukushima, Takashi Nishide
2023/365
Verifiable encodings in multigroup fully homomorphic encryption
Ramsès Fernàndez-València
2023/364
Zero-Knowledge Arguments for Subverted RSA Groups
Dimitris Kolonelos, Mary Maller, and Mikhail Volkhov
2023/363
Composable Long-Term Security with Rewinding
Robin Berger, Brandon Broadnax, Michael Klooß, Jeremias Mechler, Jörn Müller-Quade, Astrid Ottenhues, Markus Raiber
2023/362
Protecting Quantum Procrastinators with Signature Lifting: A Case Study in Cryptocurrencies
Or Sattath and Shai Wyborski
2023/361
Authenticated Encryption for Very Short Inputs
Alexandre Adomnicai, Kazuhiko Minematsu, Junji Shikata
2023/360
Fast and Efficient Code-Based Digital Signature with Dual Inverse Matrix
Farshid Haidary Makoui, T. Aaron Gulliver, Mohammad Dakhilalian
2023/359
Convolutions in Overdrive: Maliciously Secure Convolutions for MPC
Marc Rivinius, Pascal Reisert, Sebastian Hasler, Ralf Kuesters
2023/358
Efficient Code Based Cryptosystem with Dual Inverse Matrix
Farshid Haidary Makoui, T. Aaron Gulliver, Mohammad Dakhilalian
2023/357
FFT-less TFHE: Simpler, Faster and Scale-invariant
Zhen Gu, Wen-jie Lu, Cheng Hong
2023/356
Anamorphic Signatures: Secrecy From a Dictator Who Only Permits Authentication!
Miroslaw Kutylowski, Giuseppe Persiano, Duong Hieu Phan, Moti Yung, Marcin Zawada
2023/355
Improved Differential Analysis of MIBS Based on Greedy Algorithm
Jian Liu, Yanjun Li, Runyi Liu, Jian Zou, Zhiqiang Wang
2023/354
Guessing Less and Better: Improved Attacks on GIFT-64
Federico Canale, María Naya-Plasencia
2023/353
Searching for S-boxes with better Diffusion using Evolutionary Algorithm
Rahul Mishra, Bhupendra Singh, Radhakrishnan Delhibabu
2023/352
Post-Quantum Security for the Extended Access Control Protocol
Marc Fischlin, Jonas von der Heyden, Marian Margraf, Frank Morgner, Andreas Wallner, and Holger Bock
2023/351
Anonymous Broadcast Authentication with Logarithmic-Order Ciphertexts from DLP or LWE
Yoshinori Aono and Junji Shikata
2023/350
Weighted Oblivious RAM, with Applications to Searchable Symmetric Encryption
Leonard Assouline, Brice Minaud
2023/349
AAQ-PEKS: An Attribute-based Anti-Quantum Public-Key Encryption Scheme with Keyword Search for E-healthcare Scenarios
Gang Xu, Shiyuan Xu, Yibo Cao, Ke Xiao, Xiu-Bo Chen, Mianxiong Dong, Shui Yu
2023/348
Optimal Security for Keyed Hash Functions: Avoiding Time-Space Tradeoffs for Finding Collisions
Cody Freitag, Ashrujit Ghoshal, Ilan Komargodski
2023/347
Programmable Payment Channels
Yibin Yang, Mohsen Minaei, Srinivasan Raghuraman, Ranjit Kumaresan, Duc V. Le, and Mahdi Zamani
2023/346
How to achieve bidirectional zero-knowledge authentication?
Jin Li, Xingyu Li, Chang Chen, Guoyu Yang, Junyang Li, Qi Chen, Hongyang Yan
2023/345
Encryption with Quantum Public Keys
Alex B. Grilo, Or Sattath, Quoc-Huy Vu
2023/344
Quantum Search-to-Decision Reduction for the LWE Problem
Kyohei Sudo, Masayuki Tezuka, Keisuke Hara, Yusuke Yoshida
2023/343
A Map of Witness Maps: New Definitions and Connections
Suvradip Chakraborty, Manoj Prabhakaran, Daniel Wichs
2023/342
TurboSHAKE
Guido Bertoni, Joan Daemen, Seth Hoffert, Michaël Peeters, Gilles Van Assche, Ronny Van Keer, Benoît Viguier
2023/341
On How Zero-Knowledge Proof Blockchain Mixers Improve, and Worsen User Privacy
Zhipeng Wang, Stefanos Chaliasos, Kaihua Qin, Liyi Zhou, Lifeng Gao, Pascal Berrang, Benjamin Livshits, Arthur Gervais
2023/340
SALSA PICANTE: a machine learning attack on LWE with binary secrets
Cathy Li, Jana Sotáková, Emily Wenger, Mohamed Malhou, Evrard Garcelon, Francois Charton, and Kristin Lauter
2023/339
An Analysis of the Post Quantum and Classical Security of 4x4 and 16x4 S-Boxes and Their Implementations in Simplified-AES
Christopher Dunne
2023/338
Shield: Secure Allegation Escrow System with Stronger Guarantees
Nishat Koti, Varsha Bhat Kukkala, Arpita Patra, Bhavish Raj Gopal
2023/337
Quantum Implementation of AIM: Aiming for Low-Depth
Kyungbae Jang, Dukyoung Kim, Yujin Oh, Sejin Lim, Yujin Yang, Hyunji Kim, and Hwajeong Seo
2023/336
A Novel Approach to e-Voting with Group Identity Based Identification and Homomorphic Encryption
Apurva K Vangujar, Buvana Ganesh, Alia Umrani, Paolo Palmieri
2023/335
Separating Oil and Vinegar with a Single Trace
Thomas Aulbach, Fabio Campos, Juliane Krämer, Simona Samardjiska, Marc Stöttinger
2023/334
A Generic Transform from Multi-Round Interactive Proof to NIZK
Pierre-Alain Fouque, Adela Georgescu, Chen Qian, Adeline Roux-Langlois, Weiqiang Wen
2023/333
Secret Sharing Scheme with Perfect Concealment
Izumi Takeuti, Tomoko Adachi
2023/332
Asymmetric Group Message Franking: Definitions & Constructions
Junzuo Lai, Gongxian Zeng, Zhengan Huang, Siu Ming Yiu, Xin Mu, Jian Weng
2023/331
A Vulnerability in Implementations of SHA-3, SHAKE, EdDSA, and Other NIST-Approved Algorithms
Nicky Mouha, Christopher Celi
2023/330
Perfect MPC over Layered Graphs
Bernardo David, Yuval Ishai, Anders Konring, Eyal Kushilevitz, and Varun Narayanan
2023/329
Caveat Implementor! Key Recovery Attacks on MEGA
Martin R. Albrecht, Miro Haller, Lenka Mareková, Kenneth G. Paterson
2023/328
The state diagram of $\chi$
Jan Schoone and Joan Daemen
2023/327
Nested Quantum Search Model on Symmetric Ciphers and Its Applications
Yangru Zheng, Juntao Gao, Baocang Wang
2023/326
A weakness in OCB3 used with short nonces allowing for a break of authenticity and confidentiality
Jean Liénardy, Frédéric Lafitte
2023/325
Revocable Cryptography from Learning with Errors
Prabhanjan Ananth, Alexander Poremba, and Vinod Vaikuntanathan
2023/324
LATKE: A Framework for Constructing Identity-Binding PAKEs
Jonathan Katz and Michael Rosenberg
2023/323
Poseidon2: A Faster Version of the Poseidon Hash Function
Lorenzo Grassi, Dmitry Khovratovich, and Markus Schofnegger
2023/322
Differential Fault Attack on Rasta and $\text {FiLIP} _ {\text {DSM}}$
R Radheshwar, Meenakshi Kansal, Pierrick Méaux, Dibyendu Roy
2023/321
A Holistic Security Analysis of Monero Transactions
Cas Cremers, Julian Loss, and Benedikt Wagner
2023/320
Anonymous Counting Tokens
Fabrice Benhamouda, Mariana Raykova, and Karn Seth
2023/319
A Sharding-Based Approach for Enhancing Efficiency in ISSDOs for Sharing Scattered Values
Reza Ghasemi
2023/318
A Transformation for Lifting Discrete Logarithm Based Cryptography to Post-Quantum Cryptography
Danilo Gligoroski
2023/317
The special case of cyclotomic fields in quantum algorithms for unit groups
Razvan Barbulescu, Adrien Poulalion
2023/316
New Methods for Bounding the Length of Impossible Differentials of SPN Block Ciphers
Senpeng Wang, Dengguo Feng, Bin Hu, Jie Guan, Ting Cui, Tairong Shi, Kai Zhang
2023/315
SoK on Blockchain Evolution and a Taxonomy for Public Blockchain Generations
Thuat Do
2023/314
Memory-Tight Multi-Challenge Security of Public-Key Encryption
Joseph Jaeger, Akshaya Kumar
2023/313
SoK: Metadata-Protecting Communication Systems
Sajin Sasy, Ian Goldberg
2023/312
BIP32-Compatible Threshold Wallets
Poulami Das, Andreas Erwig, Sebastian Faust, Julian Loss, and Siavash Riahi
2023/311
Oblivious Transfer from Zero-Knowledge Proofs, or How to Achieve Round-Optimal Quantum Oblivious Transfer and Zero-Knowledge Proofs on Quantum States
Léo Colisson, Garazi Muguruza, and Florian Speelman
2023/310
Ramen: Souper Fast Three-Party Computation for RAM Programs
Lennart Braun, Mahak Pancholi, Rahul Rachuri, and Mark Simkin
2023/309
Practical Construction for Secure Trick-Taking Games Even With Cards Set Aside
Rohann Bella, Xavier Bultel, Céline Chevalier, Pascal Lafourcade, Charles Olivier-Anclin
2023/308
Punctured Syndrome Decoding Problem Efficient Side-Channel Attacks Against Classic McEliece
Vincent Grosso, Pierre-Louis Cayrel, Brice Colombier, Vlad-Florin Dragoi
2023/307
SUPERPACK: Dishonest Majority MPC with Constant Online Communication
Daniel Escudero, Vipul Goyal, Antigoni Polychroniadou, Yifan Song, Chenkai Weng
2023/306
A Simple Construction of Quantum Public-Key Encryption from Quantum-Secure One-Way Functions
Khashayar Barooti, Giulio Malavolta, Michael Walter
2023/305
A Novel Related Nonce Attack for ECDSA
Marco Macchetti
2023/304
On homomorphic encryption using abelian groups: Classical security analysis
Eleni Agathocleous, Vishnupriya Anupindi, Annette Bachmayr, Chloe Martindale, Rahinatou Yuh Njah Nchiwo, Mima Stanojkovski
2023/303
Fusion One-Time Non-Interactively-Aggregatable Digital Signatures From Lattices
Brandon Goodell, Aaron Feickert
2023/302
Does the Dual-Sieve Attack on Learning with Errors even Work?
Léo Ducas, Ludo Pulles
2023/301
On Circuit Private, Multikey and Threshold Approximate Homomorphic Encryption
Kamil Kluczniak and Giacomo Santato
2023/300
CNF Characterization of Sets over $\mathbb{Z}_2^n$ and Its Applications in Cryptography
Hu Xiaobo, Xu Shengyuan, Tu Yinzi, Feng Xiutao
2023/299
Approximate Modeling of Signed Difference and Digraph based Bit Condition Deduction: New Boomerang Attacks on BLAKE
Yonglin Hao, Qingju Wang, Lin Jiao, Xinxin Gong
2023/298
Hardening Signature Schemes via Derive-then-Derandomize: Stronger Security Proofs for EdDSA
Mihir Bellare, Hannah Davis, Zijing Di
2023/297
Authenticated private information retrieval
Simone Colombo, Kirill Nikitin, Henry Corrigan-Gibbs, David J. Wu, and Bryan Ford
2023/296
OpenPubkey: Augmenting OpenID Connect with User held Signing Keys
Ethan Heilman, Lucie Mugnier, Athanasios Filippidis, Sharon Goldberg, Sebastien Lipman, Yuval Marcus, Mike Milano, Sidhartha Premkumar, Chad Unrein, and John Merfeld
2023/295
Randomized Half-Ideal Cipher on Groups with applications to UC (a)PAKE
Bruno Freitas Dos Santos, Yanqi Gu, Stanislaw Jarecki
2023/294
SCA-LDPC: A Code-Based Framework for Key-Recovery Side-Channel Attacks on Post-Quantum Encryption Schemes
Qian Guo, Denis Nabokov, Alexander Nilsson, Thomas Johansson
2023/293
Searching for Gemstones: Flawed Stegosystems May Hide Promissing Ideas
Diana Maimut, Evgnosia-Alexandra Kelesidis, Ilona Teodora Ciocan
2023/292
A Formal Treatment of Distributed Key Generation, and New Constructions
Chelsea Komlo, Ian Goldberg, Douglas Stebila
2023/291
PEO-Store: Practical and Economical Oblivious Store with Peer-to-Peer Delegation
Wenlong Tian, Jian Guo, Zhiyong Xu, Ruixuan Li, Weijun Xiao
2023/290
Improved Key Pair Generation for Falcon, BAT and Hawk
Thomas Pornin
2023/289
Lower Bounds for Secret-Sharing Schemes for k-Hypergraphs
Amos Beimel
2023/288
Efficient Detection of High Probability Statistical Properties of Cryptosystems via Surrogate Differentiation
Itai Dinur, Orr Dunkelman, Nathan Keller, Eyal Ronen, Adi Shamir
2023/287
Modelling Delay-based Physically Unclonable Functions through Particle Swarm Optimization
Nimish Mishra, Kuheli Pratihar, Anirban Chakraborty, Debdeep Mukhopadhyay
2023/286
DORCIS: Depth Optimized Quantum Implementation of Substitution Boxes
Matthew Chun, Anubhab Baksi, Anupam Chattopadhyay
2023/285
New Records in Collision Attacks on RIPEMD-160 and SHA-256
Yingxin Li, Fukang Liu, Gaoli Wang
2023/284
Robust and Reusable Fuzzy Extractors and their Application to Authentication from Iris Data
Somnath Panja, Nikita Tripathi, Shaoquan Jiang, Reihaneh Safavi-Naini
2023/283
Maximizing Miner Revenue in Transaction Fee Mechanism Design
Ke Wu, Elaine Shi, and Hao Chung
2023/282
Quantum trapdoor functions from classical one-way functions
Andrea Coladangelo
2023/281
Towards A Correct-by-Construction FHE Model
Zhenkun Yang, Wen Wang, Jeremy Casas, Pasquale Cocchini, Jin Yang
2023/280
A Simple Single Slot Finality Protocol For Ethereum
Francesco D'Amato and Luca Zanolini
2023/279
Recent Latest Message Driven GHOST: Balancing Dynamic Availability With Asynchrony Resilience
Francesco D'Amato and Luca Zanolini
2023/278
Actively Secure Half-Gates with Minimum Overhead under Duplex Networks
Hongrui Cui, Xiao Wang, Kang Yang, and Yu Yu
2023/277
Analysis of RIPEMD-160: New Collision Attacks and Finding Characteristics with MILP
Fukang Liu, Gaoli Wang, Santanu Sarkar, Ravi Anand, Willi Meier, Yingxin Li, Takanori Isobe
2023/276
Threshold and Multi-Signature Schemes from Linear Hash Functions
Stefano Tessaro, Chenzhi Zhu
2023/275
Revisiting BBS Signatures
Stefano Tessaro and Chenzhi Zhu
2023/274
Panacea: Non-interactive and Stateless Oblivious RAM
Kelong Cong, Debajyoti Das, Georgio Nicolas, and Jeongeun Park
2023/273
Derecho: Privacy Pools with Proof-Carrying Disclosures
Josh Beal, Ben Fisch
2023/272
A study of KEM generalizations
Bertram Poettering, Simon Rastikian
2023/271
Swoosh: Efficient Lattice-Based Non-Interactive Key Exchange
Phillip Gajland, Bor de Kock, Miguel Quaresma, Giulio Malavolta, and Peter Schwabe
2023/270
Actively Secure Arithmetic Computation and VOLE with Constant Computational Overhead
Benny Applebaum, Niv Konstantini
2023/269
Simple Two-Round OT in the Explicit Isogeny Model
Emmanuela Orsini, Riccardo Zanotto
2023/268
Verifiable Decentralized Multi-Client Functional Encryption for Inner Product
Dinh Duy Nguyen, Duong Hieu Phan, and David Pointcheval
2023/267
Proteus: A Pipelined NTT Architecture Generator
Florian Hirner, Ahmet Can Mert, and Sujoy Sinha Roy
2023/266
Do we need to change some things? Open questions posed by the upcoming post-quantum migration to existing standards and deployments
Panos Kampanakis, Tancrède Lepoint
2023/265
Software with Certified Deletion
James Bartusek, Vipul Goyal, Dakshita Khurana, Giulio Malavolta, Justin Raizes, and Bhaskar Roberts
2023/264
Public Key Encryption with Secure Key Leasing
Shweta Agrawal, Fuyuki Kitagawa, Ryo Nishimaki, Shota Yamada, Takashi Yamakawa
2023/263
DualMS: Efficient Lattice-Based Two-Round Multi-Signature with Trapdoor-Free Simulation
Yanbo Chen
2023/262
Generic Attack on Duplex-Based AEAD Modes using Random Function Statistics
Henri Gilbert, Rachelle Heim Boissier, Louiza Khati, Yann Rotella
2023/261
A Greedy Global Framework for Lattice Reduction Using Deep Insertions
Sanjay Bhattacherjee, Julio Hernandez-Castro, and Jack Moyler
2023/260
Webb Protocol: A cross-chain private application and governance protocol.
Drew Stone
2023/259
A MIQCP-Based Automatic Search Algorithm for Differential-Linear Trails of ARX Ciphers(Long Paper)
Guangqiu Lv, Chenhui Jin, Ting Cui
2023/258
Privacy-Preserving Tree-Based Inference with Fully Homomorphic Encryption
Jordan Frery, Andrei Stoian, Roman Bredehoft, Luis Montero, Celia Kherfallah, Benoit Chevallier-Mames, Arthur Meyre
2023/257
Deep Neural Networks for Encrypted Inference with TFHE
Andrei Stoian, Jordan Frery, Roman Bredehoft, Luis Montero, Celia Kherfallah, Benoit Chevallier-Mames
2023/256
Traitor Tracing with N^(1/3)-size Ciphertexts and O(1)-size Keys from k-Lin
Junqing Gong, Ji Luo, Hoeteck Wee
2023/255
Exploiting Non-Full Key Additions: Full-Fledged Automatic Demirci-Selcuk Meet-in-the-Middle Cryptanalysis of SKINNY
Danping Shi, Siwei Sun, Ling Song, Lei Hu, Qianqian Yang
2023/254
Mitigating Decentralized Finance Liquidations with Reversible Call Options
Kaihua Qin, Jens Ernstberger, Liyi Zhou, Philipp Jovanovic, Arthur Gervais
2023/253
XOCB: Beyond-Birthday-Bound Secure Authenticated Encryption Mode with Rate-One Computation (Full Version)
Zhenzhen Bao, Seongha Hwang, Akiko Inoue, Byeonghak Lee, Jooyoung Lee, Kazuhiko Minematsu
2023/252
Obfuscation of Pseudo-Deterministic Quantum Circuits
James Bartusek, Fuyuki Kitagawa, Ryo Nishimaki, and Takashi Yamakawa
2023/251
Hardware Root-of-Trust implementations in Trusted Execution Environments
Usman Ali, Hamza Omar, Chujiao Ma, Vaibhav Garg, Omer Khan
2023/250
A Lower Bound on the Length of Signatures Based on Group Actions and Generic Isogenies
Dan Boneh, Jiaxin Guan, Mark Zhandry
2023/249
Anamorphic Encryption, Revisited
Fabio Banfi, Konstantin Gegier, Martin Hirt, Ueli Maurer, and Guilherme Rito
2023/248
Unique-Path Identity Based Encryption With Applications to Strongly Secure Messaging
Paul Rösler, Daniel Slamanig, Christoph Striecks
2023/247
A New Sieving-Style Information-Set Decoding Algorithm
Qian Guo, Thomas Johansson, and Vu Nguyen
2023/246
Fixing and Mechanizing the Security Proof of Fiat-Shamir with Aborts and Dilithium
Manuel Barbosa, Gilles Barthe, Christian Doczkal, Jelle Don, Serge Fehr, Benjamin Grégoire, Yu-Hsuan Huang, Andreas Hülsing, Yi Lee, Xiaodi Wu
2023/245
A Detailed Analysis of Fiat-Shamir with Aborts
Julien Devevey, Pouria Fallahpour, Alain Passelègue, Damien Stehlé, and Keita Xagawa
2023/244
Semi-Quantum Copy-Protection and More
Céline Chevalier, Paul Hermouet, and Quoc-Huy Vu
2023/243
Memory-Efficient Attacks on Small LWE Keys
Andre Esser, Arindam Mukherjee, and Santanu Sarkar
2023/242
The propagation game: on simulatability, correlation matrices, and probing security
Vittorio Zaccaria
2023/241
Lynx: Family of Lightweight Authenticated Encryption Schemes based on Tweakable Blockcipher
Munawar Hasan, Donghoon Chang
2023/240
Pitfalls and Shortcomings for Decompositions and Alignment (Full Version)
Baptiste Lambin, Gregor Leander, Patrick Neumann
2023/239
Improved Preimage Sampling for Lattices
Corentin Jeudy, Adeline Roux-Langlois, Olivier Sanders
2023/238
Certifying Giant Nonprimes
Charlotte Hoffmann, Pavel Hubáček, Chethan Kamath, Krzysztof Pietrzak
2023/237
Fast Practical Lattice Reduction through Iterated Compression
Keegan Ryan, Nadia Heninger
2023/236
Certified Everlasting Secure Collusion-Resistant Functional Encryption, and More
Taiga Hiroka, Fuyuki Kitagawa, Tomoyuki Morimae, Ryo Nishimaki, Tapas Pal, and Takashi Yamakawa
2023/235
New Results on Machine Learning Based Distinguishers
Anubhab Baksi, Jakub Breier, Vishnu Asutosh Dasu, Xiaolu Hou, Hyunji Kim, Hwajeong Seo
2023/234
Privately Puncturing PRFs from Lattices: Adaptive Security and Collusion Resistant Pseudorandomness
Rupeng Yang
2023/233
Complete Characterization of Broadcast and Pseudo-Signatures from Correlations
Varun Narayanan, Vinod M. Prabhakaran, Neha Sangwan, Shun Watanabe
2023/232
Crypto Dark Matter on the Torus: Oblivious PRFs from shallow PRFs and FHE
Martin R. Albrecht, Alex Davidson, Amit Deo, and Daniel Gardham
2023/231
One Digit Checksum for Data Integrity Verification of Cloud-executed Homomorphic Encryption Operations
Mostefa Kara, Abdelkader Laouid, Omer Al dabbas, Mohammad Hammoudeh, Ahcène Bounceur
2023/230
Attacking the IETF/ISO Standard for Internal Re-keying CTR-ACPKM
Orr Dunkelman, Shibam Ghosh, Eran Lambooij
2023/229
One-out-of-Many Unclonable Cryptography: Definitions, Constructions, and More
Fuyuki Kitagawa and Ryo Nishimaki
2023/228
Authenticated Continuous Key Agreement: Active MitM Detection and Prevention
Benjamin Dowling, Britta Hale
2023/227
A Novel Automatic Technique Based on MILP to Search for Impossible Differentials
Yong Liu, Zejun Xiang, Siwei Chen, Shasha Zhang, Xiangyong Zeng
2023/226
Impossibility of Indifferentiable Iterated Blockciphers from 3 or Less Primitive Calls
Chun Guo, Lei Wang, Dongdai Lin
2023/225
A Post-Quantum Round-Optimal Oblivious PRF from Isogenies
Andrea Basso
2023/224
Improved Power Analysis Attacks on Falcon
Shiduo Zhang, Xiuhan Lin, Yang Yu, Weijia Wang
2023/223
Classical and Quantum Security of Elliptic Curve VRF, via Relative Indifferentiability
Chris Peikert, Jiayu Xu
2023/222
A Lightweight Identification Protocol Based on Lattices
Samed Düzlü, Juliane Krämer, Thomas Pöppelmann, Patrick Struck
2023/221
Bicorn: An optimistically efficient distributed randomness beacon
Kevin Choi, Arasu Arun, Nirvan Tyagi, Joseph Bonneau
2023/220
Password-Authenticated TLS via OPAQUE and Post-Handshake Authentication
Julia Hesse, Stanislaw Jarecki, Hugo Krawczyk, Christopher Wood
2023/219
Sieving for large twin smooth integers using single solutions to Prouhet-Tarry-Escott
Knud Ahrens
2023/218
On the Post-Quantum Security of Classical Authenticated Encryption Schemes
Nathalie Lang, Stefan Lucks
2023/217
Indifferentiability of the Sponge Construction with a Restricted Number of Message Blocks
Charlotte Lefevre
2023/216
Two-Round Stateless Deterministic Two-Party Schnorr Signatures From Pseudorandom Correlation Functions
Yashvanth Kondi, Claudio Orlandi, and Lawrence Roy
2023/215
Formally verifying Kyber Episode IV: Implementation Correctness
José Bacelar Almeida, Manuel Barbosa, Gilles Barthe, Benjamin Grégoire, Vincent Laporte, Jean-Christophe Léchenet, Tiago Oliveira, Hugo Pacheco, Miguel Quaresma, Peter Schwabe, Antoine Séré, Pierre-Yves Strub
2023/214
DIPSAUCE: Efficient Private Stream Aggregation Without Trusted Parties
Joakim Brorsson and Martin Gunnarsson
2023/213
Deniable Authentication when Signing Keys Leak
Suvradip Chakraborty, Dennis Hofheinz, Ueli Maurer, and Guilherme Rito
2023/212
Generating Secure Hardware using ChatGPT Resistant to CWEs
Madhav Nair, Rajat Sadhukhan, Debdeep Mukhopadhyay
2023/211
Improved Low-depth SHA3 Quantum Circuit for Fault-tolerant Quantum Computers
Gyeongju Song, Kyungbae Jang, Hwajeong Seo
2023/210
New Generic Constructions of Error-Correcting PIR and Efficient Instantiations
Reo Eriguchi, Kaoru Kurosawa, Koji Nuida
2023/209
Hiding in Plain Sight: Non-profiling Deep Learning-based Side-channel Analysis with Plaintext/Ciphertext
Lichao Wu, Guilherme Perin, Stjepan Picek
2023/208
zkTree: A Zero-Knowledge Recursion Tree with ZKP Membership Proofs
Sai Deng, Bo Du
2023/207
On Quantum Secure Compressing Pseudorandom Functions
Ritam Bhaumik, Benoît Cogliati, Jordan Ethan, and Ashwin Jha
2023/206
Orca: FSS-based Secure Training and Inference with GPUs
Neha Jawalkar, Kanav Gupta, Arkaprava Basu, Nishanth Chandran, Divya Gupta, and Rahul Sharma
2023/205
DEFending Integrated Circuit Layouts
Jitendra Bhandari, Jayanth Gopinath, Mohammed Ashraf, Johann Knechtel, Ramesh Karri
2023/204
TreePIR: Sublinear-Time and Polylog-Bandwidth Private Information Retrieval from DDH
Arthur Lazzaretti, Charalampos Papamanthou
2023/203
A Different Base Approach for Better Efficiency on Range Proofs
Esra Günsay, Cansu Betin Onur, Murat Cenk
2023/202
SAT-aided Automatic Search of Boomerang Distinguishers for ARX Ciphers (Long Paper)
Dachao Wang, Baocang Wang, Siwei Sun
2023/201
DenseQMC: an efficient bit-slice implementation of the Quine-McCluskey algorithm
Aleksei Udovenko
2023/200
Classical and quantum 3 and 4-sieves to solve SVP with low memory
Johanna Loyer, André Chailloux
2023/199
MixFlow: Assessing Mixnets Anonymity with Contrastive Architectures and Semantic Network Information
Reyhane Attarian, Esfandiar Mohammadi, Tao Wang, Emad Heydari Beni
2023/198
Chopsticks: Fork-Free Two-Round Multi-Signatures from Non-Interactive Assumptions
Jiaxin Pan, Benedikt Wagner
2023/197
Flexible Password-Based Encryption: Securing Cloud Storage and Provably Resisting Partitioning-Oracle Attacks
Mihir Bellare, Laura Shea
2023/196
On Two Factors Affecting the Efficiency of MILP Models in Automated Cryptanalyses
Shengyuan Xu, Xiutao Feng, Yongxing Wang
2023/195
A simpler alternative to Lucas–Lehmer–Riesel primality test
Pavel Atnashev
2023/194
Hull Attacks on the Lattice Isomorphism Problem
Léo Ducas, Shane Gibbons
2023/193
Traceable Policy-Based Signatures with Delegation
Ismail Afia and Riham AlTawy
2023/192
Faithful Simulation of Randomized BFT Protocols on Block DAGs
Hagit Attiya, Constantin Enea, Shafik Nassar
2023/191
Beyond the Blockchain Address: Zero-Knowledge Address Abstraction
Sanghyeon Park, Jeong Hyuk Lee, Seunghwa Lee, Jung Hyun Chun, Hyeonmyeong Cho, MinGi Kim, Hyun Ki Cho, Soo-Mook Moon
2023/190
Practical Security Analysis of Zero-Knowledge Proof Circuits
Hongbo Wen, Jon Stephens, Yanju Chen, Kostas Ferles, Shankara Pailoor, Kyle Charbonnet, Isil Dillig, and Yu Feng
2023/189
tlock: Practical Timelock Encryption from Threshold BLS
Nicolas Gailly, Kelsey Melissaris, Yolan Romailler
2023/188
Cryptanalysis of a key agreement scheme using determinants and rectangular matrices
Daniel R. L. Brown
2023/187
Towards Modular Foundations for Protocol Security
Lúcás Críostóir Meier
2023/186
Generic Models for Group Actions
Julien Duman, Dominik Hartmann, Eike Kiltz, Sabrina Kunzweiler, Jonas Lehmann, Doreen Riepel
2023/185
The Last Yard: Foundational End-to-End Verification of High-Speed Cryptography
Philipp G. Haselwarter, Benjamin Salling Hvass, Lasse Letager Hansen, Théo Winterhalter, Catalin Hritcu, and Bas Spitters
2023/184
Quantum Linear Key-recovery Attacks Using the QFT
André Schrottenloher
2023/183
Maravedí: A Secure and Practical Protocol to Trade Risk for Instantaneous Finality
Mario Larangeira, Maxim Jourenko
2023/182
CAPYBARA and TSUBAKI: Verifiable Random Functions from Group Actions and Isogenies
Yi-Fu Lai
2023/181
Fully Automated Differential-Linear Attacks against ARX Ciphers
Emanuele Bellini, David Gerault, Juan Grados, Rusydi Makarim, Thomas Peyrin
2023/180
Asymmetric Trapdoor Pseudorandom Generators: Definitions, Constructions, and Applications to Homomorphic Signatures with Shorter Public Keys
Jinpeng Hou, Yansong Gao, Anmin Fu, Jie Chen, Xiaofeng Chen, Yuqing Zhang, Willy Susilo, Josef Pieprzyk
2023/179
TS-Hash: a lightweight cryptographic hash family based on Galois LFSRs
Itay Bookstein, Boaz Tsaban
2023/178
Rotational-XOR Differential Rectangle Cryptanalysis on Simon-like Ciphers
Siwei Chen, Mingming Zhu, Zejun Xiang, Runqing Xu, Xiangyong Zeng, Shasha Zhang
2023/177
The geometric interpretation of the Tate pairing and its applications
Damien Robert
2023/176
A New Algebraic Approach to the Regular Syndrome Decoding Problem and Implications for PCG Constructions
Pierre Briaud and Morten Øygarden
2023/175
Linear codes of Schubert type and quadratic public keys of Multivariate Cryptography
Vasyl Ustimenko
2023/174
Improved Heuristics for Low-latency Implementations of Linear Layers
Qun Liu, Zheng Zhao, Meiqin Wang
2023/173
Degree-$D$ Reverse Multiplication-Friendly Embeddings: Constructions and Applications
Daniel Escudero, Cheng Hong, Hongqing Liu, Chaoping Xing, and Chen Yuan
2023/172
Impossibility of Efficient Information-Theoretic Fuzzy Extraction
Benjamin Fuller
2023/171
On Differential Privacy and Adaptive Data Analysis with Bounded Space
Itai Dinur, Uri Stemmer, David P. Woodruff, Samson Zhou
2023/170
EKE Meets Tight Security in the Universally Composable Framework
Xiangyu Liu, Shengli Liu, Shuai Han, Dawu Gu
2023/169
Reputation-based state machine replication
Muhong Huang, Runchao Han, Zhiqiang Du, Yanfang Fu, Liangxin Liu
2023/168
Time-Efficient Finite Field Microarchitecture Design for Curve448 and Ed448 on Cortex-M4
Mila Anastasova, Reza Azarderakhsh, Mehran Mozaffari Kermani, Lubjana Beshaj
2023/167
Modular Design of KEM-Based Authenticated Key Exchange
Colin Boyd, Bor de Kock, Lise Millerjord
2023/166
Hermes: I/O-Efficient Forward-Secure Searchable Symmetric Encryption
Brice Minaud, Michael Reichle
2023/165
Optimizing the depth of quantum implementations of linear layers
Chengkai Zhu, Zhenyu Huang
2023/164
Concretely Efficient Input Transformation Based Zero-Knowledge Argument System for Arbitrary Circuits
Frank Y.C. Lu
2023/163
Hardware-Software Co-design for Side-Channel Protected Neural Network Inference
Anuj Dubey, Rosario Cammarota, Avinash Varna, Raghavan Kumar, Aydin Aysu
2023/162
AutoFHE: Automated Adaption of CNNs for Efficient Evaluation over FHE
Wei Ao and Vishnu Naresh Boddeti
2023/161
Quantum Advantage from One-Way Functions
Tomoyuki Morimae and Takashi Yamakawa
2023/160
Practically optimizing multi-dimensional discrete logarithm calculations: Implementations in subgroups of $\mathbb{Z}^{*}_{p}$ relevant to electronic voting and cash schemes
Madhurima Mukhopadhyay
2023/159
Sequential Half-Aggregation of Lattice-Based Signatures
Katharina Boudgoust and Akira Takahashi
2023/158
Enabling FrodoKEM on Embedded Devices
Joppe W. Bos, Olivier Bronchain, Frank Custers, Joost Renes, Denise Verbakel, Christine van Vredendaal
2023/157
A Key-Recovery Attack against Mitaka in the t-Probing Model
Thomas Prest
2023/156
Zero-Knowledge Functional Elementary Databases
Xinxuan Zhang and Yi Deng
2023/155
More Efficient Two-Round Multi-Signature Scheme with Provably Secure Parameters
Kaoru Takemure, Yusuke Sakai, Bagus Santoso, Goichiro Hanaoka, and Kazuo Ohta
2023/154
FIN: Practical Signature-Free Asynchronous Common Subset in Constant Time
Sisi Duan, Xin Wang, and Haibin Zhang
2023/153
Almost Tight Multi-User Security under Adaptive Corruptions & Leakages in the Standard Model
Shuai Han, Shengli Liu, Dawu Gu
2023/152
Almost Tightly-Secure Re-Randomizable and Replayable CCA-secure Public Key Encryption
Antonio Faonio, Dennis Hofheinz, Luigi Russo
2023/151
Analysis of the XSL Attack
Coteanu Maria Gabriela, Țîflea Denisa-Ionela
2023/150
More Efficient Zero-Knowledge Protocols over $\mathbb{Z}_{2^k}$ via Galois Rings
Fuchun Lin, Chaoping Xing, and Yizhou Yao
2023/149
Demystifying Bootstrapping in Fully Homomorphic Encryption
Ahmad Al Badawi and Yuriy Polyakov
2023/148
PassPro: A Secure Password-based Authentication Mechanism to Prevent Attacks
Ripon Patgiri and Laiphrakpam Dolendro Singh
2023/147
Fiat-Shamir Bulletproofs are Non-Malleable (in the Random Oracle Model)
Chaya Ganesh, Claudio Orlandi, Mahak Pancholi, Akira Takahashi, and Daniel Tschudi
2023/146
Optimized Quantum Implementation of AES
Da Lin, Zejun Xiang, Runqing Xu, Shasha Zhang, and Xiangyong Zeng
2023/145
Combining MILP Modeling with Algebraic Bias Evaluation for Linear Mask Search: Improved Fast Correlation Attacks on SNOW
Xinxin Gong, Yonglin Hao, Qingju Wang
2023/144
Aegis: Privacy-Preserving Market for Non-Fungible Tokens
Hisham S. Galal, Amr M. Youssef
2023/143
A Practical Compiler for Attribute-Based Encryption: New Decentralized Constructions and More
Marloes Venema
2023/142
On the Feasibility of Single-Trace Attacks on the Gaussian Sampler using a CDT
Soundes Marzougui, Ievgan Kabin, Juliane Krämer, Thomas Aulbach, Jean-Pierre Seifert
2023/141
A Secure Bandwidth-Efficient Treatment for Dropout-Resistant Time-Series Data Aggregation
Reyhaneh Rabaninejad, Alexandros Bakas, Eugene Frimpong, Antonis Michalas
2023/140
Improving Convergence and Practicality of Slide-type Reductions
Jianwei Li, Michael Walter
2023/139
Improved Estimation of Key Enumeration with Applications to Solving LWE
Alessandro Budroni, Erik Mårtensson
2023/138
Tracing a Linear Subspace: Application to Linearly-Homomorphic Group Signatures
Chloé Hébant, David Pointcheval, Robert Schädlich
2023/137
PAPR: Publicly Auditable Privacy Revocation for Anonymous Credentials
Joakim Brorsson, Bernardo David, Lorenzo Gentile, Elena Pagnin, Paul Stankovski Wagner
2023/136
Compressed M-SIDH: An Instance of Compressed SIDH-like Schemes with Isogenies of Highly Composite Degrees
Kaizhan Lin, Jianming Lin, Shiping Cai, Weize Wang, and Chang-An Zhao
2023/135
Uncovering Vulnerabilities in Smartphone Cryptography: A Timing Analysis of the Bouncy Castle RSA Implementation
Sarani Bhattacharya, Dilip Kumar Shanmugasundaram Veeraraghavan, Shivam Bhasin, Debdeep Mukhopadhyay
2023/134
Cryptanalysis of Reduced Round ChaCha- New Attack and Deeper Analysis
Sabyasachi Dey, Hirendra Kumar Garai, Subhamoy Maitra
2023/133
Prism: Private Set Intersection and Union with Aggregation over Multi-Owner Outsourced Data
Shantanu Sharma, Yin Li, Sharad Mehrotra, Nisha Panwar, Dhrubajyoti Ghosh, Peeyush Gupta
2023/132
Security analysis of DBTRU cryptosystem
Alexandra Ciobanu, Marina Stefiuc
2023/131
Some Practical Applications of Fully Homomorphic Encryption
Elisa Giurgea, Tudor Hutu, Emil Simion
2023/130
Verifiable Distributed Aggregation Functions
Hannah Davis, Christopher Patton, Mike Rosulek, and Phillipp Schoppmann
2023/129
A Lower Bound on the Share Size in Evolving Secret Sharing
Noam Mazor
2023/128
Cloning Games: A General Framework for Unclonable Primitives
Prabhanjan Ananth, Fatih Kaleoglu, Qipeng Liu
2023/127
Sender-binding Key Encapsulation
Rebecca Schwerdt, Laurin Benz, Wasilij Beskorovajnov, Sarai Eilebrecht, Jörn Müller-Quade, Astrid Ottenhues
2023/126
Privacy-Preserving Payment System With Verifiable Local Differential Privacy
Danielle Movsowitz Davidow, Yacov Manevich, Eran Toch
2023/125
Ransomware data recovery techniques
Irimia Alexandru-Vasile
2023/124
Security of Ethereum Layer 2s
Ionuț Roșca, Alexandra-Ina Butnaru, Emil Simion
2023/123
A way of decrypting particular malware payloads found in MZPE files
Tudorică Radu, Rares Radu, Emil Simion
2023/122
SoK: Privacy-Enhancing Technologies in Finance
Carsten Baum, James Hsin-yu Chiang, Bernardo David, Tore Kasper Frederiksen
2023/121
Hashing to elliptic curves over highly $2$-adic fields $\mathbb{F}_{\!q}$ with $O(\log(q))$ operations in $\mathbb{F}_{\!q}$
Dmitrii Koshelev
2023/120
X-Cipher: Achieving Data Resiliency in Homomorphic Ciphertexts
Adam Caulfield, Nabiha Raza, and Peizhao Hu
2023/119
Worst-Case Subexponential Attacks on PRGs of Constant Degree or Constant Locality
Akin Ünal
2023/118
A New Generic Fault Resistant Masking Scheme using Error-Correcting Codes
Chloé Gravouil
2023/117
Full-Round Differential Attack on ULC and LICID Block Ciphers Designed for IoT
Manjeet Kaur, Tarun Yadav, Manoj Kumar, Dhananjoy Dey
2023/116
A Cryptographic Layer for the Interoperability of CBDC and Cryptocurrency Ledgers
Diego Castejon-Molina, Alberto del Amo Pastelero, Dimitrios Vasilopoulos, Pedro Moreno-Sanchez
2023/115
Multi-User CDH Problems and the Concrete Security of NAXOS and HMQV
Eike Kiltz, Jiaxin Pan, Doreen Riepel, Magnus Ringerud
2023/114
Credible, Optimal Auctions via Blockchains
Tarun Chitra, Matheus V. X. Ferreira, Kshitij Kulkarni
2023/113
Homomorphic Sortition – Single Secret Leader Election for PoS Blockchains
Luciano Freitas, Andrei Tonkikh, Adda-Akram Bendoukha, Sara Tucci-Piergiovanni, Renaud Sirdey, Oana Stan, Petr Kuznetsov
2023/112
Faster Amortized FHEW bootstrapping using Ring Automorphisms
Gabrielle De Micheli, Duhyeong Kim, Daniele Micciancio, and Adam Suhl
2023/111
An Attack on the LILLE Stream Cipher
Vahid Amin-Ghafari, Mohammad Ali Orumiehchiha, Saeed Rostami
2023/110
VORSHA: A Variable-sized, One-way and Randomized Secure Hash Algorithm
Ripon Patgiri, Laiphrakpam Dolendro Singh, Dalton Meitei Thounaojam
2023/109
SoK: Modeling for Large S-boxes Oriented to Differential Probabilities and Linear Correlations (Long Paper)
Ling Sun, Meiqin Wang
2023/108
Grotto: Screaming fast $(2 + 1)$-PC for $\mathbb{Z}_{2^{n}}$ via (2, 2)-DPFs
Kyle Storrier, Adithya Vadapalli, Allan Lyons, Ryan Henry
2023/107
The Tip5 Hash Function for Recursive STARKs
Alan Szepieniec, Alexander Lemmens, Jan Ferdinand Sauer, Bobbin Threadbare, Al-Kindi
2023/106
Deuring for the People: Supersingular Elliptic Curves with Prescribed Endomorphism Ring in General Characteristic
Jonathan Komada Eriksen, Lorenz Panny, Jana Sotáková, and Mattia Veroni
2023/105
Gate-Level Masking of Streamlined NTRU Prime Decapsulation in Hardware
Georg Land, Adrian Marotzke, Jan Richter-Brockmann, Tim Güneysu
2023/104
Optimizations and Trade-offs for HElib
Anamaria Costache, Lea Nürnberger, Rachel Player
2023/103
Fair Delivery of Decentralised Randomness Beacon
Runchao Han, Jiangshan Yu
2023/102
Cache-timing attack against HQC
Senyang Huang, Rui Qi Sim, Chitchanok Chuengsatiansup, Qian Guo, Thomas Johansson
2023/101
Practical Preimage Attack on 3-Round Keccak-256
Xiaoen Lin, Le He, Hongbo Yu
2023/100
Meteor: Improved Secure 3-Party Neural Network Inference with Reducing Online Communication Costs
Ye Dong, Xiaojun Chen, Weizhan Jing, Kaiyun Li, Weiping Wang
2023/099
Scalable Multiparty Garbling
Gabrielle Beck, Aarushi Goel, Aditya Hegde, Abhishek Jain, Zhengzhong Jin, and Gabriel Kaptchuk
2023/098
Belief Propagation Meets Lattice Reduction: Security Estimates for Error-Tolerant Key Recovery from Decryption Errors
Julius Hermelink, Erik Mårtensson, Simona Samardjiska, Peter Pessl, Gabi Dreo Rodosek
2023/097
Circuit-Succinct Universally-Composable NIZKs with Updatable CRS
Behzad Abdolmaleki, Noemi Glaeser, Sebastian Ramacher, and Daniel Slamanig
2023/096
MPC With Delayed Parties Over Star-Like Networks
Mariana Gama, Emad Heydari Beni, Emmanuela Orsini, Nigel P. Smart, and Oliver Zajonc
2023/095
On TLS for the Internet of Things, in a Post Quantum world
Michael Scott
2023/094
Portunus: Re-imagining access control in distributed systems
Watson Ladd, Tanya Verma, Marloes Venema, Armando Faz Hernandez, Brendan McMillion, Avani Wildani, Nick Sullivan
2023/093
Automated Side-Channel Attacks using Black-Box Neural Architecture Search
Pritha Gupta, Jan Peter Drees, and Eyke Hüllermeier
2023/092
Estimation of Shor's Circuit for 2048-bit Integers based on Quantum Simulator
Junpei Yamaguchi, Masafumi Yamazaki, Akihiro Tabuchi, Takumi Honda, Tetsuya Izu, Noboru Kunihiro
2023/091
Satisfiability Modulo Finite Fields
Alex Ozdemir, Gereon Kremer, Cesare Tinelli, and Clark Barrett
2023/090
Unlimited Results: Breaking Firmware Encryption of ESP32-V3
Karim M. Abdellatif, Olivier Hériveaux, Adrian Thillard
2023/089
COMBINE: COMpilation and Backend-INdependent vEctorization for Multi-Party Computation
Benjamin Levy, Muhammad Ishaq, Ben Sherman, Lindsey Kennard, Ana Milanova, and Vassilis Zikas
2023/088
Individual Cryptography
Stefan Dziembowski, Sebastian Faust, Tomasz Lizurej
2023/087
Verification of Correctness and Security Properties for CRYSTALS-KYBER
Katharina Kreuzer
2023/086
Flyover: A Repayment Protocol for Fast Bitcoin Transfers over Federated Pegs
Javier Álvarez Cid-Fuentes, Diego Angel Masini, Sergio Demian Lerner
2023/085
The Security of ChaCha20-Poly1305 in the Multi-user Setting
Jean Paul Degabriele, Jérôme Govinden, Felix Günther, Kenneth G. Paterson
2023/084
Single-tiered hybrid PoW consensus protocol to encourage decentralization in bitcoin
GyuChol.Kim
2023/083
MacORAMa: Optimal Oblivious RAM with Integrity
Surya Mathialagan, Neekon Vafa
2023/082
Specialized Proof of Confidential Knowledge (SPoCK)
Tarak Ben Youssef, Riad S. Wahby
2023/081
Parakeet: Practical Key Transparency for End-to-End Encrypted Messaging
Harjasleen Malvai, Lefteris Kokoris-Kogias, Alberto Sonnino, Esha Ghosh, Ercan Oztürk, Kevin Lewi, Sean Lawlor
2023/080
PLASMA: Private, Lightweight Aggregated Statistics against Malicious Adversaries
Dimitris Mouris, Pratik Sarkar, and Nektarios Georgios Tsoutsos
2023/079
The challenges of proving solvency while preserving privacy.
Tabacaru Robert, Anghel Florin, Asandoaiei David, Simion Emil
2023/078
An Efficient Multi-Signature Scheme for Blockchain
Mostefa Kara, Abdelkader Laouid, Mohammad Hammoudeh
2023/077
Lattice-Based Blind Signatures: Short, Efficient, and Round-Optimal
Ward Beullens, Vadim Lyubashevsky, Ngoc Khanh Nguyen, Gregor Seiler
2023/076
Bake It Till You Make It: Heat-induced Power Leakage from Masked Neural Networks
Dev M. Mehta, Mohammad Hashemi, David S. Koblah, Domenic Forte, and Fatemeh Ganji
2023/075
Silicon Echoes: Non-Invasive Trojan and Tamper Detection using Frequency-Selective Impedance Analysis
Tahoura Mosavirik, Saleh Khalaj Monfared, Maryam Saadat Safa, Shahin Tajik
2023/074
Random Sources in Private Computation
Geoffroy Couteau, Adi Rosén
2023/073
FssNN: Communication-Efficient Secure Neural Network Training via Function Secret Sharing
Peng Yang, Zoe Lin Jiang, Shiqi Gao, Hongxiao Wang, Jun Zhou, Yangyiye Jin, Siu-Ming Yiu, and Junbin Fang
2023/072
Non-Interactive Secure Computation of Inner-Product from LPN and LWE
Geoffroy Couteau, Maryam Zarezadeh
2023/071
A security analysis comparison between Signal, WhatsApp and Telegram
Corina-Elena Bogos, Răzvan Mocanu, Emil Simion
2023/070
A new side-channel attack on RSA prime numbers generation
Isac Iulian-George, Emil Simion
2023/069
On the (Im)plausibility of Public-Key Quantum Money from Collision-Resistant Hash Functions
Prabhanjan Ananth, Zihan Hu, Henry Yuen
2023/068
Obfuscating Evasive Decision Trees
Shalini Banerjee, Steven D. Galbraith, and Giovanni Russello
2023/067
Blind signatures from Zero-knowledge arguments
Paulo L. Barreto, Gustavo H. M. Zanon
2023/066
Plonkup scheme with multiple queries
Alexandr Bulkin, Tim Dokchitser
2023/065
A Practical TFHE-Based Multi-Key Homomorphic Encryption with Linear Complexity and Low Noise Growth
Jakub Klemsa, Melek Önen, Yavuz Akın
2023/064
Computation of Hilbert class polynomials and modular polynomials from supersingular elliptic curves
Antonin Leroux
2023/063
Threshold Signatures in the Multiverse
Leemon Baird, Sanjam Garg, Abhishek Jain, Pratyay Mukherjee, Rohit Sinha, Mingyuan Wang, Yinuo Zhang
2023/062
Post-Quantum Secure Deterministic Wallet: Stateless, Hot/Cold Setting, and More Secure
Mingxing Hu
2023/061
Key-and-Signature Compact Multi-Signatures for Blockchain: A Compiler with Realizations
Shaoquan Jiang, Dima Alhadidi, and Hamid Fazli Khojir
2023/060
Silph: A Framework for Scalable and Accurate Generation of Hybrid MPC Protocols
Edward Chen, Jinhao Zhu, Alex Ozdemir, Riad S. Wahby, Fraser Brown, Wenting Zheng
2023/059
Oil and Vinegar: Modern Parameters and Implementations
Ward Beullens, Ming-Shing Chen, Shih-Hao Hung, Matthias J. Kannwischer, Bo-Yuan Peng, Cheng-Jhih Shih, Bo-Yin Yang
2023/058
SCALLOP: scaling the CSI-FiSh
Luca De Feo, Tako Boris Fouotsa, Péter Kutas, Antonin Leroux, Simon-Philipp Merz, Lorenz Panny, and Benjamin Wesolowski
2023/057
DY Fuzzing: Formal Dolev-Yao Models Meet Cryptographic Protocol Fuzz Testing
Max Ammann, Lucca Hirschi, and Steve Kremer
2023/056
Quantum Annealing for Subset Product and Noisy Subset Product
Trey Li
2023/055
An analysis of a scheme proposed for electronic voting systems
Nicu Neculache, Vlad-Andrei Petcu, Emil Simion
2023/054
On the Incoercibility of Digital Signatures
Ashley Fraser, Lydia Garms, Elizabeth A. Quaglia
2023/053
P3V: Privacy-Preserving Path Validation System for Multi-Authority Sliced Networks
Weizhao Jin, Erik Kline, T. K. Satish Kumar, Lincoln Thurlow, Srivatsan Ravi
2023/052
Putting the Online Phase on a Diet: Covert Security from Short MACs
Sebastian Faust, Carmit Hazay, David Kretzler, Benjamin Schlosser
2023/051
On the Scholz conjecture on addition chains
Theophilus Agama
2023/050
Exploiting Intermediate Value Leakage in Dilithium: A Template-Based Approach
Alexandre Berzati, Andersson Calle Viera, Maya Chartouny, Steven Madec, Damien Vergnaud, David Vigilant
2023/049
Phantom: A CUDA-Accelerated Word-Wise Homomorphic Encryption Library
Hao Yang, Shiyu Shen, Wangchen Dai, Lu Zhou, Zhe Liu, and Yunlei Zhao
2023/048
On-Line/Off-Line DCR-based Homomorphic Encryption and Applications
Marc Joye
2023/047
Side-Channel Resistant Implementation Using Arbiter PUF
Raja Adhithan RadhaKrishnan
2023/046
Cognitive Cryptography using behavioral features from linguistic-biometric data
Jose Contreras
2023/045
A note on machine learning applied in ransomware detection
Manuela Horduna, Simona-Maria Lăzărescu, Emil Simion
2023/044
Complete Knowledge: Preventing Encumbrance of Cryptographic Secrets
Mahimna Kelkar, Kushal Babel, Philip Daian, James Austgen, Vitalik Buterin, and Ari Juels
2023/043
RDS: FPGA Routing Delay Sensors for Effective Remote Power Analysis Attacks
David Spielmann, Ognjen Glamocanin, Mirjana Stojilovic
2023/042
On Protecting SPHINCS+ Against Fault Attacks
Aymeric Genêt
2023/041
Quantum-Safe Protocols and Application in Data Security of Medical Records
Adrian-Daniel Stefan, Ionut-Petrisor Anghel, Emil Simion
2023/040
A Closer Look at the Chaotic Ring Oscillators based TRNG Design
Shuqin Su, Bohan Yang, Vladimir Rožić, Mingyuan Yang, Min Zhu, Shaojun Wei, Leibo Liu
2023/039
Server-Supported Decryption for Mobile Devices
Johanna Maria Kirss, Peeter Laud, Nikita Snetkov, Jelizaveta Vakarjuk
2023/038
On the Amortized Communication Complexity of Byzantine Broadcast
Atsuki Momose, Ling Ren, Elaine Shi, Jun Wan, Zhuolun Xiang
2023/037
Efficient Isogeny Proofs Using Generic Techniques
Kelong Cong, Yi-Fu Lai, Shai Levin
2023/036
Differential analysis of the ternary hash function Troika
Christina Boura, Margot Funk, Yann Rotella
2023/035
A Deep Analysis of two Glitch-Free Hardware Masking Schemes SESYM and LMDPL
Nicolai Müller, Daniel Lammers, and Amir Moradi
2023/034
PROLEAD_SW - Probing-Based Software Leakage Detection for ARM Binaries
Jannik Zeitschner, Nicolai Müller, Amir Moradi
2023/033
Fast amortized KZG proofs
Dankrad Feist, Dmitry Khovratovich
2023/032
A Gentle Tutorial for Lattice-Based Cryptanalysis
Joseph Surin, Shaanan Cohney
2023/031
Sassafras and Semi-Anonymous Single Leader Election
Jeffrey Burdges, Handan Kılınç Alper, Alistair Stewart, Sergey Vasilyev
2023/030
Earn While You Reveal: Private Set Intersection that Rewards Participants
Aydin Abadi
2023/029
Public Verification for Private Hash Matching
Sarah Scheffler, Anunay Kulshrestha, Jonathan Mayer
2023/028
Information-Theoretic Distributed Point Functions
Elette Boyle, Niv Gilboa, Yuval Ishai, Victor I. Kolobov
2023/027
Verification of the (1–δ)-Correctness Proof of CRYSTALS-KYBER with Number Theoretic Transform
Katharina Kreuzer
2023/026
Fermat Factorization in the Wild
Hanno Böck
2023/025
Quantum Attacks on Beyond-Birthday-Bound MACs
Hong-Wei Sun, Bin-Bin Cai, Su-Juan Qin, Qiao-Yan Wen, and Fei Gao
2023/024
It Runs and it Hides: A Function-Hiding Construction for Private-Key Multi-Input Functional Encryption
Alexandros Bakas, Antonis Michalas
2023/023
New Algorithm for Exhausting Optimal Permutations for Generalized Feistel Networks
Stéphanie Delaune, Patrick Derbez, Arthur Gontier, Charles Prud'homme
2023/022
Recommendation for a holistic secure embedded ISA extension
Florian Stolz, Marc Fyrbiak, Pascal Sasdrich, Tim Güneysu
2023/021
DLFA: Deep Learning based Fault Analysis against Block Ciphers
Yukun Cheng, Changhai Ou, Fan Zhang, Shihui Zheng, Shengmin Xu, and Jiangshan Long
2023/020
The Scholz conjecture on addition chain is true for infinitely many integers with ℓ(2n) = ℓ(n)
Amadou TALL
2023/019
Autoencoder-enabled Model Portability for Reducing Hyperparameter Tuning Efforts in Side-channel Analysis
Marina Krček, Guilherme Perin
2023/018
New record in the number of qubits for a quantum implementation of AES
Zhenqiang Li, Fei Gao, Sujuan Qin, Qiaoyan Wen
2023/017
Cryptographic Group and Semigroup Actions
Oliver W. Gnilke, Jens Zumbrägel
2023/016
Simple Threshold (Fully Homomorphic) Encryption From LWE With Polynomial Modulus
Katharina Boudgoust and Peter Scholl
2023/015
Unconditionally Secure NIZK in the Fine-Grained Setting
Yuyu Wang, Jiaxin Pan
2023/014
Amortized Bootstrapping Revisited: Simpler, Asymptotically-faster, Implemented
Antonio Guimarães, Hilder V. L. Pereira, and Barry van Leeuwen
2023/013
M-SIDH and MD-SIDH: countering SIDH attacks by masking information
Tako Boris Fouotsa, Tomoki Moriya, Christophe Petit
2023/012
Delegated Private Matching for Compute
Dimitris Mouris, Daniel Masny, Ni Trieu, Shubho Sengupta, Prasad Buddhavarapu, and Benjamin Case
2023/011
Using the RSA or RSA-B accumulator in anonymous credential schemes
Sietse Ringers
2023/010
Verifying Classic McEliece: examining the role of formal methods in post-quantum cryptography standardisation
Martin Brain, Carlos Cid, Rachel Player, and Wrenna Robson
2023/009
Efficient Privacy-Preserving Viral Strain Classification via k-mer Signatures and FHE
Adi Akavia, Ben Galili, Hayim Shaul, Mor Weiss, Zohar Yakhini
2023/008
AutoPOI: Automated Points Of Interest Selection for Side-channel Analysis
Mick G.D. Remmerswaal, Lichao Wu, Sébastien Tiran, Nele Mentens
2023/007
Post-Quantum Security of Key Encapsulation Mechanism against CCA Attacks with a Single Decapsulation Query
Haodong Jiang, Zhi Ma, and Zhenfeng Zhang
2023/006
Exploring multi-task learning in the context of masked AES implementations
Thomas Marquet and Elisabeth Oswald
2023/005
Secure Single-Server Fuzzy Deduplication without Interactive Proof-of-Ownership in Cloud
Shuai Cheng, Shengke Zeng, Haoyu Zeng, Yawen Feng, Jixiang Xiao
2023/004
Quantum Artificial Intelligence on Cryptanalysis
Hyunji Kim, Sejin Lim, Anubhab Baksi, Dukyoung Kim, Seyoung Yoon, Kyungbae Jang, Hwajeong Seo
2023/003
How to Use Sigstore without Sigstore
Yan-Cheng Chang
2023/002
Ring Verifiable Random Functions and Zero-Knowledge Continuations
Jeffrey Burdges, Oana Ciobotaru, Handan Kılınç Alper, Alistair Stewart, and Sergey Vasilyev
2023/001
Time is money, friend! Timing Side-channel Attack against Garbled Circuit Constructions
Mohammad Hashemi, Domenic Forte, Fatemeh Ganji
2022/1781
COA-Secure Obfuscation and Applications
Ran Canetti, Suvradip Chakraborty, Dakshita Khurana, Nishanth Kumar, Oxana Poburinnaya, Manoj Prabhakaran
2022/1780
More Efficient Key Ranking for Optimal Collision Side-Channel Attacks
Cezary Glowacz
2022/1779
Batching, Aggregation, and Zero-Knowledge Proofs in Bilinear Accumulators
Shravan Srinivasan, Ioanna Karantaidou, Foteini Baldimtsi, Charalampos Papamanthou
2022/1778
Asynchronous Delegated Private Set Intersection with Hiding of Intersection Size
Wyatt Howe, Andrei Lapets, Frederick Jansen, Tanner Braun, Ben Getchell
2022/1777
Weightwise perfectly balanced functions and nonlinearity
Agnese Gini, Pierrick Méaux
2022/1776
Offset-Based BBB-Secure Tweakable Block-ciphers with Updatable Caches
Arghya Bhattacharjee, Ritam Bhaumik, Mridul Nandi
2022/1775
Candidate Trapdoor Claw-Free Functions from Group Actions with Applications to Quantum Protocols
Navid Alamati, Giulio Malavolta, Ahmadreza Rahimi
2022/1774
PECO: methods to enhance the privacy of DECO protocol
Manuel B. Santos
2022/1773
SoK: Decentralized Finance (DeFi) Attacks
Liyi Zhou, Xihan Xiong, Jens Ernstberger, Stefanos Chaliasos, Zhipeng Wang, Ye Wang, Kaihua Qin, Roger Wattenhofer, Dawn Song, Arthur Gervais
2022/1772
You Can Sign but Not Decrypt: Hierarchical Integrated Encryption and Signature
Min Zhang, Binbin Tu, Yu Chen
2022/1771
Security analysis for BIKE, Classic McEliece and HQC against the quantum ISD algorithms
Asuka Wakasugi, Mitsuru Tada
2022/1770
Cryptographic Primitives with Hinting Property
Navid Alamati, Sikhar Patranabis
2022/1769
PoRt: Non-Interactive Continuous Availability Proof of Replicated Storage
Reyhaneh Rabaninejad, Bin Liu, Antonis Michalas
2022/1768
Continuous Group Key Agreement with Flexible Authorization and Its Applications
Kaisei Kajita, Keita Emura, Kazuto Ogawa, Ryo Nojima, Go Ohtake
2022/1767
Do Not Trust in Numbers: Practical Distributed Cryptography With General Trust
Orestis Alpos and Christian Cachin
2022/1766
Systematically Quantifying Cryptanalytic Non-Linearities in Strong PUFs
Durba Chatterjee, Kuheli Pratihar, Aritra Hazra, Ulrich Rührmair, Debdeep Mukhopadhyay
2022/1765
A Deep Learning Aided Differential Distinguisher Improvement Framework with More Lightweight and Universality
Jiashuo Liu, Jiongjiong Ren, Shaozhen Chen
2022/1764
Wi-Fi Security: Do We Still Have to Look Back?
Karim Lounis
2022/1763
cq: Cached quotients for fast lookups
Liam Eagen, Dario Fiore, and Ariel Gabizon
2022/1762
On the Impossibility of Surviving (Iterated) Deletion of Weakly Dominated Strategies in Rational MPC
Johannes Blömer, Jan Bobolz, and Henrik Bröcher
2022/1761
A Family of Block Ciphers Based on Multiple Quasigroups
Umesh Kumar, V. Ch. Venkaiah
2022/1760
Fully Succinct Batch Arguments for NP from Indistinguishability Obfuscation
Rachit Garg, Kristin Sheridan, Brent Waters, and David J. Wu
2022/1759
Bingo: Adaptivity and Asynchrony in Verifiable Secret Sharing and Distributed Key Generation
Ittai Abraham, Philipp Jovanovic, Mary Maller, Sarah Meiklejohn, Gilad Stern
2022/1758
SuperNova: Proving universal machine executions without universal circuits
Abhiram Kothapalli, Srinath Setty
2022/1757
An Injectivity Analysis of CRYSTALS-Kyber and Implications on Quantum Security
Xiaohui Ding, Muhammed F. Esgin, Amin Sakzad, Ron Steinfeld
2022/1756
CRS-Updatable Asymmetric Quasi-Adaptive NIZK Arguments
Behzad Abdolmaleki, Daniel Slamanig
2022/1755
Towards Secure Evaluation of Online Functionalities (Corrected and Extended Version)
Andreas Klinger, Ulrike Meyer
2022/1754
An SVP attack on Vortex
zhenfei zhang
2022/1753
DSKE: Digital Signature with Key Extraction
Zhipeng Wang, Orestis Alpos, Alireza Kavousi, Sze Yiu Chau, Duc V. Le, and Christian Cachin
2022/1752
IsoLock: Thwarting Link-Prediction Attacks on Routing Obfuscation by Graph Isomorphism
Shaza Elsharief, Lilas Alrahis, Johann Knechtel, and Ozgur Sinanoglu
2022/1751
Pseudorandomness of Decoding, Revisited: Adapting OHCP to Code-Based Cryptography
Maxime Bombar, Alain Couvreur, and Thomas Debris-Alazard
2022/1750
Faster Dual Lattice Attacks by Using Coding Theory
Kevin Carrier, Yixin Shen, Jean-Pierre Tillich
2022/1749
Computational Hardness of the Permuted Kernel and Subcode Equivalence Problems
Paolo Santini, Marco Baldi, and Franco Chiaraluce
2022/1748
RMC-PVC: A Multi-Client Reusable Verifiable Computation Protocol (Long version)
Pascal Lafourcade, Gael Marcadet, Léo Robert
2022/1747
Duoram: A Bandwidth-Efficient Distributed ORAM for 2- and 3-Party Computation
Adithya Vadapalli, Ryan Henry, Ian Goldberg
2022/1746
Clipaha: A Scheme to Perform Password Stretching on the Client
Francisco Blas Izquierdo Riera, Magnus Almgren, Pablo Picazo-Sanchez, Christian Rohner
2022/1745
Leakage Resilient l-more Extractable Hash and Applications to Non-Malleable Cryptography
Aggelos Kiayias, Feng-Hao Liu, Yiannis Tselekounis
2022/1744
Worst and Average Case Hardness of Decoding via Smoothing Bounds
Thomas Debris-Alazard, Nicolas Resch
2022/1743
Ring Signatures with User-Controlled Linkability
Dario Fiore, Lydia Garms, Dimitris Kolonelos, Claudio Soriente, Ida Tucker
2022/1742
A Simple Noncommutative UOV Scheme
Lih-Chung Wang, Po-En Tseng, Yen-Liang Kuan, and Chun-Yen Chou
2022/1741
Demystifying the comments made on “A Practical Full Key Recovery Attack on TFHE and FHEW by Inducing Decryption Errors”
Bhuvnesh Chaturvedi, Anirban Chakraborty, Ayantika Chatterjee, Debdeep Mukhopadhyay
2022/1740
A Holistic Approach Towards Side-Channel Secure Fixed-Weight Polynomial Sampling
Markus Krausz, Georg Land, Jan Richter-Brockmann, Tim Güneysu
2022/1739
On blindness of several ElGamal-type blind signatures
Alexandra Babueva, Liliya Akhmetzyanova, Evgeny Alekseev, Oleg Taraskin
2022/1738
Removing the Field Size Loss from Duc et al.'s Conjectured Bound for Masked Encodings
Julien Béguinot, Wei Cheng, Sylvain Guilley, Yi Liu, Loïc Masure, Olivier Rioul, François-Xavier Standaert
2022/1737
Regularizers to the Rescue: Fighting Overfitting in Deep Learning-based Side-channel Analysis
Azade Rezaeezade and Lejla Batina
2022/1736
An algorithm for efficient detection of $(N,N)$-splittings and its application to the isogeny problem in dimension 2
Maria Corte-Real Santos, Craig Costello, and Sam Frengley
2022/1735
BlindHub: Bitcoin-Compatible Privacy-Preserving Payment Channel Hubs Supporting Variable Amounts
Xianrui Qin, Shimin Pan, Arash Mirzaei, Zhimei Sui, Oğuzhan Ersoy, Amin Sakzad, Muhammed F. Esgin, Joseph K. Liu, Jiangshan Yu, and Tsz Hon Yuen
2022/1734
Mind Your Path: On (Key) Dependencies in Differential Characteristics
Thomas Peyrin, Quan Quan Tan
2022/1733
New and Improved Constructions for Partially Equivocable Public Key Encryption
Benoît Libert, Alain Passelègue, Mahshid Riahinia
2022/1732
TreeSync: Authenticated Group Management for Messaging Layer Security
Théophile Wallez, Jonathan Protzenko, Benjamin Beurdouche, Karthikeyan Bhargavan
2022/1731
Linear Cryptanalysis of Reduced-Round Simeck Using Super Rounds
Reham Almukhlifi, Poorvi Vora
2022/1730
Merkle Tree Ladder Mode: Reducing the Size Impact of NIST PQC Signature Algorithms in Practice
Andrew Fregly, Joseph Harvey, Burton S. Kaliski Jr., and Swapneel Sheth
2022/1729
Acsesor: A New Framework for Auditable Custodial Secret Storage and Recovery
Melissa Chase, Hannah Davis, Esha Ghosh, and Kim Laine
2022/1728
Efficient Zero Knowledge Arguments for Bilinear Matrix Relations over Finite Fields and Knowledge-Soundness Enhancement via Operations over Extended Field
Yuan Tian
2022/1727
Find Thy Neighbourhood: Privacy-Preserving Local Clustering
Pranav Shriram A, Nishat Koti, Varsha Bhat Kukkala, Arpita Patra, Bhavish Raj Gopal
2022/1726
Optimization for SPHINCS+ using Intel Secure Hash Algorithm Extensions
Thomas Hanson, Qian Wang, Santosh Ghosh, Fernando Virdia, Anne Reinders, Manoj R. Sastry
2022/1725
A note on SPHINCS+ parameter sets
Stefan Kölbl and Jade Philipoom
2022/1724
Formal Analysis of SPDM: Security Protocol and Data Model version 1.2
Cas Cremers, Alexander Dax, and Aurora Naska
2022/1723
Asymptotically Optimal Message Dissemination with Applications to Blockchains
Chen-Da Liu-Zhang, Christian Matt, and Søren Eller Thomsen
2022/1722
On Side-Channel and CVO Attacks against TFHE and FHEW
Michael Walter
2022/1721
Glimpse: On-Demand PoW Light Client with Constant-Size Storage for DeFi
Giulia Scaffino, Lukas Aumayr, Zeta Avarikioti, Matteo Maffei
2022/1720
Red Team vs. Blue Team: A Real-World Hardware Trojan Detection Case Study Across Four Modern CMOS Technology Generations
Endres Puschner, Thorben Moos, Steffen Becker, Christian Kison, Amir Moradi, Christof Paar
2022/1719
Two-Round Concurrent 2PC from Sub-Exponential LWE
Behzad Abdolmaleki, Saikrishna Badrinarayanan, Rex Fernando, Giulio Malavolta, Ahmadreza Rahimi, and Amit Sahai
2022/1718
Identity-based Matchmaking Encryption with Stronger Security and Instantiation on Lattices
Yuejun Wang, Baocang Wang, Qiqi Lai, Yu Zhan
2022/1717
Scaling Blockchain-Based Tokens with Joint Cryptographic Accumulators
Trevor Miller
2022/1716
Area-time Efficient Implementation of NIST Lightweight Hash Functions Targeting IoT Applications
Safiullah Khan, Wai-Kong Lee, Angshuman Karmakar, Jose Maria Bermudo Mera, Abdul Majeed, Seong Oun Hwang
2022/1715
An Algebraic Attack Against McEliece-like Cryptosystems Based on BCH Codes
Freja Elbro, Christian Majenz
2022/1714
Meet-in-the-Middle Preimage Attacks on Sponge-based Hashing
Lingyue Qin, Jialiang Hua, Xiaoyang Dong, Hailun Yan, Xiaoyun Wang
2022/1713
Breaking a Fifth-Order Masked Implementation of CRYSTALS-Kyber by Copy-Paste
Elena Dubrova, Kalle Ngo, Joel Gärtner
2022/1712
KEMTLS vs. Post-Quantum TLS: Performance On Embedded Systems
Ruben Gonzalez, Thom Wiggers
2022/1711
Nonce- and Redundancy-encrypting Modes with Farfalle
Seth Hoffert
2022/1710
Formal Analysis of Session-Handling in Secure Messaging: Lifting Security from Sessions to Conversations
Cas Cremers, Charlie Jacomme, and Aurora Naska
2022/1709
Dory: Faster Asynchronous BFT with Reduced Communication for Permissioned Blockchains
Zongyang Zhang, You Zhou, Sisi Duan, Haibin Zhang, Bin Hu, Licheng Wang, and Jianwei Liu
2022/1708
Expert Mental Models of SSI Systems and Implications for End-User Understanding
Alexandra Mai
2022/1707
Private Access Control for Function Secret Sharing
Sacha Servan-Schreiber, Simon Beyzerov, Eli Yablon, and Hyojae Park
2022/1706
Optimized Implementation of Encapsulation and Decapsulation of Classic McEliece on ARMv8
Minjoo Sim, Siwoo Eum, Hyeokdong Kwon, Hyunjun Kim, Hwajeong Seo
2022/1705
Careful with MAc-then-SIGn: A Computational Analysis of the EDHOC Lightweight Authenticated Key Exchange Protocol
Felix Günther, Marc Ilunga Tshibumbu Mukendi
2022/1704
Some applications of higher dimensional isogenies to elliptic curves (overview of results)
Damien Robert
2022/1703
Doubly Efficient Private Information Retrieval and Fully Homomorphic RAM Computation from Ring LWE
Wei-Kai Lin, Ethan Mook, Daniel Wichs
2022/1702
SCB Mode: Semantically Secure Length-Preserving Encryption
Fabio Banfi
2022/1701
On Zero-Knowledge Proofs over the Quantum Internet
Mark Carney
2022/1700
Comparative Study of HDL algorithms for Intrusion Detection System in Internet of Vehicles
Manoj Srinivas Botla, Jai Bala Srujan Melam, Raja Stuthi Paul Pedapati, Srijanee Mookherji, Vanga Odelu, Rajendra Prasath
2022/1699
SoK: Use of Cryptography in Malware Obfuscation
Hassan Asghar, Benjamin Zi Hao Zhao, Muhammad Ikram, Giang Nguyen, Dali Kaafar, Sean Lamont, Daniel Coscia
2022/1698
Digital Signature from Syndrome Decoding Problem
Abdelhaliem Babiker
2022/1697
RISC-V Instruction Set Extensions for Lightweight Symmetric Cryptography
Hao Cheng, Johann Großschädl, Ben Marshall, Dan Page, Thinh Pham
2022/1696
Post-Quantum Anonymity of Kyber
Varun Maram, Keita Xagawa
2022/1695
ELSA: Secure Aggregation for Federated Learning with Malicious Actors
Mayank Rathee, Conghao Shen, Sameer Wagh, Raluca Ada Popa
2022/1694
Security Analysis of a Color Image Encryption Scheme Based on Dynamic Substitution and Diffusion Operations
George Teseleanu
2022/1693
More Efficient Adaptively Secure Lattice-based IBE with Equality Test in the Standard Model
Kyoichi Asano, Keita Emura, Atsushi Takayasu
2022/1692
Secret Key Recovery Attacks on Masked and Shuffled Implementations of CRYSTALS-Kyber and Saber
Linus Backlund, Kalle Ngo, Joel Gärtner, Elena Dubrova
2022/1691
TokenWeaver: Privacy Preserving and Post-Compromise Secure Attestation
Cas Cremers, Gal Horowitz, Charlie Jacomme, and Eyal Ronen
2022/1690
LUNA: Quasi-Optimally Succinct Designated-Verifier Zero-Knowledge Arguments from Lattices
Ron Steinfeld, Amin Sakzad, Muhammed F. Esgin, Veronika Kuchta, Mert Yassi, and Raymond K. Zhao
2022/1689
Efficient Zero-Knowledge Arguments for Some Matrix Relations over Ring and Non-malleable Enhancement
Yuan Tian
2022/1688
Funshade: Function Secret Sharing for Two-Party Secure Thresholded Distance Evaluation
Alberto Ibarrondo, Hervé Chabanne, and Melek Önen
2022/1687
Stronger Security and Generic Constructions for Adaptor Signatures
Wei Dai, Tatsuaki Okamoto, Go Yamamoto
2022/1686
Practical Quantum-Safe Voting from Lattices, Extended
Ian Black, Emma McFall, Juliet Whidden, Bryant Xie, Ryann Cartor
2022/1685
CoRA: Collaborative Risk-Aware Authentication
Mastooreh Salajegheh, Shashank Agrawal, Maliheh Shirvanian, Mihai Christodorescu,, Payman Mohassel
2022/1684
Division in the Plactic Monoid
Chris Monico
2022/1683
Powers of Tau in Asynchrony
Sourav Das, Zhuolun Xiang, and Ling Ren
2022/1682
Interactive Authentication
Deepak Maram, Mahimna Kelkar, and Ittay Eyal
2022/1681
Backdooring Post-Quantum Cryptography: Kleptographic Attacks on Lattice-based KEMs
Prasanna Ravi, Shivam Bhasin, Anupam Chattopadhyay, Aikata, Sujoy Sinha Roy
2022/1680
Authenticated Encryption with Key Identification
Julia Len, Paul Grubbs, Thomas Ristenpart
2022/1679
Integer Polynomial Recovery from Outputs and its Application to Cryptanalysis of a Protocol for Secure Sorting
Srinivas Vivek, Shyam Murthy, Deepak Kumaraswamy
2022/1678
Practical Asynchronous Distributed Key Generation: Improved Efficiency, Weaker Assumption, and Standard Model
Haibin Zhang, Sisi Duan, Chao Liu, Boxin Zhao, Xuanji Meng, Shengli Liu, Yong Yu, Fangguo Zhang, Liehuang Zhu
2022/1677
Quagmire ciphers and group theory: What is a Porta cipher?
Thomas Kaeding
2022/1676
Concurrently Secure Blind Schnorr Signatures
Georg Fuchsbauer and Mathias Wolf
2022/1675
SoK: Assisted Fault Simulation - Existing Challenges and Opportunities Offered by AI
Asmita Adhikary, Ileana Buhan
2022/1674
Practical Multi-Key Homomorphic Encryption for More Flexible and Efficient Secure Federated Aggregation (preliminary work)
Alberto Pedrouzo-Ulloa, Aymen Boudguiga, Olive Chakraborty, Renaud Sirdey, Oana Stan, Martin Zuber
2022/1673
DeV-IP: A k-out-n Decentralized and verifiable BFV for Inner Product evaluation
Jose Contreras, Hardik Gajera
2022/1672
An Auditable Confidentiality Protocol for Blockchain Transactions
Aoxuan Li, Gabriele D’Angelo, Jacky Tang, Frank Fang, Baron Gong
2022/1671
Quantum Neural Network based Distinguisher for Differential Cryptanalysis on Simplified Block Ciphers
Hyunji Kim, Kyungbae Jang, Sejin Lim, Yeajun Kang, Wonwoong Kim, Hwajeong Seo
2022/1670
Compactly Committing Authenticated Encryption Using Encryptment and Tweakable Block Cipher
Shoichi Hirose and Kazuhiko Minematsu
2022/1669
Jolt: Recovering TLS Signing Keys via Rowhammer Faults
Koksal Mus, Yarkın Doröz, M. Caner Tol, Kristi Rahman, Berk Sunar
2022/1668
On the families of algebraic graphs with the fastest growth of cycle indicator and their applications
Vasyl Ustimenko
2022/1667
Applying Castryck-Decru Attack on the Masked Torsion Point Images SIDH variant
Jesús-Javier Chi-Domínguez
2022/1666
Cryptanalysis of Ivanov-Krouk-Zyablov cryptosystem
Kirill Vedenev, Yury Kosolapov
2022/1665
GCKSign: Simple and Efficient Signatures from Generalized Compact Knapsacks
Joo Woo, Kwangsu Lee, Jong Hwan Park
2022/1664
NTRU+: Compact Construction of NTRU Using Simple Encoding Method
Jonghyun Kim, Jong Hwan Park
2022/1663
REDOG and Its Performance Analysis
Jon-Lark Kim, Jihoon Hong, Terry Shue Chien Lau, YounJae Lim, Byung-Sun Won
2022/1662
Revisiting cycles of pairing-friendly elliptic curves
Marta Bellés-Muñoz, Jorge Jiménez Urroz, Javier Silva
2022/1661
Enhancing the Dual Attack against MLWE: Constructing More Short Vectors Using Its Algebraic Structure
Han Wu, Guangwu Xu
2022/1660
Owner Identity Verification in the Internet of Connected Vehicles: Zero Trust Based Solution
Mashrukh Zayed, Adnan Anwar, Ziaur Rahman, Sk. Shezan Arefin, Rafiqul Islam
2022/1659
A Deep Learning aided Key Recovery Framework for Large-State Block Ciphers
Yi Chen, Zhenzhen Bao, Yantian Shen, Hongbo Yu
2022/1658
A new Privacy Preserving and Scalable Revocation Method for Self Sovereign Identity - The Perfect Revocation Method does not exist yet
Andreas Freitag
2022/1657
CycloneNTT: An NTT/FFT Architecture Using Quasi-Streaming of Large Datasets on DDR- and HBM-based FPGA Platforms
Kaveh Aasaraai, Emanuele Cesena, Rahul Maganti, Nicolas Stalder, Javier Varela, Kevin Bowers
2022/1656
Proactive Refresh for Accountable Threshold Signatures
Dan Boneh, Aditi Partap, Lior Rotem
2022/1655
Just How Fair is an Unreactive World?
Srinivasan Raghuraman and Yibin Yang
2022/1654
On the Complete Non-Malleability of the Fujisaki-Okamoto Transform
Daniele Friolo, Matteo Salvino, Daniele Venturi
2022/1653
Reversing, Breaking, and Fixing the French Legislative Election E-Voting Protocol
Alexandre Debant and Lucca Hirschi
2022/1652
Breaking the Size Barrier: Universal Circuits meet Lookup Tables
Yann Disser, Daniel Günther, Thomas Schneider, Maximilian Stillger, Arthur Wigandt,, and Hossein Yalame
2022/1651
TiGER: Tiny bandwidth key encapsulation mechanism for easy miGration based on RLWE(R)
Seunghwan Park, Chi-Gon Jung, Aesun Park, Joongeun Choi, Honggoo Kang
2022/1650
LightSwap: An Atomic Swap Does Not Require Timeouts At Both Blockchains
Philipp Hoenisch, Subhra Mazumdar, Pedro Moreno-Sanchez, Sushmita Ruj
2022/1649
Robustness of Affine and Extended Affine Equivalent Surjective S-Box(es) against Differential Cryptanalysis
Shah Fahd, Mehreen Afzal, Dawood Shah, Waseem Iqbal, Atiya Hai
2022/1648
Compute, but Verify: Efficient Multiparty Computation over Authenticated Inputs
Moumita Dutta, Chaya Ganesh, Sikhar Patranabis, and Nitin Singh
2022/1647
Quantum Algorithm for Oracle Subset Product
Trey Li
2022/1646
Blockin: Multi-Chain Sign-In Standard with Micro-Authorizations
Matt Davison, Ken King, Trevor Miller
2022/1645
The Return of the SDitH
Carlos Aguilar-Melchor, Nicolas Gama, James Howe, Andreas Hülsing, David Joseph, Dongze Yue
2022/1644
An attack on a key exchange protocol based on max-times and min-times algebras
Ivan Buchinskiy, Matvei Kotov, Alexander Treier
2022/1643
End-to-End Secure Messaging with Traceability Only for Illegal Content
James Bartusek, Sanjam Garg, Abhishek Jain, Guru-Vamsi Policharla
2022/1642
Proofs of Proof-of-Stake with Sublinear Complexity
Shresth Agrawal, Joachim Neu, Ertem Nusret Tas, and Dionysis Zindros
2022/1641
AlgSAT --- a SAT Method for Search and Verification of Differential Characteristics from Algebraic Perspective
Huina Li, Haochen Zhang, Guozhen Liu, Kai Hu, Jian Guo, Weidong Qiu
2022/1640
Differential Meet-In-The-Middle Cryptanalysis
Christina Boura, Nicolas David, Patrick Derbez, Gregor Leander, María Naya-Plasencia
2022/1639
Post-Quantum Hybrid KEMTLS Performance in Simulated and Real Network Environments
Alexandre Augusto Giron, João Pedro Adami do Nascimento, Ricardo Custódio, Lucas Pandolfo Perin
2022/1638
The Security of Quasigroups Based Substitution Permutation Networks
George Teseleanu
2022/1637
Polynomial-Time Cryptanalysis of the Subspace Flooding Assumption for Post-Quantum $i\mathcal{O}$
Aayush Jain, Huijia Lin, Paul Lou, Amit Sahai
2022/1636
Threshold Signatures with Private Accountability
Dan Boneh, Chelsea Komlo
2022/1635
FPT: a Fixed-Point Accelerator for Torus Fully Homomorphic Encryption
Michiel Van Beirendonck, Jan-Pieter D'Anvers, Furkan Turan, and Ingrid Verbauwhede
2022/1634
Division of Regulatory Power: Collaborative Regulation for Privacy-Preserving Blockchains
Tianyu Zhaolu, Zhiguo Wan, and Huaqun Wang
2022/1633
Linea Prover Documentation
Linea Prover
2022/1632
Cryptography with Weights: MPC, Encryption and Signatures
Sanjam Garg, Abhishek Jain, Pratyay Mukherjee, Rohit Sinha, Mingyuan Wang, Yinuo Zhang
2022/1631
Enhancing Ring-LWE Hardness using Dedekind Index Theorem
Charanjit S Jutla, Chengyu Lin
2022/1630
Finding Collisions for Round-Reduced Romulus-H
Marcel Nageler, Felix Pallua, Maria Eichlseder
2022/1629
Temporary Block Withholding Attacks on Filecoin's Expected Consensus
Tong Cao, Xin Li
2022/1628
Analyzing the Leakage Resistance of the NIST's Lightweight Crypto Competition's Finalists
Corentin Verhamme, Gaëtan Cassiers, François-Xavier Standaert
2022/1627
The Random Fault Model
Siemen Dhooghe and Svetla Nikova
2022/1626
MinRoot: Candidate Sequential Function for Ethereum VDF
Dmitry Khovratovich, Mary Maller, Pratyush Ranjan Tiwari
2022/1625
Efficient Threshold FHE for Privacy-Preserving Applications
Siddhartha Chowdhury, Sayani Sinha, Animesh Singh, Shubham Mishra, Chandan Chaudhary, Sikhar Patranabis, Pratyay Mukherjee, Ayantika Chatterjee, and Debdeep Mukhopadhyay
2022/1624
Algorithms for switching between block-wise and arithmetic masking
Evgeny Alekseev, Andrey Bozhko
2022/1623
WOTSwana: A Generalized Sleeve Construction for Multiple Proofs of Ownership
David Chaum, Mario Larangeira, Mario Yaksetig
2022/1622
Anonymous Tokens with Hidden Metadata Bit from Algebraic MACs
Melissa Chase, F. Betül Durak, Serge Vaudenay
2022/1621
cuXCMP: CUDA-Accelerated Private Comparison Based on Homomorphic Encryption
Hao Yang, Shiyu Shen, Zhe Liu, Yunlei Zhao
2022/1620
Another Round of Breaking and Making Quantum Money: How to Not Build It from Lattices, and More
Jiahui Liu, Hart Montgomery, Mark Zhandry
2022/1619
The Performance Analysis of Post-Quantum Cryptography for Vehicular Communications
Abel C. H. Chen
2022/1618
Witness-Succinct Universally-Composable SNARKs
Chaya Ganesh, Yashvanth Kondi, Claudio Orlandi, Mahak Pancholi, Akira Takahashi, Daniel Tschudi
2022/1617
A New Higher Order Differential of RAGHAV
Naoki Shibayama, Yasutaka Igarashi
2022/1616
Secret Sharing for Generic Access Structures
James Smith
2022/1615
Efficient Methods for Implementation of Generalized Access Structures
James Smith
2022/1614
Throughput Limitation of the Off-chain Payment Networks
Shayan Hamidi Dehshali, Seyed Mahdi Hosseini, Soheil Zibakhsh Shabgahi, Behnam Bahrak
2022/1613
Classic McEliece Key Generation on RAM constrained devices
Rainer Urian, Raphael Schermann
2022/1612
On Black-Box Constructions of Time and Space Efficient Sublinear Arguments from Symmetric-Key Primitives
Laasya Bangalore, Rishabh Bhadauria, Carmit Hazay, Muthuramakrishnan Venkitasubramaniam
2022/1611
Efficient Aggregatable BLS Signatures with Chaum-Pedersen Proofs
Jeff Burdges, Oana Ciobotaru, Syed Lavasani, and Alistair Stewart
2022/1610
ADMM and Reproducing Sum-Product Decoding Algorithm Applied to QC-MDPC Code-based McEliece Cryptosystems
Kohtaro Watanabe, Motonari Ohtsuka, and Yuta Tsukie
2022/1609
Forking Sums of Permutations for Optimally Secure and Highly Efficient PRFs
Avijit Dutta, Jian Guo, Eik List
2022/1608
Ligero: Lightweight Sublinear Arguments Without a Trusted Setup
Scott Ames, Carmit Hazay, Yuval Ishai, Muthuramakrishnan Venkitasubramaniam
2022/1607
A Universally Composable PAKE with Zero Communication Cost (And Why It Shouldn't Be Considered UC-Secure)
Lawrence Roy and Jiayu Xu
2022/1606
AUC: Accountable Universal Composability
Mike Graf, Ralf Küsters, Daniel Rausch
2022/1605
Sweep-UC: Swapping Coins Privately
Lucjan Hanzlik, Julian Loss, Sri AravindaKrishnan Thyagarajan, Benedikt Wagner
2022/1604
Quantum Rebound Attacks on Reduced-Round ARIA-Based Hash Functions
Seungjun Baek, Jongsung Kim
2022/1603
Slid Pairs of the Fruit-80 Stream Cipher
Pang Kok An, Shekh Faisal Abdul-Latip, Hazlin Abdul Rani
2022/1602
Survey on Fully Homomorphic Encryption, Theory, and Applications
Chiara Marcolla, Victor Sucasas, Marc Manzano, Riccardo Bassoli, Frank H.P. Fitzek, Najwa Aaraj
2022/1601
Revisiting the Concrete Hardness of SelfTargetMSIS in CRYSTALS-Dilithium
Geng Wang, Wenwen Xia, Gongyu Shi, Ming Wan, Yuncong Zhang, Dawu Gu
2022/1600
Secret-Shared Joins with Multiplicity from Aggregation Trees
Saikrishna Badrinarayanan, Sourav Das, Gayathri Garimella, Srinivasan Raghuraman, Peter Rindal
2022/1599
Streaming Functional Encryption
Jiaxin Guan, Alexis Korb, and Amit Sahai
2022/1598
Efficiently Testable Circuits
Mirza Ahad Baig, Suvradip Chakraborty, Stefan Dziembowski, Małgorzata Gałązka, Tomasz Lizurej, Krzysztof Pietrzak
2022/1597
A Closer Look at a Recent Pipelined True Random Number Generator Design
Markus Dichtl
2022/1596
LowMS: a new rank metric code-based KEM without ideal structure
Nicolas Aragon, Victor Dyseryn, Philippe Gaborit, Pierre Loidreau, Julian Renner, and Antonia Wachter-Zeh
2022/1595
Efficient Secure Three-Party Sorting with Applications to Data Analysis and Heavy Hitters
Gilad Asharov, Koki Hamada, Dai Ikarashi, Ryo Kikuchi, Ariel Nof, Benny Pinkas, Katsumi Takahashi, Junichi Tomida
2022/1594
Compact FE for Unbounded Attribute-Weighted Sums for Logspace from SXDH
Pratish Datta, Tapas Pal, Katsuyuki Takashima
2022/1593
Proofs of discrete logarithm equality across groups
Melissa Chase, Michele Orrù, Trevor Perrin, Greg Zaverucha
2022/1592
Powers-of-Tau to the People: Decentralizing Setup Ceremonies
Valeria Nikolaenko, Sam Ragsdale, Joseph Bonneau, and Dan Boneh
2022/1591
ISAP+: ISAP with Fast Authentication
Arghya Bhattacharjee, Avik Chakraborti, Nilanjan Datta, Cuauhtemoc Mancillas-López, Mridul Nandi
2022/1590
Misuse-resistant MGM2 mode
Liliya Akhmetzyanova, Evgeny Alekseev, Alexandra Babueva, Andrey Bozhko, Stanislav Smyshlyaev
2022/1589
Cryptanalysis of a privacy-preserving behavior-oriented authentication scheme
Sigurd Eskeland, Ahmed Fraz Baig
2022/1588
Factoring using multiplicative relations modulo n: a subexponential algorithm inspired by the index calculus
Katherine E. Stange
2022/1587
Applications of the indirect sum in the design of several special classes of bent functions outside the completed $\mathcal{MM}$ class
Fengrong Zhang, Enes Pasalic, Amar Bapić, Baocang Wang
2022/1586
Practical Asynchronous Proactive Secret Sharing and Key Refresh
Christoph U. Günther, Sourav Das, Lefteris Kokoris-Kogias
2022/1585
Attribute-based Anonymous Credential: Optimization for Single-Use and Multi-Use
Kwan Yin Chan, Tsz Hon Yuen
2022/1584
Instantiability of Classical Random-Oracle-Model Encryption Transforms
Alice Murphy, Adam O'Neill, Mohammad Zaheri
2022/1583
Asynchronous Multi-Party Quantum Computation
Vipul Goyal, Chen-Da Liu-Zhang, Justin Raizes, João Ribeiro
2022/1582
FSMx-Ultra: Finite State Machine Extraction from Gate-Level Netlist for Security Assessment
Rasheed Kibria, Farimah Farahmandi, Mark Tehranipoor
2022/1581
Truncator: Time-space Tradeoff of Cryptographic Primitives
Foteini Baldimtsi, Konstantinos Chalkias, Panagiotis Chatzigiannis, and Mahimna Kelkar
2022/1580
Multi-ciphertext security degradation for lattices
Daniel J. Bernstein
2022/1579
New Properties of Double Boomerang Connectivity Table
Qianqian Yang, Ling Song, Siwei Sun, Danping Shi, Lei Hu
2022/1578
Weighted Secret Sharing from Wiretap Channels
Fabrice Benhamouda, Shai Halevi, Lev Stambler
2022/1577
Rescue-Prime Optimized
Tomer Ashur, Al Kindi, Willi Meier, Alan Szepieniec, Bobbin Threadbare
2022/1576
Folding Schemes with Selective Verification
Carla Ràfols, Alexandros Zacharakis
2022/1575
On Linearization Attack of Entropic Quasigroups Cryptography
Daniel Nager
2022/1574
Security Analysis of Delay-Based Strong PUFs with Multiple Delay Lines
Anita Aghaie, Amir Moradi, Johannes Tobisch, Nils Wisiol
2022/1573
Solving Small Exponential ECDLP in EC-based Additively Homomorphic Encryption and Applications
Fei Tang, Guowei Ling, Chaochao Cai, Jinyong Shan, Xuanqi Liu, Peng Tang, Weidong Qiu
2022/1572
Layered ROLLO-I: Faster rank-metric code-based KEM using ideal LRPC codes
Chanki Kim, Young-Sik Kim, Jong-Seon No
2022/1571
Practical Settlement Bounds for Longest-Chain Consensus
Peter Gaži, Ling Ren, Alexander Russell
2022/1570
Set (Non-)Membership NIZKs from Determinantal Accumulators
Helger Lipmaa, Roberto Parisella
2022/1569
DAG-$\Sigma$: A DAG-based Sigma Protocol for Relations in CNF
Gongxian Zeng, Junzuo Lai, Zhengan Huang, Yu Wang, Zhiming Zheng
2022/1568
Extendable Threshold Ring Signatures with Enhanced Anonymity
Gennaro Avitabile, Vincenzo Botta, Dario Fiore
2022/1567
Full Round Zero-sum Distinguishers on TinyJAMBU-128 and TinyJAMBU-192 Keyed-permutation in the Known-key setting
Orr Dunkelman, Shibam Ghosh, Eran Lambooij
2022/1566
Characterisation of Bijectivity Preserving Componentwise Modification of S-Boxes
Kaisa Nyberg
2022/1565
Baloo: Nearly Optimal Lookup Arguments
Arantxa Zapico, Ariel Gabizon, Dmitry Khovratovich, Mary Maller, Carla Ràfols
2022/1564
Efficient privacy preserving top-k recommendation using homomorphic sorting
Pranav Verma, Anish Mathuria, Sourish Dasgupta
2022/1563
A Practical Full Key Recovery Attack on TFHE and FHEW by Inducing Decryption Errors
Bhuvnesh Chaturvedi, Anirban Chakraborty, Ayantika Chatterjee, Debdeep Mukhopadhyay
2022/1562
A Systematization of Voter Registration Security
Jack Cable, Andrés Fábrega, Sunoo Park, Michael A. Specter
2022/1561
Vogue: Faster Computation of Private Heavy Hitters
Pranav Jangir, Nishat Koti, Varsha Bhat Kukkala, Arpita Patra, Bhavish Raj Gopal, Somya Sangal
2022/1560
Verifiable Private Information Retrieval
Shany Ben-David, Yael Tauman Kalai, Omer Paneth
2022/1559
Take your MEDS: Digital Signatures from Matrix Code Equivalence
Tung Chou, Ruben Niederhagen, Edoardo Persichetti, Tovohery Hajatiana Randrianarisoa, Krijn Reijnders, Simona Samardjiska, Monika Trimoska
2022/1558
Quantum Speed-Up for Multidimensional (Zero Correlation) Linear Distinguishers
Akinori Hosoyamada
2022/1557
Less is more: refinement proofs for probabilistic proofs
Kunming Jiang, Devora Chait-Roth, Zachary DeStefano, Michael Walfish, Thomas Wies
2022/1556
Intermediate Certificate Suppression in Post-Quantum TLS: An Approximate Membership Querying Approach
Dimitrios Sikeridis, Sean Huntley, David Ott, and Michael Devetsikiotis
2022/1555
Avoiding Lock Outs: Proactive FIDO Account Recovery using Managerless Group Signatures
Sunpreet S. Arora, Saikrishna Badrinarayanan, Srinivasan Raghuraman, Maliheh Shirvanian, Kim Wagner, Gaven Watson
2022/1554
Executing and Proving over Dirty Ledgers
Christos Stefo, Zhuolun Xiang, Lefteris Kokoris-Kogias
2022/1553
Lower Bound Framework for Differentially Private and Oblivious Data Structures
Giuseppe Persiano, Kevin Yeo
2022/1552
XMSS-SM3 and MT-XMSS-SM3: Instantiating Extended Merkle Signature Schemes with SM3
Siwei Sun, Tianyu Liu, Zhi Guan, Yifei He, Jiwu Jing, Lei Hu, Zhenfeng Zhang, Hailun Yan
2022/1551
Extensible Decentralized Secret Sharing and Application to Schnorr Signatures
Michele Battagliola, Riccardo Longo, Alessio Meneghetti
2022/1550
Modifications of Bijective S-Boxes with Linear Structures
Kaisa Nyberg
2022/1549
The SAT-Based Automatic Searching and Experimental Verification for Differential Characteristics with Application to Midori64
Yingying Li, Qichun Wang
2022/1548
Trellis: Robust and Scalable Metadata-private Anonymous Broadcast
Simon Langowski, Sacha Servan-Schreiber, Srinivas Devadas
2022/1547
A Masked Pure-Hardware Implementation of Kyber Cryptographic Algorithm
Tendayi Kamucheka, Alexander Nelson, David Andrews, Miaoqing Huang
2022/1546
Threshold Implementations in Software: Micro-architectural Leakages in Algorithms
John Gaspoz, Siemen Dhooghe
2022/1545
On Structure-Preserving Cryptography and Lattices
Dennis Hofheinz, Kristina Hostáková, Roman Langrehr, and Bogdan Ursu
2022/1544
Towards Efficient Decentralized Federated Learning
Christodoulos Pappas, Dimitrios Papadopoulos, Dimitris Chatzopoulos, Eleni Panagou, Spyros Lalis, Manolis Vavalis
2022/1543
Four-Round Black-Box Non-Malleable Commitments from One-Way Permutations
Michele Ciampi, Emmanuela Orsini, Luisa Siniscalchi
2022/1542
Scalable and Transparent Proofs over All Large Fields, via Elliptic Curves (ECFFT part II)
Eli Ben-Sasson, Dan Carmon, Swastik Kopparty, David Levit
2022/1541
Secure Auctions in the Presence of Rational Adversaries
Chaya Ganesh, Bhavana Kanukurthi, Girisha Shankar
2022/1540
Exploiting algebraic structures in probing security
Maxime Plançon
2022/1539
Oblivious-Transfer Complexity of Noisy Coin-Toss via Secure Zero Communication Reductions
Saumya Goyal, Varun Narayanan, Manoj Prabhakaran
2022/1538
DME: a full encryption, signature and KEM multivariate public key cryptosystem
Ignacio Luengo, Martín Avendaño
2022/1537
On Extremal Algebraic Graphs and Multivariate Cryptosystems
Vasyl Ustimenko
2022/1536
Privacy-Preserving Blueprints
Markulf Kohlweiss, Anna Lysyanskaya, An Nguyen
2022/1535
Reverse Firewalls for Oblivious Transfer Extension and Applications to Zero-Knowledge
Suvradip Chakraborty, Chaya Ganesh, Pratik Sarkar
2022/1534
Masked Iterate-Fork-Iterate: A new Design Paradigm for Tweakable Expanding Pseudorandom Function
Elena Andreeva, Benoit Cogliati, Virginie Lallemand, Marine Minier, Antoon Purnal, Arnab Roy
2022/1533
How to Hide MetaData in MLS-Like Secure Group Messaging: Simple, Modular, and Post-Quantum
Keitaro Hashimoto, Shuichi Katsumata, Thomas Prest
2022/1532
Dynamic Decentralized Functional Encryption with Strong Security
Ky Nguyen, David Pointcheval, and Robert Schädlich
2022/1531
The Key Lattice Framework for Concurrent Group Messaging
Kelong Cong, Karim Eldefrawy, Nigel P. Smart, and Ben Terner
2022/1530
Multivariate lookups based on logarithmic derivatives
Ulrich Haböck
2022/1529
Key-Recovery Fault Injection Attack on the Classic McEliece KEM
Sabine Pircher, Johannes Geier, Julian Danner, Daniel Mueller-Gritschneder, Antonia Wachter-Zeh
2022/1528
Graph-Theoretic Algorithms for the Alternating Trilinear Form Equivalence Problem
Ward Beullens
2022/1527
Pattern Matching in Encrypted Stream from Inner Product Encryption
Élie Bouscatié, Guilhem Castagnos, Olivier Sanders
2022/1526
Threshold-Optimal MPC With Friends and Foes
Nikolas Melissaris, Divya Ravi, Sophia Yakoubov
2022/1525
Endemic Oblivious Transfer via Random Oracles, Revisited
Zhelei Zhou, Bingsheng Zhang, Hong-Sheng Zhou, Kui Ren
2022/1524
Shielding Probabilistically Checkable Proofs: Zero-Knowledge PCPs from Leakage Resilience
Mor Weiss
2022/1523
Your Reputation's Safe with Me: Framing-Free Distributed Zero-Knowledge Proofs
Carmit Hazay, Muthuramakrishnan Venkitasubramaniam, and Mor Weiss
2022/1522
Two new infinite families of APN functions in trivariate form
Kangquan Li, Nikolay Kaleyski
2022/1521
An Assessment of Differential-Neural Distinguishers
Aron Gohr, Gregor Leander, Patrick Neumann
2022/1520
Censorship-Resilient and Confidential Collateralized Second-Layer Payments
Kari Kostiainen, Sven Gnap, Ghassan Karame
2022/1519
Collusion-resistant broadcast encryption based on hidden RSA subgroups
Sigurd Eskeland
2022/1518
An Experimentally Verified Attack on 820-Round Trivium (Full Version)
Cheng Che, Tian Tian
2022/1517
Best-of-Both-Worlds Multiparty Quantum Computation with Publicly Verifiable Identifiable Abort
Kai-Min Chung, Mi-Ying (Miryam) Huang, Er-Cheng Tang, and Jiapeng Zhang
2022/1516
Obfuscation of Evasive Algebraic Set Membership
Steven D. Galbraith and Trey Li
2022/1515
Succinct Vector, Polynomial, and Functional Commitments from Lattices
Hoeteck Wee and David J. Wu
2022/1514
Pseudorandom (Function-Like) Quantum State Generators: New Definitions and Applications
Prabhanjan Ananth, Aditya Gulati, Luowen Qian, Henry Yuen
2022/1513
Player-Replaceability and Forensic Support are Two Sides of the Same (Crypto) Coin
Peiyao Sheng, Gerui Wang, Kartik Nayak, Sreeram Kannan, Pramod Viswanath
2022/1512
Building MPCitH-based Signatures from MQ, MinRank, Rank SD and PKP
Thibauld Feneuil
2022/1511
Round-Optimal Oblivious Transfer and MPC from Computational CSIDH
Saikrishna Badrinarayanan, Daniel Masny, Pratyay Mukherjee, Sikhar Patranabis, Srinivasan Raghuraman, Pratik Sarkar
2022/1510
Witness Encryption for Succinct Functional Commitments and Applications
Matteo Campanelli, Dario Fiore, and Hamidreza Khoshakhlagh
2022/1509
sVote with Control Components Voting Protocol. Computational Proof of Complete Verifiability and Privacy.
Enrique Larraia, Tamara Finogina, Nuria Costa
2022/1508
Non-Interactive Publicly-Verifiable Delegation of Committed Programs
Riddhi Ghosal, Amit Sahai, Brent Waters
2022/1507
Label Correlation in Deep Learning-based Side-channel Analysis
Lichao Wu, Léo Weissbart, Marina Krček, Huimin Li, Guilherme Perin, Lejla Batina, Stjepan Picek
2022/1506
ORTOA: One Round Trip Oblivious Access
Sujaya Maiyya, Yuval Steinhart, Divyakant Agrawal, Prabhanjan Ananth, and Amr El Abbadi
2022/1505
Efficient Registration-Based Encryption
Noemi Glaeser, Dimitris Kolonelos, Giulio Malavolta, and Ahmadreza Rahimi
2022/1504
On Perfectly Secure Two-Party Computation for Symmetric Functionalities with Correlated Randomness
Bar Alon, Olga Nissenbaum, Eran Omri, Anat Paskin-Cherniavsky, Arpita Patra
2022/1503
The Parallel Reversible Pebbling Game: Analyzing the Post-Quantum Security of iMHFs
Jeremiah Blocki, Blake Holman, Seunghoon Lee
2022/1502
Beyond Uber: Instantiating Generic Groups via PGGs
Balthazar Bauer, Pooya Farshim, Patrick Harasser, Adam O'Neill
2022/1501
MinRank in the Head: Short Signatures from Zero-Knowledge Proofs
Gora Adj, Luis Rivera-Zamarripa, Javier Verbel
2022/1500
Registered Attribute-Based Encryption
Susan Hohenberger, George Lu, Brent Waters, David J. Wu
2022/1499
WrapQ: Side-Channel Secure Key Management for Post-Quantum Cryptography
Markku-Juhani O. Saarinen
2022/1498
Simple, Fast, Efficient, and Tightly-Secure Non-Malleable Non-Interactive Timed Commitments
Peter Chvojka, Tibor Jager
2022/1497
Lattice-Based Quantum Advantage from Rotated Measurements
Yusuf Alnawakhtha, Atul Mantri, Carl A. Miller, Daochen Wang
2022/1496
Multiplicative Partially Homomorphic CRT Secret Sharing
Shlomi Dolev, Yaniv Kleinman
2022/1495
Peregrine: Toward Fastest FALCON Based on GPV Framework
Eun-Young Seo, Young-Sik Kim, Joon-Woo Lee, Jong-Seon No
2022/1494
The DAG KNIGHT Protocol: A Parameterless Generalization of Nakamoto Consensus
Yonatan Sompolinsky, Michael Sutton
2022/1493
Enhanced pqsigRM: Code-Based Digital Signature Scheme with Short Signature and Fast Verification for Post-Quantum Cryptography
Jinkyu Cho, Jong-Seon No, Yongwoo Lee, Zahyun Koo, Young-Sik Kim
2022/1492
A Control Theoretic Approach to Infrastructure-Centric Blockchain Tokenomics
Oguzhan Akcin, Robert P. Streit, Benjamin Oommen, Sriram Vishwanath, Sandeep Chinchali
2022/1491
LMS-SM3 and HSS-SM3: Instantiating Hash-based Post-Quantum Signature Schemes with SM3
Siwei Sun, Tianyu Liu, Zhi Guan, Yifei He, Jiwu Jing, Lei Hu, Zhenfeng Zhang, Hailun Yan
2022/1490
Efficient Gaussian sampling for RLWE-based cryptography through a fast Fourier transform
Marcio Barbado Junior
2022/1489
On new results on Extremal Algebraic Graph Theory and their connections with Algebraic Cryptography
Vasyl Ustimenko
2022/1488
Quagmire ciphers and group theory: What is a Beaufort cipher?
Thomas Kaeding
2022/1487
An efficient verifiable state for zk-EVM and beyond from the Anemoi hash function
Jianwei Liu, Harshad Patil, Akhil Sai Peddireddy, Kevin Singh, Haifeng Sun, Huachuang Sun, and Weikeng Chen
2022/1486
Correlation Intractability and SNARGs from Sub-exponential DDH
Arka Rai Choudhuri, Sanjam Garg, Abhishek Jain, Zhengzhong Jin, Jiaheng Zhang
2022/1485
Policy-Based Redactable Signatures
Zachary A Kissel
2022/1484
Efficient and Universally Composable Non-Interactive Zero-Knowledge Proofs of Knowledge with Security Against Adaptive Corruptions
Anna Lysyanskaya and Leah Namisa Rosenbloom
2022/1483
Towards Practical Secure Neural Network Inference: The Journey So Far and the Road Ahead
Zoltán Ádám Mann, Christian Weinert, Daphnee Chabal, and Joppe W. Bos
2022/1482
Multi-Point HashDH OPRF using Multiplicative Blinding with Application to Private Set Intersection
Minglang Dong
2022/1481
Secure Messaging with Strong Compromise Resilience, Temporal Privacy, and Immediate Decryption
Cas Cremers, Mang Zhao
2022/1480
A Pairing-Free Signature Scheme from Correlation Intractable Hash Function and Strong Diffie-Hellman Assumption
Benoit Chevallier-Mames
2022/1479
A Note on Constructing SIDH-PoK-based Signatures after Castryck-Decru Attack
Jesús-Javier Chi-Domínguez
2022/1478
Limits on revocable proof systems, with applications to stateless blockchains
Miranda Christ, Joseph Bonneau
2022/1477
A Post-Quantum Digital Signature Scheme from QC-LDPC Codes
Christian Picozzi, Alessio Meneghetti, Giovanni Tognolini
2022/1476
The EVIL Machine: Encode, Visualize and Interpret the Leakage
Valence Cristiani, Maxime Lecomte, Philippe Maurine
2022/1475
Quagmire ciphers and group theory: Recovering keywords from the key table
Thomas Kaeding
2022/1474
Quantum security of subset cover problems
Samuel Bouaziz--Ermann, Alex B. Grilo, Damien Vergnaud
2022/1473
Let's Meet Ternary Keys on Babai's Plane: A Hybrid of Lattice-reduction and Meet-LWE
Minki Hhan, Jiseung Kim, Changmin Lee, and Yongha Son
2022/1472
Hardware-Supported Cryptographic Protection of Random Access Memory
Roberto Avanzi, Ionut Mihalcea, David Schall, Héctor Montaner, and Andreas Sandberg
2022/1471
Peer-to-Peer Energy Trading Meets Blockchain: Consensus via Score-Based Bid Assignment
Xiangyu Su, Xavier Défago, Mario Larangeira, Kazuyuki Mori, Takuya Oda, Yuta Okumura, Yasumasa Tamura, Keisuke Tanaka
2022/1470
Casting out Primes: Bignum Arithmetic for Zero-Knowledge Proofs
Daniel Lubarov, Jordi Baylina Melé
2022/1469
Supersingular Curves You Can Trust
Andrea Basso, Giulio Codogni, Deirdre Connolly, Luca De Feo, Tako Boris Fouotsa, Guido Maria Lido, Travis Morrison, Lorenz Panny, Sikhar Patranabis, Benjamin Wesolowski
2022/1468
Vulnerability Assessment of Ciphers To Fault Attacks Using Reinforcement Learning
Hao Guo, Sayandeep Saha, Satwik Patnaik, Vasudev Gohil, Debdeep Mukhopadhyay, Jeyavijayan (JV) Rajendran
2022/1467
A Cipher-Agnostic Neural Training Pipeline with Automated Finding of Good Input Differences
Emanuele Bellini, David Gerault, Anna Hambitzer, and Matteo Rossi
2022/1466
I want to ride my BICYCL: BICYCL Implements CryptographY in CLass groups
Cyril Bouvier, Guilhem Castagnos, Laurent Imbert, and Fabien Laguillaumie
2022/1465
Private Collaborative Data Cleaning via Non-Equi PSI
Erik-Oliver Blass, Florian Kerschbaum
2022/1464
Parallel Isogeny Path Finding with Limited Memory
Emanuele Bellini, Jorge Chavez-Saab, Jesús-Javier Chi-Domínguez, Andre Esser, Sorina Ionica, Luis Rivera-Zamarripa, Francisco Rodríguez-Henríquez, Monika Trimoska, Floyd Zweydinger
2022/1463
How to Obfuscate MPC Inputs
Ian McQuoid, Mike Rosulek, Jiayu Xu
2022/1462
RTL-FSMx: Fast and Accurate Finite State Machine Extraction at the RTL for Security Applications
Rasheed Kibria, M. Sazadur Rahman, Farimah Farahmandi, Mark Tehranipoor
2022/1461
ACORN: Input Validation for Secure Aggregation
James Bell, Adrià Gascón, Tancrède Lepoint, Baiyu Li, Sarah Meiklejohn, Mariana Raykova, Cathie Yun
2022/1460
Towards Practical Multi-key TFHE: Parallelizable, Key-Compatible, Quasi-linear Complexity
Hyesun Kwak, Seonhong Min, and Yongsoo Song
2022/1459
Circuit Privacy for FHEW/TFHE-Style Fully Homomorphic Encryption in Practice
Kamil Kluczniak
2022/1458
Speeding-Up Elliptic Curve Cryptography Algorithms
Diana Maimut, Alexandru Cristian Matei
2022/1457
Secure Non-Interactive Reducibility is Decidable
Kaartik Bhushan, Ankit Kumar Misra, Varun Narayanan, Manoj Prabhakaran
2022/1456
Resistance of Ascon Family against Conditional Cube Attacks in Nonce-Misuse Setting
Donghoon Chang, Deukjo Hong, Jinkeon Kang, Meltem Sönmez Turan
2022/1455
Cuckoo Hashing in Cryptography: Optimal Parameters, Robustness and Applications
Kevin Yeo
2022/1454
Unjamming Lightning: A Systematic Approach
Clara Shikhelman, Sergei Tikhomirov
2022/1453
Assisted MPC
Philipp Muth, Stefan Katzenbeisser
2022/1452
A Side-Channel Attack on a Hardware Implementation of CRYSTALS-Kyber
Yanning Ji, Ruize Wang, Kalle Ngo, Elena Dubrova, Linus Backlund
2022/1451
Attribute-Based Signatures for Range of Inner Product and Its Applications
Masahito Ishizaka, Kazuhide Fukushima
2022/1450
Deterministic Wallets for Adaptor Signatures
Andreas Erwig, Siavash Riahi
2022/1449
ParaDiSE: Efficient Threshold Authenticated Encryption in Fully Malicious Model
Shashank Agrawal, Wei Dai, Atul Luykx, Pratyay Mukherjee, Peter Rindal
2022/1448
Towards Practical Sleepy BFT
Dahlia Malkhi, Atsuki Momose, and Ling Ren
2022/1447
flookup: Fractional decomposition-based lookups in quasi-linear time independent of table size
Ariel Gabizon and Dmitry Khovratovich
2022/1446
Radical isogenies and modular curves
Valentina Pribanić
2022/1445
Minimizing Even-Mansour Ciphers for Sequential Indifferentiability (Without Key Schedules)
Shanjie Xu, Qi Da, Chun Guo
2022/1444
Finding Three-Subset Division Property for Ciphers with Complex Linear Layers (Full Version)
Debasmita Chakraborty
2022/1443
DOT-M: A Dual Offline Transaction Scheme of Central Bank Digital Currency for Trusted Mobile Devices
Bo Yang, Yanchao Zhang, Dong Tong
2022/1442
FairPoS: Input Fairness in Permissionless Consensus
James Hsin-yu Chiang, Bernardo David, Ittay Eyal, Tiantian Gong
2022/1441
Tighter Post-quantum Proof for Plain FDH, PFDH and GPV-IBE
Yu Liu, Haodong Jiang, Yunlei Zhao
2022/1440
An Efficient and Decentralized Blockchain-based Commercial Alternative (Full Version)
Marwan Zeggari, Renaud Lambiotte, Aydin Abadi, Louise Axon, Mohamad Kassab
2022/1439
Cryptographic Smooth Neighbors
Giacomo Bruno, Maria Corte-Real Santos, Craig Costello, Jonathan Komada Eriksen, Michael Meyer, Michael Naehrig, and Bruno Sterner
2022/1438
Plug-and-play sanitization for TFHE
Florian Bourse and Malika Izabachène
2022/1437
Secure Multiparty Computation from Threshold Encryption Based on Class Groups
Lennart Braun, Ivan Damgård, and Claudio Orlandi
2022/1436
Efficient and Generic Transformations for Chosen-Ciphertext Secure Predicate Encryption
Marloes Venema, Leon Botros
2022/1435
Eagle: Efficient Privacy Preserving Smart Contracts
Carsten Baum, James Hsin-yu Chiang, Bernardo David, and Tore Kasper Frederiksen
2022/1434
Weightwise almost perfectly balanced functions: secondary constructions for all $n$ and better weightwise nonlinearities
Agnese Gini, Pierrick Méaux
2022/1433
BG: A Modular Treatment of BFT Consensus
Xiao Sui, Sisi Duan, and Haibin Zhang
2022/1432
A Lattice-based Ring Signature Scheme Secure against Key Exposure
Xiaoling Yu, Yuntao Wang
2022/1431
Half-Tree: Halving the Cost of Tree Expansion in COT and DPF
Xiaojie Guo, Kang Yang, Xiao Wang, Wenhao Zhang, Xiang Xie, Jiang Zhang, and Zheli Liu
2022/1430
Indistinguishability Obfuscation via Mathematical Proofs of Equivalence
Abhishek Jain, Zhengzhong Jin
2022/1429
Collusion Resistant Copy-Protection for Watermarkable Functionalities
Jiahui Liu, Qipeng Liu, Luowen Qian, Mark Zhandry
2022/1428
TrustBoost: Boosting Trust among Interoperable Blockchains
Xuechao Wang, Peiyao Sheng, Sreeram Kannan, Kartik Nayak, Pramod Viswanath
2022/1427
Improved Quantum Analysis of SPECK and LowMC (Full Version)
Kyungbae Jang, Anubhab Baksi, Hyunji Kim, Hwajeong Seo, Anupam Chattopadhyay
2022/1426
Decentralized Anonymous IoT Data Sharing with Key-Private Proxy Re-Encryption
Esra Günsay, Oğuz Yayla
2022/1425
Towards Automating Cryptographic Hardware Implementations: a Case Study of HQC
Carlos Aguilar-Melchor, Jean-Christophe Deneuville, Arnaud Dion, James Howe, Romain Malmain, Vincent Migliore, Mamuri Nawan, Kashif Nawaz
2022/1424
DeFi That Defies: Imported Off-Chain Metrics and Pseudonymous On-Chain Activity
David W. Kravitz, Mollie Z. Halverson
2022/1423
The Superlinearity Problem in Post-Quantum Blockchains
Sunoo Park, Nicholas Spooner
2022/1422
Unlinkable Policy-based Sanitizable Signatures
Ismail Afia, Riham AlTawy
2022/1421
Transparent Batchable Time-lock Puzzles and Applications to Byzantine Consensus
Shravan Srinivasan, Julian Loss, Giulio Malavolta, Kartik Nayak, Charalampos Papamanthou, Sri AravindaKrishnan Thyagarajan
2022/1420
Diamonds are Forever, Loss-Versus-Rebalancing is Not
Conor McMenamin, Vanesa Daza, Bruno Mazorra
2022/1419
Speed-Stacking: Fast Sublinear Zero-Knowledge Proofs for Disjunctions
Aarushi Goel, Mathias Hall-Andersen, Gabriel Kaptchuk, Nicholas Spooner
2022/1418
Da Yan Concentrator and Extender of Random Data (DYCE)
Anna M. Johnston, Puru Kulkarni
2022/1417
Efficient Dynamic Proof of Retrievability for Cold Storage
Tung Le, Pengzhi Huang, Attila A. Yavuz, Elaine Shi, Thang Hoang
2022/1416
Side-Channel Attack Countermeasures Based On Clock Randomization Have a Fundamental Flaw
Martin Brisfors, Michail Moraitis, Elena Dubrova
2022/1415
FABEO: Fast Attribute-Based Encryption with Optimal Security
Doreen Riepel and Hoeteck Wee
2022/1414
INT-RUP Security of SAEB and TinyJAMBU
Nilanjan Datta, Avijit Dutta, Shibam Ghosh
2022/1413
How to Compress Encrypted Data
Nils Fleischhacker, Kasper Green Larsen, Mark Simkin
2022/1412
Algorithm xxx: Evaluating a Boolean Polynomial on All Possible Inputs
Charles Bouillaguet
2022/1411
Cryptographic Administration for Secure Group Messaging
David Balbás, Daniel Collins, Serge Vaudenay
2022/1410
Breaking and Protecting the Crystal: Side-Channel Analysis of Dilithium in Hardware
Hauke Steffen, Georg Land, Lucie Kogelheide, Tim Güneysu
2022/1409
SNARGs and PPAD Hardness from the Decisional Diffie-Hellman Assumption
Yael Tauman Kalai, Alex Lombardi, Vinod Vaikuntanathan
2022/1408
BRAKE: Biometric Resilient Authenticated Key Exchange
Pia Bauspieß, Tjerand Silde, Matej Poljuha, Alexandre Tullot, Anamaria Costache, Christian Rathgeb, Jascha Kolberg, and Christoph Busch
2022/1407
Threshold Linear Secret Sharing to the Rescue of MPC-in-the-Head
Thibauld Feneuil, Matthieu Rivain
2022/1406
Protecting Dilithium against Leakage: Revisited Sensitivity Analysis and Improved Implementations
Melissa Azouaoui, Olivier Bronchain, Gaëtan Cassiers, Clément Hoffmann, Yulia Kuzovkova, Joost Renes, Markus Schönauer, Tobias Schneider, François-Xavier Standaert, Christine van Vredendaal
2022/1405
Subverting Deniability
Marcel Armour, Elizabeth A. Quaglia
2022/1404
Reducing an LWE Instance by Modular Hints and its Applications to Primal Attack, Dual Attack and BKW Attack
Han Wu, Xiaoyun Wang, Guangwu Xu
2022/1403
On the Dual Attack of LWE Schemes in the Presence of Hints
Han Wu, Xiaoyun Wang, Guangwu Xu
2022/1402
Sorting Attacks Resilient Authentication Protocol for CMOS Image Sensor Based PUF
Chandan Kumar, Mahendra Rathor, Urbi Chatterjee
2022/1401
PIRANA: Faster Multi-query PIR via Constant-weight Codes
Jian Liu, Jingyu Li, Di Wu, and Kui Ren
2022/1400
EdMSM: Multi-Scalar-Multiplication for SNARKs and Faster Montgomery multiplication
Youssef El Housni, Gautam Botrel
2022/1399
Low-latency implementation of the GIFT cipher on RISC-V architectures
Gheorghe Pojoga, Kostas Papagiannopoulos
2022/1398
MILP-aided Cryptanalysis of the FUTURE Block Cipher
Murat Burhan İlter and Ali Aydin Selcuk
2022/1397
Synchronous Perfectly Secure Message Transmission with Optimal Asynchronous Fallback Guarantees
Giovanni Deligios and Chen-Da Liu-Zhang
2022/1396
FPGA Acceleration of Multi-Scalar Multiplication: CycloneMSM
Kaveh Aasaraai, Don Beaver, Emanuele Cesena, Rahul Maganti, Nicolas Stalder, Javier Varela
2022/1395
Non-Interactive Anonymous Router with Quasi-Linear Router Computation
Rex Fernando, Elaine Shi, Pratik Soni, Nikhil Vanjani, and Brent Waters
2022/1394
Risky Translations: Securing TLBs against Timing Side Channels
Florian Stolz, Jan Philipp Thoma, Pascal Sasdrich, Tim Güneysu
2022/1393
Efficient Zero-Knowledge Proofs on Signed Data with Applications to Verifiable Computation on Data Streams
Dario Fiore, Ida Tucker
2022/1392
A Faster Third-Order Masking of Lookup Tables
Anju Alexander, Annapurna Valiveti, Srinivas Vivek
2022/1391
Efficient Noise Generation Protocols for Differentially Private Multiparty Computation
Reo Eriguchi, Atsunori Ichikawa, Noboru Kunihiro, Koji Nuida
2022/1390
Multiplicative and Verifiably Multiplicative Secret Sharing for Multipartite Adversary Structures
Reo Eriguchi, Noboru Kunihiro, Koji Nuida
2022/1389
Practical Asynchronous High-threshold Distributed Key Generation and Distributed Polynomial Sampling
Sourav Das, Zhuolun Xiang, Lefteris Kokoris-Kogias, Ling Ren
2022/1388
MIPS Assembly Language Implementation of GIFT-64-128 Encryption
William Diehl
2022/1387
AIM: Symmetric Primitive for Shorter Signatures with Stronger Security (Full Version)
Seongkwang Kim, Jincheol Ha, Mincheol Son, Byeonghak Lee, Dukjae Moon, Joohee Lee, Sangyub Lee, Jihoon Kwon, Jihoon Cho, Hyojin Yoon, Jooyoung Lee
2022/1386
A multivariate noise-free HE proposal
Gerald Gavin, Sandrine Tainturier
2022/1385
Deep Reinforcement Learning-based Rebalancing Policies for Profit Maximization of Relay Nodes in Payment Channel Networks
Nikolaos Papadis and Leandros Tassiulas
2022/1384
Non-uniformity and Quantum Advice in the Random Oracle Model
Qipeng Liu
2022/1383
Sublinear-Round Broadcast without Trusted Setup against Dishonest Majority
Andreea B. Alexandru, Julian Loss, Charalampos Papamanthou, and Giorgos Tsimos
2022/1382
Quagmire ciphers, group theory, and information: Key amplification in crib-based attacks
Thomas Kaeding
2022/1381
How to backdoor LWE-like cryptosystems
Tobias Hemmert
2022/1380
Post-Quantum Zero-Knowledge with Space-Bounded Simulation
Prabhanjan Ananth, Alex B. Grilo
2022/1379
Zero-Knowledge Optimal Monetary Policy under Stochastic Dominance
David Cerezo Sánchez
2022/1378
A Fast Hash Family for Memory Integrity
Qiming Li, Sampo Sovio
2022/1377
Improved Differential and Linear Trail Bounds for ASCON
Solane El Hirch, Silvia Mella, Alireza Mehrdad, Joan Daemen
2022/1376
Modeling Effective Lifespan of Payment Channels
Soheil Zibakhsh Shabgahi, Seyed Mahdi Hosseini, Seyed Pooya Shariatpanahi, Behnam Bahrak
2022/1375
From the Hardness of Detecting Superpositions to Cryptography: Quantum Public Key Encryption and Commitments
Minki Hhan, Tomoyuki Morimae, Takashi Yamakawa
2022/1374
Efficient Public Key Searchable Encryption Schemes from Standard Hard Lattice Problems for Cloud Computing
Lijun Qi, Jincheng Zhuang
2022/1373
ZKBdf: A ZKBoo-based Quantum-Secure Verifiable Delay Function with Prover-secret
Teik Guan Tan, Vishal Sharma, Zengpeng Li, Pawel Szalachowski, Jianying Zhou
2022/1372
Security and Quantum Computing: An Overview
Prasannna Ravi, Anupam Chattopadhyay, Shivam Bhasin
2022/1371
On the Security of KOS
Benjamin E. Diamond
2022/1370
A New Post-Quantum Key Agreement Protocol and Derived Cryptosystem Based on Rectangular Matrices
Hugo Daniel Scolnik, Juan Pedro Hecht
2022/1369
Network-Agnostic Security Comes (Almost) for Free in DKG and MPC
Renas Bacho, Daniel Collins, Chen-Da Liu-Zhang, and Julian Loss
2022/1368
Functional Commitments for All Functions, with Transparent Setup and from SIS
Leo de Castro, Chris Peikert
2022/1367
Agile Cryptography: A Universally Composable Approach
Christian Badertscher, Michele Ciampi, and Aggelos Kiayias
2022/1366
Two remarks on the vectorization problem
Wouter Castryck, Natan Vander Meeren
2022/1365
Chainable Functional Commitments for Unbounded-Depth Circuits
David Balbás, Dario Catalano, Dario Fiore, Russell W. F. Lai
2022/1364
On Polynomial Functions Modulo $p^e$ and Faster Bootstrapping for Homomorphic Encryption
Robin Geelen, Ilia Iliashenko, Jiayi Kang, and Frederik Vercauteren
2022/1363
Bootstrapping for BGV and BFV Revisited
Robin Geelen and Frederik Vercauteren
2022/1362
ALLOSAUR: Accumulator with Low-Latency Oblivious Sublinear Anonymous credential Updates with Revocations
Samuel Jaques, Michael Lodder, and Hart Montgomery
2022/1361
Correlation Electromagnetic Analysis on an FPGA Implementation of CRYSTALS-Kyber
Rafael Carrera Rodriguez, Florent Bruguier, Emanuele Valea, and Pascal Benoit
2022/1360
One for All, All for One: A Unified Evaluation Framework for Univariate DPA Attacks
Jiangshan Long, Chenxu Wang, Changhai Ou, Zhu Wang, Yongbin Zhou, and Ming Tang
2022/1359
Probabilistic Hash-and-Sign with Retry in the Quantum Random Oracle Model
Haruhisa Kosuge and Keita Xagawa
2022/1358
Commitments to Quantum States
Sam Gunn, Nathan Ju, Fermi Ma, Mark Zhandry
2022/1357
A Theory of Composition for Differential Obliviousness
Mingxun Zhou, Elaine Shi, T-H. Hubert Chan, and Shir Maimon
2022/1356
A fully classical LLL algorithm for modules
Gabrielle De Micheli, Daniele Micciancio
2022/1355
HyperPlonk: Plonk with Linear-Time Prover and High-Degree Custom Gates
Binyi Chen, Benedikt Bünz, Dan Boneh, and Zhenfei Zhang
2022/1354
Embracing Hellman: A Simple Proof-of-Space Search consensus algorithm with stable block times using Logarithmic Embargo
Marijn F. Stollenga
2022/1353
Anonymous Permutation Routing
Paul Bunn, Eyal Kushilevitz, and Rafail Ostrovsky
2022/1352
aPlonK : Aggregated PlonK from Multi-Polynomial Commitment Schemes
Miguel Ambrona, Marc Beunardeau, Anne-Laure Schmitt, Raphaël R. Toledo
2022/1351
Better Steady than Speedy: Full break of SPEEDY-7-192
Christina Boura, Nicolas David, Rachelle Heim Boissier, Maria Naya-Plasencia
2022/1350
Rai-Choo! Evolving Blind Signatures to the Next Level
Lucjan Hanzlik, Julian Loss, Benedikt Wagner
2022/1349
Invertibility of multiple random functions and its application to symmetric ciphers
Xiutao Feng, Xiaoshan GAO, Zhangyi WANG, Xiangyong ZENG
2022/1348
ABE for DFA from LWE against Bounded Collusions, Revisited
Hoeteck Wee
2022/1347
Broadcast, Trace and Revoke with Optimal Parameters from Polynomial Hardness
Shweta Agrawal, Simran Kumari, Anshu Yadav, Shota Yamada
2022/1346
Generic Signature from Noisy Systems
Trey Li
2022/1345
Revisiting Security Estimation for LWE with Hints from a Geometric Perspective
Dana Dachman-Soled, Huijing Gong, Tom Hanson, Hunter Kippen
2022/1344
Discrete Exponential Equations and Noisy Systems
Trey Li
2022/1343
Refined Strategy for Solving LWE in Two-step Mode
Wenwen Xia, Leizhang Wang, GengWang, Dawu Gu, and Baocang Wang
2022/1342
Block Cipher Doubling for a Post-Quantum World
Ritam Bhaumik, André Chailloux, Paul Frixons, Bart Mennink, María Naya-Plasencia
2022/1341
LaBRADOR: Compact Proofs for R1CS from Module-SIS
Ward Beullens, Gregor Seiler
2022/1340
Understanding the Duplex and Its Security
Bart Mennink
2022/1339
CCA-1 Secure Updatable Encryption with Adaptive Security
Huanhuan Chen, Yao Jiang Galteland, and Kaitai Liang
2022/1338
Privacy-Preserving Authenticated Key Exchange: Stronger Privacy and Generic Constructions
Sebastian Ramacher, Daniel Slamanig, Andreas Weninger
2022/1337
How to Enumerate LWE Keys as Narrow as in Kyber/Dilithium
Timo Glaser and Alexander May
2022/1336
One-Wayness in Quantum Cryptography
Tomoyuki Morimae and Takashi Yamakawa
2022/1335
Revisiting Higher-Order Differential-Linear Attacks from an Algebraic Perspective
Kai Hu, Thomas Peyrin, Quan Quan Tan, and Trevor Yap
2022/1334
Post-Quantum Signature from Subset Product with Errors
Trey Li
2022/1333
Fast Fully Oblivious Compaction and Shuffling
Sajin Sasy, Aaron Johnson, Ian Goldberg
2022/1332
On the Classic Protocol for MPC Schnorr Signatures
Nikolaos Makriyannis
2022/1331
Additive-Homomorphic Functional Commitments and Applications to Homomorphic Signatures
Dario Catalano, Dario Fiore, Ida Tucker
2022/1330
Hybrid Dual and Meet-LWE Attack
Lei Bi, Xianhui Lu, Junjie Luo, Kunpeng Wang
2022/1329
New Time-Memory Trade-Offs for Subset Sum -- Improving ISD in Theory and Practice
Andre Esser, Floyd Zweydinger
2022/1328
Revisiting Nearest-Neighbor-Based Information Set Decoding
Andre Esser
2022/1327
Post-Quantum Public Key Cryptosystem from Subset Product with Errors
Trey Li
2022/1326
Survey: Non-malleable code in the split-state model
Divesh Aggarwal, Marshall Ball, Maciej Obremski
2022/1325
Efficient and Complete Formulas for Binary Curves
Thomas Pornin
2022/1324
Adaptive Multiparty NIKE
Venkata Koppula, Brent Waters, Mark Zhandry
2022/1323
On Constructing One-Way Quantum State Generators, and More
Shujiao Cao and Rui Xue
2022/1322
Efficient Linkable Ring Signature from Vector Commitment inexplicably named Multratug
Anton A. Sokolov
2022/1321
cuZK: Accelerating Zero-Knowledge Proof with A Faster Parallel Multi-Scalar Multiplication Algorithm on GPUs
Tao Lu, Chengkun Wei, Ruijing Yu, Chaochao Chen, Wenjing Fang, Lei Wang, Zeke Wang, Wenzhi Chen
2022/1320
Boosting Batch Arguments and RAM Delegation
Yael Tauman Kalai, Alex Lombardi, Vinod Vaikuntanathan, Daniel Wichs
2022/1319
Post-Quantum Key Exchange from Subset Product With Errors
Trey Li
2022/1318
General Partially Fair Multi-Party Computation with VDFs
Bolton Bailey, Andrew Miller, Or Sattath
2022/1317
On the Optimal Succinctness and Efficiency of Functional Encryption and Attribute-Based Encryption
Aayush Jain, Huijia Lin, and Ji Luo
2022/1316
TurboPack: Honest Majority MPC with Constant Online Communication
Daniel Escudero, Vipul Goyal, Antigoni Polychroniadou, Yifan Song
2022/1315
Hitchhiker’s Guide to a Practical Automated TFHE Parameter Setup for Custom Applications
Jakub Klemsa
2022/1314
Hash Gone Bad: Automated discovery of protocol attacks that exploit hash function weaknesses
Vincent Cheval, Cas Cremers, Alexander Dax, Lucca Hirschi, Charlie Jacomme, Steve Kremer
2022/1313
Bounded Surjective Quadratic Functions over $\mathbb F_p^n$ for MPC-/ZK-/FHE-Friendly Symmetric Primitives
Lorenzo Grassi
2022/1312
Multiple Modular Unique Factorization Domain Subset Product with Errors
Trey Li
2022/1311
Fully Adaptive Decentralized Multi-Authority ABE
Pratish Datta, Ilan Komargodski, Brent Waters
2022/1310
Power Residue Symbol Order Detecting Algorithm for Subset Product over Algebraic Integers
Trey Li
2022/1309
MPC as a service using Ethereum Registry Smart Contracts - dCommon CIP
Matt Shams(Anis), Bingsheng Zhang, Justinas Zaliaduonis
2022/1308
Jacobi Symbol Parity Checking Algorithm for Subset Product
Trey Li
2022/1307
BLOOM: Bimodal Lattice One-Out-of-Many Proofs and Applications
Vadim Lyubashevsky, Ngoc Khanh Nguyen
2022/1306
Single-shuffle Full-open Card-based Protocols Imply Private Simultaneous Messages Protocols
Kazumasa Shinagawa, Koji Nuida
2022/1305
Subset Product with Errors over Unique Factorization Domains and Ideal Class Groups of Dedekind Domains
Trey Li
2022/1304
Unifying Quantum Verification and Error-Detection: Theory and Tools for Optimisations
Theodoros Kapourniotis, Elham Kashefi, Dominik Leichtle, Luka Music, Harold Ollivier
2022/1303
Fast and Clean: Auditable high-performance assembly via constraint solving
Amin Abdulrahman, Hanno Becker, Matthias J. Kannwischer, and Fabien Klein
2022/1302
Private Certifier Intersection
Bishakh Chandra Ghosh, Sikhar Patranabis, Dhinakaran Vinayagamurthy, Venkatraman Ramakrishna, Krishnasuri Narayanam, Sandip Chakraborty
2022/1301
On the Invalidity of Lin16/Lin17 Obfuscation Schemes
Hu Yupu, Dong Siyue, Wang Baocang, Dong Xingting
2022/1300
Garrison: A Novel Watchtower Scheme for Bitcoin
Arash Mirzaei, Amin Sakzad, Jiangshan Yu, Ron Steinfeld
2022/1299
Addax: A fast, private, and accountable ad exchange infrastructure
Ke Zhong, Yiping Ma, Yifeng Mao, Sebastian Angel
2022/1298
BLEACH: Cleaning Errors in Discrete Computations over CKKS
Nir Drucker, Guy Moshkowich, Tomer Pelleg, Hayim Shaul
2022/1297
Toward a Post-Quantum Zero-Knowledge Verifiable Credential System for Self-Sovereign Identity
Simone Dutto, Davide Margaria, Carlo Sanna, Andrea Vesco
2022/1296
Efficient Asymmetric Threshold ECDSA for MPC-based Cold Storage
Constantin Blokh, Nikolaos Makriyannis, and Udi Peled
2022/1295
Daric: A Storage Efficient Payment Channel With Penalization Mechanism
Arash Mirzaei, Amin Sakzad, Jiangshan Yu, Ron Steinfeld
2022/1294
What Can Cryptography Do For Decentralized Mechanism Design?
Elaine Shi, Hao Chung, Ke Wu
2022/1293
Improving the Efficiency of Report and Trace Ring Signatures
Xavier Bultel, Ashley Fraser, Elizabeth A. Quaglia
2022/1292
Bet-or-Pass: Adversarially Robust Bloom Filters
Moni Naor, Noa Oved
2022/1291
sMGM: parameterizable AEAD-mode
Liliya Akhmetzyanova, Evgeny Alekseev, Alexandra Babueva, Andrey Bozhko, Stanislav Smyshlyaev
2022/1290
Bool Network: An Open, Distributed, Secure Cross-chain Notary Platform
Zeyuan Yin, Bingsheng Zhang, Jingzhong Xu, Kaiyu Lu, Kui Ren
2022/1289
Exploring RNS for Isogeny-based Cryptography
David Jacquemin, Ahmet Can Mert, Sujoy Sinha Roy
2022/1288
Round-Optimal Black-Box Secure Computation from Two-Round Malicious OT
Yuval Ishai, Dakshita Khurana, Amit Sahai, Akshayaram Srinivasan
2022/1287
On a Conjecture From a Failed CryptoAnalysis
Shengtong Zhang
2022/1286
ZEBRA: SNARK-based Anonymous Credentials for Practical, Private and Accountable On-chain Access Control
Deevashwer Rathee, Guru Vamsi Policharla, Tiancheng Xie, Ryan Cottone, Dawn Song
2022/1285
Lower Bounds for the Number of Decryption Updates in Registration-Based Encryption
Mohammad Mahmoody, Wei Qi, Ahmadreza Rahimi
2022/1284
(Inner-Product) Functional Encryption with Updatable Ciphertexts
Valerio Cini, Sebastian Ramacher, Daniel Slamanig, Christoph Striecks, and Erkan Tairi
2022/1283
A Note on Reimplementing the Castryck-Decru Attack and Lessons Learned for SageMath
Rémy Oudompheng, Giacomo Pope
2022/1282
Comparing Key Rank Estimation Methods
Rebecca Young, Luke Mather, Elisabeth Oswald
2022/1281
LARP: A Lightweight Auto-Refreshing Pseudonym Protocol for V2X
Zheng Yang, Tien Tuan Anh Dinh, Chao Yin, Yingying Yao, Dianshi Yang, Xiaolin Chang, Jianying Zhou
2022/1280
Group Time-based One-time Passwords and its Application to Efficient Privacy-Preserving Proof of Location
Zheng Yang, Chenglu Jin, Jianting Ning, Zengpeng Li, Tien Tuan Anh Dinh, Jianying Zhou
2022/1279
Improved Neural Distinguishers with Multi-Round and Multi-Splicing Construction
Jiashuo Liu, Jiongjiong Ren, Shaozhen Chen, ManMan Li
2022/1278
Fast Evaluation of S-boxes with Garbled Circuits
Erik Pohle, Aysajan Abidin, and Bart Preneel
2022/1277
Compact GF(2) systemizer and optimized constant-time hardware sorters for Key Generation in Classic McEliece
Yihong Zhu, Wenping Zhu, Chen Chen, Min Zhu, Zhengdong Li, Shaojun Wei, Leibo Liu
2022/1276
Second-Order Low-Randomness $d+1$ Hardware Sharing of the AES
Siemen Dhooghe, Aein Rezaei Shahmirzadi, Amir Moradi
2022/1275
DiAE: Re-rolling the DiSE
Alexandre Duc, Robin Müller, Damian Vizár
2022/1274
Self Masking for Hardering Inversions
Paweł Cyprys, Shlomi Dolev, and Shlomo Moran
2022/1273
A Conjecture From a Failed Cryptanalysis
David Naccache, Ofer Yifrach-Stav
2022/1272
PPAD is as Hard as LWE and Iterated Squaring
Nir Bitansky, Arka Rai Choudhuri, Justin Holmgren, Chethan Kamath, Alex Lombardi, Omer Paneth, Ron D. Rothblum
2022/1271
Privacy-preserving Federated Singular Value Decomposition
Bowen LIU, Balázs Pejó, Qiang TANG
2022/1270
Typing High-Speed Cryptography against Spectre v1
Basavesh Ammanaghatta Shivakumar, Gilles Barthe, Benjamin Grégoire, Vincent Laporte, Tiago Oliveira, Swarn Priya, Peter Schwabe, Lucas Tabary-Maujean
2022/1269
Collusion-Resistant Functional Encryption for RAMs
Prabhanjan Ananth, Kai-Min Chung, Xiong Fan, Luowen Qian
2022/1268
Cryptographic Role-Based Access Control, Reconsidered
Bin Liu, Antonis Michalas, Bogdan Warinschi
2022/1267
High-precision Leveled Homomorphic Encryption with Batching
Long Nie, ShaoWen Yao, Jing Liu
2022/1266
Asymptotically Free Broadcast in Constant Expected Time via Packed VSS
Ittai Abraham, Gilad Asharov, Shravani Patil, Arpita Patra
2022/1265
Universal Ring Signatures in the Standard Model
Pedro Branco, Nico Döttling, Stella Wohnig
2022/1264
Rotatable Zero Knowledge Sets: Post Compromise Secure Auditable Dictionaries with application to Key Transparency
Brian Chen, Yevgeniy Dodis, Esha Ghosh, Eli Goldin, Balachandar Kesavan, Antonio Marcedone, and Merry Ember Mou
2022/1263
Steganography-Free Zero-Knowledge
Behzad Abdolmaleki, Nils Fleischhacker, Vipul Goyal, Abhishek Jain, Giulio Malavolta
2022/1262
Vectorized Batch Private Information Retrieval
Muhammad Haris Mughees, Ling Ren
2022/1261
Breaking RSA Generically is Equivalent to Factoring, with Preprocessing
Dana Dachman-Soled, Julian Loss, Adam O'Neill
2022/1260
On Committing Authenticated Encryption
John Chan, Phillip Rogaway
2022/1259
Horizontal racewalking using radical isogenies
Wouter Castryck, Thomas Decru, Marc Houben, Frederik Vercauteren
2022/1258
Tightly Secure Chameleon Hash Functions in the Multi-User Setting and Their Applications
Xiangyu Liu, Shengli Liu, Dawu Gu
2022/1257
One-Time Programs from Commodity Hardware
Harry Eldridge, Aarushi Goel, Matthew Green, Abhishek Jain, Maximilian Zinkus
2022/1256
EvalRound Algorithm in CKKS Bootstrapping
Seonghak Kim, Minji Park, Jaehyung Kim, Taekyung Kim, and Chohong Min
2022/1255
PLUME: An ECDSA Nullifier Scheme for Unique Pseudonymity within Zero Knowledge Proofs
Aayush Gupta, Kobi Gurkan
2022/1254
Protecting the most significant bits in scalar multiplication algorithms
Estuardo Alpirez Bock, Lukasz Chmielewski, Konstantina Miteloudi
2022/1253
A Modular Approach to the Incompressibility of Block-Cipher-Based AEADs
Akinori Hosoyamada, Takanori Isobe, Yosuke Todo, Kan Yasuda
2022/1252
Functional Encryption with Secure Key Leasing
Fuyuki Kitagawa, Ryo Nishimaki
2022/1251
Flashproofs: Efficient Zero-Knowledge Arguments of Range and Polynomial Evaluation with Transparent Setup
Nan Wang, Sid Chi-Kin Chau
2022/1250
Eureka: A General Framework for Black-box Differential Privacy Estimators
Yun Lu, Malik Magdon-Ismail, Yu Wei, and Vassilis Zikas
2022/1249
On Rejection Sampling in Lyubashevsky's Signature Scheme
Julien Devevey, Omar Fawzi, Alain Passelègue, Damien Stehlé
2022/1248
Fully-Secure MPC with Minimal Trust
Yuval Ishai, Arpita Patra, Sikhar Patranabis, Divya Ravi, Akshayaram Srinivasan
2022/1247
Peek into the Black-Box: Interpretable Neural Network using SAT Equations in Side-Channel Analysis
Trevor Yap, Adrien Benamira, Shivam Bhasin, Thomas Peyrin
2022/1246
Identity-Based Matchmaking Encryption from Standard Assumptions
Jie Chen, Yu Li, Jinming Wen, Jian Weng
2022/1245
On Generalizations of the Lai-Massey Scheme
Lorenzo Grassi
2022/1244
A Modular Approach to the Security Analysis of Two-Permutation Constructions
Yu Long Chen
2022/1243
Hybrid scalar/vector implementations of Keccak and SPHINCS+ on AArch64
Hanno Becker, Matthias J. Kannwischer
2022/1242
Data Protection Law and Multi-Party Computation: Applications to Information Exchange between Law Enforcement Agencies
Amos Treiber, Dirk Müllmann, Thomas Schneider, Indra Spiecker genannt Döhmann
2022/1241
Continued Fractions Applied to a Family of RSA-like Cryptosystems
George Teseleanu, Paul Cotan
2022/1240
Sherlock Holmes Zero-Knowledge Protocols
George Teseleanu
2022/1239
Improving Bounds on Elliptic Curve Hidden Number Problem for ECDH Key Exchange
Jun Xu, Santanu Sarkar, Huaxiong Wang, Lei Hu
2022/1238
Secure Quantum Bit Commitment
Ping Wang, Yiting Su, Fangguo Zhang
2022/1237
On the Worst-Case Inefficiency of CGKA
Alexander Bienstock, Yevgeniy Dodis, Sanjam Garg, Garrison Grogan, Mohammad Hajiabadi, Paul Rösler
2022/1236
Rate-1 Non-Interactive Arguments for Batch-NP and Applications
Lalita Devadas, Rishab Goyal, Yael Kalai, Vinod Vaikuntanathan
2022/1235
QCCA-Secure Generic Transformations in the Quantum Random Oracle Model
Tianshu Shan, Jiangxia Ge, Rui Xue
2022/1234
Towards Tight Security Bounds for OMAC, XCBC and TMAC
Soumya Chattopadhyay, Ashwin Jha, Mridul Nandi
2022/1233
Forward-Secure Encryption with Fast Forwarding
Yevgeniy Dodis, Daniel Jost, Harish Karthikeyan
2022/1232
The Abe-Okamoto Partially Blind Signature Scheme Revisited
Julia Kastner, Julian Loss, Jiayu Xu
2022/1231
Continuously Non-Malleable Codes against Bounded-Depth Tampering
Gianluca Brian, Sebastian Faust, Elena Micheli, Daniele Venturi
2022/1230
Group Action Key Encapsulation and Non-Interactive Key Exchange in the QROM
Julien Duman, Dominik Hartmann, Eike Kiltz, Sabrina Kunzweiler, Jonas Lehmann, Doreen Riepel
2022/1229
Cumulatively All-Lossy-But-One Trapdoor Functions from Standard Assumptions
Benoît Libert, Ky Nguyen, Alain Passelègue
2022/1228
SCARF: A Low-Latency Block Cipher for Secure Cache-Randomization
Federico Canale, Tim Güneysu, Gregor Leander, Jan Philipp Thoma, Yosuke Todo, Rei Ueno
2022/1227
How to Sample a Discrete Gaussian (and more) from a Random Oracle
George Lu, Brent Waters
2022/1226
Algebraic Relation of Three MinRank Algebraic Modelings
Hao Guo, Jintai Ding
2022/1225
Hybrid Post-Quantum Signatures in Hardware Security Keys
Diana Ghinea, Fabian Kaczmarczyck, Jennifer Pullman, Julien Cretin, Stefan Kölbl, Rafael Misoczki, Jean-Michel Picod, Luca Invernizzi, and Elie Bursztein
2022/1224
From Plaintext-extractability to IND-CCA Security
Ehsan Ebrahimi
2022/1223
Efficient Proofs of Software Exploitability for Real-world Processors
Matthew Green, Mathias Hall-Andersen, Eric Hennenfent, Gabriel Kaptchuk, Benjamin Perez, Gijs Van Laer
2022/1222
Homomorphic Encryption on GPU
Ali Şah Özcan, Can Ayduman, Enes Recep Türkoğlu, Erkay Savaş
2022/1221
Multi-User Security of the Sum of Truncated Random Permutations (Full Version)
Wonseok Choi, Hwigyeom Kim, Jooyoung Lee, Yeongmin Lee
2022/1220
Permissionless Clock Synchronization with Public Setup
Juan Garay, Aggelos Kiayias, Yu Shen
2022/1219
Anonymous Random Allocation and Its Applications
Azam Soleimanian
2022/1218
Stretching Cube Attacks: Improved Methods to Recover Massive Superpolies
Jiahui He, Kai Hu, Bart Preneel, Meiqin Wang
2022/1217
Privacy-Preserving Authenticated Key Exchange in the Standard Model
You Lyu, Shengli Liu, Shuai Han, Dawu Gu
2022/1216
A summary on the FRI low degree test
Ulrich Haböck
2022/1215
Continuous Authentication in Secure Messaging
Benjamin Dowling, Felix Günther, Alexandre Poirrier
2022/1214
Updatable NIZKs from Non-Interactive Zaps
Karim Baghery, Navid Ghaedi Bardeh
2022/1213
Nostradamus goes Quantum
Barbara Jiabao Benedikt, Marc Fischlin, Moritz Huppert
2022/1212
VoteXX: A Solution to Improper Influence in Voter-Verifiable Elections
David Chaum, Richard T. Carback, Jeremy Clark, Chao Liu, Mahdi Nejadgholi, Bart Preneel, Alan T. Sherman, Mario Yaksetig, Zeyuan Yin, Filip Zagórski, Bingsheng Zhang
2022/1211
Arithmetization of Functional Program Execution via Interaction Nets in Halo 2
Anthony Hart
2022/1210
On the Field-Based Division Property: Applications to MiMC, Feistel MiMC and GMiMC (Full Version)
Jiamin Cui, Kai Hu, Meiqin Wang, Puwen Wei
2022/1209
Puncturable Key Wrapping and Its Applications
Matilda Backendal, Felix Günther, Kenneth G. Paterson
2022/1208
Notes on Reusable Garbling
Hu Yupu, Dong Siyue, Wang Baocang, Liu Jun
2022/1207
Attaining GOD Beyond Honest Majority With Friends and Foes
Aditya Hegde, Nishat Koti, Varsha Bhat Kukkala, Shravani Patil, Arpita Patra, Protik Paul
2022/1206
On the Optimal Communication Complexity of Error-Correcting Multi-Server PIR
Reo Eriguchi, Kaoru Kurosawa, Koji Nuida
2022/1205
Accountable Light Client Systems for PoS Blockchains
Oana Ciobotaru, Fatemeh Shirazi, Alistair Stewart, Sergey Vasilyev
2022/1204
The Pseudorandom Oracle Model and Ideal Obfuscation
Aayush Jain, Huijia Lin, Ji Luo, Daniel Wichs
2022/1203
On Module Unique-SVP and NTRU
Joël Felderhoff, Alice Pellet-Mary, Damien Stehlé
2022/1202
Disorientation faults in CSIDH
Gustavo Banegas, Juliane Krämer, Tanja Lange, Michael Meyer, Lorenz Panny, Krijn Reijnders, Jana Sotáková, Monika Trimoska
2022/1201
Leakage Certification Made Simple
Aakash Chowdhury, Carlo Brunetta, Arnab Roy, and Elisabeth Oswald
2022/1200
SEEK: model extraction attack against hybrid secure inference protocols
Si Chen, Junfeng Fan
2022/1199
Structure Evaluation of AES-like Ciphers against Mixture Differential Cryptanalysis
Xiaofeng Xie, Tian Tian
2022/1198
To Be, or Not to Be Stateful: Post-Quantum Secure Boot using Hash-Based Signatures
Alexander Wagner, Felix Oberhansl, Marc Schink
2022/1197
On Squaring Modulo Mersenne Numbers
David Naccache, Ofer Yifrach-Stav
2022/1196
Embedded Identity Traceable Identity-Based IPFE from Pairings and Lattices
Subhranil Dutta, Tapas Pal, Amit Kumar Singh, Sourav Mukhopadhyay
2022/1195
A Deep Neural Differential Distinguisher for ARX based Block Cipher
Debranjan Pal, Upasana Mandal, Mainak Chaudhury, Abhijit Das, and Dipanwita Roy Chowdhury
2022/1194
Multi-Authority ABE from Lattices without Random Oracles
Brent Waters, Hoeteck Wee, David J. Wu
2022/1193
Knowledge Encryption and Its Applications to Simulatable Protocols With Low Round-Complexity
Yi Deng, Xinxuan Zhang
2022/1192
(Augmented) Broadcast Encryption from Identity Based Encryption with Wildcard
Anaïs Barthoulot, Olivier Blazy, Sébastien Canard
2022/1191
A New Framework for Quantum Oblivious Transfer
Amit Agarwal, James Bartusek, Dakshita Khurana, Nishant Kumar
2022/1190
Statistical Security in Two-Party Computation Revisited
Saikrishna Badrinarayanan, Sikhar Patranabis, Pratik Sarkar
2022/1189
CSI-SharK: CSI-FiSh with Sharing-friendly Keys
Shahla Atapoor, Karim Baghery, Daniele Cozzo, Robi Pedersen
2022/1188
High-order masking of NTRU
Jean-Sebastien Coron, François Gérard, Matthias Trannoy, Rina Zeitoun
2022/1187
Strongly Anonymous Ratcheted Key Exchange
Benjamin Dowling, Eduard Hauck, Doreen Riepel, Paul Rösler
2022/1186
Adversarial Correctness and Privacy for Probabilistic Data Structures
Mia Filić, Kenneth G. Paterson, Anupama Unnikrishnan, Fernando Virdia
2022/1185
PEA: Practical private epistasis analysis using MPC
Kay Hamacher, Tobias Kussel, Thomas Schneider, Oleksandr Tkachenko
2022/1184
On digital signatures based on group actions: QROM security and ring signatures
Markus Bläser, Zhili Chen, Dung Hoang Duong, Antoine Joux, Ngoc Tuong Nguyen, Thomas Plantard, Youming Qiao, Willy Susilo, and Gang Tang
2022/1183
Fast and Efficient Hardware Implementation of HQC
Sanjay Deshpande, Chuanqi Xu, Mamuri Nawan, Kashif Nawaz, Jakub Szefer
2022/1182
Machine-Checked Proofs of Privacy Against Malicious Boards for Selene & Co
Constantin Cătălin Drăgan, François Dupressoir, Ehsan Estaji, Kristian Gjøsteen, Thomas Haines, Peter Y. A. Ryan, Peter B. Rønne, Morten Rotvold Solberg
2022/1181
On the computational hardness needed for quantum cryptography
Zvika Brakerski, Ran Canetti, Luowen Qian
2022/1180
Cryptographic multilinear maps using pro-p groups
Delaram Kahrobaei, Mima Stanojkovski
2022/1179
Trustless Cross-chain Communication for Zendoo Sidechains
Alberto Garoffolo, Dmytro Kaidalov, Roman Oliynykov
2022/1178
Cryptography with Certified Deletion
James Bartusek, Dakshita Khurana
2022/1177
Liberating TFHE: Programmable Bootstrapping with General Quotient Polynomials
Marc Joye, Michael Walter
2022/1176
Anonymous Public Key Encryption under Corruptions
Zhengan Huang, Junzuo Lai, Shuai Han, Lin Lyu, Jian Weng
2022/1175
A Cryptanalysis of NOVA Signature Scheme
Dongyu Wu
2022/1174
Ibex: Privacy-preserving ad conversion tracking and bidding (full version)
Ke Zhong, Yiping Ma, Sebastian Angel
2022/1173
Secure Maximum Weight Matching Approximation on General Graphs (Full Version)
Andreas Brüggemann, Malte Breuer, Andreas Klinger, Thomas Schneider, Ulrike Meyer
2022/1172
On the Security of Keyed Hashing Based on Public Permutations
Jonathan Fuchs, Yann Rotella, Joan Daemen
2022/1171
Goldfish: No More Attacks on Ethereum?!
Francesco D'Amato, Joachim Neu, Ertem Nusret Tas, and David Tse
2022/1170
TRIFORS: LINKable Trilinear Forms Ring Signature
Giuseppe D'Alconzo, Andrea Gangemi
2022/1169
DyCAPS: Asynchronous Dynamic-committee Proactive Secret Sharing
Bin Hu, Zongyang Zhang, Han Chen, You Zhou, Huazu Jiang, and Jianwei Liu
2022/1168
Multi-Input Quadratic Functional Encryption: Stronger Security, Broader Functionality
Shweta Agrawal, Rishab Goyal, Junichi Tomida
2022/1167
META-BTS: Bootstrapping Precision Beyond the Limit
Youngjin Bae, Jung Hee Cheon, Wonhee Cho, Jaehyung Kim, Taekyung Kim
2022/1166
McEliece-type encryption based on Gabidulin codes with no hidden structure
Wenshuo Guo, Fang-Wei Fu
2022/1165
A Subexponential Quantum Algorithm for the Semidirect Discrete Logarithm Problem
Christopher Battarbee, Delaram Kahrobaei, Ludovic Perret, and Siamak F. Shahandashti
2022/1164
Point-Halving and Subgroup Membership in Twisted Edwards Curves
Thomas Pornin
2022/1163
A Third is All You Need: Extended Partial Key Exposure Attack on CRT-RSA with Additive Exponent Blinding
Yuanyuan Zhou, Joop van de Pol, Yu Yu, François-Xavier Standaert
2022/1162
Pairings in Rank-1 Constraint Systems
Youssef El Housni
2022/1161
Group-based Cryptography in the Quantum Era
Delaram Kahrobaei, Ramón Flores, Marialaura Noce
2022/1160
The Scholz conjecture on addition chain is true for $v(n)= 4$
Amadou TALL
2022/1159
Decomposing Linear Layers
Christof Beierle, Patrick Felke, Gregor Leander, Sondre Rønjom
2022/1158
Differential Cryptanalysis of K-Cipher
Mohammad Mahzoun, Liliya Kraleva, Raluca Posteuca, Tomer Ashur
2022/1157
Classically Verifiable NIZK for QMA with Preprocessing
Tomoyuki Morimae, Takashi Yamakawa
2022/1156
On the security of data markets: controlled Private Function Evaluation
István Vajda
2022/1155
Hawk: Module LIP makes Lattice Signatures Fast, Compact and Simple
Léo Ducas, Eamonn W. Postlethwaite, Ludo N. Pulles, Wessel van Woerden
2022/1154
Efficient Constant-Time Implementation of SM4 with Intel GFNI instruction set extension and Arm NEON coprocessor
Weiji Guo
2022/1153
Sharp: Short Relaxed Range Proofs
Geoffroy Couteau, Dahmun Goudarzi, Michael Klooß, and Michael Reichle
2022/1152
Fully Collusion Resistant Trace-and-Revoke Functional Encryption for Arbitrary Identities
Fucai Luo, Saif Al-Kuwari, Haiyan Wang, Xingfu Yan
2022/1151
A Survey on Exotic Signatures for Post-Quantum Blockchain: Challenges & Research Directions
Maxime Buser, Rafael Dowsley, Muhammed F. Esgin, Clémentine Gritti, Shabnam Kasra Kermanshahi, Veronika Kuchta, Jason T. LeGrow, Joseph K. Liu, Raphael C.-W. Phan, Amin Sakzad, Ron Steinfeld, Jiangshan Yu
2022/1150
Farasha: A Provable Permutation-based Parallelizable PRF
Najwa Aaraj, Emanuele Bellin, Ravindra Jejurikar, Marc Manzano, Raghvendra Rohit, Eugenio Salazar
2022/1149
Secure Anycast Channels with Applications to 4G and 5G Handovers
Karl Norrman
2022/1148
On Security Against Time Traveling Adversaries
Lúcás Críostóir Meier
2022/1147
Finding the Impossible: Automated Search for Full Impossible-Differential, Zero-Correlation, and Integral Attacks
Hosein Hadipour, Sadegh Sadeghi, and Maria Eichlseder
2022/1146
A Sponge-Based PRF with Good Multi-user Security
Arghya Bhattacharjee, Ritam Bhaumik, Mridul Nandi
2022/1145
Yafa-108/146: Implementing ed25519-embedding Cocks-Pinch curves in arkworks-rs
Rami Akeela, Weikeng Chen
2022/1144
On the Higher bit Version of Approximate Inhomogeneous Short Integer Solution Problem
Anaëlle Le Dévéhat, Hiroki Shizuya, Shingo Hasegawa
2022/1143
Threshold Linearly Homomorphic Encryption on $\mathbf{Z}/2^k\mathbf{Z}$
Guilhem Castagnos, Fabien Laguillaumie, Ida Tucker
2022/1142
Secure Message Authentication in the Presence of Leakage and Faults
Francesco Berti, Chun Guo, Thomas Peters, Yaobin Shen, François-Xavier Standaert
2022/1141
An Optimal Universal Construction for the Threshold Implementation of Bijective S-boxes
Enrico Piccione, Samuele Andreoli, Lilya Budaghyan, Claude Carlet, Siemen Dhooghe, Svetla Nikova, George Petrides, Vincent Rijmen
2022/1140
Witness Encryption and Null-IO from Evasive LWE
Vinod Vaikuntanathan, Hoeteck Wee, Daniel Wichs
2022/1139
Formal Security Definition of Metadata-Private Messaging
Shengtong Zhang, Arvid Lunnemark, Sualeh Asif
2022/1138
Designated-Verifier Linkable Ring Signatures with unconditional anonymity
Danai Balla, Pourandokht Behrouz, Panagiotis Grontas, Aris Pagourtzis, Marianna Spyrakou, Giannis Vrettos
2022/1137
Private Computation On Set Intersection With Sublinear Communication
Jonas Janneck, Anselme Tueno, Jörn Kußmaul, Matthew Akram
2022/1136
The Tropical Version of ElGamal Encryption
Any Muanalifah, Ayus Riana Isnawati
2022/1135
Full Quantum Equivalence of Group Action DLog and CDH, and More
Hart Montgomery, Mark Zhandry
2022/1134
An improved method for predicting truncated multiple recursive generators with unknown parameters
Han-Bing Yu, Qun-Xiong Zheng, Yi-Jian Liu, Jing-Guo Bi, Yu-Fei Duan, Jing-Wen Xue, You Wu, Yue Cao, Rong Cheng, Lin Wang, Bai-Shun Sun
2022/1133
Secure Batch Deduplication Without Dual Servers in Backup System
Haoyu Zheng, Shengke Zeng, Hongwei Li, Zhijun Li
2022/1132
Kryvos: Publicly Tally-Hiding Verifiable E-Voting
Nicolas Huber, Ralf Kuesters, Toomas Krips, Julian Liedtke, Johannes Mueller, Daniel Rausch, Pascal Reisert, Andreas Vogt
2022/1131
CINI MINIS: Domain Isolation for Fault and Combined Security
Jakob Feldtkeller, Jan Richter-Brockmann, Pascal Sasdrich, Tim Güneysu
2022/1130
Subterm-based proof techniques for improving the automation and scope of security protocol analysis
Cas Cremers, Charlie Jacomme, Philip Lukert
2022/1129
Breaking KASLR on Mobile Devices without Any Use of Cache Memory
Milad Seddigh, Mahdi Esfahani, Sarani Bhattacharya, Mohammad Reza Aref, Hadi Soleimany
2022/1128
On the (im)possibility of ElGamal blind signatures
Liliya Akhmetzyanova, Evgeny Alekseev, Alexandra Babueva, Stanislav Smyshlyaev
2022/1127
GUC-Secure Commitments via Random Oracles: New Impossibility and Feasibility
Zhelei Zhou, Bingsheng Zhang, Hong-Sheng Zhou, Kui Ren
2022/1126
Explicit infinite families of bent functions outside $\mathcal{MM}^\#$
Enes Pasalic, Amar Bapić, Fengrong Zhang, Yongzhuang Wei
2022/1125
A one-time single-bit fault leaks all previous NTRU-HRSS session keys to a chosen-ciphertext attack
Daniel J. Bernstein
2022/1124
Unbounded Quadratic Functional Encryption and More from Pairings
Junichi Tomida
2022/1123
DEEPAND: In-Depth Modeling of Correlated AND Gates for NLFSR-based Lightweight Block Ciphers
Amit Jana, Mostafizar Rahman, Dhiman Saha
2022/1122
Practical Related-Key Forgery Attacks on the Full TinyJAMBU-192/256
Orr Dunkelman, Eran Lambooij, Shibam Ghosh
2022/1121
Practical Attacks on Full-round FRIET
Senpeng wang, Dengguo Feng, Bin Hu, Jie Guan, Tairong Shi
2022/1120
VMEO: Vector Modeling Errors and Operands for Approximate adders
Vishesh Mishra, Urbi Chatterjee
2022/1119
PESCA: A Privacy-Enhancing Smart-Contract Architecture
Wei Dai
2022/1118
PentaGOD: Stepping beyond Traditional GOD with Five Parties
Nishat Koti, Varsha Bhat Kukkala, Arpita Patra, Bhavish Raj Gopal
2022/1117
Two-Round Multi-Signatures from Okamoto Signatures
Kwangsu Lee, Hyoseung Kim
2022/1116
Automatic Certified Verification of Cryptographic Programs with COQCRYPTOLINE
Ming-Hsien Tsai, Yu-Fu Fu, Xiaomu Shi, Jiaxiang Liu, Bow-Yaw Wang, Bo-Yin Yang
2022/1115
Vizard: A Metadata-hiding Data Analytic System with End-to-End Policy Controls
Chengjun Cai, Yichen Zang, Cong Wang, Xiaohua Jia, Qian Wang
2022/1114
Multi-User Dynamic Searchable Symmetric Encryption with Corrupted Participants
Javad Ghareh Chamani, Yun Wang, Dimitrios Papadopoulos, Mingyang Zhang, Rasool Jalili
2022/1113
A new algorithm for solving the rSUM problem
Valerii Sopin
2022/1112
Ergodic dynamical systems over the Cartesian power of the ring of p-adic integers
Valerii Sopin
2022/1111
A tale of two models: formal verification of KEMTLS via Tamarin
Sofía Celi, Jonathan Hoyland, Douglas Stebila, Thom Wiggers
2022/1110
Invisible Formula Attacks
David Naccache, Ofer Yifrach-Stav
2022/1109
A Note on Copy-Protection from Random Oracles
Prabhanjan Ananth, Fatih Kaleoglu
2022/1108
Nonmalleable Digital Lockers and Robust Fuzzy Extractors in the Plain Model
Daniel Apon, Chloe Cachet, Benjamin Fuller, Peter Hall, Feng-Hao Liu
2022/1107
Projective Geometry of Hessian Elliptic Curves and Genus 2 Triple Covers of Cubics
Rémy Oudompheng
2022/1106
Towards Practical Topology-Hiding Computation
Shuaishuai Li
2022/1105
Arithmetization of Σ¹₁ relations with polynomial bounds in Halo 2
Anthony Hart, Morgan Thomas
2022/1104
$\mu$Cash: Transparent Anonymous Transactions
Liam Eagen
2022/1103
Speeding-Up Parallel Computation of Large Smooth-Degree Isogeny using Precedence-Constrained Scheduling
Kittiphon Phalakarn, Vorapong Suppakitpaisarn, M. Anwar Hasan
2022/1102
Proofs of Quantumness from Trapdoor Permutations
Tomoyuki Morimae, Takashi Yamakawa
2022/1101
Solutions to quantum weak coin flipping
Atul Singh Arora, Jérémie Roland, Chrysoula Vlachou, Stephan Weis
2022/1100
Short Non-Malleable Codes from Related-Key Secure Block Ciphers, Revisited
Gianluca Brian, Antonio Faonio, João Ribeiro, Daniele Venturi
2022/1099
One-Hot Conversion: Towards Faster Table-based A2B Conversion
Jan-Pieter D'Anvers
2022/1098
SoK: Security Evaluation of SBox-Based Block Ciphers
Joelle Lim, Derrick Ng, Ruth Ng
2022/1097
Post-Quantum Security of Tweakable Even-Mansour, and Applications
Gorjan Alagic, Chen Bai, Jonathan Katz, Christian Majenz, and Patrick Struck
2022/1096
TWo-IN-one-SSE: Fast, Scalable and Storage-Efficient Searchable Symmetric Encryption for Conjunctive and Disjunctive Boolean Queries
Arnab Bag, Debadrita Talapatra, Ayushi Rastogi, Sikhar Patranabis, Debdeep Mukhopadhyay
2022/1095
Toffoli gate count Optimized Space-Efficient Quantum Circuit for Binary Field Multiplication
KIM, SUNYEOP, KIM, INSUNG, Seonggyeom Kim, Seokhie Hong
2022/1094
Secure Integrated Sensing and Communication
Onur Gunlu, Matthieu Bloch, Rafael F. Schaefer, Aylin Yener
2022/1093
HPKA: A High-Performance CRYSTALS-Kyber Accelerator Exploring Efficient Pipelining
Ziying Ni, Ayesha Khalid, Dur-e-Shahwar Kundi, Máire O’Neill, Weiqiang Liu
2022/1092
On NTRU-ν-um Modulo $X^N − 1$
Marc Joye
2022/1091
Mul-IBS: A Multivariate Identity-Based Signature Scheme Compatible with IoT-based NDN Architecture
Sumit Kumar Debnath, Sihem Mesnager, Vikas Srivastava, Saibal Kumar Pal, Nibedita Kundu
2022/1090
How fast do you heal? A taxonomy for post-compromise security in secure-channel establishment
Olivier Blazy, Ioana Boureanu, Pascal Lafourcade, Cristina Onete, Léo Robert
2022/1089
Pirmission: Single-server PIR with Access Control
Andrew Beams, Sebastian Angel
2022/1088
Tighter trail bounds for Xoodoo
Joan Daemen, Silvia Mella, Gilles Van Assche
2022/1087
I Know What Your Layers Did: Layer-wise Explainability of Deep Learning Side-channel Analysis
Guilherme Perin, Sengim Karayalcin, Lichao Wu, and Stjepan Picek
2022/1086
KaLi: A Crystal for Post-Quantum Security using Kyber and Dilithium
Aikata Aikata, Ahmet Can Mert, Malik Imran, Samuel Pagliarini, Sujoy Sinha Roy
2022/1085
Bicoptor: Two-round Secure Three-party Non-linear Computation without Preprocessing for Privacy-preserving Machine Learning
Lijing Zhou, Ziyu Wang, Hongrui Cui, Qingrui Song, Yu Yu
2022/1084
Glass-Vault: A Generic Transparent Privacy-preserving Exposure Notification Analytics Platform
Lorenzo Martinico, Aydin Abadi, Thomas Zacharias, Thomas Win
2022/1083
Enigmap : External-Memory Oblivious Map for Secure Enclaves
Afonso Tinoco, Sixiang Gao, Elaine Shi
2022/1082
Assisted Private Information Retrieval
Natnatee Dokmai, L. Jean Camp, Ryan Henry
2022/1081
Pairing-free secure-channel establishment in mobile networks with fine-grained lawful interception
Xavier Bultel, Cristina Onete
2022/1080
A Lightweight, Secure Big data-based Authentication and Key-agreement Scheme for IoT with Revocability
Behnam Zahednejad
2022/1079
The inspection model for zero-knowledge proofs and efficient Zerocash with secp256k1 keys
Huachuang Sun, Haifeng Sun, Kevin Singh, Akhil Sai Peddireddy, Harshad Patil, Jianwei Liu, Weikeng Chen
2022/1078
Skip Ratchet: A Hierarchical Hash System
Brooklyn Zelenka
2022/1077
New Bounds on the Multiplicative Complexity of Boolean Functions
Meltem Sonmez Turan
2022/1076
Range Search over Encrypted Multi-Attribute Data
Francesca Falzon, Evangelia Anna Markatou, Zachary Espiritu, Roberto Tamassia
2022/1075
Secure Branching Program Evaluation
Jonas Janneck, Anas Boudi, Anselme Tueno, Matthew Akram
2022/1074
On Quantum Ciphertext Indistinguishability, Recoverability, and OAEP
Juliane Krämer, Patrick Struck
2022/1073
Fixing Issues and Achieving Maliciously Secure Verifiable Aggregation in ``VeriFL: Communication-Efficient and Fast Verifiable Aggregation for Federated Learning''
Xiaojie Guo
2022/1072
Recursion over Public-Coin Interactive Proof Systems; Faster Hash Verification
Alexandre Belling, Azam Soleimanian, and Olivier Bégassat
2022/1071
Performance Evaluation of NIST LWC Finalists on AVR ATmega and ARM Cortex-M3 Microcontrollers
Yuhei Watanabe, Hideki Yamamoto, Hirotaka Yoshida
2022/1070
Efficient Unique Ring Signatures From Lattices
Tuong Ngoc Nguyen, Anh The Ta, Huy Quoc Le, Dung Hoang Duong, Willy Susilo, Fuchun Guo, Kazuhide Fukushima, Shinsaku Kiyomoto
2022/1069
A Theoretical Framework for the Analysis of Physical Unclonable Function Interfaces and its Relation to the Random Oracle Model
Marten van Dijk, Chenglu Jin
2022/1068
Evaluating isogenies in polylogarithmic time
Damien Robert
2022/1067
Lattice Enumeration with Discrete Pruning: Improvement, Cost Estimation and Optimal Parameters
Luan Luan, Chunxiang Gu, Yonghui Zheng, Yanan Shi
2022/1066
FairBlock: Preventing Blockchain Front-running with Minimal Overheads
Peyman Momeni, Sergey Gorbunov, Bohan Zhang
2022/1065
A Note on the Theoretical and Practical Security of Block Ciphers
Öznur MUT SAĞDIÇOĞLU, Serhat Sağdıçoğlu, Ebru Küçükkubaş
2022/1064
Lattice Reduction Meets Key-Mismatch: New Misuse Attack on Lattice-Based NIST Candidate KEMs
Ruiqi Mi, Haodong Jiang, Zhenfeng Zhang
2022/1063
Rapidash: Foundations of Side-Contract-Resilient Fair Exchange
Hao Chung, Elisaweta Masserova, Elaine Shi, Sri AravindaKrishnan Thyagarajan
2022/1062
A Password-Based Access Control Framework for Time-Sequence Aware Media Cloudization
Haiyan Wang
2022/1061
Breaking Category Five SPHINCS+ with SHA-256
Ray Perlner, John Kelsey, David Cooper
2022/1060
Programmable Distributed Point Functions
Elette Boyle, Niv Gilboa, Yuval Ishai, Victor I. Kolobov
2022/1059
Classification of all DO planar polynomials with prime field coefficients over GF(3^n) for n up to 7
Diana Davidova, Nikolay Kaleyski
2022/1058
Evaluating the Security of Merkle-Damgård Hash Functions and Combiners in Quantum Settings
Zhenzhen Bao, Jian Guo, Shun Li, Phuong Pham
2022/1057
Rebound Attacks on SKINNY Hashing with Automatic Tools
Shun Li, Guozhen Liu, Phuong Pham
2022/1056
Linear-Time Probabilistic Proofs with Sublinear Verification for Algebraic Automata Over Every Field
Jonathan Bootle, Alessandro Chiesa, Ziyi Guan, Siqi Liu
2022/1055
Exploring Integrity of AEADs with Faults: Definitions and Constructions
Sayandeep Saha, Mustafa Khairallah, Thomas Peyrin
2022/1054
SIDH with masked torsion point images
Tako Boris Fouotsa
2022/1053
Secure and Private Distributed Source Coding with Private Keys and Decoder Side Information
Onur Gunlu, Rafael F. Schaefer, Holger Boche, H. Vincent Poor
2022/1052
Double-Odd Jacobi Quartic
Thomas Pornin
2022/1051
How to Verifiably Encrypt Many Bits for an Election?
Henri Devillez, Olivier Pereira, Thomas Peters
2022/1050
RapidUp: Multi-Domain Permutation Protocol for Lookup Tables
Héctor Masip Ardevol, Jordi Baylina Melé, Daniel Lubarov, José L. Muñoz-Tapia
2022/1049
Post Quantum Design in SPDM for Device Authentication and Key Establishment
Jiewen Yao, Krystian Matusiewicz, Vincent Zimmer
2022/1048
Practical Sublinear Proofs for R1CS from Lattices
Ngoc Khanh Nguyen, Gregor Seiler
2022/1047
Perfectly Secure Synchronous MPC with Asynchronous Fallback Guarantees Against General Adversaries
Ananya Appan, Anirudh Chandramouli, Ashish Choudhury
2022/1046
Post-Quantum Multi-Recipient Public Key Encryption
Joël Alwen, Dominik Hartmann, Eike Kiltz, Marta Mularczyk, Peter Schwabe
2022/1045
On UC-Secure Range Extension and Batch Verification for ECVRF
Christian Badertscher, Peter Gaži, Iñigo Querejeta-Azurmendi, Alexander Russell
2022/1044
Oblivious Revocable Functions and Encrypted Indexing
Kevin Lewi, Jon Millican, Ananth Raghunathan, Arnab Roy
2022/1043
A Study of Error Floor Behavior in QC-MDPC Codes
Sarah Arpin, Tyler Raven Billingsley, Daniel Rayor Hast, Jun Bo Lau, Ray Perlner, Angela Robinson
2022/1042
Weak Subtweakeys in SKINNY
Daniël Kuijsters, Denise Verbakel, Joan Daemen
2022/1041
Lattice-Based Cryptography in Miden VM
Alan Szepieniec, Frederik Vercauteren
2022/1040
A framework for constructing Single Secret Leader Election from MPC
Michael Backes, Pascal Berrang, Lucjan Hanzlik, Ivan Pryvalov
2022/1039
Theoretical Limits of Provable Security Against Model Extraction by Efficient Observational Defenses
Ari Karchmer
2022/1038
Breaking SIDH in polynomial time
Damien Robert
2022/1037
RPM: Robust Anonymity at Scale
Donghang Lu, Aniket Kate
2022/1036
MuSig-L: Lattice-Based Multi-Signature With Single-Round Online Phase
Cecilia Boschini, Akira Takahashi, Mehdi Tibouchi
2022/1035
Efficient Pseudorandom Correlation Generators from Ring-LPN
Elette Boyle, Geoffroy Couteau, Niv Gilboa, Yuval Ishai, Lisa Kohl, Peter Scholl
2022/1034
Finding All Impossible Differentials When Considering the DDT
Kai Hu, Thomas Peyrin, and Meiqin Wang
2022/1033
A Complete Characterization of Security for Linicrypt Block Cipher Modes
Tommy Hollenberg, Mike Rosulek, Lawrence Roy
2022/1032
On Non-uniform Security for Black-box Non-Interactive CCA Commitments
Rachit Garg, Dakshita Khurana, George Lu, Brent Waters
2022/1031
Revisiting Algebraic Attacks on MinRank and on the Rank Decoding Problem
Magali Bardet, Pierre Briaud, Maxime Bros, Philippe Gaborit, Jean-Pierre Tillich
2022/1030
Oblivious Extractors and Improved Security in Biometric-based Authentication Systems
Ivan De Oliveira Nunes, Peter Rindal, Maliheh Shirvanian
2022/1029
FIDO2, CTAP 2.1, and WebAuthn 2: Provable Security and Post-Quantum Instantiation
Nina Bindel, Cas Cremers, Mang Zhao
2022/1028
New Unbounded Verifiable Data Streaming for Batch Query with Almost Optimal Overhead
Jiaojiao Wu, Jianfeng Wang, Xinwei Yong, Xinyi Huang, Xiaofeng Chen
2022/1027
Maliciously Secure Massively Parallel Computation for All-but-One Corruptions
Rex Fernando, Yuval Gelles, Ilan Komargodski, Elaine Shi
2022/1026
An attack on SIDH with arbitrary starting curve
Luciano Maino, Chloe Martindale
2022/1025
Parallelizable Delegation from LWE
Cody Freitag, Rafael Pass, Naomi Sirkin
2022/1024
Multi-Input Attribute Based Encryption and Predicate Encryption
Shweta Agrawal, Anshu Yadav, Shota Yamada
2022/1023
SIM: Secure Interval Membership Testing and Applications to Secure Comparison
Albert Yu, Donghang Lu, Aniket Kate, Hemanta K. Maji
2022/1022
New Low-Memory Algebraic Attacks on LowMC in the Picnic Setting
Fukang Liu, Willi Meier, Santanu Sarkar, Takanori Isobe
2022/1021
Practical Statistically-Sound Proofs of Exponentiation in any Group
Charlotte Hoffmann, Pavel Hubáček, Chethan Kamath, Karen Klein, Krzysztof Pietrzak
2022/1020
Uncle Maker: (Time)Stamping Out The Competition in Ethereum
Aviv Yaish, Gilad Stern, and Aviv Zohar
2022/1019
Masked-degree SIDH
Tomoki Moriya
2022/1018
Time-Deniable Signatures
Gabrielle Beck, Arka Rai Choudhuri, Matthew Green, Abhishek Jain, Pratyush Ranjan Tiwari
2022/1017
PERKS: Persistent and Distributed Key Acquisition for Secure Storage from Passwords
Gareth T. Davies, Jeroen Pijnenburg
2022/1016
Public Key Authenticated Encryption with Keyword Search from LWE
Leixiao Cheng, Fei Meng
2022/1015
Quantum Cryptanalysis of 5 rounds Feistel schemes and Benes schemes
Maya Chartouny, Jacques Patarin, and Ambre Toulemonde
2022/1014
Correlated Pseudorandomness from Expand-Accumulate Codes
Elette Boyle, Geoffroy Couteau, Niv Gilboa, Yuval Ishai, Lisa Kohl, Nicolas Resch, Peter Scholl
2022/1013
Dynamic Local Searchable Symmetric Encryption
Brice Minaud, Michael Reichle
2022/1012
Nonce-Misuse Resilience of Romulus-N and GIFT-COFB
Akiko Inoue, Chun Guo, Kazuhiko Minematsu
2022/1011
Structure-Aware Private Set Intersection, With Applications to Fuzzy Matching
Gayathri Garimella, Mike Rosulek, Jaspal Singh
2022/1010
Orion: Zero Knowledge Proof with Linear Prover Time
Tiancheng Xie, Yupeng Zhang, and Dawn Song
2022/1009
Time-Space Tradeoffs for Sponge Hashing: Attacks and Limitations for Short Collisions
Cody Freitag, Ashrujit Ghoshal, Ilan Komargodski
2022/1008
Multimodal Private Signatures
Khoa Nguyen, Fuchun Guo, Willy Susilo, Guomin Yang
2022/1007
zkQMC: Zero-Knowledge Proofs For (Some) Probabilistic Computations Using Quasi-Randomness
Zachary DeStefano, Dani Barrack, Michael Dixon
2022/1006
A Forward-secure Efficient Two-factor Authentication Protocol
Steven J. Murdoch, Aydin Abadi
2022/1005
PUF-COTE: A PUF Construction with Challenge Obfuscation and Throughput Enhancement
Boyapally Harishma, Durba Chatterjee, Kuheli Pratihar, Sayandeep Saha, Debdeep Mukhopadhyay
2022/1004
Interactive Non-Malleable Codes Against Desynchronizing Attacks in the Multi-Party Setting
Nils Fleischhacker, Suparno Ghoshal, Mark Simkin
2022/1003
Orbis Specification Language: a type theory for zk-SNARK programming
Morgan Thomas
2022/1002
Zswap: zk-SNARK Based Non-Interactive Multi-Asset Swaps
Felix Engelmann, Thomas Kerber, Markulf Kohlweiss, Mikhail Volkhov
2022/1001
Quantum Security of FOX Construction based on Lai-Massey Scheme
Amit Kumar Chauhan, Somitra Sanadhya
2022/1000
Statistical Decoding 2.0: Reducing Decoding to LPN
Kevin Carrier, Thomas Debris-Alazard, Charles Meyer-Hilfiger, Jean-Pierre Tillich
2022/999
PipeMSM: Hardware Acceleration for Multi-Scalar Multiplication
Charles. F. Xavier
2022/998
On the Hardness of the Finite Field Isomorphism Problem
Dipayan Das, Antoine Joux
2022/997
Key-Recovery Attacks on CRAFT and WARP (Full Version)
Ling Sun, Wei Wang, Meiqin Wang
2022/996
Fast Hashing to $\mathbb{G}_2$ on Pairing-friendly Curves with the Lack of Twists
Yu Dai, Fangguo Zhang, and Chang-An Zhao
2022/995
Sequential Digital Signatures for Cryptographic Software-Update Authentication
Bertram Poettering, Simon Rastikian
2022/994
Faster Sounder Succinct Arguments and IOPs
Justin Holmgren, Ron Rothblum
2022/993
A New Look at Blockchain Leader Election: Simple, Efficient, Sustainable and Post-Quantum
Muhammed F. Esgin, Oguzhan Ersoy, Veronika Kuchta, Julian Loss, Amin Sakzad, Ron Steinfeld, Xiangwen Yang, Raymond K. Zhao
2022/992
An $\mathcal{O}(n)$ Algorithm for Coefficient Grouping
Fukang Liu
2022/991
Coefficient Grouping: Breaking Chaghri and More
Fukang Liu, Ravi Anand, Libo Wang, Willi Meier, Takanori Isobe
2022/990
Efficient Computation of (2^n,2^n)-Isogenies
Sabrina Kunzweiler
2022/989
Quantum-Resistant Password-Based Threshold Single-Sign-On Authentication with Updatable Server Private Key
Jingwei Jiang, Ding Wang, Guoyin Zhang, Zhiyuan Chen
2022/988
Modeling and Simulating the Sample Complexity of solving LWE using BKW-Style Algorithms
Qian Guo, Erik Mårtensson, Paul Stankovski Wagner
2022/987
A Signature-Based Gröbner Basis Algorithm with Tail-Reduced Reductors (M5GB)
Manuel Hauke, Lukas Lamster, Reinhard Lüftenegger, Christian Rechberger
2022/986
Quantum Attacks on Lai-Massey Structure
Shuping Mao, Tingting Guo, Peng Wang, Lei Hu
2022/985
Privacy when Everyone is Watching: An SOK on Anonymity on the Blockchain
Roy Rinberg, Nilaksh Agarwal
2022/984
ToSHI - Towards Secure Heterogeneous Integration: Security Risks, Threat Assessment, and Assurance
Nidish Vashistha, Md Latifur Rahman, Md Saad Ul Haque, Azim Uddin, Md Sami Ul Islam Sami, Amit Mazumder Shuo, Paul Calzada, Farimah Farahmandi, Navid Asadizanjani, Fahim Rahman, Mark Tehranipoor
2022/983
Do Not Bound to a Single Position: Near-Optimal Multi-Positional Mismatch Attacks Against Kyber and Saber
Qian Guo, Erik Mårtensson
2022/982
Random-Index Oblivious RAM
Shai Halevi, Eyal Kushilevitz
2022/981
FrodoPIR: Simple, Scalable, Single-Server Private Information Retrieval
Alex Davidson, Gonçalo Pestana, Sofía Celi
2022/980
Fast norm computation in smooth-degree Abelian number fields
Daniel J. Bernstein
2022/979
Secure and Lightweight User Authentication Scheme for Cloud-Aided Internet of Things
Chenyu Wang, Ding Wang, Yihe Duan, Xiaofeng Tao
2022/978
Non-Malleable Multi-Party Computation
Fuchun Lin
2022/977
Allocating Rotational Cryptanalysis based Preimage Attack on 4-round Keccak-224 for Quantum Setting
Runsong Wang, Xuelian Li, Juntao Gao, Hui Li, Baocang Wang
2022/976
Paras - A Private NFT Protocol
Vanishree Rao
2022/975
An efficient key recovery attack on SIDH
Wouter Castryck, Thomas Decru
2022/974
PEReDi: Privacy-Enhanced, Regulated and Distributed Central Bank Digital Currencies
Amirreza Sarencheh, Aggelos Kiayias, and Markulf Kohlweiss
2022/973
MR-DSS – Smaller MinRank-based (Ring-)Signatures
Emanuele Bellini, Andre Esser, Carlo Sanna, Javier Verbel
2022/972
Keyed Streebog is a secure PRF and MAC
Vitaly Kiryukhin
2022/971
Long Live The Honey Badger: Robust Asynchronous DPSS and its Applications
Thomas Yurek, Zhuolun Xiang, Yu Xia, Andrew Miller
2022/970
Related-key attacks on the compression function of Streebog
Vitaly Kiryukhin
2022/969
Certified Everlasting Functional Encryption
Taiga Hiroka, Tomoyuki Morimae, Ryo Nishimaki, Takashi Yamakawa
2022/968
Code Equivalence in the Sum-Rank Metric: Hardness and Completeness
Giuseppe D'Alconzo
2022/967
On the Computational Hardness of the Code Equivalence Problem in Cryptography
Alessandro Barenghi, Jean-Francois Biasse, Edoardo Persichetti, Paolo Santini
2022/966
On Linear Complexity of Finite Sequences : Coding Theory and Applications to Cryptography
Edoardo Persichetti, Tovohery Randrianarisoa
2022/965
PROLEAD - A Probing-Based Hardware Leakage Detection Tool
Nicolai Müller, Amir Moradi
2022/964
Hybrid Decoding -- Classical-Quantum Trade-Offs for Information Set Decoding
Andre Esser, Sergi Ramos-Calderer, Emanuele Bellini, José Ignacio Latorre, Marc Manzano
2022/963
Resolving the Doubts: On the Construction and Use of ResNets for Side-channel Analysis
Sengim Karayalcin, Stjepan Picek
2022/962
Group Signatures with Designated Traceability over Openers' Attributes
Hiroaki Anada, Masayuki Fukumitsu, and Shingo Hasegawa
2022/961
Secure and Efficient Implicit Certificates: Improving the Performance for Host Identity Protocol in IoT
Zhaokang Lu, Jianzhu Lu
2022/960
Scan, Shuffle, Rescan: Machine-Assisted Election Audits With Untrusted Scanners
Douglas W. Jones, Sunoo Park, Ronald L. Rivest, Adam Sealfon
2022/959
MEGA: Malleable Encryption Goes Awry
Matilda Backendal, Miro Haller, Kenneth G. Paterson
2022/958
Get Me out of This Payment! Bailout: An HTLC Re-routing Protocol
Oguzhan Ersoy, Pedro Moreno-Sanchez, Stefanie Roos
2022/957
Caulk+: Table-independent lookup arguments
Jim Posen, Assimakis A. Kattis
2022/956
Improved Plantard Arithmetic for Lattice-based Cryptography
Junhao Huang, Jipeng Zhang, Haosong Zhao, Zhe Liu, Ray C. C. Cheung, Çetin Kaya Koç, and Donglong Chen
2022/955
A Small GIFT-COFB: Lightweight Bit-Serial Architectures
Andrea Caforio, Daniel Collins, Subhadeep Banik, Francesco Regazzoni
2022/954
XOR Compositions of Physically Related Functions
Harishma Boyapally, Sikhar Patranabis, Debdeep Mukhopadhyay
2022/953
Big Brother Is Watching You: A Closer Look At Backdoor Construction
Anubhab Baksi, Arghya Bhattacharjee, Jakub Breier, Takanori Isobe, Mridul Nandi
2022/952
When Frodo Flips: End-to-End Key Recovery on FrodoKEM via Rowhammer
Michael Fahr Jr., Hunter Kippen, Andrew Kwong, Thinh Dang, Jacob Lichtinger, Dana Dachman-Soled, Daniel Genkin, Alexander Nelson, Ray Perlner, Arkady Yerukhimovich, Daniel Apon
2022/951
MixCT: Mixing Confidential Transactions from Homomorphic Commitment
Jiajun Du, Zhonghui Ge, Yu Long, Zhen Liu, Shifeng Sun, Xian Xu, Dawu Gu
2022/950
Private Balance-Checking on Blockchain Accounts Using Private Integer Addition
Birenjith Sasidharan, Emanuele Viterbo
2022/949
One Server for the Price of Two: Simple and Fast Single-Server Private Information Retrieval
Alexandra Henzinger, Matthew M. Hong, Henry Corrigan-Gibbs, Sarah Meiklejohn, and Vinod Vaikuntanathan
2022/948
A quantum polynomial time search algorithm for certain unsorted finite lists
Stephane Lemieux
2022/947
Volume and Access Pattern Leakage-abuse Attack with Leaked Documents
Steven Lambregts, Huanhuan Chen, Jianting Ning, Kaitai Liang
2022/946
ImpedanceVerif: On-Chip Impedance Sensing for System-Level Tampering Detection
Tahoura Mosavirik, Patrick Schaumont, Shahin Tajik
2022/945
Searchable Encryption with randomized ciphertext and randomized keyword search
Marco Calderini, Riccardo Longo, Massimiliano Sala, Irene Villa
2022/944
Two-Round MPC without Round Collapsing Revisited -- Towards Efficient Malicious Protocols
Huijia Lin, Tianren Liu
2022/943
DiSSECT: Distinguisher of Standard & Simulated Elliptic Curves via Traits
Vladimir Sedlacek, Vojtech Suchanek, Antonin Dufka, Marek Sys, Vashek Matyas
2022/942
Foundations of Coin Mixing Services
Noemi Glaeser, Matteo Maffei, Giulio Malavolta, Pedro Moreno-Sanchez, Erkan Tairi, Sri AravindaKrishnan Thyagarajan
2022/941
Lattice-Based SNARKs: Publicly Verifiable, Preprocessing, and Recursively Composable
Martin R. Albrecht, Valerio Cini, Russell W. F. Lai, Giulio Malavolta, Sri AravindaKrishnan Thyagarajan
2022/940
Multiple-Valued Plaintext-Checking Side-Channel Attacks on Post-Quantum KEMs
Yutaro Tanaka, Rei Ueno, Keita Xagawa, Akira Ito, Junko Takahashi, Naofumi Homma
2022/939
Multi-party Private Function Evaluation for RAM
Keyu Ji, Bingsheng Zhang, Tianpei Lu, Kui Ren
2022/938
Truncated EdDSA/ECDSA Signatures
Thomas Pornin
2022/937
Post-quantum Plaintext-awareness
Ehsan Ebrahimi, Jeroen van Wier
2022/936
PROBONITE : PRivate One-Branch-Only Non-Interactive decision Tree Evaluation
Sofiane Azogagh, Victor Delfour, Sébastien Gambs, Marc-Olivier Killijian
2022/935
SALSA: Attacking Lattice Cryptography with Transformers
Emily Wenger, Mingjie Chen, Francois Charton, Kristin Lauter
2022/934
On Secure Computation of Solitary Output Functionalities With and Without Broadcast
Bar Alon, Eran Omri
2022/933
Secure Quantized Training for Deep Learning
Marcel Keller, Ke Sun
2022/932
Bitcoin-Enhanced Proof-of-Stake Security: Possibilities and Impossibilities
Ertem Nusret Tas, David Tse, Fangyu Gai, Sreeram Kannan, Mohammad Ali Maddah-Ali, Fisher Yu
2022/931
Pushing the Limits of Generic Side-Channel Attacks on LWE-based KEMs - Parallel PC Oracle Attacks on Kyber KEM and Beyond
Gokulnath Rajendran, Prasanna Ravi, Jan-Pieter D'Anvers, Shivam Bhasin, Anupam Chattopadhyay
2022/930
Multi-Parameter Support with NTTs for NTRU and NTRU Prime on Cortex-M4
Erdem Alkim, Vincent Hwang, Bo-Yin Yang
2022/929
PH = PSPACE
Valerii Sopin
2022/928
Universal Gaussian Elimination Hardware for Cryptographic Purposes
Jingwei Hu, Wen Wang, Kris Gaj, Donglong Chen, Huaxiong Wang
2022/927
Fit The Joint Moments - How to Attack any Masking Schemes
Valence Cristiani, Maxime Lecomte, Thomas Hiscock, Philippe Maurine
2022/926
Zero-Knowledge in EasyCrypt
Denis Firsov, Dominique Unruh
2022/925
Ad Hoc Broadcast, Trace, and Revoke --- Plus Time-Space Trade-Offs for Attribute-Based Encryption
Ji Luo
2022/924
FICS PCB X-ray: A dataset for automated printed circuit board inter-layers inspection
Dhwani Mehta, John True, Olivia P. Dizon-Paradis, Nathan Jessurun, Damon L. Woodard, Navid Asadizanjani, Mark Tehranipoor
2022/923
All for one and one for all: Fully decentralised privacy-preserving dark pool trading using multi-party computation
Mariana Botelho da Gama, John Cartlidge, Nigel P. Smart, Younes Talibi Alaoui
2022/922
Estimating the Hidden Overheads in the BDGL Lattice Sieving Algorithm
Léo Ducas
2022/921
Low-Delay 4, 5 and 6-Term Karatsuba Formulae in $\mathbb{F}_2[x]$ Using Overlap-free Splitting
Haining Fan
2022/920
Distributed, Private, Sparse Histograms in the Two-Server Model
James Bell, Adria Gascon, Badih Ghazi, Ravi Kumar, Pasin Manurangsi, Mariana Raykova, Phillipp Schoppmann
2022/919
Side-Channel Attacks on Lattice-Based KEMs Are Not Prevented by Higher-Order Masking
Kalle Ngo, Ruize Wang, Elena Dubrova, Nils Paulsrud
2022/918
Building PRFs from TPRPs: Beyond the Block and the Tweak Length Bounds
Wonseok Choi, Jooyoung Lee, and Yeongmin Lee
2022/917
Almost-Surely Terminating Asynchronous Byzantine Agreement Against General Adversaries with Optimal Resilience
Ashish Choudhury
2022/916
Post-Quantum Authenticated Encryption against Chosen-Ciphertext Side-Channel Attacks
Melissa Azouaoui, Yulia Kuzovkova, Tobias Schneider, Christine van Vredendaal
2022/915
OpenFHE: Open-Source Fully Homomorphic Encryption Library
Ahmad Al Badawi, Andreea Alexandru, Jack Bates, Flavio Bergamaschi, David Bruce Cousins, Saroja Erabelli, Nicholas Genise, Shai Halevi, Hamish Hunt, Andrey Kim, Yongwoo Lee, Zeyu Liu, Daniele Micciancio, Carlo Pascoe, Yuriy Polyakov, Ian Quah, Saraswathy R.V., Kurt Rohloff, Jonathan Saylor, Dmitriy Suponitsky, Matthew Triplett, Vinod Vaikuntanathan, and Vincent Zucca
2022/914
The Hidden Number Problem with Small Unknown Multipliers: Cryptanalyzing MEGA in Six Queries and Other Applications
Keegan Ryan, Nadia Heninger
2022/913
On the Communication Efficiency of Statistically-Secure Asynchronous MPC with Optimal Resilience
Ashish Choudhury, Arpita Patra
2022/912
Individual Discrete Logarithm with Sublattice Reduction
Haetham AL ASWAD and Cécile PIERROT
2022/911
Some Security Arguments For Xifrat1
Jianfang "Danny" Niu
2022/910
Round Optimal Blind Signatures: Short Signatures with Post-Quantum Blindness
Shweta Agrawal, Jung Hee Cheon, Hyeongmin Choe, Damien Stehlé, Anshu Yadav
2022/909
Multi-Instance Secure Public-Key Encryption
Carlo Brunetta, Hans Heum, Martijn Stam
2022/908
On fast computations of numerical parameters of homogeneous algebraic graphs of large girth and small diameter and encryption of large files.
Tymoteusz Chojecki, Vasyl Ustimenko
2022/907
A New Approach to Post-Quantum Non-Malleability
Xiao Liang, Omkant Pandey, and Takashi Yamakawa
2022/906
A Random Oracle for All of Us
Marc Fischlin, Felix Rohrbach, Tobias Schmalz
2022/905
Tight Security Analysis of the Public Permutation-Based PMAC_Plus
Avijit Dutta, Mridul Nandi, Suprita Talnikar
2022/904
Patient Zero and Patient Six: Zero-Value and Correlation Attacks on CSIDH and SIKE
Fabio Campos, Michael Meyer, Krijn Reijnders, and Marc Stöttinger
2022/903
Cycle-Accurate Power Side-Channel Analysis Using the ChipWhisperer: a Case Study on Gaussian Sampling
Nils Wisiol, Patrick Gersch, Jean-Pierre Seifert
2022/902
MPC for Tech Giants (GMPC): Enabling Gulliver and the Lilliputians to Cooperate Amicably
Bar Alon, Moni Naor, Eran Omri, Uri Stemmer
2022/901
Garbled-Circuits from an SCA Perspective: Free XOR can be Quite Expensive. . .
Itamar Levi, Carmit Hazay
2022/900
On the key generation in SQISign
Hiroshi Onuki
2022/899
Deep Learning-Based Medical Diagnostic Services: A Secure, Lightweight, and Accurate Realization
Xiaoning Liu, Yifeng Zheng, Xingliang Yuan, Xun Yi
2022/898
Ferveo: Threshold Decryption for Mempool Privacy in BFT networks
Joseph Bebel, Dev Ojha
2022/897
Constrained Pseudorandom Functions from Pseudorandom Synthesizers
Zachary A Kissel
2022/896
Post-quantum hash functions using $\mathrm{SL}_n(\mathbb{F}_p)$
Corentin Le Coz, Christopher Battarbee, Ramón Flores, Thomas Koberda, and Delaram Kahrobaei
2022/895
Security Analysis of RSA-BSSA
Anna Lysyanskaya
2022/894
Toward Full Accounting for Leakage Exploitation and Mitigation in Dynamic Encrypted Databases
Lei Xu, Anxin Zhou, Huayi Duan, Cong Wang, Qian Wang, Xiaohua Jia
2022/893
NJS: Database Protection Algorithm
Edimar Veríssimo da Silva
2022/892
Piranha: A GPU Platform for Secure Computation
Jean-Luc Watson, Sameer Wagh, Raluca Ada Popa
2022/891
Secure Physical Design
Sukanta Dey, Jungmin Park, Nitin Pundir, Dipayan Saha, Amit Mazumder Shuvo, Dhwani Mehta, Navid Asadi, Fahim Rahman, Farimah Farahmandi, Mark Tehranipoor
2022/890
One Network to rule them all. An autoencoder approach to encode datasets
Cristian-Alexandru Botocan
2022/889
Quantum Rewinding for Many-Round Protocols
Russell W. F. Lai, Giulio Malavolta, Nicholas Spooner
2022/888
Tweakable Sleeve: A Novel Sleeve Construction based on Tweakable Hash Functions
David Chaum, Mario Larangeira, Mario Yaksetig
2022/887
Round-Optimal Black-Box Protocol Compilers
Yuval Ishai, Dakshita Khurana, Amit Sahai, Akshayaram Srinivasan
2022/886
Deep Learning based Cryptanalysis of Lightweight Block Ciphers, Revisited
Hyunji Kim, Sejin Lim, Yeajun Kang, Wonwoong Kim, Hwajeong Seo
2022/885
Time-Space Lower Bounds for Finding Collisions in Merkle-Damgård Hash Functions
Akshima, Siyao Guo, Qipeng Liu
2022/884
On the Feasibility of Unclonable Encryption, and More
Prabhanjan Ananth, Fatih Kaleoglu, Xingjian Li, Qipeng Liu, Mark Zhandry
2022/883
Differentially Oblivious Turing Machines
Ilan Komargodski, Elaine Shi
2022/882
Randomness Optimization for Gadget Compositions in Higher-Order Masking
Jakob Feldtkeller, David Knichel, Pascal Sasdrich, Amir Moradi, Tim Güneysu
2022/881
A Novel High-performance Implementation of CRYSTALS-Kyber with AI Accelerator
Lipeng Wan, Fangyu Zheng, Guang Fan, Rong Wei, Lili Gao, Jiankuo Dong, Jingqiang Lin, Yuewu Wang
2022/880
Efficient supersingularity testing over $\mathbb{F}_p$ and CSIDH key validation
Gustavo Banegas, Valerie Gilchrist, Benjamin Smith
2022/879
Modular Polynomial Multiplication Using RSA/ECC coprocessor
Aurélien Greuet, Simon Montoya, Clémence Vermeersch
2022/878
zk-creds: Flexible Anonymous Credentials from zkSNARKs and Existing Identity Infrastructure
Michael Rosenberg, Jacob White, Christina Garman, Ian Miers
2022/877
A New Approach to the Constant-Round Re-encryption Mix-Net
Myungsun Kim
2022/876
Watermarkable Public key Encryption With Efficient Extraction Under Standard Assumptions
Foteini Baldimtsi, Aggelos Kiayias, Katerina Samari
2022/875
Contact Discovery in Mobile Messengers: Low-cost Attacks, Quantitative Analyses, and Efficient Mitigations
Christoph Hagen, Christian Weinert, Christoph Sendner, Alexandra Dmitrienko, Thomas Schneider
2022/874
Lattice Codes for Lattice-Based PKE
Shanxiang Lyu, Ling Liu, Cong Ling, Junzuo Lai, and Hao Chen
2022/873
\(\texttt{POLKA}\): Towards Leakage-Resistant Post-Quantum CCA-Secure Public Key Encryption
Clément Hoffmann, Benoît Libert, Charles Momin, Thomas Peters, François-Xavier Standaert
2022/872
Nirvana: Instant and Anonymous Payment-Guarantees
Akash Madhusudan, Mahdi Sedaghat, Philipp Jovanovic, Bart Preneel
2022/871
Secure Plot Transfer for the Chia Blockchain
Shashank Agrawal
2022/870
Supersingular Isogeny Diffie-Hellman with Legendre Form
Jesse Elliott, Aaron Hutchinson
2022/869
Post-Quantum Insecurity from LWE
Alex Lombardi, Ethan Mook, Willy Quach, Daniel Wichs
2022/868
Maximizing the Potential of Custom RISC-V Vector Extensions for Speeding up SHA-3 Hash Functions
Huimin Li, Nele Mentens, Stjepan Picek
2022/867
The State of the Union: Union-Only Signatures for Data Aggregation
Diego F. Aranha, Felix Engelmann, Sebastian Kolby, and Sophia Yakoubov
2022/866
Communication-Efficient Secure Logistic Regression
Amit Agarwal, Stanislav Peceny, Mariana Raykova, Phillipp Schoppmann, and Karn Seth
2022/865
Linked Fault Analysis
Ali Asghar Beigizad, Hadi Soleimany, Sara Zarei, and Hamed Ramzanipour
2022/864
BalanceProofs: Maintainable Vector Commitments with Fast Aggregation
Weijie Wang, Annie Ulichney, Charalampos Papamanthou
2022/863
Effective and Efficient Masking with Low Noise using Small-Mersenne-Prime Ciphers
Loïc Masure, Pierrick Méaux, Thorben Moos, François-Xavier Standaert
2022/862
Scooby: Improved Multi-Party Homomorphic Secret Sharing Based on FHE
Ilaria Chillotti, Emmanuela Orsini, Peter Scholl, Nigel Paul Smart, and Barry Van Leeuwen
2022/861
Genus Distribution of Random q-ary Lattices
Peter J. Bruin, Léo Ducas, Shane Gibbons
2022/860
AB-SIFA: SIFA with Adjacent-Byte Model
Chunya Hu, Yongbo Hu, Wenfeng Zhu, Zixin Tan, Qi Zhang, Zichao Gong, Yanhao Gong, Luyao Jin, Pengwei Feng
2022/859
Practical Side-Channel Attack on Masked Message Encoding in Latticed-Based KEM
Jian Wang, Weiqiong Cao, Hua Chen, Haoyuan Li
2022/858
Snapshot-Oblivious RAMs: Sub-Logarithmic Efficiency for Short Transcripts
Yang Du, Daniel Genkin, Paul Grubbs
2022/857
Succinct Classical Verification of Quantum Computation
James Bartusek, Yael Tauman Kalai, Alex Lombardi, Fermi Ma, Giulio Malavolta, Vinod Vaikuntanathan, Thomas Vidick, Lisa Yang
2022/856
Mix-Nets from Re-Randomizable and Replayable CCA-secure Public-Key Encryption
Antonio Faonio, Luigi Russo
2022/855
Tightness Subtleties for Multi-user PKE Notions
Hans Heum and Martijn Stam
2022/854
On Access Control Encryption without Sanitization
Cecilia Boschini, Ivan Damgård, Claudio Orlandi
2022/853
Hashing to Prime in Zero-Knowledge
Thomas Groß
2022/852
Making Biased DL Models Work: Message and Key Recovery Attacks on Saber Using Amplitude-Modulated EM Emanations
Ruize Wang, Kalle Ngo, Elena Dubrova
2022/851
NIWI and New Notions of Extraction for Algebraic Languages
Chaya Ganesh, Hamidreza Khoshakhlagh, Roberto Parisella
2022/850
Privacy-aware Secure Region-based Handover for Small Cell Networks in 5G-enabled Mobile Communication
Rabiah Alnashwan, Prosanta Gope, Benjamin Dowling
2022/849
Formal Verification of Arithmetic Masking in Hardware and Software
Barbara Gigerl, Robert Primas, Stefan Mangard
2022/848
Symmetrical Disguise: Realizing Homomorphic Encryption Services from Symmetric Primitives (extended version)
Alexandros Bakas, Eugene Frimpong, Antonis Michalas
2022/847
A note on key control in CSIDH
Antonio Sanso
2022/846
A Long Tweak Goes a Long Way: High Multi-user Security Authenticated Encryption from Tweakable Block Ciphers
Benoît Cogliati, Jérémy Jean, Thomas Peyrin, and Yannick Seurin
2022/845
Key Structures: Improved Related-Key Boomerang Attack against the Full AES-256
Jian Guo, Ling Song, Haoyang Wang
2022/844
Security Analysis of a Recent Pairing-based Certificateless Authenticated Key Agreement Protocol for Blockchain-based WBANs
Yong-Jin Kim, Dok-Jun An, Kum-Sok Sin, Son-Gyong Kim
2022/843
Predicting BKZ Z-Shapes on q-ary Lattices
Martin R. Albrecht, Jianwei Li
2022/842
Nearly Optimal Property Preserving Hashing
Justin Holmgren, Minghao Liu, LaKyah Tyner, Daniel Wichs
2022/841
Faster Yet Safer: Logging System Via Fixed-Key Blockcipher
Viet Tung Hoang, Cong Wu, Xin Yuan
2022/840
New Design Techniques for Efficient Arithmetization-Oriented Hash Functions:Anemoi Permutations and Jive Compression Mode
Clémence Bouvier, Pierre Briaud, Pyrros Chaidos, Léo Perrin, Robin Salen, Vesselin Velichkov, Danny Willems
2022/839
Threshold Structure-Preserving Signatures
Elizabeth Crites, Markulf Kohlweiss, Bart Preneel, Mahdi Sedaghat, and Daniel Slamanig
2022/838
An Efficient Query Recovery Attack Against a Graph Encryption Scheme
Francesca Falzon, Kenneth G. Paterson
2022/837
Differential Cryptanalysis in the Fixed-Key Model
Tim Beyne and Vincent Rijmen
2022/836
Authenticated Garbling from Simple Correlations
Samuel Dittmer, Yuval Ishai, Steve Lu, Rafail Ostrovsky
2022/835
Covert Authentication from Lattices
Rajendra Kumar, Khoa Nguyen
2022/834
A New Framework For More Efficient Round-Optimal Lattice-Based (Partially) Blind Signature via Trapdoor Sampling
Rafael del Pino, Shuichi Katsumata
2022/833
Stronger Security for Non-Interactive Threshold Signatures: BLS and FROST
Mihir Bellare, Stefano Tessaro, and Chenzhi Zhu
2022/832
Sustained Space and Cumulative Complexity Trade-offs for Data-Dependent Memory-Hard Functions
Jeremiah Blocki and Blake Holman
2022/831
Sharing Transformation and Dishonest Majority MPC with Packed Secret Sharing
Vipul Goyal, Antigoni Polychroniadou, Yifan Song
2022/830
Near-Optimal Private Information Retrieval with Preprocessing
Arthur Lazzaretti and Charalampos Papamanthou
2022/829
TERSE: Tiny Encryptions and Really Speedy Execution for Post-Quantum Private Stream Aggregation
Jonathan Takeshita, Zachariah Carmichael, Ryan Karl, Taeho Jung
2022/828
Lower Bounds for (Batch) PIR with Private Preprocessing
Kevin Yeo
2022/827
Privacy-Preserving IP Verification
Dimitris Mouris, Charles Gouert, Nektarios Georgios Tsoutsos
2022/826
Pika: Secure Computation using Function Secret Sharing over Rings
Sameer Wagh
2022/825
Romeo: Conversion and Evaluation of HDL Designs in the Encrypted Domain
Charles Gouert, Nektarios Georgios Tsoutsos
2022/824
Fiddling the Twiddle Constants - Fault Injection Analysis of the Number Theoretic Transform
Prasanna Ravi, Bolin Yang, Shivam Bhasin, Fan Zhang, Anupam Chattopadhyay
2022/823
Round Efficient Byzantine Agreement from VDFs
Poulami Das, Lisa Eckey, Sebastian Faust, Julian Loss, and Monosij Maitra
2022/822
Traceable Receipt-Free Encryption
Henri Devillez, Olivier Pereira, Thomas Peters
2022/821
MPC for Group Reconstruction Circuits
Lúcás Críostóir Meier
2022/820
Public-Coin 3-Round Zero-Knowledge from Learning with Errors and Keyless Multi-Collision-Resistant Hash
Susumu Kiyoshima
2022/819
Moz$\mathbb{Z}_{2^k}$arella: Efficient Vector-OLE and Zero-Knowledge Proofs Over $\mathbb{Z}_{2^k}$
Carsten Baum, Lennart Braun, Alexander Munch-Hansen, Peter Scholl
2022/818
Provably Secure Reflection Ciphers
Tim Beyne, Yu Long Chen
2022/817
Overloading the Nonce: Rugged PRPs, Nonce-Set AEAD, and Order-Resilient Channels
Jean Paul Degabriele, Vukašin Karadžić
2022/816
Securing Approximate Homomorphic Encryption Using Differential Privacy
Baiyu Li, Daniele Micciancio, Mark Schultz, Jessica Sorrell
2022/815
More Efficient Dishonest Majority Secure Computation over $\mathbb{Z}_{2^k}$ via Galois Rings
Daniel Escudero, Chaoping Xing, Chen Yuan
2022/814
Suborn Channels: Incentives Against Timelock Bribes
Zeta Avarikioti, Orfeas Stefanos Thyfronitis Litos
2022/813
Quadratic Multiparty Randomized Encodings Beyond Honest Majority and Their Applications
Benny Applebaum, Yuval Ishai, Or Karni, Arpita Patra
2022/812
Secret Can Be Public: Low-Memory AEAD Mode for High-Order Masking
Yusuke Naito, Yu Sasaki, Takeshi Sugawara
2022/811
EZEE: Epoch Parallel Zero Knowledge for ANSI C
Yibin Yang, David Heath, Vladimir Kolesnikov, David Devecsery
2022/810
Zero Knowledge for Everything and Everyone: Fast ZK Processor with Cached RAM for ANSI C Programs
David Heath, Yibin Yang, David Devecsery, Vladimir Kolesnikov
2022/809
A 2.1 KHz Zero-Knowledge Processor with BubbleRAM
David Heath, Vladimir Kolesnikov
2022/808
Secret key generation from Gaussian sources using lattice-based extractors
Laura Luzzi, Cong Ling, Matthieu R. Bloch
2022/807
Side-Channel Analysis of Saber KEM Using Amplitude-Modulated EM Emanations
Ruize Wang, Kalle Ngo, Elena Dubrova
2022/806
Multi-key and Multi-input Predicate Encryption from Learning with Errors
Danilo Francati, Daniele Friolo, Giulio Malavolta, Daniele Venturi
2022/805
Authenticated Consensus in Synchronous Systems with Mixed Faults
Ittai Abraham, Danny Dolev, Alon Kagan, Gilad Stern
2022/804
Review of the White-Box Encodability of NIST Lightweight Finalists
Alex Charlès, Chloé Gravouil
2022/803
How to Avoid Repetitions in Lattice-based Deniable Zero-Knowledge Proofs
Xavier Arnal, Abraham Cano, Tamara Finogina, Javier Herranz
2022/802
VERI-ZEXE: Decentralized Private Computation with Universal Setup
Alex Luoyuan Xiong, Binyi Chen, Zhenfei Zhang, Benedikt Bünz, Ben Fisch, Fernando Krell, Philippe Camacho
2022/801
Secure and Robust Key-Trapped Design-for-Security Architecture for Protecting Obfuscated Logic
Hadi Mardani Kamali
2022/800
BarnOwl: Secure Comparisons using Silent Pseudorandom Correlation Generators
Sameer Wagh
2022/799
Tight Bounds on the Randomness Complexity of Secure Multiparty Computation
Vipul Goyal, Yuval Ishai, Yifan Song
2022/798
One Hot Garbling
David Heath, Vladimir Kolesnikov
2022/797
Garbled Circuits With Sublinear Evaluator
Abida Haque, David Heath, Vladimir Kolesnikov, Steve Lu, Rafail Ostrovsky, Akash Shah
2022/796
Safe Permissionless Consensus
Youer Pu, Lorenzo Alvisi, Ittay Eyal
2022/795
Efficient Generic Arithmetic for KKW Practical Linear: MPC-in-the-Head NIZK on Commodity Hardware without Trusted Setup
David Heath, Vladimir Kolesnikov, Jiahui Lu
2022/794
Generation of "independent" points on elliptic curves by means of Mordell--Weil lattices
Dmitrii Koshelev
2022/793
LLAMA: A Low Latency Math Library for Secure Inference
Kanav Gupta, Deepak Kumaraswamy, Nishanth Chandran, Divya Gupta
2022/792
Reliable Password Hardening Service with Opt-Out
Chunfu Jia, Shaoqiang Wu, Ding Wang
2022/791
log*-Round Game-Theoretically-Fair Leader Election
Ilan Komargodski, Shin’ichiro Matsuo, Elaine Shi, and Ke Wu
2022/790
A Toolbox for Barriers on Interactive Oracle Proofs
Gal Arnon, Amey Bhangale, Alessandro Chiesa, Eylon Yogev
2022/789
Mind the TWEAKEY Schedule: Cryptanalysis on SKINNYe-64-256
Lingyue Qin, Xiaoyang Dong, Anyu Wang, Jialiang Hua, Xiaoyun Wang
2022/788
Improved Preimage Attacks on Round-Reduced Keccak-384/512
Le He, Xiaoen Lin, Hongbo Yu, Jian Guo
2022/787
Block Cipher's Substitution Box Generation Based on Natural Randomness in Underwater Acoustics and Knight's Tour Chain
Muhammad Fahad Khan, Khalid Saleem, Tariq Shah, Mohmmad Mazyad Hazzazi, Ismail Bahkali, Piyush Kumar Shukla
2022/786
On the Necessity of Collapsing for Post-Quantum and Quantum Commitments
Marcel Dall'Agnol, Nicholas Spooner
2022/785
Shorter Hash-and-Sign Lattice-Based Signatures
Thomas Espitau, Mehdi Tibouchi, Alexandre Wallet, Yang Yu
2022/784
Fully Privacy-Preserving Federated Representation Learning via Secure Embedding Aggregation
Jiaxiang Tang, Jinbao Zhu, Songze Li, Kai Zhang, Lichao Sun
2022/783
Augmented Random Oracles
Mark Zhandry
2022/782
Simon’s Algorithm and Symmetric Crypto: Generalizations and Automatized Applications
Federico Canale, Gregor Leander, Lukas Stennes
2022/781
Linear Communication in Malicious Majority MPC
S. Dov Gordon, Phi Hung Le, Daniel McVicker
2022/780
An Efficient Threshold Access-Structure for RLWE-Based Multiparty Homomorphic Encryption
Christian Mouchet, Elliott Bertrand, Jean-Pierre Hubaux
2022/779
New Lattice Two-Stage Sampling Technique and its Applications to Functional Encryption -- Stronger Security and Smaller Ciphertexts
Qiqi Lai, Feng-Hao Liu, Zhedong Wang
2022/778
SPHINCS+C: Compressing SPHINCS+ With (Almost) No Cost
Mikhail Kudinov, Andreas Hülsing, Eyal Ronen, Eylon Yogev
2022/777
Arithmetization of Σ¹₁ relations in Halo 2
Morgan Thomas
2022/776
Balanced Byzantine Reliable Broadcast with Near-Optimal Communication and Improved Computation
Nicolas Alhaddad, Sourav Das, Sisi Duan, Ling Ren, Mayank Varia, Zhuolun Xiang, Haibin Zhang
2022/775
Asynchronous Verifiable Information Dispersal with Near-Optimal Communication
Nicolas Alhaddad, Sourav Das, Sisi Duan, Ling Ren, Mayank Varia, Zhuolun Xiang, Haibin Zhang
2022/774
Complexity Analysis of the SAT Attack on Logic Locking
Yadi Zhong, Ujjwal Guin
2022/773
Adaptive versus Static Multi-oracle Algorithms, and Quantum Security of a Split-key PRF
Jelle Don, Serge Fehr, Yu-Hsuan Huang
2022/772
Maliciously Secure Multi-Party PSI with Lower Bandwidth and Faster Computation
Zhi Qiu, Kang Yang, Yu Yu, Lijing Zhou
2022/771
Field Instruction Multiple Data
Khin Mi Mi Aung, Enhui Lim, Jun Jie Sim, Benjamin Hong Meng Tan, Huaxiong Wang, Sze Ling Yeo
2022/770
Password-Authenticated Key Exchange from Group Actions
Michel Abdalla, Thorsten Eisenhofer, Eike Kiltz, Sabrina Kunzweiler, Doreen Riepel
2022/769
Faster Beta Weil Pairing on BLS Pairing Friendly Curves with Odd Embedding Degree
Azebaze Guimagang Laurian, Fouotsa Emmanuel, El Mrabet Nadia, Pecha Njiahouo Aminatou
2022/768
Public-Key Watermarking Schemes for Pseudorandom Functions
Rupeng Yang, Zuoxia Yu, Man Ho Au, Willy Susilo
2022/767
A New Approach to Efficient Non-Malleable Zero-Knowledge
Allen Kim, Xiao Liang, Omkant Pandey
2022/766
The Cost of Statistical Security in Interactive Proofs for Repeated Squaring
Cody Freitag, Ilan Komargodski
2022/765
Rotational Differential-Linear Distinguishers of ARX Ciphers with Arbitrary Output Linear Masks
Zhongfeng Niu, Siwei Sun, Yunwen Liu, Chao Li
2022/764
Efficient Proofs of Retrievability using Expander Codes
Françoise Levy-dit-Vehel, Maxime Roméas
2022/763
SoK: Assumptions Underlying Cryptocurrency Deanonymizations -- A Taxonomy for Scientific Experts and Legal Practitioners
Dominic Deuber, Viktoria Ronge, Christian Rückert
2022/762
The Price of Verifiability: Lower Bounds for Verifiable Random Functions
Nicholas Brandt, Dennis Hofheinz, Julia Kastner, Akin Ünal
2022/761
Quantum Procedures for Nested Search Problems with Applications in Cryptanalysis
André Schrottenloher and Marc Stevens
2022/760
Privacy Preserving Opinion Aggregation
Aggelos Kiayias, Vanessa Teague, Orfeas Stefanos Thyfronitis Litos
2022/759
SwiftEC: Shallue–van de Woestijne Indifferentiable Function To Elliptic Curves
Jorge Chávez-Saab, Francisco Rodrı́guez-Henrı́quez, and Mehdi Tibouchi
2022/758
Static vs. Adaptive Security in Perfect MPC: A Separation and the Adaptive Security of BGW
Gilad Asharov, Ran Cohen, and Oren Shochat
2022/757
SortingHat: Efficient Private Decision Tree Evaluation via Homomorphic Encryption and Transciphering
Kelong Cong, Debajyoti Das, Jeongeun Park, Hilder V. L. Pereira
2022/756
Curve Trees: Practical and Transparent Zero-Knowledge Accumulators
Matteo Campanelli, Mathias Hall-Andersen, and Simon Holmgaard Kamp
2022/755
Low-latency Hardware Architecture for VDF Evaluation in Class Groups
Danyang Zhu, Jing Tian, Minghao Li, Zhongfeng Wang
2022/754
Quantum impossible differential attacks: Applications to AES and SKINNY
Nicolas David, María Naya-Plasencia, André Schrottenloher
2022/753
Fast MILP Models for Division Property
Patrick Derbez, Baptiste Lambin
2022/752
Provably Minimum Data Complexity Integral Distinguisher Based on Conventional Division Property
Akram Khalesi and Zahra Ahmadian
2022/751
SCALES: MPC with Small Clients and Larger Ephemeral Servers
Anasuya Acharya, Carmit Hazay, Vladimir Kolesnikov, Manoj Prabhakaran
2022/750
The Ideal Functionalities for Private Set Union, Revisited
Yanxue Jia, Shi-Feng Sun, Hong-Sheng Zhou, Dawu Gu
2022/749
Cryptanalysis of Draco
Subhadeep Banik
2022/748
2DT-GLS: Faster and exception-free scalar multiplication in the GLS254 binary curve
Marius A. Aardal, Diego F. Aranha
2022/747
More Inputs Makes Difference: Implementations of Linear Layers Using Gates with More Than Two Inputs
Qun Liu, Weijia Wang, Ling Sun, Yanhong Fan, Lixuan Wu, Meiqin Wang
2022/746
Efficient Proofs of Knowledge for Threshold Relations
Gennaro Avitabile, Vincenzo Botta, Daniele Friolo, Ivan Visconti
2022/745
Throwing Boomerangs into Feistel Structures: Application to CLEFIA, WARP, LBlock, LBlock-s and TWINE
Hosein Hadipour, Marcel Nageler, and Maria Eichlseder
2022/744
MoNet: A Fast Payment Channel Network for Scriptless Cryptocurrency Monero
Zhimei Sui, Joseph K. Liu, Jiangshan Yu, Xianrui Qin
2022/743
How Efficient are Replay Attacks against Vote Privacy? A Formal Quantitative Analysis
David Mestel, Johannes Mueller, Pascal Reisert
2022/742
Application of Automorphic Forms to Lattice Problems
Samed Düzlü, Juliane Krämer
2022/741
Sapic+: protocol verifiers of the world, unite!
Vincent Cheval, Charlie Jacomme, Steve Kremer, Robert Künnemann
2022/740
Practical Privacy-Preserving Authentication for SSH
Lawrence Roy, Stanislav Lyakhov, Yeongjin Jang, Mike Rosulek
2022/739
Updatable Encryption from Group Actions
Antonin Leroux and Maxime Roméas
2022/738
Secure Search on Multi-key Homomorphically Encrypted Data with Finite Fields
Buvana Ganesh, Paolo Palmieri
2022/737
Side-channel and Fault-injection attacks over Lattice-based Post-quantum Schemes (Kyber, Dilithium): Survey and New Results
Prasanna Ravi, Anupam Chattopadhyay, Jan Pieter D'Anvers, Anubhab Baksi
2022/736
Mathematical Aspects of Division Property
Phil Hebborn, Gregor Leander, Aleksei Udovenko
2022/735
Multiparty Private Set Intersection Cardinality and Its Applications
Jiahui Gao, Ni Trieu, and Avishay Yanai
2022/734
Tight Preimage Resistance of the Sponge Construction
Charlotte Lefevre, Bart Mennink
2022/733
Breaking the quadratic barrier: Quantum cryptanalysis of Milenage, telecommunications’ cryptographic backbone
Vincent Ulitzsch and Jean-Pierre Seifert
2022/732
Structure-Preserving Compilers from New Notions of Obfuscations
Matteo Campanelli, Danilo Francati, Claudio Orlandi
2022/731
Triangulating Rebound Attack on AES-like Hashing
Xiaoyang Dong, Jian Guo, Shun Li, Phuong Pham
2022/730
New Dolev-Reischuk Lower Bounds Meet Blockchain Eclipse Attacks
Ittai Abraham, Gilad Stern
2022/729
Integral Cryptanalysis of WARP based on Monomial Prediction
Hosein Hadipour and Maria Eichlseder
2022/728
Snowball: Another View on Side-Channel Key Recovery Tools
Jiangshan Long, Changhai Ou, Zhu Wang, Shihui Zheng, Fei Yan, Fan Zhang, Siew-Kei Lam
2022/727
A Lower Bound for Proving Hardness of Learning with Rounding with Polynomial Modulus
Parker Newton and Silas Richelson
2022/726
Radix-3 NTT-Based Polynomial Multiplication for Lattice-Based Cryptography
Chenar Abdulla Hassan, Oğuz Yayla
2022/725
Revisiting Related-Key Boomerang attacks on AES using computer-aided tool
Patrick Derbez, Marie Euler, Pierre-Alain Fouque, Phuong Hoa Nguyen
2022/724
A Power Side-Channel Attack on the Reed-Muller Reed-Solomon Version of the HQC Cryptosystem
Thomas Schamberger, Lukas Holzbaur, Julian Renner, Antonia Wachter-Zeh, Georg Sigl
2022/723
Optimizing Rectangle Attacks: A Unified and Generic Framework for Key Recovery
Ling Song, Nana Zhang, Qianqian Yang, Danping Shi, Jiahao Zhao, Lei Hu, Jian Weng
2022/722
Speedy Error Reconciliation
Kaibo Liu, Xiaozhuo Gu, Peixin Ren, Xuwen Nie
2022/721
Fast Multi-party Private Set Operations in the Star Topology from Secure ANDs and ORs
Jelle Vos, Mauro Conti, Zekeriya Erkin
2022/720
A Model Set Method to Search Integral Distinguishers Based on Division Property for Block Ciphers
Liu Zhang, Huawei Liu, Zilong Wang
2022/719
Contingent payments from two-party signing and verification for abelian groups
Sergiu Bursuc, Sjouke Mauw
2022/718
A Post-Quantum Four-Party Outsourced Authentication
Reza Ghasemi, Alptekin Küpçü
2022/717
Cross Chain Atomic Swaps in the Absence of Time via Attribute Verifiable Timed Commitments
Yacov Manevich, Adi Akavia
2022/716
x-Superoptimal Pairings on some Elliptic Curves with Odd Prime Embedding Degrees
Emmanuel Fouotsa, Azebaze Guimagang Laurian, Ayissi Raoul
2022/715
Ultimate SLH: Taking Speculative Load Hardening to the Next Level
Zhiyuan Zhang, Gilles Barthe, Chitchanok Chuengsatiansup, Peter Schwabe, Yuval Yarom
2022/714
MicroSecAgg: Streamlined Single-Server Secure Aggregation
Yue Guo, Antigoni Polychroniadou, Elaine Shi, David Byrd, and Tucker Balch
2022/713
More Efficient (Reusable) Private Set Union
Dov Gordon, Carmit Hazay, Phi Hung Le, and Mingyu Liang
2022/712
The Hardness of LPN over Any Integer Ring and Field for PCG Applications
Hanlin Liu, Xiao Wang, Kang Yang, and Yu Yu
2022/711
Efficient and Adaptively Secure Asynchronous Binary Agreement via Binding Crusader Agreement
Ittai Abraham, Naama Ben-David, Sravya Yandamuri
2022/710
Advanced Signature Functionalities from the Code Equivalence Problem
Alessandro Barenghi, Jean-Francois Biasse, Tran Ngo, Edoardo Persichetti, Paolo Santini
2022/709
Some Easy Instances of Ideal-SVP and Implications on the Partial Vandermonde Knapsack Problem
Katharina Boudgoust, Erell Gachon, Alice Pellet-Mary
2022/708
An Estimator for the Hardness of the MQ Problem
Emanuele Bellini, Rusydi H. Makarim, Carlo Sanna, Javier Verbel
2022/707
Efficiently Masking Polynomial Inversion at Arbitrary Order
Markus Krausz, Georg Land, Jan Richter-Brockmann, Tim Güneysu
2022/706
Finding and Evaluating Parameters for BGV
Johannes Mono, Chiara Marcolla, Georg Land, Tim Güneysu, Najwa Aaraj
2022/705
Linear-map Vector Commitments and their Practical Applications
Matteo Campanelli, Anca Nitulescu, Carla Ràfols, Alexandros Zacharakis, Arantxa Zapico
2022/704
Parameter Optimization & Larger Precision for (T)FHE
Loris Bergerat, Anas Boudi, Quentin Bourgerie, Ilaria Chillotti, Damien Ligier, Jean-Baptiste Orfila, Samuel Tap
2022/703
Proof-of-possession for KEM certificates using verifiable generation
Tim Güneysu, Philip Hodges, Georg Land, Mike Ounsworth, Douglas Stebila, Greg Zaverucha
2022/702
Kevlar: Transparent, Efficient, Polynomial Commitment Scheme with Logarithmic Verification and Communication Costs on Efficient Groups
Frank Y.C. Lu
2022/701
Truncated Boomerang Attacks and Application to AES-based Ciphers
Augustin Bariant, Gaëtan Leurent
2022/700
Grief-free Atomic Swaps
Tejaswi Nadahalli, Majid Khabbazian, Roger Wattenhofer
2022/699
On the Quantum Security of OCB
Varun Maram, Daniel Masny, Sikhar Patranabis, Srinivasan Raghuraman
2022/698
State Machine Replication under Changing Network Conditions
Andreea B. Alexandru, Erica Blum, Jonathan Katz, Julian Loss
2022/697
Rate-1 Incompressible Encryption from Standard Assumptions
Pedro Branco, Nico Döttling, Jesko Dujmovic
2022/696
On the Impossibility of Algebraic Vector Commitments in Pairing-Free Groups
Dario Catalano, Dario Fiore, Rosario Gennaro, and Emanuele Giunta
2022/695
Yet Another Algebraic Cryptanalysis of Small Scale Variants of AES
Marek Bielik, Martin Jureček, Olha Jurečková, Róbert Lórencz
2022/694
Squirrel: Efficient Synchronized Multi-Signatures from Lattices
Nils Fleischhacker, Mark Simkin, Zhenfei Zhang
2022/693
Unified View for Notions of Bit Security
Shun Watanabe and Kenji Yasunaga
2022/692
LIKE – Lattice Isomorphism-based Non-Interactive Key Exchange via Group Actions
Alessandro Budroni, Jesús-Javier Chi-Domínguez, Mukul Kulkarni
2022/691
QuORAM: A Quorum-Replicated Fault Tolerant ORAM Datastore
Sujaya Maiyya, Seif Ibrahim, Caitlin Scarberry, Divyakant Agrawal, Amr El Abbadi, Huijia Lin, Stefano Tessaro, Victor Zakhary
2022/690
Authentication in the Bounded Storage Model
Yevgeniy Dodis, Willy Quach, Daniel Wichs
2022/689
Tight Multi-User Security Bound of $\textsf{DbHtS}$
Nilanjan Datta, Avijit Dutta, Mridul Nandi, Suprita Talnikar
2022/688
Memory-Efficient Single Data-Complexity Attacks on LowMC Using Partial Sets
Subhadeep Banik, Khashayar Barooti, Andrea Caforio, Serge Vaudenay
2022/687
Adaptively Secure Single Secret Leader Election from DDH
Dario Catalano, Dario Fiore, Emanuele Giunta
2022/686
Proof of Mirror Theory for a Wide Range of $\xi_{\max}$
Benoît Cogliati, Avijit Dutta, Mridul Nandi, Jacques Patarin, Abishanka Saha
2022/685
Error Leakage using Timing Channel in FHE Ciphertexts from TFHE Library
Bhuvnesh Chaturvedi, Anirban Chakraborty, Ayantika Chatterjee, Debdeep Mukhopadhyay
2022/684
RSK: A Bitcoin sidechain with stateful smart-contracts
Sergio Demian Lerner, Javier Álvarez Cid-Fuentes, Julian Len, Ramsès Fernàndez-València, Patricio Gallardo, Nicolás Vescovo, Raúl Laprida, Shreemoy Mishra, Federico Jinich, Diego Masini
2022/683
Quantum Analysis of AES
Kyungbae Jang, Anubhab Baksi, Hyunji Kim, Gyeongju Song, Hwajeong Seo, and Anupam Chattopadhyay
2022/682
Secure Federated Clustering
Songze Li, Sizai Hou, Baturalp Buyukates, Salman Avestimehr
2022/681
Refuting the Dream XOR Lemma via Ideal Obfuscation and Resettable MPC
Saikrishna Badrinarayanan, Yuval Ishai, Dakshita Khurana, Amit Sahai, Daniel Wichs
2022/680
Practical Delegatable Anonymous Credentials From Equivalence Class Signatures
Omid Mir, Daniel Slamanig, Balthazar Bauer, and René Mayrhofer
2022/679
Vandermonde meets Regev: Public Key Encryption Schemes Based on Partial Vandermonde Problems
Katharina Boudgoust, Amin Sakzad, Ron Steinfeld
2022/678
New Constructions of Collapsing Hashes
Mark Zhandry
2022/677
A Conjecture on Hermite Constants
Leon Mächler, David Naccache
2022/676
Finding many Collisions via Reusable Quantum Walks
Xavier Bonnetain, André Chailloux, André Schrottenloher, Yixin Shen
2022/675
MPClan: Protocol Suite for Privacy-Conscious Computations
Nishat Koti, Shravani Patil, Arpita Patra, Ajith Suresh
2022/674
A Note on Key Ranking for Optimal Collision Side-Channel Attacks
Cezary Glowacz
2022/673
Meet-in-the-Filter and Dynamic Counting with Applications to Speck
Alex Biryukov, Luan Cardoso dos Santos, Je Sen Teh, Aleksei Udovenko, Vesselin Velichkov
2022/672
CENSOR: Privacy-preserving Obfuscation for Outsourcing SAT formulas
Tassos Dimitriou and Khazam Alhamdan
2022/671
The Gap Is Sensitive to Size of Preimages: Collapsing Property Doesn't Go Beyond Quantum Collision-Resistance for Preimages Bounded Hash Functions
Shujiao Cao, Rui Xue
2022/670
Practical UC-Secure Zero-Knowledge Smart Contracts
Jayamine Alupotha, Xavier Boyen
2022/669
On those Boolean functions that are coset leaders of first order Reed-Muller codes
Claude Carlet, Serge Feukoua
2022/668
Key-Reduced Variants of 3kf9 with Beyond-Birthday-Bound Security
Yaobin Shen, Ferdinand Sibleyras
2022/667
Arithmetic Tuples for MPC
Pascal Reisert, Marc Rivinius, Toomas Krips, and Ralf Küsters
2022/666
Deciding and reconstructing linear equivalence of uniformly distributed functions
Ivana Ivkovic, Nikolay Kaleyski
2022/665
NOVA, a Noncommutative-ring Based Unbalanced Oil and Vinegar Signature Scheme with Key-randomness Alignment
Lih-Chung Wang, Po-En Tseng, Yen-Liang Kuan, Chun-Yen Chou
2022/664
The $c-$differential uniformity and boomerang uniformity of three classes of permutation polynomials over $\mathbb{F}_{2^n}$
Qian Liu, Zhiwei Huang, Jianrui Xie, Ximeng Liu, Jian Zou
2022/663
SafeNet: The Unreasonable Effectiveness of Ensembles in Private Collaborative Learning
Harsh Chaudhari, Matthew Jagielski, Alina Oprea
2022/662
SHORTSTACK : Distributed, Fault-tolerant, Oblivious Data Access
Midhul Vuppalapati, Kushal Babel, Anurag Khandelwal, Rachit Agarwal
2022/661
Protego: Efficient, Revocable and Auditable Anonymous Credentials with Applications to Hyperledger Fabric
Aisling Connolly, Jerome Deschamps, Pascal Lafourcade, Octavio Perez Kempner
2022/660
Secure Sampling with Sublinear Communication
Seung Geol Choi, Dana Dachman-Soled, S. Dov Gordon, Linsheng Liu, Arkady Yerukhimovich
2022/659
ABE for Circuits with Constant-Size Secret Keys and Adaptive Security
Hanjun Li, Huijia Lin, Ji Luo
2022/658
Unclonable Polymers and Their Cryptographic Applications
Ghada Almashaqbeh, Ran Canetti, Yaniv Erlich, Jonathan Gershoni, Tal Malkin, Itsik Pe’er, Anna Roitburd-Berman, Eran Tromer
2022/657
BASALISC: Programmable Hardware Accelerator for BGV Fully Homomorphic Encryption
Robin Geelen, Michiel Van Beirendonck, Hilder V. L. Pereira, Brian Huffman, Tynan McAuley, Ben Selfridge, Daniel Wagner, Georgios Dimou, Ingrid Verbauwhede, Frederik Vercauteren, and David W. Archer
2022/656
Quantum Augmented Dual Attack
Martin R. Albrecht, Yixin Shen
2022/655
Bit Security as Cost to Demonstrate Advantage
Keewoo Lee
2022/654
Torsion point attacks on ``SIDH-like'' cryptosystems
Péter Kutas, Christophe Petit
2022/653
Fast Unbalanced Private Set Union from Fully Homomorphic Encryption
Binbin Tu, Yu Chen, Qi Liu, Cong Zhang
2022/652
Private Set Operations from Multi-Query Reverse Private Membership Test
Yu Chen, Min Zhang, Cong Zhang, Minglang Dong, and Weiran Liu
2022/651
Revisiting the Efficiency of Asynchronous Multi Party Computation Against General Adversaries
Ananya Appan, Anirudh Chandramouli, Ashish Choudhury
2022/650
Supersingular Non-Superspecial Abelian Surfaces in Cryptography
Jason T. LeGrow, Yan Bo Ti, Lukas Zobernig
2022/649
IBE with Incompressible Master Secret and Small Identity Secrets
Nico Döttling, Sanjam Garg, Sruthi Sekar, Mingyuan Wang
2022/648
Dynamic Searchable Encryption with Optimal Search in the Presence of Deletions
Javad Ghareh Chamani, Dimitrios Papadopoulos, Mohammadamin Karbasforushan, Ioannis Demertzis
2022/647
Quantum Implementation and Analysis of DEFAULT
Kyungbae Jang, Anubhab Baksi, Jakub Breier, Hwajeong Seo, Anupam Chattopadhyay
2022/646
Faster Non-interactive Verifiable Computing
Pascal Lafourcade, Gael Marcadet, Léo Robert
2022/645
Round-Optimal Multi-Party Computation with Identifiable Abort
Michele Ciampi, Divya Ravi, Luisa Siniscalchi, Hendrik Waldner
2022/644
DiLizium 2.0: Revisiting Two-Party Crystals-Dilithium
Peeter Laud, Nikita Snetkov, and Jelizaveta Vakarjuk
2022/643
Accelerating the Best Trail Search on AES-Like Ciphers
Seonggyeom Kim, Deukjo Hong, Jaechul Sung, Seokhie Hong
2022/642
Statistical Effective Fault Attacks: The other Side of the Coin
Navid Vafaei, Sara Zarei, Nasour Bagheri, Maria Eichlseder, Robert Primas, Hadi Soleimany
2022/641
Self-Timed Masking: Implementing Masked S-Boxes Without Registers
Mateus Simões, Lilian Bossuet, Nicolas Bruneau, Vincent Grosso, Patrick Haddad, Thomas Sarno
2022/640
Dialektos: Privacy-preserving Smart Contracts
Tadas Vaitiekūnas
2022/639
Anamorphic Encryption: Private Communication against a Dictator
Giuseppe Persiano, Duong Hieu Phan, Moti Yung
2022/638
Impossibilities in Succinct Arguments: Black-box Extraction and More
Matteo Campanelli, Chaya Ganesh, Hamidreza Khoshakhlagh, and Janno Siim
2022/637
Conditional Attribute-Based Proxy Re-Encryption: Definitions and Constructions from LWE
Lisha Yao, Jian Weng, Pengfei Wu, Xiaoguo Li, Yi Liu, Junzuo Lai, Guomin Yang, and Robert H. Deng
2022/636
Integer Syndrome Decoding in the Presence of Noise
Vlad-Florin Dragoi, Brice Colombier, Pierre-Louis Cayrel, Vincent Grosso
2022/635
Post-Quantum Secure Boot on Vehicle Network Processors
Joppe W. Bos, Brian Carlson, Joost Renes, Marius Rotaru, Daan Sprenkels, Geoffrey P. Waters
2022/634
Round-Optimal Lattice-Based Threshold Signatures, Revisited
Shweta Agrawal, Damien Stehle, Anshu Yadav
2022/633
CUDA-Accelerated RNS Multiplication in Word-Wise Homomorphic Encryption Schemes
Shiyu Shen, Hao Yang, Yu Liu, Zhe Liu, Yunlei Zhao
2022/632
Recovering Rainbow's Secret Key with a First-Order Fault Attack
Thomas Aulbach, Tobias Kovats, Juliane Krämer, Soundes Marzougui
2022/631
Watermarking PRFs against Quantum Adversaries
Fuyuki Kitagawa and Ryo Nishimaki
2022/630
Enforcing fine-grained constant-time policies
Basavesh Ammanaghatta Shivakumar, Gilles Barthe, Benjamin Grégoire, Vincent Laporte, Swarn Priya
2022/629
Feel the Quantum Functioning: Instantiating Generic Multi-Input Functional Encryption from Learning with Errors (extended version)?
Alexandros Bakas, Antonis Michalas, Eugene Frimpong, Reyhaneh Rabbaninejad
2022/628
High-Performance Polynomial Multiplication Hardware Accelerators for KEM Saber and NTRU
Elizabeth Carter, Pengzhou He, Jiafeng Xie
2022/627
Secure Hierarchical Deterministic Wallet Supporting Stealth Address
Xin Yin, Zhen Liu, Guomin Yang, Guoxing Chen, Haojin Zhu
2022/626
New method for combining Matsui’s bounding conditions with sequential encoding method
Senpeng Wang, Dengguo Feng, Bin Hu, Jie Guan, Kai Zhang, Tairong Shi
2022/625
Dashing and Star: Byzantine Fault Tolerance with Weak Certificates
Sisi Duan, Haibin Zhang, Xiao Sui, Baohan Huang, Changchun Mu, Gang Di, and Xiaoyun Wang
2022/624
Cryptanalysis of Three Quantum Money Schemes
Andriyan Bilyk, Javad Doliskani, Zhiyong Gong
2022/623
Fast Fully Secure Multi-Party Computation over Any Ring with Two-Thirds Honest Majority
Anders Dalskov, Daniel Escudero, Ariel Nof
2022/622
Efficient and Accurate homomorphic comparisons
Olive Chakraborty, Martin Zuber
2022/621
Caulk: Lookup Arguments in Sublinear Time
Arantxa Zapico, Vitalik Buterin, Dmitry Khovratovich, Mary Maller, Anca Nitulescu, Mark Simkin
2022/620
Synthesizing Quantum Circuits of AES with Lower T-depth and Less Qubits
Zhenyu Huang, Siwei Sun
2022/619
Breaking the $t< n/3$ Consensus Bound: Asynchronous Dynamic Proactive Secret Sharing under Honest Majority
Christophe Levrat, Matthieu Rambaud, Antoine Urban
2022/618
A simple proof of ARX completeness
Adriano Koleci
2022/617
SO-CCA Secure PKE in the Quantum Random Oracle Model or the Quantum Ideal Cipher Model
Shingo Sato, Junji Shikata
2022/616
Post-Quantum Anonymous One-Sided Authenticated Key Exchange without Random Oracles
Ren Ishibashi, Kazuki Yoneyama
2022/615
Smoothing Codes and Lattices: Systematic Study and New Bounds
Thomas Debris, Léo Ducas, Nicolas Resch, Jean-Pierre Tillich
2022/614
PPRKS: A Privacy Preserving Range Keyword Search Scheme
Yu Zhang, Zongbin Wang, Tihong Qin
2022/613
GLUE: Generalizing Unbounded Attribute-Based Encryption for Flexible Efficiency Trade-Offs
Marloes Venema, Greg Alpár
2022/612
Cryptanalysis of Reduced Round SPEEDY
Raghvendra Rohit, Santanu Sarkar
2022/611
Further Cryptanalysis of a Type of RSA Variants
Gongyu Shi, Geng Wang, Dawu Gu
2022/610
On the Differential Spectrum of a Differentially $3$-Uniform Power Function
Tingting Pang, Nian Li, Xiangyong Zeng
2022/609
Optimal Single-Server Private Information Retrieval
Mingxun Zhou, Wei-Kai Lin, Yiannis Tselekounis, Elaine Shi
2022/608
Practical Provably Secure Flooding for Blockchains
Chen-Da Liu-Zhang, Christian Matt, Ueli Maurer, Guilherme Rito, Søren Eller Thomsen
2022/607
Noise*: A Library of Verified High-Performance Secure Channel Protocol Implementations (Long Version)
Son Ho, Jonathan Protzenko, Abhishek Bichhawat, Karthikeyan Bhargavan
2022/606
Security Against Honorific Adversaries: Efficient MPC with Server-aided Public Verifiability
Li Duan, Yufan Jiang, Yong Li, Jörn Müller-Quade, Andy Rupp
2022/605
Weighted Attribute-Based Encryption with Parallelized Decryption
Alexandru Ionita
2022/604
Algorithm Substitution Attacks against Receivers
Marcel Armour, Bertram Poettering
2022/603
Distributed Blockchain Price Oracle
Léonard Lys, Maria Potop-Butucaru
2022/602
Combined Fault Injection and Real-Time Side-Channel Analysis for Android Secure-Boot Bypassing
Clément Fanjas, Clément Gaine, Driss Aboulkassimi, Simon Pontié, Olivier Potin
2022/601
A Better Method to Analyze Blockchain Consistency
Lucianna Kiffer, Rajmohan Rajaraman, abhi shelat
2022/600
A Nearly Tight Proof of Duc et al.'s Conjectured Security Bound for Masked Implementations
Loïc Masure, Olivier Rioul, François-Xavier Standaert
2022/599
TenderTee: Secure Tendermint
Lionel Beltrando, Maria Potop-Butucaru, Jose Alfaro
2022/598
Verifiable and forward private conjunctive keyword search from DIA tree
Laltu Sardar, Sushmita Ruj
2022/597
Foundations of Dynamic BFT
Sisi Duan, Haibin Zhang
2022/596
Zero Knowledge Proofs of Elliptic Curve Inner Products from Principal Divisors and Weil Reciprocity
Liam Eagen
2022/595
On the Cryptographic Fragility of the Telegram Ecosystem
Theo von Arx, Kenneth G. Paterson
2022/594
A CONCRETE approach to torus fully homomorphic encryption
Maria Ferrara, Antonio Tortora
2022/593
On the Security Proof of CKO+21 Secret Sharing Scheme
Yupu Hu, Shanshan Zhang, Baocang Wang, Siyue Dong
2022/592
Chaghri --- an FHE-friendly Block Cipher
Tomer Ashur, Mohammad Mahzoun, and Dilara Toprakhisar
2022/591
Software Evaluation for Second Round Candidates in NIST Lightweight Cryptography
Ryota Hira, Tomoaki Kitahara, Daiki Miyahara, Yuko Hara-Azumi, Yang Li, Kazuo Sakiyama
2022/590
Secure Merge in Linear Time and O(log log N) Rounds
Mark Blunk, Paul Bunn, Samuel Dittmer, Steve Lu, and Rafail Ostrovsky
2022/589
Unnecessary Input Heuristics & PayJoin Transactions
Simin Ghesmati, Andreas Kern, Aljosha Judmayer, Nicholas Stifter and
2022/588
Efficient Lifting for Shorter Zero-Knowledge Proofs and Post-Quantum Signatures
Daniel Kales, Greg Zaverucha
2022/587
Doubly Efficient Interactive Proofs over Infinite and Non-Commutative Rings
Eduardo Soria-Vazquez
2022/586
A survey of elliptic curves for proof systems
Diego F. Aranha, Youssef El Housni, Aurore Guillevic
2022/585
Towards Practical Homomorphic Time-Lock Puzzles: Applicability and Verifiability
Yi Liu, Qi Wang, Siu-Ming Yiu
2022/584
Revisiting the Uber Assumption in the Algebraic Group Model: Fine-Grained Bounds in Hidden-Order Groups and Improved Reductions in Bilinear Groups
Lior Rotem
2022/583
A Fully-Constructive Discrete-Logarithm Preprocessing Algorithm with an Optimal Time-Space Tradeoff
Lior Rotem, Gil Segev
2022/582
Ponyta: Foundations of Side-Contract-Resilient Fair Exchange
Hao Chung, Elisaweta Masserova, Elaine Shi, and Sri AravindaKrishnan Thyagarajan
2022/581
Cryptanalysis of an Identity-Based Provable Data Possession Protocol with Compressed Cloud Storage
Lidong Han, Guangwu Xu, Qi Xie, Xiao Tan, Chengliang Tian
2022/580
How to keep text private? A systematic review of deep learning methods for privacy-preserving natural language processing
Samuel Sousa, Roman Kern
2022/579
Compact and Efficient KEMs over NTRU Lattices
Zhichuang Liang, Boyue Fang, Jieyu Zheng, Yunlei Zhao
2022/578
Fast Skinny-128 SIMD Implementations for Sequential Modes of Operation
Alexandre Adomnicai, Kazuhiko Minematsu, Maki Shigeri
2022/577
Construction of generalized-involutory MDS matrices
Xuting Zhou, Tianshuo Cong
2022/576
On the Success Rate of Side-Channel Attacks on Masked Implementations: Information-Theoretical Bounds and Their Practical Usage
Akira Ito, Rei Ueno, Naofumi Homma
2022/575
Optimizing Homomorphic Encryption Parameters for Arbitrary Applications
Charles Gouert, Rishi Khan, Nektarios Georgios Tsoutsos
2022/574
Comparison-Based MPC in Star Topology (Full Version)
Gowri R Chandran, Carmit Hazay, Robin Hundt, Thomas Schneider
2022/573
Finding One Common Item, Privately
Tyler Beauregard, Janabel Xia, Mike Rosulek
2022/572
Homomorphically counting elements with the same property
Ilia Iliashenko, Malika Izabachène, Axel Mertens, Hilder V. L. Pereira.
2022/571
Entropically secure cipher for messages generated by Markov chains with unknown statistics
Boris Ryabko
2022/570
Secure and Private Source Coding with Private Key and Decoder Side Information
Onur Gunlu, Rafael F. Schaefer, Holger Boche, H. Vincent Poor
2022/569
TinyABE: Unrestricted Ciphertext-Policy Attribute-Based Encryption for Embedded Devices and Low-Quality Networks
Marloes Venema, Greg Alpár
2022/568
Improved MITM Cryptanalysis on Streebog
Jialiang Hua, Xiaoyang Dong, Siwei Sun, Zhiyu Zhang, Lei Hu, Xiaoyun Wang
2022/567
FC1: A Powerful, Non-Deterministic, Symmetric Key Cipher
Michele Fabbrini
2022/566
AntMan: Interactive Zero-Knowledge Proofs with Sublinear Communication
Chenkai Weng, Kang Yang, Zhaomin Yang, Xiang Xie, Xiao Wang
2022/565
Power Contracts: Provably Complete Power Leakage Models for Processors
Roderick Bloem, Barbara Gigerl, Marc Gourjon, Vedad Hadžić, Stefan Mangard, and Robert Primas
2022/564
FAPRIL: Towards Faster Privacy-Preserving Fingerprint-Based Localization
Christopher van der Beets, Raine Nieminen, Thomas Schneider
2022/563
Find the Bad Apples: An efficient method for perfect key recovery under imperfect SCA oracles – A case study of Kyber
Muyan Shen, Chi Cheng, Xiaohan Zhang, Qian Guo, Tao Jiang
2022/562
Orientations and cycles in supersingular isogeny graphs
Sarah Arpin, Mingjie Chen, Kristin E. Lauter, Renate Scheidler, Katherine Stange, Ha T. N. Tran
2022/561
Survey on the Effectiveness of DAPA-Related Attacks against Shift Register Based AEAD Schemes
Shivam Bhasin, Dirmanto Jap, Wei Cheng Ng, Siang Meng Sim
2022/560
Distributed Shuffling in Adversarial Environments
Kasper Green Larsen, Maciej Obremski, Mark Simkin
2022/559
DeCAF: Decentralizable Continuous Group Key Agreement with Fast Healing
Joël Alwen, Benedikt Auerbach, Miguel Cueto Noval, Karen Klein, Guillermo Pascual-Perez, and Krzysztof Pietrzak
2022/558
On Seedless PRNGs and Premature Next
Sandro Coretti, Yevgeniy Dodis, Harish Karthikeyan, Noah Stephens-Davidowitz, Stefano Tessaro
2022/557
Honest Majority Multi-Prover Interactive Arguments
Alexander R. Block, Christina Garman
2022/556
Resumable Zero-Knowledge for Circuits from Symmetric Key Primitives
Handong Zhang, Puwen Wei, Haiyang Xue, Yi Deng, Jinsong Li, Wei Wang, Guoxiao Liu
2022/555
Adapting Belief Propagation to Counter Shuffling of NTTs
Julius Hermelink, Silvan Streit, Emanuele Strieder, Katharina Thieme
2022/554
Byzantine Reliable Broadcast with $O(nL+kn+n^2 log n)$ Communication
Sisi Duan, Haibin Zhang
2022/553
Secure Storage with Deduplication
John Best, Wayne Hineman, Steven Hetzler, Guerney Hunt, Charanjit S. Jutla
2022/552
Improving Line-Point Zero Knowledge: Two Multiplications for the Price of One
Samuel Dittmer, Yuval Ishai, Steve Lu, Rafail Ostrovsky
2022/551
Marlin: Two-Phase BFT with Linearity
Xiao Sui, Sisi Duan, Haibin Zhang
2022/550
ROAST: Robust Asynchronous Schnorr Threshold Signatures
Tim Ruffing, Viktoria Ronge, Elliott Jin, Jonas Schneider-Bensch, Dominique Schröder
2022/549
Smart Contracts Obfuscation from Blockchain-based One-time Program
Sora Suegami
2022/548
Non-Interactive Zero-Knowledge Proofs with Fine-Grained Security
Yuyu Wang, Jiaxin Pan
2022/547
Fast signing method in RSA with high speed verification
GyuChol. Kim, YongBok. Jong
2022/546
He-HTLC: Revisiting Incentives in HTLC
Sarisht Wadhwa, Jannis Stoeter, Fan Zhang, Kartik Nayak
2022/545
Logic Locking - Connecting Theory and Practice
Elisaweta Masserova, Deepali Garg, Ken Mai, Lawrence Pileggi, Vipul Goyal, Bryan Parno
2022/544
Conditional Cube Attacks on Ascon-128 and Ascon-80pq in a Nonce-misuse Setting
Donghoon Chang, Deukjo Hong, Jinkeon Kang
2022/543
Aura: private voting with reduced trust on tallying authorities
Aram Jivanyan and Aaron Feickert
2022/542
On Valiant's Conjecture: Impossibility of Incrementally Verifiable Computation from Random Oracles
Mathias Hall-Andersen, Jesper Buus Nielsen
2022/541
The Generals’ Scuttlebutt: Byzantine-Resilient Gossip Protocols
Sandro Coretti, Aggelos Kiayias, Cristopher Moore, Alexander Russell
2022/540
On the revision of NIST 800-22 Test Suites
Katarzyna Anna Kowalska, Davide Fogliano, Jose Garcia Coello
2022/539
Post Quantum Noise
Yawning Angel, Benjamin Dowling, Andreas Hülsing, Peter Schwabe, and Fiona Johanna Weber
2022/538
Post-Quantum Signatures on RISC-V with Hardware Acceleration
Patrick Karl, Jonas Schupp, Tim Fritzmann, Georg Sigl
2022/537
Rubato: Noisy Ciphers for Approximate Homomorphic Encryption (Full Version)
Jincheol Ha, Seongkwang Kim, Byeonghak Lee, Jooyoung Lee, Mincheol Son
2022/536
Revamped Differential-Linear Cryptanalysis on Reduced Round ChaCha
Sabyasachi Dey, Hirendra Kumar Garai, Santanu Sarkar, Nitin Kumar Sharma
2022/535
Distributed (Correlation) Samplers: How to Remove a Trusted Dealer in One Round
Damiano Abram, Peter Scholl, Sophia Yakoubov
2022/534
On the Adaptive Security of the Threshold BLS Signature Scheme
Renas Bacho and Julian Loss
2022/533
Băhēm: A Symmetric Cipher with Provable 128-bit Security
M. Rajululkahf
2022/532
Rotation Key Reduction for Client-Server Systems of Deep Neural Network on Fully Homomorphic Encryption
Joon-Woo Lee, Eunsang Lee, Young-Sik Kim, and Jong-Seon No
2022/531
Jammin' on the deck
Norica Băcuieți, Joan Daemen, Seth Hoffert, Gilles Van Assche, Ronny Van Keer
2022/530
High-speed SABER Key Encapsulation Mechanism in 65nm CMOS
Malik Imran, Felipe Almeida, Andrea Basso, Sujoy Sinha Roy, Samuel Pagliarini
2022/529
Laconic Private Set-Intersection From Pairings
Diego Aranha, Chuanwei Lin, Claudio Orlandi, Mark Simkin
2022/528
On Random Sampling of Supersingular Elliptic Curves
Marzio Mula, Nadir Murru, Federico Pintore
2022/527
PQC-SEP: Power Side-channel Evaluation Platform for Post-Quantum Cryptography Algorithms
Jungmin Park, N. Nalla Anandakumar, Dipayan Saha, Dhwani Mehta, Nitin Pundir, Fahim Rahman, Farimah Farahmandi, Mark M. Tehranipoor
2022/526
Optimal Tightness for Chain-Based Unique Signatures
Fuchun Guo, Willy Susilo
2022/525
Breaking Goppa-Based McEliece with Hints
Elena Kirshanova, Alexander May
2022/524
Inner Product Functional Commitments with Constant-Size Public Parameters and Openings
Hien Chu, Dario Fiore, Dimitris Kolonelos, Dominique Schröder
2022/523
A side-channel based disassembler for the ARM-Cortex M0
Jurian van Geest, Ileana Buhan
2022/522
The Case of Small Prime Numbers Versus the Joye-Libert Cryptosystem
George Teseleanu
2022/521
On The Distributed Discrete Logarithm Problem with Preprocessing
Pavel Hubáček, Ľubica Jančová, Veronika Králová
2022/520
Efficient Verification of the Wesolowski Verifiable Delay Function for Distributed Environments
Vidal Attias, Luigi Vigneri, Vassil Dimitrov
2022/519
HARPOCRATES: An Approach Towards Efficient Encryption of Data-at-rest
Md Rasid Ali, Debranjan Pal, Abhijit Das, Dipanwita Roychowdhury
2022/518
Failing to hash into supersingular isogeny graphs
Jeremy Booher, Ross Bowden, Javad Doliskani, Tako Boris Fouotsa, Steven D. Galbraith, Sabrina Kunzweiler, Simon-Philipp Merz, Christophe Petit, Benjamin Smith, Katherine E. Stange, Yan Bo Ti, Christelle Vincent, José Felipe Voloch, Charlotte Weitkämper, Lukas Zobernig
2022/517
Local permutation polynomials and the action of e-Klenian groups
Jaime Gutierrez, Jorge Jimenez Urroz
2022/516
zk-Sherlock: Exposing Hardware Trojans in Zero-Knowledge
Dimitris Mouris, Charles Gouert, and Nektarios Georgios Tsoutsos
2022/515
MOSFHET: Optimized Software for FHE over the Torus
Antonio Guimarães, Edson Borin, and Diego F. Aranha
2022/514
A Key-Recovery Side-Channel Attack on Classic McEliece
Qian Guo, Andreas Johansson, Thomas Johansson
2022/513
Characteristic Automated Search of Cryptographic Algorithms for Distinguishing Attacks (CASCADA)
Adrián Ranea, Vincent Rijmen
2022/512
A Bit-Vector Differential Model for the Modular Addition by a Constant and its Applications to Differential and Impossible-Differential Cryptanalysis
Seyyed Arash Azimi, Adrián Ranea, Mahmoud Salmasizadeh, Javad Mohajeri, Mohammad Reza Aref, Vincent Rijmen
2022/511
OOBKey: Key Exchange with Implantable Medical Devices Using Out-Of-Band Channels
Mo Zhang, Eduard Marin, David Oswald, Vassilis Kostakos, Mark Ryan, Benjamin Tag, Kleomenis Katevas
2022/510
Bulletproofs++: Next Generation Confidential Transactions via Reciprocal Set Membership Arguments
Liam Eagen, Sanket Kanjalkar, Tim Ruffing, Jonas Nick
2022/509
Lattice Signature with Efficient Protocols, Application to Anonymous Credentials
Corentin Jeudy, Adeline Roux-Langlois, Olivier Sanders
2022/508
Security of Truncated Permutation Without Initial Value
Lorenzo Grassi, Bart Mennink
2022/507
Low-Latency Hardware Private Circuits
David Knichel, Amir Moradi
2022/506
Design and analysis of a distributed ECDSA signing service
Jens Groth, Victor Shoup
2022/505
Riding the Waves Towards Generic Single-Cycle Masking in Hardware
Rishub Nagpal, Barbara Gigerl, Robert Primas, Stefan Mangard
2022/504
Blockchain Applicability for the Internet of Things: Performance and Scalability Challenges and Solutions
Ziaur Rahman, Xun Yi, Sk. Tanzir Mehedi, Rafiqul Islam, Andrei Kelarev
2022/503
Towards a Formal Treatment of Logic Locking
Peter Beerel, Marios Georgiou, Ben Hamlin, Alex J. Malozemoff, Pierluigi Nuzzo
2022/502
Fast Diffusion Block for Secret Key Cryptography
Vlastimil Klima
2022/501
Another Concrete Quantum Cryptanalysis of Binary Elliptic Curves
Dedy Septono Catur Putranto, Rini Wisnu Wardhani, Harashta Tatimma Larasati, Howon Kim
2022/500
Multi-Server PIR with Full Error Detection and Limited Error Correction
Reo Eriguchi, Kaoru Kurosawa, Koji Nuida
2022/499
Cryptographic Oracle-Based Conditional Payments
Varun Madathil, Sri AravindaKrishnan Thyagarajan, Dimitrios Vasilopoulos, Lloyd Fournier, Giulio Malavolta, Pedro Moreno-Sanchez
2022/498
Limitations of Information-theoretic Incompressible Encodings
Petr Sedláček
2022/497
Protecting Distributed Primitives against Leakage: Equivocal Secret Sharing and More
Carmit Hazay, Muthuramakrishnan Venkitasubramaniam, Mor Weiss
2022/496
Lightweight Hardware Accelerator for Post-Quantum Digital Signature CRYSTALS-Dilithium
Naina Gupta, Arpan Jati, Anupam Chattopadhyay, Gautam Jha
2022/495
Maliciously Circuit-Private FHE from Information-Theoretic Principles
Nico Döttling, Jesko Dujmovic
2022/494
Single-Trace Side-Channel Attacks on ω-Small Polynomial Sampling: With Applications to NTRU, NTRU Prime, and CRYSTALS-DILITHIUM
Emre Karabulut, Erdem Alkim, Aydin Aysu
2022/493
Don’t Learn What You Already Know: Scheme-Aware Modeling for Profiling Side-Channel Analysis against Masking
Loïc Masure, Valence Cristiani, Maxime Lecomte, François-Xavier Standaert
2022/492
Towards Smart Contract-based Verification of Anonymous Credentials
Robert Muth, Tarek Galal, Jonathan Heiss, Florian Tschorsch
2022/491
Multi-Party Computation in the GDPR
Lukas Helminger, Christian Rechberger
2022/490
Information Bounds and Convergence Rates for Side-Channel Security Evaluators
Loïc Masure, Gaëtan Cassiers, Julien Hendrickx, François-Xavier Standaert
2022/489
A Practical-Quantum Differential Attack on Block Ciphers
Tarun Yadav, Manoj Kumar, Amit Kumar, S K Pal
2022/488
OrgAn: Organizational Anonymity with Low Latency
Debajyoti Das, Easwar Vivek Mangipudi, Aniket Kate
2022/487
New Key-Recovery Attack on Reduced-Round AES
Navid Ghaedi Bardeh, Vincent Rijmen
2022/486
MARSHAL: Messaging with Asynchronous Ratchets and Signatures for faster HeALing
Olivier Blazy, Pierre-Alain Fouque, Thibaut Jacques, Pascal Lafourcade, Cristina Onete, Léo Robert
2022/485
Two new classes of permutation trinomials over $\mathbb{F}_{q^3}$ with odd characteristic
Xi Xie, Nian Li, Linjie Xu, Xiangyong Zeng, Xiaohu Tang
2022/484
VERICA - Verification of Combined Attacks: Automated formal verification of security against simultaneous information leakage and tampering
Jan Richter-Brockmann, Jakob Feldtkeller, Pascal Sasdrich, Tim Güneysu
2022/483
When Cryptography Needs a Hand: Practical Post-Quantum Authentication for V2V Communications
Geoff Twardokus, Nina Bindel, Hanif Rahbari, and Sarah McCarthy
2022/482
cuFE: High Performance Privacy Preserving Support Vector Machine with Inner-Product Functional Encryption
KyungHyun Han, Wai-Kong Lee, Angshuman Karmakar, Jose Maria Bermudo Mera, Seong Oun Hwang
2022/481
India’s “Aadhaar” Biometric ID: Structure, Security, and Vulnerabilities
Pratyush Ranjan Tiwari, Dhruv Agarwal, Prakhar Jain, Swagam Dasgupta, Preetha Datta, Vineet Reddy, Debayan Gupta
2022/480
Medha: Microcoded Hardware Accelerator for computing on Encrypted Data
Ahmet Can Mert, Aikata, Sunmin Kwon, Youngsam Shin, Donghoon Yoo, Yongwoo Lee, Sujoy Sinha Roy
2022/479
Short Lattice Signature Scheme with Tighter Reduction under Ring-SIS Assumption
Kaisei Kajita, Go Ohtake, Kazuto Ogawa, Koji Nuida, Tsuyoshi Takagi
2022/478
Property-Preserving Hash Functions and Combinatorial Group Testing
Kazuhiko Minematsu
2022/477
Subverting Cryptographic Hardware used in Blockchain Consensus
Pratyush Ranjan Tiwari and Matthew Green
2022/476
On the Security of TrCBC
Debrup Chakraborty, Samir Kundu
2022/475
SIDH-sign: an efficient SIDH PoK-based signature
Jesús-Javier Chi-Domínguez, Víctor Mateu, Lucas Pandolfo Perin
2022/474
Side-Channel Analysis of Lattice-Based Post-Quantum Cryptography: Exploiting Polynomial Multiplication
Catinca Mujdei, Arthur Beckers, Jose Maria Bermudo Mera, Angshuman Karmakar, Lennert Wouters, Ingrid Verbauwhede
2022/473
Understanding binary-Goppa decoding
Daniel J. Bernstein
2022/472
On the Hardness of Module Learning With Errors with Short Distributions
Katharina Boudgoust, Corentin Jeudy, Adeline Roux-Langlois, Weiqiang Wen
2022/471
Breaking Masked Implementations of the Clyde-Cipher by Means of Side-Channel Analysis - A Report on the CHES Challenge Side-Channel Contest 2020
Aron Gohr, Friederike Laus, Werner Schindler
2022/470
Designated-Verifier Linkable Ring Signatures
Pourandokht Behrouz, Panagiotis Grontas, Vangelis Konstantakatos, Aris Pagourtzis, Marianna Spyrakou
2022/469
Efficient ASIC Architectures for Low Latency Niederreiter Decryption
Daniel Fallnich, Shutao Zhang, Tobias Gemmeke
2022/468
Improved Pump and Jump BKZ by Sharp Simulator
Leizhang Wang, Wenwen Xia, Geng Wang, Baocang Wang, Dawu Gu
2022/467
Armistice: Micro-Architectural Leakage Modelling for Masked Software Formal Verification
Arnaud de Grandmaison, Karine Heydemann, Quentin L. Meunier
2022/466
Quantum binary quadratic form reduction
Nicolas David, Thomas Espitau, Akinori Hosoyamada
2022/465
Băhēm: A Provably Secure Symmetric Cipher
M. Rajululkahf
2022/464
Superposition Attacks on Pseudorandom Schemes based on Two or Less Permutations
Shaoxuan Zhang, Chun Guo, Qingju Wang
2022/463
Reducing the Depth of Quantum FLT-Based Inversion Circuit
Harashta Tatimma Larasati, Dedy Septono Catur Putranto, Rini Wisnu Wardhani, Howon Kim
2022/462
New optimization techniques for PlonK’s arithmetization
Miguel Ambrona, Anne-Laure Schmitt, Raphael R. Toledo, Danny Willems
2022/461
Information Leakage in Code-based Masking: A Systematic Evaluation by Higher-Order Attacks
Wei Cheng, Sylvain Guilley, Jean-Luc Danger
2022/460
A Novel NIZK-based Privacy Preserving Biometric Identification Scheme for Internet of Things
Lin You, Qiang Zhu, Gengran Hu
2022/459
SIPFA: Statistical Ineffective Persistent Faults Analysis on Feistel Ciphers
Nasour Bagheri, Sadegh Sadeghi, Prasanna Ravi, Shivam Bhasin, Hadi Soleimany
2022/458
Multilinear Schwartz-Zippel mod N with Applications to Succinct Arguments
Benedikt Bünz and Ben Fisch
2022/457
Improving Differential-Neural Distinguisher Model For DES, Chaskey and PRESENT
Liu Zhang, Zilong Wang
2022/456
Robust, Revocable and Adaptively Secure Attribute-Based Encryption with Outsourced Decryption
Anis Bkakria
2022/455
Proof of Availability & Retrieval in a Modular Blockchain Architecture
Shir Cohen, Guy Goren, Lefteris Kokoris-Kogias, Alberto Sonnino, Alexander Spiegelman
2022/454
Efficient Compiler to Covert Security with Public Verifiability for Honest Majority MPC
Thomas Attema, Vincent Dunning, Maarten Everts, Peter Langenkamp
2022/453
Dependable Intrusion Detection System for IoT: A Deep Transfer Learning-based Approach
Sk. Tanzir Mehedi, Adnan Anwar, Ziaur Rahman, Kawsar Ahmed, Rafiqul Islam
2022/452
UTT: Decentralized Ecash with Accountable Privacy
Alin Tomescu, Adithya Bhat, Benny Applebaum, Ittai Abraham, Guy Gueta, Benny Pinkas, Avishay Yanai
2022/451
Improved Stock Market Structure Using Cryptography
Charanjit S. Jutla, Barry Mishra
2022/450
Astrape: Anonymous Payment Channels with Boring Cryptography
Yuhao Dong, Ian Goldberg, Sergey Gorbunov, Raouf Boutaba
2022/449
On End-to-End Encryption
Britta Hale, Chelsea Komlo
2022/448
Attacks Against White-Box ECDSA and Discussion of Countermeasures - A Report on the WhibOx Contest 2021
Sven Bauer, Hermann Drexler, Maximilian Gebhardt, Dominik Klein, Friederike Laus, Johannes Mittmann
2022/447
Leveled Multikey FHE with constant-size ciphertexts from RLWE
Vanesa Daza, Paz Morillo, Sergi Rovira
2022/446
Fast Side-Channel Key-Recovery Attack against Elephant Dumbo
Louis Vialar
2022/445
TWAP Oracle Attacks: Easier Done than Said?
Torgin Mackinga, Tejaswi Nadahalli, Roger Wattenhofer
2022/444
A White-Box Speck Implementation using Self-Equivalence Encodings (Full Version)
Joachim Vandersmissen, Adrián Ranea, Bart Preneel
2022/443
Attack on SHealS and HealS: the Second Wave of GPST
Steven D. Galbraith, Yi-Fu Lai
2022/442
Quantum Attacks on PRFs Based on Public Random Permutations
Tingting Guo, Peng Wang, Lei Hu, Dingfeng Ye
2022/441
Two-Client Inner-Product Functional Encryption, with an Application to Money-Laundering Detection
Paola de Perthuis, David Pointcheval
2022/440
A Security Model for Randomization-based Protected Caches
Jordi Ribes-González, Oriol Farràs, Carles Hernández, Vatistas Kostalabros, Miquel Moretó
2022/439
Efficient Multiplication of Somewhat Small Integers using Number-Theoretic Transforms
Hanno Becker, Vincent Hwang, Matthias J. Kannwischer, Lorenz Panny, Bo-Yin Yang
2022/438
Computing isogenies between finite Drinfeld modules
Benjamin Wesolowski
2022/437
Continuous LWE is as Hard as LWE & Applications to Learning Gaussian Mixtures
Aparna Gupte, Neekon Vafa, Vinod Vaikuntanathan
2022/436
Publicly Accountable Robust Multi-Party Computation
Marc Rivinius, Pascal Reisert, Daniel Rausch, Ralf Kuesters
2022/435
Fiat-Shamir for Proofs Lacks a Proof Even in the Presence of Shared Entanglement
Frédéric Dupuis, Philippe Lamontagne, and Louis Salvail
2022/434
Verifiable Quantum Advantage without Structure
Takashi Yamakawa and Mark Zhandry
2022/433
McFly: Verifiable Encryption to the Future Made Practical
Nico Döttling, Lucjan Hanzlik, Bernardo Magri, Stella Wohnig
2022/432
Classical Verification of Quantum Computations in Linear Time
Jiayu Zhang
2022/431
Non-Adaptive Universal One-Way Hash Functions from Arbitrary One-Way Functions
Xinyu Mao, Noam Mazor, Jiapeng Zhang
2022/430
Is the JCJ voting system really coercion-resistant?
Véronique Cortier, Pierrick Gaudry, and Quentin Yang
2022/429
Resurrecting Xifrat - Compact Cryptosystems 2nd Attempt
Jianfang "Danny" Niu
2022/428
Implicit White-Box Implementations: White-Boxing ARX Ciphers
Adrián Ranea, Joachim Vandersmissen, Bart Preneel
2022/427
Constant Size Secret Sharing: with General Thresholds, Towards Standard Assumptions, and Applications
Katarzyna Kapusta, Matthieu Rambaud, Ferdinand Sibleyras
2022/426
Spectre Declassified: Reading from the Right Place at the Wrong Time
Basavesh Ammanaghatta Shivakumar, Jack Barnes, Gilles Barthe, Sunjay Cauligi, Chitchanok Chuengsatiansup, Daniel Genkin, Sioli O'Connell, Peter Schwabe, Rui Qi Sim, Yuval Yarom
2022/425
SoK: New Insights into Fully Homomorphic Encryption Libraries via Standardized Benchmarks
Charles Gouert, Dimitris Mouris, Nektarios Georgios Tsoutsos
2022/424
Refined Cryptanalysis of the GPRS Ciphers GEA-1 and GEA-2
Dor Amzaleg, Itai Dinur
2022/423
Polynomial Approximation of Inverse sqrt Function for FHE
Samanvaya Panda
2022/422
Verifiable Mix-Nets and Distributed Decryption for Voting from Lattice-Based Assumptions
Diego F. Aranha, Carsten Baum, Kristian Gjøsteen, and Tjerand Silde
2022/421
Multiverse of HawkNess: A Universally-Composable MPC-based Hawk Variant
Aritra Banerjee, Hitesh Tewari
2022/420
Gemini: Elastic SNARKs for Diverse Environments
Jonathan Bootle, Alessandro Chiesa, Yuncong Hu, Michele Orrù
2022/419
Dew: Transparent Constant-sized zkSNARKs
Arasu Arun, Chaya Ganesh, Satya Lokam, Tushar Mopuri, Sriram Sridhar
2022/418
LLTI: Low-Latency Threshold Implementations
Victor Arribas, Zhenda Zhang, Svetla Nikova
2022/417
Efficient, Actively Secure MPC with a Dishonest Majority: a Survey
Emmanuela Orsini
2022/416
Post-Quantum ID-based Ring Signatures from Symmetric-key Primitives
Maxime Buser, Joseph K. Liu, Ron Steinfeld, Amin Sakzad
2022/415
Efficient and Tight Oblivious Transfer from PKE with Tight Multi-User Security
Saikrishna Badrinarayanan, Daniel Masny, Pratyay Mukherjee
2022/414
PQ-HPKE: Post-Quantum Hybrid Public Key Encryption
Mila Anastasova, Panos Kampanakis, Jake Massimo
2022/413
Instachain: Breaking the Sharding Limits via Adjustable Quorums
Mustafa Safa Ozdayi, Yue Guo, Mahdi Zamani
2022/412
Complete and Improved FPGA Implementation of Classic McEliece
Po-Jen Chen, Tung Chou, Sanjay Deshpande, Norman Lahr, Ruben Niederhagen, Jakub Szefer, Wen Wang
2022/411
Quotient Approximation Modular Reduction
Aurélien Greuet, Simon Montoya, Clémence Vermeersch
2022/410
Enhancing AES Using Chaos and Logistic Map-Based Key Generation Technique for Securing IoT-Based Smart Home
Ziaur Rahman, Xun Yi, Mustain Billah, Mousumi Sumi, Adnan Anwar
2022/409
Proof-of-Stake Is a Defective Mechanism
Vicent Sus
2022/408
On the weightwise nonlinearity of weightwise perfectly balanced functions
Agnese Gini, Pierrick Méaux
2022/407
Improving the Privacy of Tor Onion Services
Edward Eaton, Sajin Sasy, Ian Goldberg
2022/406
Counting Vampires: From Univariate Sumcheck to Updatable ZK-SNARK
Helger Lipmaa, Janno Siim, Michal Zajac
2022/405
Benchmarking and Analysing the NIST PQC Lattice-Based Signature Schemes Standards on the ARM Cortex M7
James Howe, Bas Westerbaan
2022/404
Constant Latency in Sleepy Consensus
Atsuki Momose, Ling Ren
2022/403
Horst Meets Fluid-SPN: Griffin for Zero-Knowledge Applications
Lorenzo Grassi, Yonglin Hao, Christian Rechberger, Markus Schofnegger, Roman Walch, and Qingju Wang
2022/402
Improved Rotational-XOR Cryptanalysis of Simon-like Block Ciphers
Jinyu Lu, Yunwen Liu, Tomer Ashur, Bing Sun, Chao Li
2022/401
A Logic and an Interactive Prover for the Computational Post-Quantum Security of Protocols
Cas Cremers, Caroline Fontaine, Charlie Jacomme
2022/400
Quantum Advantage from Any Non-Local Game
Yael Tauman Kalai, Alex Lombardi, Vinod Vaikuntanathan, Lisa Yang
2022/399
The Inverse of $\chi$ and Its Applications to Rasta-like Ciphers
Fukang Liu, Santanu Sarkar, Willi Meier, Takanori Isobe
2022/398
Auditable, Available and Resilient Private Computation on the Blockchain via MPC
Christopher Cordi, Michael P. Frank, Kasimir Gabert, Carollan Helinski, Ryan C. Kao, Vladimir Kolesnikov, Abrahim Ladha, Nicholas Pattengale
2022/397
Revocable Hierarchical Attribute-based Signatures from Lattices
Daniel Gardham, Mark Manulis
2022/396
Side-channel attacks based on power trace decomposition
Fanliang Hu, Huanyu Wang, Junnian Wang
2022/395
A lightweight verifiable secret sharing scheme in IoTs
Likang Lu, Jianzhu Lu
2022/394
Fuzz, Penetration, and AI Testing for SoC Security Verification: Challenges and Solutions
Kimia Zamiri Azar, Muhammad Monir Hossain, Arash Vafaei, Hasan Al Shaikh, Nurun N. Mondol, Fahim Rahman, Mark Tehranipoor, Farimah Farahmandi
2022/393
Improved Straight-Line Extraction in the Random Oracle Model With Applications to Signature Aggregation
Yashvanth Kondi, abhi shelat
2022/392
Poly Onions: Achieving Anonymity in the Presence of Churn
Megumi Ando, Miranda Christ, Anna Lysyanskaya, Tal Malkin
2022/391
An Improved Model on the Vague Sets-Based DPoS’s Voting Phase in Blockchain
Lin You, Zhuobiao Wang, Gengran Hu, Chengtang Cao
2022/390
An Efficient and Robust Multidimensional Data Aggregation Scheme for Smart Grid Based on Blockchain
Lin You, Xinhua Zhang, Gengran Hu, Longbo Han
2022/389
Higher-order masked Saber
Suparna Kundu, Jan-Pieter D’Anvers, Michiel Van Beirendonck, Angshuman Karmakar, and Ingrid Verbauwhede
2022/388
Shaduf++: Non-Cycle and Privacy-Preserving Payment Channel Rebalancing
Zhonghui Ge, Yi Zhang, Yu Long, Dawu Gu
2022/387
Phase-shift Fault Analysis of Grain-128
HRIDYA P R and Jimmy Jose
2022/386
Secure Two-party Computation Approach for NTRUEncrypt
Lin You, Yan Wang, Liang Li, Gengran Hu
2022/385
ECDSA White-Box Implementations: Attacks and Designs from WhibOx 2021 Contest
Guillaume Barbu, Ward Beullens, Emmanuelle Dottax, Christophe Giraud, Agathe Houzelot, Chaoyun Li, Mohammad Mahzoun, Adrián Ranea, Jianrui Xie
2022/384
Light Clients for Lazy Blockchains
Ertem Nusret Tas, David Tse, Lei Yang, and Dionysis Zindros
2022/383
On Succinct Non-Interactive Arguments in Relativized Worlds
Megan Chen, Alessandro Chiesa, Nicholas Spooner
2022/382
Witness-Authenticated Key Exchange Revisited: Improved Models, Simpler Constructions, Extensions to Groups
Matteo Campanelli, Rosario Gennaro, Kelsey Melissaris, Luca Nizzardo
2022/381
On Extension of Evaluation Algorithms in Keyed-Homomorphic Encryption
Hirotomo Shinoki, Koji Nuida
2022/380
A Linear-Time 2-Party Secure Merge Protocol
Brett Hemenway Falk, Rohit Nema, Rafail Ostrovsky
2022/379
Fully Secure PSI via MPC-in-the-Head
S. Dov Gordon, Carmit Hazay, Phi Hung Le
2022/378
Share $\&$ Shrink: (In-)Feasibility of MPC from one Broadcast-then-Asynchrony, and Delegated Computation
Antoine Urban and Matthieu Rambaud
2022/377
(Commit-and-Prove) Predictable Arguments with Privacy
Hamidreza Khoshakhlagh
2022/376
Universally Composable End-to-End Secure Messaging
Ran Canetti, Palak Jain, Marika Swanberg, Mayank Varia
2022/375
A Note on the Security Framework of Two-key DbHtS MACs
Tingting Guo, Peng Wang
2022/374
Simple Three-Round Multiparty Schnorr Signing with Full Simulatability
Yehuda Lindell
2022/373
Blind accumulators for e-voting
Sergey Agievich
2022/372
Shorter quantum circuits
Vadym Kliuchnikov, Kristin Lauter, Romy Minko, Christophe Petit, Adam Paetznick
2022/371
A High-performance ECC Processor over Curve448 based on a Novel Variant of the Karatsuba Formula for Asymmetric Digit Multiplier
Asep Muhamad Awaludin, Jonguk Park, Rini Wisnu Wardhani, Howon Kim
2022/370
Efficient NIZKs from LWE via Polynomial Reconstruction and ``MPC in the Head"
Riddhi Ghosal, Paul Lou, Amit Sahai
2022/369
Matching Attacks on Romulus-M
Makoto Habu, Kazuhiko Minematsu, Tetsu Iwata
2022/368
Spiral: Fast, High-Rate Single-Server PIR via FHE Composition
Samir Jordan Menon, David J. Wu
2022/367
Efficient Algorithms for Large Prime Characteristic Fields and Their Application to Bilinear Pairings
Patrick Longa
2022/366
On the Algebraic Degree of Iterated Power Functions
Clémence Bouvier, Anne Canteaut, Léo Perrin
2022/365
Failing gracefully: Decryption failures and the Fujisaki-Okamoto transform
Kathrin Hövelmanns, Andreas Hülsing, Christian Majenz
2022/364
Single-trace clustering power analysis of the point-swapping procedure in the three point ladder of Cortex-M4 SIKE
Aymeric Genêt, Novak Kaluđerović
2022/363
An Algebraic Framework for Silent Preprocessing with Trustless Setup and Active Security
Damiano Abram, Ivan Damgård, Claudio Orlandi, Peter Scholl
2022/362
How to Backdoor (Classic) McEliece and How to Guard Against Backdoors
Tobias Hemmert, Alexander May, Johannes Mittmann, Carl Richard Theodor Schneider
2022/361
Base64 Malleability in Practice
Panagiotis Chatzigiannis, Konstantinos Chalkias
2022/360
Privacy-Preserving Contrastive Explanations with Local Foil Trees
Thijs Veugen, Bart Kamphorst, Michiel Marcus
2022/359
How much is the fork? Fast Probability and Profitability Calculation during Temporary Forks
Aljosha Judmayer, Nicholas Stifter, Philipp Schindler, Edgar Weippel
2022/358
Linear Private Set Union from Multi-Query Reverse Private Membership Test
Cong Zhang, Yu Chen, Weiran Liu, Min Zhang, Dongdai Lin
2022/357
An Effective Lower Bound on the Number of Orientable Supersingular Elliptic Curves
Antonin Leroux
2022/356
A Systematic Literature Review on Blockchain Enabled Federated Learning Framework for Internet of Vehicles
MUSTAIN BILLAH, SK. TANZIR MEHEDI, ADNAN ANWAR, ZIAUR RAHMAN, RAFIQUL ISLAM
2022/355
A More Complete Analysis of the Signal Double Ratchet Algorithm
Alexander Bienstock, Jaiden Fairoze, Sanjam Garg, Pratyay Mukherjee, Srinivasan Raghuraman
2022/354
Optimal Synchronous Approximate Agreement with Asynchronous Fallback
Diana Ghinea, Chen-Da Liu-Zhang, Roger Wattenhofer
2022/353
SNARGs for P from Sub-exponential DDH and QR
James Hulett, Ruta Jawale, Dakshita Khurana, Akshayaram Srinivasan
2022/352
Co-factor clearing and subgroup membership testing on pairing-friendly curves
Youssef El Housni, Aurore Guillevic, Thomas Piellard
2022/351
Formal Verification of Saber's Public-Key Encryption Scheme in EasyCrypt
Andreas Hülsing, Matthias Meijers, Pierre-Yves Strub
2022/350
DO NOT RUG ON ME: ZERO-DIMENSIONAL SCAM DETECTION
Bruno Mazorra, Victor Adan, Vanesa Daza
2022/349
Hard Homogeneous Spaces from the Class Field Theory of Imaginary Hyperelliptic Function Fields
Antoine Leudière, Pierre-Jean Spaenlehauer
2022/348
Fast Subgroup Membership Testings for $\mathbb{G}_1$, $\mathbb{G}_2$ and $\mathbb{G}_T$ on Pairing-friendly Curves
Yu Dai, Kaizhan Lin, Chang-An Zhao, Zijian Zhou
2022/347
Asymptotically Faster Multi-Key Homomorphic Encryption from Homomorphic Gadget Decomposition
Taechan Kim, Hyesun Kwak, Dongwon Lee, Jinyeong Seo, and Yongsoo Song
2022/346
Recovering the tight security proof of $SPHINCS^{+}$
Andreas Hülsing, Mikhail Kudinov
2022/345
On the decisional Diffie-Hellman problem for class group actions on oriented elliptic curves
Wouter Castryck, Marc Houben, Frederik Vercauteren, Benjamin Wesolowski
2022/344
Shorter Signatures from MQ
William Wang
2022/343
Beyond the Csiszár-Körner Bound: Best-Possible Wiretap Coding via Obfuscation
Yuval Ishai, Alexis Korb, Paul Lou, Amit Sahai
2022/342
From Farfalle to Megafono via Ciminion: The PRF Hydra for MPC Applications
Lorenzo Grassi, Morten Øygarden, Markus Schofnegger, Roman Walch
2022/341
Deep neural networks aiding cryptanalysis: A case study of the Speck distinguisher
Nicoleta-Norica Băcuieți, Lejla Batina, Stjepan Picek
2022/340
To Overfit, Or Not to Overfit: Improving the Performance of Deep Learning-based SCA
Azade Rezaeezade, Guilherme Perin, Stjepan Picek
2022/339
New Digital Signature Algorithm EHT
Igor Semaev
2022/338
Communication-Efficient Inner Product Private Join and Compute with Cardinality
Koji Chida, Koki Hamada, Atsunori Ichikawa, Masanobu Kii, and Junichi Tomida
2022/337
Improving Software Quality in Cryptography Standardization Projects
Matthias J. Kannwischer, Peter Schwabe, Douglas Stebila, Thom Wiggers
2022/336
Batch Arguments for NP and More from Standard Bilinear Group Assumptions
Brent Waters, David J. Wu
2022/335
Evaluation of Machine Learning Algorithms in Network-Based Intrusion Detection System
Tuan-Hong Chua, Iftekhar Salam
2022/334
Improved Private Set Intersection for Sets with Small Entries
Dung Bui, Geoffroy Couteau
2022/333
We Can Make Mistakes: Fault-tolerant Forward Private Verifiable Dynamic Searchable Symmetric Encryption
Dandan Yuan, Shujie Cui, Giovanni Russello
2022/332
CostCO: An automatic cost modeling framework for secure multi-party computation
Vivian Fang, Lloyd Brown, William Lin, Wenting Zheng, Aurojit Panda, Raluca Ada Popa
2022/331
Parallelizable Authenticated Encryption with Small State Size
Akiko Inoue, Kazuhiko Minematsu
2022/330
A Simple and Generic Approach to Dynamic Collusion Model
Rachit Garg, Rishab Goyal, and George Lu
2022/329
Rolling up lattice cryptography primes
Daniel R. L. Brown
2022/328
On the susceptibility of Texas Instruments SimpleLink platform microcontrollers to non-invasive physical attacks
Lennert Wouters, Benedikt Gierlichs, Bart Preneel
2022/327
Provable Secure Software Masking in the Real-World
Arthur Beckers, Lennert Wouters, Benedikt Gierlichs, Bart Preneel, Ingrid Verbauwhede
2022/326
Composable Dynamic Secure Emulation
Pierre Civit, Maria Potop-Butucaru
2022/325
FPGA Design Deobfuscation by Iterative LUT Modification at Bitstream Level
Michail Moraitis, Elena Dubrova
2022/324
Backward-Leak Uni-Directional Updatable Encryption from (Homomorphic) Public Key Encryption
Yao Jiang Galteland, Jiaxin Pan
2022/323
Dilithium for Memory Constrained Devices
Joppe W. Bos, Joost Renes, Amber Sprenkels
2022/322
SecFloat: Accurate Floating-Point meets Secure 2-Party Computation
Deevashwer Rathee, Anwesh Bhattacharya, Rahul Sharma, Divya Gupta, Nishanth Chandran, Aseem Rastogi
2022/321
zkKYC in DeFi: An approach for implementing the zkKYC solution concept in Decentralized Finance
Pieter Pauwels, Joni Pirovich, Peter Braunz, Jack Deeb
2022/320
Blazing Fast PSI from Improved OKVS and Subfield VOLE
Srinivasan Raghuraman, Peter Rindal
2022/319
A Blockchain-based Long-term Time-Stamping Scheme
Long Meng, Liqun Chen
2022/318
Efficient Online-friendly Two-Party ECDSA Signature
Haiyang Xue, Man Ho Au, Xiang Xie, Tsz Hon Yuen, Handong Cui
2022/317
Thora: Atomic and Privacy-Preserving Multi-Channel Updates
Lukas Aumayr, Kasra Abbaszadeh, Matteo Maffei
2022/316
Bounded Functional Encryption for Turing Machines: Adaptive Security from General Assumptions
Shweta Agrawal, Fuyuki Kitagawa, Anuja Modi, Ryo Nishimaki, Shota Yamada, Takashi Yamakawa
2022/315
Low-Communication Multiparty Triple Generation for SPDZ from Ring-LPN
Damiano Abram, Peter Scholl
2022/314
Batch-OT with Optimal Rate
Zvika Brakerski, Pedro Branco, Nico Döttling, Sihang Pu
2022/313
Efficient Proof of RAM Programs from Any Public-Coin Zero-Knowledge System
Cyprien Delpech de Saint Guilhem, Emmanuela Orsini, Titouan Tanguy, Michiel Verbauwhede
2022/312
Low Communication Complexity Protocols, Collision Resistant Hash Functions and Secret Key-Agreement Protocols
Shahar P. Cohen, Moni Naor
2022/311
Unidirectional Updatable Encryption and Proxy Re-encryption from DDH
Peihan Miao, Sikhar Patranabis, Gaven Watson
2022/310
Dispute-free Scalable Open Vote Network using zk-SNARKs
Muhammad ElSheikh, Amr M. Youssef
2022/309
On Time-Space Tradeoffs for Bounded-Length Collisions in Merkle-Damgård Hashing
Ashrujit Ghoshal, Ilan Komargodski
2022/308
Colordag: An Incentive-Compatible Blockchain
Ittai Abraham, Danny Dolev, Ittay Eyal, Joseph Y. Halpern
2022/307
An Anonymous Trace-and-Revoke Broadcast Encryption Scheme
Olivier Blazy, Sayantan Mukherjee, Huyen Nguyen, Duong Hieu Phan, Damien Stehle
2022/306
The More You Know: Improving Laser Fault Injection with Prior Knowledge
Marina Krček, Thomas Ordas, Daniele Fronte, Stjepan Picek
2022/305
Surveying definitions of election verifiability
Ben Smyth, Michael R. Clarkson
2022/304
Multi-User BBB Security of Public Permutations Based MAC
Yu Long Chen, Avijit Dutta, Mridul Nandi
2022/303
Unlinkable Delegation of WebAuthn Credentials
Nick Frymann, Daniel Gardham, Mark Manulis
2022/302
SoK: Oblivious Pseudorandom Functions
Sílvia Casacuberta, Julia Hesse, Anja Lehmann
2022/301
How Practical are Fault Injection Attacks, Really?
Jakub Breier, Xiaolu Hou
2022/300
Faster NTRU on ARM Cortex-M4 with TMVP-based multiplication
Irem Keskinkurt Paksoy, Murat Cenk
2022/299
Related-Tweakey Impossible Differential Attack on Reduced-Round SKINNY-AEAD M1/M3
Yanhong Fan,Muzhou Li,Chao Niu,Zhenyu Lu,Meiqin Wang
2022/298
Constructive Post-Quantum Reductions
Nir Bitansky, Zvika Brakerski, Yael Tauman Kalai
2022/297
Promise $\Sigma$-protocol: How to Construct Efficient Threshold ECDSA from Encryptions Based on Class Groups
Yi Deng, Shunli Ma, Xinxuan Zhang, Hailong Wang, Xuyang Song, Xiang Xie
2022/296
On new results on Extremal Graph Theory, Theory of Algebraic Graphs and their applications in Cryptography and Coding Theory.
Vasyl Ustimenko
2022/295
Quantum Proofs of Deletion for Learning with Errors
Alexander Poremba
2022/294
A Plug-n-Play Framework for Scaling Private Set Intersection to Billion-sized Sets
Saikrishna Badrinarayanan, Ranjit Kumaresan, Mihai Christodorescu, Vinjith Nagaraja, Karan Patel, Srinivasan Raghuraman, Peter Rindal, Wei Sun, Minghua Xu
2022/293
Minimizing Setup in Broadcast-Optimal Two Round MPC
Ivan Damgård, Divya Ravi, Luisa Siniscalchi, Sophia Yakoubov
2022/292
Comment on ``SRAM-PUF Based Entities Authentication Scheme for Resource-constrained IoT Devices''
Michael Amar, Amit Kama, Kang Wang, Yossi Oren
2022/291
Provable security of CFB mode of operation with external re-keying
Vadim Tsypyschev, Iliya Morgasov
2022/290
Universally Composable Sigma-protocols in the Global Random-Oracle Model
Anna Lysyanskaya, Leah Namisa Rosenbloom
2022/289
Two Attacks On Proof-of-Stake GHOST/Ethereum
Joachim Neu, Ertem Nusret Tas, David Tse
2022/288
Spats: confidential assets and non-fungible tokens
Aaron Feickert and Aram Jivanyan
2022/287
User-Perceived Privacy in Blockchain
Simin Ghesmati, Walid Fdhila, Edgar Weippl
2022/286
Provably Secure Identity-Based Remote Password Registration
Csanád Bertók, Andrea Huszti, Szabolcs Kovács, Norbert Oláh
2022/285
Usability of Cryptocurrency Wallets Providing CoinJoin Transactions
Simin Ghesmati, Walid Fdhila, Edgar Weippl
2022/284
Lattice-Based Zero-Knowledge Proofs and Applications: Shorter, Simpler, and More General
Vadim Lyubashevsky, Ngoc Khanh Nguyen, Maxime Plancon
2022/283
Block-Cipher-Based Tree Hashing
Aldo Gunsing
2022/282
Achievable CCA2 Relaxation for Homomorphic Encryption
Adi Akavia, Craig Gentry, Shai Halevi, Margarita Vald
2022/281
Succinct Interactive Oracle Proofs: Applications and Limitations
Shafik Nassar, Ron D. Rothblum
2022/280
Efficient Homomorphic Evaluation on Large Intervals
Jung Hee Cheon, Wootae Kim, Jai Hyun Park
2022/279
Permutation rotation-symmetric S-boxes, liftings and affine equivalence
Tron Omland, Pantelimon Stanica
2022/278
Incompressiblity and Next-Block Pseudoentropy
Iftach Haitner, Noam Mazor, Jad Silbak
2022/277
Security Analysis of Elliptic Curves over Sextic Extension of Small Prime Fields
Robin Salen, Vijaykumar Singh, Vladimir Soukharev
2022/276
Hardness estimates of the Code Equivalence Problem in the Rank Metric
Krijn Reijnders, Simona Samardjiska, and Monika Trimoska
2022/275
Concrete Analysis of Approximate Ideal-SIVP to Decision Ring-LWE Reduction
Neal Koblitz, Subhabrata Samajder, Palash Sarkar, Subhadip Singha
2022/274
EcGFp5: a Specialized Elliptic Curve
Thomas Pornin
2022/273
Compact Storage for Homomorphic Encryption
Adi Akavia, Neta Oren, Boaz Sapir, Margarita Vald
2022/272
Quantum-Secure Aggregate One-time Signatures with Detecting Functionality
Shingo Sato, Junji Shikata
2022/271
Approximate Divisor Multiples -- Factoring with Only a Third of the Secret CRT-Exponents
Alexander May, Julian Nowakowski, Santanu Sarkar
2022/270
Efficient NIZKs and Signatures from Commit-and-Open Protocols in the QROM
Jelle Don, Serge Fehr, Christian Majenz, Christian Schaffner
2022/269
On Codes and Learning With Errors over Function Fields
Maxime Bombar, Alain Couvreur, and Thomas Debris-Alazard
2022/268
Efficient Schemes for Committing Authenticated Encryption
Mihir Bellare and Viet Tung Hoang
2022/267
Practical Post-Quantum Signature Schemes from Isomorphism Problems of Trilinear Forms
Gang Tang, Dung Hoang Duong, Antoine Joux, Thomas Plantard, Youming Qiao, Willy Susilo
2022/266
Verifiably Distributed Multi-User Secret Sharing schemes
Likang Lu, Jianzhu Lu
2022/265
Non-interactive Mimblewimble transactions, revisited
Georg Fuchsbauer, Michele Orrù
2022/264
Gradecast in Synchrony and Reliable Broadcast in Asynchrony with Optimal Resilience, Efficiency, and Unconditional Security
Ittai Abraham, Gilad Asharov
2022/263
Rethinking Modular Multi-Exponentiation in Real-World Applications
Vidal Attias, Luigi Vigneri, Vassil Dimitrov
2022/262
Secure Non-Interactive Reduction and Spectral Analysis of Correlations
Pratyush Agarwal, Varun Narayanan, Shreya Pathak, Manoj Prabhakaran, Vinod M. Prabhakaran, Mohammad Ali Rehan
2022/261
Sublinear GMW-Style Compiler for MPC with Preprocessing
Elette Boyle, Niv Gilboa, Yuval Ishai, Ariel Nof
2022/260
Advances in Logic Locking: Past, Present, and Prospects
Hadi Mardani Kamali, Kimia Zamiri Azar, Farimah Farahmandi, Mark Tehranipoor
2022/259
Partial Key Exposure Attacks on BIKE, Rainbow and NTRU
Andre Esser, Alexander May, Javier Verbel, Weiqiang Wen
2022/258
Digital Twin for Secure Semiconductor Lifecycle Management: Prospects and Applications
Hasan Al Shaikh, Mohammad Bin Monjil, Shigang Chen, Farimah Farahmandi, Navid Asadizanjani, Mark Tehranipoor, Fahim Rahman
2022/257
Guaranteed Output in $O(\sqrt{n})$ Rounds for Round-Robin Sampling Protocols
Ran Cohen, Jack Doerner, Yashvanth Kondi, abhi shelat
2022/256
Multi-Designated Receiver Signed Public Key Encryption
Ueli Maurer, Christopher Portmann, and Guilherme Rito
2022/255
Round-Optimal Byzantine Agreement
Diana Ghinea, Vipul Goyal, Chen-Da Liu-Zhang
2022/254
Unprotected and Masked Hardware Implementations of Spook v2
Charles Momin, Gaëtan Cassiers, François-Xavier Standaert
2022/253
The Side-Channel Metrics Cheat Sheet
Kostas Papagiannopoulos, Ognjen Glamocanin, Melissa Azouaoui, Dorian Ros, Francesco Regazzoni, Mirjana Stojilovic
2022/252
Handcrafting: Improving Automated Masking in Hardware with Manual Optimizations
Charles Momin, Gaëtan Cassiers, François-Xavier Standaert
2022/251
CoCoA: Concurrent Continuous Group Key Agreement
Joël Alwen, Benedikt Auerbach, Miguel Cueto Noval, Karen Klein, Guillermo Pascual-Perez, Krzysztof Pietrzak, Michael Walter
2022/250
Private Circuits with Quasilinear Randomness
Vipul Goyal, Yuval Ishai, Yifan Song
2022/249
The Summation-Truncation Hybrid: Reusing Discarded Bits for Free
Aldo Gunsing, Bart Mennink
2022/248
Collapseability of Tree Hashes
Aldo Gunsing, Bart Mennink
2022/247
Deck-Based Wide Block Cipher Modes and an Exposition of the Blinded Keyed Hashing Model
Aldo Gunsing, Joan Daemen, Bart Mennink
2022/246
On the Concrete Security of TLS 1.3 PSK Mode
Hannah Davis, Denis Diemert, Felix Günther, and Tibor Jager
2022/245
Entropic Hardness of Module-LWE from Module-NTRU
Katharina Boudgoust, Corentin Jeudy, Adeline Roux-Langlois, Weiqiang Wen
2022/244
Universally Composable Subversion-Resilient Cryptography
Suvradip Chakraborty, Bernardo Magri, Jesper Buus Nielsen, Daniele Venturi
2022/243
A Greater GIFT: Strengthening GIFT against Statistical Cryptanalysis
Ling Sun, Bart Preneel, Wei Wang, Meiqin Wang
2022/242
YOLO YOSO: Fast and Simple Encryption and Secret Sharing in the YOSO Model
Ignacio Cascudo, Bernardo David, Lydia Garms, Anders Konring
2022/241
Coalition and Threshold Hash-Based Signatures
John Kelsey, Stefan Lucks, Nathalie Lang
2022/240
SNACKs: Leveraging Proofs of Sequential Work for Blockchain Light Clients
Hamza Abusalah, Georg Fuchsbauer, Peter Gaži, Karen Klein
2022/239
Several Improvements on BKZ Algorithm
Ziyu Zhao, Jintai Ding
2022/238
HEAD: an FHE-based Privacy-preserving Cloud Computing Protocol with Compact Storage and Efficient Computation
Lijing Zhou, Ziyu Wang, Hongrui Cui, Xiao Zhang, Xianggui Wang, Yu Yu
2022/237
Public Randomness Extraction with Ephemeral Roles and Worst-Case Corruptions
Jesper Buus Nielsen, João Ribeiro, and Maciej Obremski
2022/236
Characterizing the qIND-qCPA (in)security of the CBC, CFB, OFB and CTR modes of operation
Tristan Nemoz, Zoé AMBLARD, Aurélien DUPIN
2022/235
Limits of Preprocessing for Single-Server PIR
Giuseppe Persiano, Kevin Yeo
2022/234
New algorithms for the Deuring correspondence: Towards practical and secure SQISign signatures
Luca De Feo, Antonin Leroux, Patrick Longa, Benjamin Wesolowski
2022/233
Variational quantum solutions to the Shortest Vector Problem
Martin R. Albrecht, Miloš Prokop, Yixin Shen, Petros Wallden
2022/232
Conditional Variational AutoEncoder based on Stochastic Attack
Gabriel Zaid, Lilian Bossuet, Mathieu Carbone, Amaury Habrard, Alexandre Venelli
2022/231
Towards Low-Latency Implementation of Linear Layers
Qun Liu, Weijia Wang, Yanhong Fan, Lixuan Wu, Ling Sun, Meiqin Wang
2022/230
Apple vs. EMA: Electromagnetic Side Channel Attacks on Apple CoreCrypto
Gregor Haas, Aydin Aysu
2022/229
WiP: Applicability of ISO Standard Side-Channel Leakage Tests to NIST Post-Quantum Cryptography
Markku-Juhani O. Saarinen
2022/228
Semi-Quantum Tokenized Signatures
Omri Shmueli
2022/227
The Little Seal Bug: Optical Sound Recovery from Lightweight Reflective Objects
Ben Nassi, Ras Swissa, Yuval Elovici, Boris Zadov
2022/226
To Label, or Not To Label (in Generic Groups)
Mark Zhandry
2022/225
Constant matters: Fine-grained Complexity of Differentially Private Continual Observation Using Completely Bounded Norms
Monika Henzinger, Jalaj Upadhyay
2022/224
Embedding the UC Model into the IITM Model
Daniel Rausch, Ralf Kuesters, Céline Chevalier
2022/223
Zero-Knowledge Protocols for the Subset Sum Problem from MPC-in-the-Head with Rejection
Thibauld Feneuil, Jules Maire, Matthieu Rivain, Damien Vergnaud
2022/222
Half-Aggregation of Schnorr Signatures with Tight Reductions
Yanbo Chen, Yunlei Zhao
2022/221
Secure Joint Communication and Sensing
Onur Gunlu, Matthieu Bloch, Rafael F. Schaefer, Aylin Yener
2022/220
Cache-22: A Highly Deployable End-To-End Encrypted Cache System with Post-Quantum Security
Keita Emura, Shiho Moriai, Takuma Nakajima, Masato Yoshimi
2022/219
PFE: Linear Active Security, Double-Shuffle Proofs, and Low-Complexity Communication
Hanyu Jia, Xiangxue Li
2022/218
On the Impossibility of Key Agreements from Quantum Random Oracles
Per Austrin, Hao Chung, Kai-Min Chung, Shiuan Fu, Yao-Ting Lin, Mohammad Mahmoody
2022/217
High-Performance Hardware Implementation of Lattice-Based Digital Signatures
Luke Beckwith, Duc Tri Nguyen, Kris Gaj
2022/216
Short Leakage Resilient and Non-malleable Secret Sharing Schemes
Nishanth Chandran, Bhavana Kanukurthi, Sai Lakshmi Bhavana Obbattu, Sruthi Sekar
2022/215
Multi-Client Functional Encryption with Fine-Grained Access Control
Ky Nguyen, Duong Hieu Phan, David Pointcheval
2022/214
Breaking Rainbow Takes a Weekend on a Laptop
Ward Beullens
2022/213
Issuer-Hiding Attribute-Based Credentials
Jan Bobolz, Fabian Eidens, Stephan Krenn, Sebastian Ramacher, Kai Samelin
2022/212
Tight Analysis of Decrypton Failure Probability of Kyber in Reality
Boyue Fang, Weize Wang, Yunlei Zhao
2022/211
Azeroth: Auditable Zero-knowledge Transactions in Smart Contracts
Gweonho Jeong, Nuri Lee, Jihye Kim, Hyunok Oh
2022/210
An Analysis of the Algebraic Group Model
Jonathan Katz, Cong Zhang, Hong-Sheng Zhou
2022/209
Blockchain based Contact Tracing: A Solution using Bluetooth and Sound Waves for Proximity Detection
ZiXi Hee, Iftekhar Salam
2022/208
Trust Dies in Darkness: Shedding Light on Samsung's TrustZone Keymaster Design
Alon Shakevsky, Eyal Ronen, Avishai Wool
2022/207
Cheetah: Lean and Fast Secure Two-Party Deep Neural Network Inference
Zhicong Huang, Wen-jie Lu, Cheng Hong, and Jiansheng Ding
2022/206
Proving UNSAT in Zero Knowledge
Ning Luo, Timos Antonopoulos, William Harris, Ruzica Piskac, Eran Tromer, Xiao Wang
2022/205
Fiat-Shamir signatures without aborts using Ring-and-Noise assumptions
Dipayan Das, Antoine Joux, Anand Kumar Narayanan
2022/204
RevEAL: Single-Trace Side-Channel Leakage of the SEAL Homomorphic Encryption Library
Furkan Aydin, Emre Karabulut, Seetal Potluri, Erdem Alkim, Aydin Aysu
2022/203
A New Perturbation for Multivariate Public Key Schemes such as HFE and UOV
Jean-Charles Faugère, Gilles macario-Rat, Jacques Patarin, Ludovic Perret
2022/202
Through the Looking-Glass: Benchmarking Secure Multi-Party Computation Comparisons for ReLU's
Abdelrahaman Aly, Kashif Nawaz, Eugenio Salazar, Victor Sucasas
2022/201
Enig: Player Replaceable Finality Layers with Optimal Validity
Simon Holmgaard Kamp, Jesper Buus Nielsen, Søren Eller Thomsen, Daniel Tschudi
2022/200
Non-Black-Box Approach to Secure Two-Party Computation in Three Rounds
Akshayaram Srinivasan
2022/199
Lattice-based Public Key Encryption with Multi-Ciphertexts Equality Test in Cloud Computing
Giang Linh Duc Nguyen, Dung Hoang Duong, Huy Quoc Le, Willy Susilo
2022/198
Efficient FHEW Bootstrapping with Small Evaluation Keys, and Applications to Threshold Homomorphic Encryption
Yongwoo Lee, Daniele Micciancio, Andrey Kim, Rakyong Choi, Maxim Deryabin, Jieun Eom, Donghoon Yoo
2022/197
Nice Attacks --- but What is the Cost? Computational Models for Cryptanalysis
Charles Bouillaguet
2022/196
Generalising Fault Attacks to Genus Two Isogeny Cryptosystems
Ariana Goh, Chu-Wee Lim, Yan Bo Ti
2022/195
Quantum and Classical Algorithms for Bounded Distance Decoding
Richard Allen, Ratip Emin Berker, Sílvia Casacuberta, Michael Gul
2022/194
Finding Collisions against 4-round SHA3-384 in Practical Time
Senyang Huang, Orna Agmon Ben-Yehuda, Orr Dunkelman, Alexander Maximov
2022/193
OptRand: Optimistically responsive distributed random beacons
Adithya Bhat, Nibesh Shrestha, Aniket Kate, Kartik Nayak
2022/192
SoftSpokenOT: Communication--Computation Tradeoffs in OT Extension
Lawrence Roy
2022/191
NanoGRAM: Garbled RAM with $\widetilde{O}(\log N)$ Overhead
Andrew Park, Wei-Kai Lin, Elaine Shi
2022/190
Short-lived zero-knowledge proofs and signatures
Arasu Arun, Joseph Bonneau, Jeremy Clark
2022/189
Simplified MITM Modeling for Permutations: New (Quantum) Attacks
André Schrottenloher, Marc Stevens
2022/188
Syndrome Decoding in the Head: Shorter Signatures from Zero-Knowledge Proofs
Thibauld Feneuil, Antoine Joux, Matthieu Rivain
2022/187
Constant-Round YOSO MPC Without Setup
Sebastian Kolby, Divya Ravi, Sophia Yakoubov
2022/186
Overflow-detectable Floating-point Fully Homomorphic Encryption
Seunghwan Lee, Dong-Joon Shin
2022/185
Statistically Sender-Private OT from LPN and Derandomization
Nir Bitansky, Sapir Freizeit
2022/184
Exploring SAT for Cryptanalysis: (Quantum) Collision Attacks against 6-Round SHA-3 (Full Version)
Jian Guo, Guozhen Liu, Ling Song, Yi Tu
2022/183
Improving Differential-Neural Cryptanalysis
Liu Zhang, Zilong Wang, and Baocang wang
2022/182
A Novel Framework for Explainable Leakage Assessment
Si Gao and Elisabeth Oswald
2022/181
Vector Commitments over Rings and Compressed $\Sigma$-Protocols
Thomas Attema, Ignacio Cascudo, Ronald Cramer, Ivan Bjerre Damgård, Daniel Escudero
2022/180
Towards Globally Optimized Hybrid Homomorphic Encryption - Featuring the Elisabeth Stream Cipher
Orel Cosseron, Clément Hoffmann, Pierrick Méaux, François-Xavier Standaert
2022/179
Locally Verifiable Signature and Key Aggregation
Rishab Goyal, Vinod Vaikuntanathan
2022/178
Lower Bound on SNARGs in the Random Oracle Model
Iftach Haitner, Daniel Nukrai, Eylon Yogev
2022/177
The Power of the Differentially Oblivious Shuffle in Distributed Privacy Mechanisms
Mingxun Zhou, Elaine Shi
2022/176
Towards Fair Multiparty Computation in Scriptless Distributed Ledger Systems
Minze Xu, Yuan Zhang, Sheng Zhong
2022/175
WeRLman: To Tackle Whale (Transactions), Go Deep (RL)
Roi Bar-Zur, Ameer Abu-Hanna, Ittay Eyal, Aviv Tamar
2022/174
How to Launch a Powerful Side-Channel Collision Attack?
Jiangshan Long, Changhai Ou, Yajun Ma, Yifan Fan, Hua Chen, Shihui Zheng
2022/173
Collision-Resistance from Multi-Collision-Resistance
Ron D. Rothblum, Prashant Nalini Vasudevan
2022/172
A remark on NIST SP 800-22 serial test
Corina-Elena Bogos, Razvan Mocanu, Emil Simion
2022/171
Practical and Improved Byzantine Reliable Broadcast and Asynchronous Verifiable Information Dispersal from Hash Functions
Nicolas Alhaddad, Sisi Duan, Mayank Varia, Haibin Zhang
2022/170
gOTzilla: Efficient Disjunctive Zero-Knowledge Proofs from MPC in the Head, with Application to Proofs of Assets in Cryptocurrencies
Foteini Baldimtsi, Panagiotis Chatzigiannis, S. Dov Gordon, Phi Hung Le, Daniel McVicker
2022/169
SP 800-22 and GM/T 0005-2012 Tests: Clearly Obsolete, Possibly Harmful
Markku-Juhani O. Saarinen
2022/168
Hardness of Approximation for Stochastic Problems via Interactive Oracle Proofs
Gal Arnon, Alessandro Chiesa, Eylon Yogev
2022/167
Verifiable Relation Sharing and Multi-Verifier Zero-Knowledge in Two Rounds: Trading NIZKs with Honest Majority
Benny Applebaum, Eliran Kachlon, Arpita Patra
2022/166
Digital Contact Tracing Solutions: Promises, Pitfalls and Challenges
Thien Duc Nguyen, Markus Miettinen, Alexandra Dmitrienko, Ahmad-Reza Sadeghi, Ivan Visconti
2022/165
PAC Learnability of iPUF Variants
Durba Chatterjee, Debdeep Mukhopadhyay, Aritra Hazra
2022/164
Shanrang: Fully Asynchronous Proactive Secret Sharing with Dynamic Committees
Yunzhou Yan, Yu Xia, Srinivas Devadas
2022/163
A High Performance Payment Processing System Designed for Central Bank Digital Currencies
James Lovejoy, Cory Fields, Madars Virza, Tyler Frederick, David Urness, Kevin Karwaski, Anders Brownworth, Neha Narula
2022/162
On the precision loss in approximate homomorphic encryption
Anamaria Costache, Benjamin R. Curtis, Erin Hales, Sean Murphy, Tabitha Ogilvie, and Rachel Player
2022/161
D-KODE: Mechanism to Generate and Maintain a Billion Keys
Easwar Vivek Mangipudi, Aniket Kate
2022/160
Random primes in arithmetic progressions
Pascal Giorgi, Bruno Grenet, Armelle Perret du Cray, Daniel S. Roche
2022/159
A Note on Blockchain Authentication Methods For Mobile Devices In Healthcare
George-Mircea Grosu, Silvia-Elena Nistor, Emil Simion
2022/158
Bitslicing Arithmetic/Boolean Masking Conversions for Fun and Profit with Application to Lattice-Based KEMs
Olivier Bronchain, Gaëtan Cassiers
2022/157
Shuffle-based Private Set Union: Faster and More Secure
Yanxue Jia, Shi-Feng Sun, Hong-Sheng Zhou, Jiajun Du, Dawu Gu
2022/156
Universal Reductions: Reductions Relative to Stateful Oracles
Benjamin Chan, Cody Freitag, Rafael Pass
2022/155
FairTraDEX: A Decentralised Exchange Preventing Value Extraction
Conor McMenamin, Vanesa Daza, Matthias Fitzi, Padraic O'Donoghue
2022/154
Coeus: A System for Oblivious Document Ranking and Retrieval
Ishtiyaque Ahmad, Laboni Sarker, Divyakant Agrawal, Amr El Abbadi, Trinabh Gupta
2022/153
Faulty isogenies: a new kind of leakage
Gora Adj, Jesús-Javier Chi-Domínguez, Víctor Mateu, Francisco Rodríguez-Henríquez
2022/152
K-XMSS and K-SPHINCS$^+$:Hash based Signatures with\\Korean Cryptography Algorithms
Minjoo Sim, Siwoo Eum, Gyeongju Song, HyeokDong Kwon, Kyungbae Jang, HyunJun Kim, HyunJi Kim, Yujin Yang, Wonwoong Kim, Wai-Kong Lee, Hwajeong Seo
2022/151
Addendum to Linear Cryptanalyses of Three AEADs with GIFT-128 as Underlying Primitives
Ling Sun, Wei Wang, Meiqin Wang
2022/150
The Generalized Montgomery Coordinate: A New Computational Tool for Isogeny-based Cryptography
Tomoki Moriya, Hiroshi Onuki, Yusuke Aikawa, Tsuyoshi Takagi
2022/149
Putting up the swiss army knife of homomorphic calculations by means of TFHE functional bootstrapping
Pierre-Emmanuel Clet, Martin Zuber, Aymen Boudguiga, Renaud Sirdey, Cédric Gouy-Pailler
2022/148
Attacks on the Firekite cipher
Thomas Johansson, Willi Meier, Vu Nguyen
2022/147
Constructing new superclasses of bent functions from known ones
Amar Bapić, Enes Pasalic, Fengrong Zhang, Samir Hodžić
2022/146
Training Differentially Private Models with Secure Multiparty Computation
Sikha Pentyala, Davis Railsback, Ricardo Maia, Rafael Dowsley, David Melanson, Anderson Nascimento, Martine De Cock
2022/145
An elementary construction of QR-UOV
Yasufumi Hashimoto
2022/144
Rainbow Differential Privacy
Ziqi Zhou, Onur Gunlu, Rafael G. L. D'Oliveira, Muriel Medard, Parastoo Sadeghi, Rafael F. Schaefer
2022/143
Composition construction of new bent functions from known dually isomorphic bent functions
Guangpu Gao, Weiguo Zhang, Yongjuan Wang
2022/142
Efficient Verifiable Partially-Decryptable Commitments from Lattices and Applications
Muhammed F. Esgin, Ron Steinfeld, Raymond K. Zhao
2022/141
Efficient Hybrid Exact/Relaxed Lattice Proofs and Applications to Rounding and VRFs
Muhammed F. Esgin, Ron Steinfeld, Dongxi Liu, and Sushmita Ruj
2022/140
On the Related-Key Attack Security of Authenticated Encryption Schemes
Sebastian Faust, Juliane Krämer, Maximilian Orlt, Patrick Struck
2022/139
Sponge-based Authenticated Encryption: Security against Quantum Attackers
Christian Janson, Patrick Struck
2022/138
Resisting Key-Extraction and Code-Compression: a Secure Implementation of the HFE Signature Scheme in the White-Box Model
Pierre Galissant, Louis Goubin
2022/137
Ten years of cube attacks
Marco Cianfriglia, Elia Onofri, Silvia Onofri, Marco Pedicini
2022/136
Twilight: A Differentially Private Payment Channel Network
Maya Dotan, Saar Tochner, Aviv Zohar, Yossi Gilad
2022/135
Do NOT Misuse the Markov Cipher Assumption - Automatic Search for Differential and Impossible Differential Characteristics in ARX Ciphers
Zheng Xu, Yongqiang Li, Lin Jiao, Mingsheng Wang, Willi Meier
2022/134
Functional Cryptanalysis: Application to reduced-round Xoodoo
Emanuele Bellini, Rusydi H. Makarim
2022/133
Faster verification of V2X BSM messages via Message Chaining
Eduardo Lopes Cominetti, Marcos Vinicius M. Silva, Marcos A. Simplicio Jr., Harsh Kupwade Patil, Jefferson E. Ricardini
2022/132
On Defeating Graph Analysis of Anonymous Transactions
Christoph Egger, Russell W. F. Lai, Viktoria Ronge, Ivy K. Y. Woo, Hoover H. F. Yin
2022/131
Light the Signal: Optimization of Signal Leakage Attacks against LWE-Based Key Exchange
Yue Qin, Ruoyu Ding, Chi Cheng, Nina Bindel, Yanbin Pan, Jintai Ding
2022/130
A LeVeL Paying Field: Cryptographic Solutions towards Social Accountability and Financial Inclusion
Gideon Samid
2022/129
TOFU - Toggle Count Analysis made simple
Michael Gruber, Georg Sigl
2022/128
Time-Memory tradeoffs for large-weight syndrome decoding in ternary codes
Pierre Karpman, Charlotte Lefevre
2022/127
CCA secure ElGamal encryption over an integer group where ICDH assumption holds
Gyu-Chol. Kim, Jae-Yong. Sin, Yong-Bok. Jong
2022/126
Storage Security in Cloud Computing: Data Auditing Protocols
Andrei-Alexandru Brebu, Mihai Iacov, Emil Simion
2022/125
Profiled Side-channel Attack on Cryptosystems based on the Binary Syndrome Decoding Problem
Brice Colombier, Vlad-Florin Drăgoi, Pierre-Louis Cayrel, Vincent Grosso
2022/124
On the Performance Gap of a Generic C Optimized Assembler and Wide Vector Extensions for Masked Software with an Ascon-{\it{p}} test case
Dor Salomon, Itamar Levi
2022/123
CryptoMaze: Privacy-Preserving Splitting of Off-Chain Payments
Subhra Mazumdar, Sushmita Ruj
2022/122
Quantum cryptography with classical communication: parallel remote state preparation for copy-protection, verification, and more
Alexandru Gheorghiu, Tony Metger, Alexander Poremba
2022/121
Crime and Punishment in Distributed Byzantine Decision Tasks (Extended Version)
Pierre Civit, Seth Gilbert, Vincent Gramoli, Rachid Guerraoui, Jovan Komatovic, Zarko Milosevic, Adi Serendinschi
2022/120
Practical Seed Recovery of Fast Cryptographic Pseudo Random Number Generators
Florette Martinez
2022/119
Hardware Implementation of SpoC-128
Ambati Sathvik, Tirunagari Rahul, Anubhab Baksi, Vikramkumar Pudi
2022/118
Streebog compression function as PRF in secret-key settings
Vitaly Kiryukhin
2022/117
AuxChannel: Enabling Efficient Bi-Directional Channel for Scriptless Blockchains
Zhimei Sui, Joseph K. Liu, Jiangshan Yu, Man Ho Au, Jia Liu
2022/116
Rocca: An Efficient AES-based Encryption Scheme for Beyond 5G (Full version)
Kosei Sakamoto, Fukang Liu, Yuto Nakano, Shinsaku Kiyomoto, Takanori Isobe
2022/115
GMHL: Generalized Multi-Hop Locks for Privacy-Preserving Payment Channel Networks
Zilin Liu, Anjia Yang, Jian Weng, Tao Li, Huang Zeng, Xiaojian Liang
2022/114
Blockchain based AI-enabled Industry 4.0 CPS Protection against Advanced Persistent Threat
Ziaur Rahman, Xun Yi, Ibrahim Khalil
2022/113
XCC: Theft-Resilient and Collateral-Optimized Cryptocurrency-Backed Assets
Theodore Bugnet, Alexei Zamyatin
2022/112
Faster Kyber and Dilithium on the Cortex-M4
Amin Abdulrahman, Vincent Hwang, Matthias J. Kannwischer, Amber Sprenkels
2022/111
Breaking Panther
Christina Boura, Rachelle Heim Boissier, Yann Rotella
2022/110
Revisiting Higher-Order Masked Comparison for Lattice-Based Cryptography: Algorithms and Bit-sliced Implementations
Jan-Pieter D'Anvers, Michiel Van Beirendonck, Ingrid Verbauwhede
2022/109
Perfectly-Secure Synchronous MPC with Asynchronous Fallback Guarantees
Ananya Appan, Anirudh Chandramouli, Ashish Choudhury
2022/108
Public Key Compression and Fast Polynomial Multiplication for NTRU using the Corrected Hybridized NTT-Karatsuba Method
Rohon Kundu, Alessandro de Piccoli, Andrea Visconti
2022/107
Payment with Dispute Resolution: A Protocol For Reimbursing Frauds' Victims
Aydin Abadi, Steven J. Murdoch
2022/106
Profiling Side-Channel Attacks on Dilithium: A Small Bit-Fiddling Leak Breaks It All
Soundes Marzougui, Vincent Ulitzsch, Mehdi Tibouchi, Jean-Pierre Seifert
2022/105
Preserving Buyer-Privacy in Decentralized Supply Chain Marketplaces
Varun Madathil, Alessandra Scafuro, Kemafor Anyanwu, Sen Qiao, Akash Pateria, Binil Starly
2022/104
Minotaur: Multi-Resource Blockchain Consensus
Matthias Fitzi, Xuechao Wang, Sreeram Kannan, Aggelos Kiayias, Nikos Leonardos, Pramod Viswanath, Gerui Wang
2022/103
E-Tenon: An Efficient Privacy-Preserving Secure Open Data Sharing Scheme for EHR System
Zhihui Lin, Prosanta Gope, Jianting Ning, Biplab Sikdar
2022/102
MPC-Friendly Commitments for Publicly Verifiable Covert Security
Nitin Agrawal, James Bell, Adrià Gascón, Matt J. Kusner
2022/101
Lattice-Based Linkable Ring Signature in the Standard Model
Mingxing Hu, Zhen Liu
2022/100
Development of Cryptography since Shannon
Funda Özdemir, Çetin Kaya Koç
2022/099
Performance of Hierarchical Transforms in Homomorphic Encryption: A case study on Logistic Regression inference
Pedro Geraldo M. R. Alves, Jheyne N. Ortiz, Diego F. Aranha
2022/098
Orienteering with one endomorphism
Sarah Arpin, Mingjie Chen, Kristin E. Lauter, Renate Scheidler, Katherine E. Stange, Ha T. N. Tran
2022/097
Lattice Signature can be as Simple as Lattice Encryption
Dingfeng Ye, Jun Xu, Guifang Huang, Lei Hu
2022/096
On Regenerating Codes and Proactive Secret Sharing: Relationships and Implications
Karim Eldefrawy, Nicholas Genise, Rutuja Kshirsagar, Moti Yung
2022/095
Spatial Encryption Revisited: From Delegatable Multiple Inner Product Encryption and More
Huy Quoc Le, Dung Hoang Duong, Willy Susilo, Josef Pieprzyk
2022/094
Timing leakage analysis of non-constant-time NTT implementations with Harvey butterflies
Nir Drucker, Tomer Pelleg
2022/093
Public-Key Encryption from Homogeneous CLWE
Andrej Bogdanov, Miguel Cueto Noval, Charlotte Hoffmann, Alon Rosen
2022/092
Rethinking Watermark: Providing Proof of IP Ownership in Modern SoCs
N. Nalla Anandakumar, M. Sazadur Rahman, Mridha Md Mashahedur Rahman, Rasheed Kibria, Upoma Das, Farimah Farahmandi, Fahim Rahman, Mark M. Tehranipoor
2022/091
The multiplicative complexity of interval checking
Thomas Häner, Mathias Soeken
2022/090
Attacks on Encrypted Range Search Schemes in Multiple Dimensions
Francesca Falzon, Evangelia Anna Markatou, Zachary Espiritu, Roberto Tamassia
2022/089
NTRU-$\nu$-um: Secure Fully Homomorphic Encryption from NTRU with Small Modulus
Kamil Kluczniak
2022/088
A survey on the security protocols employed by mobile messaging applications
Ștefania Andrieș, Andrei-Daniel Miron, Andrei Cristian, Emil Simion
2022/087
The Internet Computer for Geeks
The DFINITY Team
2022/086
PlonKup: Reconciling PlonK with plookup
Luke Pearson, Joshua Fitzgerald, Héctor Masip, Marta Bellés-Muñoz, Jose Luis Muñoz-Tapia
2022/085
Cross-Domain Identity-based Matchmaking Encryption
Axin Wu, Jian Weng, Weiqi Luo, Anjia Yang, Jia-Nan Liu, Zike Jiang
2022/084
Token meets Wallet: Formalizing Privacy and Revocation for FIDO2
Lucjan Hanzlik, Julian Loss, Benedikt Wagner
2022/083
Zef: Low-latency, Scalable, Private Payments
Mathieu Baudet, Alberto Sonnino, Mahimna Kelkar, George Danezis
2022/082
Feta: Efficient Threshold Designated-Verifier Zero-Knowledge Proofs
Carsten Baum, Robin Jadoul, Emmanuela Orsini, Peter Scholl, Nigel P. Smart
2022/081
Single-Server Private Information Retrieval with Sublinear Amortized Time
Henry Corrigan-Gibbs, Alexandra Henzinger, Dmitry Kogan
2022/080
Better Security-Efficiency Trade-Offs in Permutation-Based Two-Party Computation
Yu Long Chen, Stefano Tessaro
2022/079
Lightweight Secure Integer Comparison
Thijs Veugen
2022/078
Secure Lossy Function Computation with Multiple Private Remote Source Observations
Onur Gunlu, Matthieu Bloch, Rafael F. Schaefer
2022/077
Multiple Noisy Private Remote Source Observations for Secure Function Computation
Onur Gunlu, Matthieu Bloch, Rafael F. Schaefer
2022/076
Babylon: Reusing Bitcoin Mining to Enhance Proof-of-Stake Security
Ertem Nusret Tas, David Tse, Fisher Yu, Sreeram Kannan
2022/075
Uncovering Impact of Mental Models towards Adoption of Multi-device Crypto-Wallets
Easwar Vivek Mangipudi, Udit Desai, Mohsen Minaei, Mainack Mondal, and Aniket Kate
2022/074
FINAL: Faster FHE instantiated with NTRU and LWE
Charlotte Bonte, Ilia Iliashenko, Jeongeun Park, Hilder V. L. Pereira, Nigel P. Smart
2022/073
Forward-Secure Public Key Encryption without Key Update from Proof-of-Stake Blockchain
Seiya Nuta, Jacob C. N. Schuldt, Takashi Nishide
2022/072
Generic Construction of Public-key Authenticated Encryption with Keyword Search Revisited: Stronger Security and Efficient Construction
Keita Emura
2022/071
Encapsulated Search Index: Public-Key, Sub-linear, Distributed, and Delegatable
Erik Aronesty, David Cash, Yevgeniy Dodis, Daniel H. Gallancy, Christopher Higley, Harish Karthikeyan, Oren Tysor
2022/070
(Nondeterministic) Hardness vs. Non-Malleability
Marshall Ball, Dana Dachman-Soled, Julian Loss
2022/069
Small-Box Cryptography
Yevgeniy Dodis, Harish Karthikeyan, Daniel Wichs
2022/068
Updatable Public Key Encryption in the Standard Model
Yevgeniy Dodis, Harish Karthikeyan, Daniel Wichs
2022/067
Parallel Operations over TFHE-Encrypted Multi-Digit Integers
Jakub Klemsa, Melek Önen
2022/066
A remark on the Discrete Fourier Transform statistical test
Anghel Florin, Asandoaiei David, Tabacaru Robert
2022/065
Practical (Post-Quantum) Key Combiners from One-Wayness and Applications to TLS
Nimrod Aviram, Benjamin Dowling, Ilan Komargodski, Kenneth G. Paterson, Eyal Ronen, Eylon Yogev
2022/064
A Framework for the Design of Secure and Efficient Proofs of Retrievability
Françoise Levy-dit-Vehel, Maxime Roméas
2022/063
Non-Interactive Zero-Knowledge Proofs to Multiple Verifiers
Kang Yang, Xiao Wang
2022/062
An Introduction to Secret-Sharing-Based Secure Multiparty Computation
Daniel Escudero
2022/061
A remark on the NIST 800-22 Binary Matrix Rank Test
Nicu Neculache, Vlad-Andrei Petcu, Emil Simion
2022/060
Quantum Boomerang Attacks and Some Applications
Paul Frixons, María Naya-Plasencia, André Schrottenloher
2022/059
SPHINCS-$\alpha$: A Compact Stateless Hash-Based Signature Scheme
Kaiyi Zhang, Hongrui Cui, Yu Yu
2022/058
First-Order Masked Kyber on ARM Cortex-M4
Daniel Heinz, Matthias J. Kannwischer, Georg Land, Thomas Pöppelmann, Peter Schwabe, and Amber Sprenkels
2022/057
The Hidden Parallelepiped Is Back Again: Power Analysis Attacks on Falcon
Morgane Guerreau, Ange Martinelli, Thomas Ricosset, Mélissa Rossi
2022/056
LedgerHedger: Gas Reservation for Smart-Contract Security
Itay Tsabary, Alex Manuskin, Roi Bar-Zur, and Ittay Eyal
2022/055
Key lifting : Multi-key Fully Homomorphic Encryption in plain model without noise flooding
Xiaokang Dai, Wenyuan Wu, and Yong Feng
2022/054
SIKE Channels
Luca De Feo, Nadia El Mrabet, Aymeric Genêt, Novak Kaluđerović, Natacha Linard de Guertechin, Simon Pontié, Élise Tasso
2022/053
Brute Force Cryptanalysis
Aron Gohr
2022/052
Near-optimal Balanced Reliable Broadcast and Asynchronous Verifiable Information Dispersal
Sourav Das, Zhuolun Xiang, Ling Ren
2022/051
Titanium: A Metadata-Hiding File-Sharing System with Malicious Security
Weikeng Chen, Thang Hoang, Jorge Guajardo, Attila A. Yavuz
2022/050
High-Speed and Unified ECC Processor for Generic Weierstrass Curves over GF(p) on FPGA
Asep Muhamad Awaludin, Harashta Tatimma Larasati, Howon Kim
2022/049
Small MACs from Small Permutations
Maria Eichlseder, Ahmet Can Mert, Christian Rechberger, Markus Schofnegger
2022/048
RSA, DH, and DSA in the Wild
Nadia Heninger
2022/047
Short Pairing-Free Blind Signatures with Exponential Security
Stefano Tessaro, Chenzhi Zhu
2022/046
Membership Privacy for Asynchronous Group Messaging
Keita Emura, Kaisei Kajita, Ryo Nojima, Kazuto Ogawa, Go Ohtake
2022/045
Probing Security through Input-Output Separation and Revisited Quasilinear Masking
Dahmun Goudarzi, Thomas Prest, Matthieu Rivain, Damien Vergnaud
2022/044
Security and Privacy Analysis of Recently Proposed ECC-Based RFID Authentication Schemes
Atakan Arslan, Muhammed Ali Bingöl
2022/043
Broken Proofs of Solvency in Blockchain Custodial Wallets and Exchanges
Konstantinos Chalkias, Panagiotis Chatzigiannis, Yan Ji
2022/042
Inapplicability of Differential Fault Attacks against Cellular Automata based Lightweight Authenticated Cipher
AMBILI K N, JIMMY JOSE
2022/041
Reinforcing Lightweight Authenticated Encryption Schemes against Statistical Ineffective Fault Attack
AMBILI K N, JIMMY JOSE
2022/040
Ensuring Accountability and Outsourced Decryption in IoT Systems using Ciphertext-Policy Attribute-Based Encryption
AMBILI K N, JIMMY JOSE
2022/039
Outsourced CP-ABE with Whitebox Accountability in IoT Systems
AMBILI K N, JIMMY JOSE
2022/038
ABE Squared: Accurately Benchmarking Efficiency of Attribute-Based Encryption
Antonio de la Piedra, Marloes Venema, Greg Alpár
2022/037
Subgroup membership testing on elliptic curves via the Tate pairing
Dmitrii Koshelev
2022/036
Systematic Study of Decryption and Re-Encryption Leakage: the Case of Kyber
Melissa Azouaoui, Olivier Bronchain, Clément Hoffmann, Yulia Kuzovkova, Tobias Schneider, François-Xavier Standaert
2022/035
Time-Traveling Simulators Using Blockchains and Their Applications
Vipul Goyal, Justin Raizes, Pratik Soni
2022/034
From Privacy-Only to Simulatable OT: Black-Box, Round-Optimal, Information-theoretic
Varun Madathil, Chris Orsini, Alessandra Scafuro, Daniele Venturi
2022/033
Deletion-Compliance in the Absence of Privacy
Jonathan Godin, Philippe Lamontagne
2022/032
Formal Analysis of Non-Malleability for Commitments in EasyCrypt
Denis Firsov, Sven Laur, Ekaterina Zhuchko
2022/031
BAT: Small and Fast KEM over NTRU Lattices
Pierre-Alain Fouque, Paul Kirchner, Thomas Pornin, Yang Yu
2022/030
Improved (Related-key) Differential-based Neural Distinguishers for SIMON and SIMECK Block Ciphers
Jinyu Lu, Guoqiang Liu, Bing Sun, Chao Li, Li Liu
2022/029
CRYScanner: Finding cryptographic libraries misuse
Amit Choudhari, Sylvain Guilley, Khaled Karray
2022/028
Locality-Preserving Hashing for Shifts with Connections to Cryptography
Elette Boyle, Itai Dinur, Niv Gilboa, Yuval Ishai, Nathan Keller, Ohad Klein
2022/027
Speeding Dumbo: Pushing Asynchronous BFT Closer to Practice
Bingyong Guo, Yuan Lu, Zhenliang Lu, Qiang Tang, Jing Xu, Zhenfeng Zhang
2022/026
Preparation for Post-Quantum era: a survey about blockchain schemes from a post-quantum perspective
Andrada-Teodora Ciulei, Marian-Codrin Crețu, Emil Simion
2022/025
Boomeyong: Embedding Yoyo within Boomerang and its Applications to Key Recovery Attacks on AES and Pholkos
Mostafizar Rahman, Dhiman Saha, Goutam Paul
2022/024
Bootstrapping for Approximate Homomorphic Encryption with Negligible Failure-Probability by Using Sparse-Secret Encapsulation
Jean-Philippe Bossuat, Juan Ramón Troncoso-Pastoriza, Jean-Pierre Hubaux
2022/023
Transitional Leakage in Theory and Practice - Unveiling Security Flaws in Masked Circuits
Nicolai Müller, David Knichel, Pascal Sasdrich, Amir Moradi
2022/022
Dynamic Group Signature Scheme on Lattice with Verifier-local Revocation
Xiuju Huang, Jiashuo Song, Zichen Li
2022/021
WaterBear: Practical Asynchronous BFT Matching Security Guarantees of Partially Synchronous BFT
Haibin Zhang, Sisi Duan, Boxin Zhao, Liehuang Zhu
2022/020
PACE: Fully Parallelizable BFT from Reproposable Byzantine Agreement
Haibin Zhang, Sisi Duan
2022/019
Algebraic Meet-in-the-Middle Attack on LowMC
Fukang Liu, Santanu Sarkar, Gaoli Wang, Willi Meier, Takanori Isobe
2022/018
Pairing-based Accountable Subgroup Multi-signatures with Verifiable Group Setup
Ahmet Ramazan Ağırtaş, Oğuz Yayla
2022/017
Keyed-Fully Homomorphic Encryption without Indistinguishability Obfuscation
Shingo Sato, Keita Emura, and Atsushi Takayasu
2022/016
An algebraic attack to the Bluetooth stream cipher E0
Roberto La Scala, Sergio Polese, Sharwan K. Tiwari, Andrea Visconti
2022/015
Lattice-based Signatures with Tight Adaptive Corruptions and More
Jiaxin Pan, Benedikt Wagner
2022/014
Transformer encoder-based Crypto-Ransomware Detection for Low-Power Embedded Processors
Hyunji Kim, Sejin Lim, Yeajun Kang, Wonwoong Kim, Hwajeong Seo
2022/013
Quantum Rotational Cryptanalysis for Preimage Recovery of Round-Reduced Keccak
Runsong Wang, Xuelian Li, Juntao Gao, Hui Li, Baocang Wang
2022/012
Security of Identity-based Encryption Schemes from Quadratic Residues
Ferucio Laurentiu Tiplea, Sorin Iftene, George Teseleanu, Anca-Maria Nica
2022/011
Security Analysis of Coconut, an Attribute-Based Credential Scheme with Threshold Issuance
Alfredo Rial, Ania M. Piotrowska
2022/010
Formalizing Delayed Adaptive Corruptions and the Security of Flooding Networks
Christian Matt, Jesper Buus Nielsen, Søren Eller Thomsen
2022/009
Algebraic Reductions of Knowledge
Abhiram Kothapalli, Bryan Parno
2022/008
Beating Classical Impossibility of Position Verification
Jiahui Liu, Qipeng Liu, Luowen Qian
2022/007
PI-Cut-Choo and Friends: Compact Blind Signatures via Parallel Instance Cut-and-Choose and More
Rutchathon Chairattana-Apirom, Lucjan Hanzlik, Julian Loss, Anna Lysyanskaya, Benedikt Wagner
2022/006
Efficient Lattice-Based Blind Signatures via Gaussian One-Time Signatures
Vadim Lyubashevsky, Ngoc Khanh Nguyen, Maxime Plancon
2022/005
Pseudorandom Bit Generation with Asymmetric Numeral Systems
Josef Pieprzyk, Marcin Pawlowski, Pawel Morawiecki, Arash Mahboubi, Jarek Duda, Seyit Camtepe
2022/004
Publicly verifiable anonymous tokens with private metadata bit
Fabrice Benhamouda, Tancrède Lepoint, Michele Orrù, Mariana Raykova
2022/003
Merged with 2022/007
Rutchathon Chairattana-Apirom, Anna Lysyanskaya
2022/002
Polynomial-Time Key Recovery Attack on the Lau-Tan Cryptosystem Based on Gabidulin Codes
Wenshuo Guo, Fang-Wei Fu
2022/001
Analyzing the Provable Security Bounds of GIFT-COFB and Photon-Beetle
Akiko Inoue, Tetsu Iwata, Kazuhiko Minematsu
2021/1705
GoUncle: A Blockchain Of, By, For Modest Computers
Mao Wenbo, Wang Wenxiang
2021/1704
Verifiable Encryption from MPC-in-the-Head
Akira Takahashi and Greg Zaverucha
2021/1703
The Maiorana-McFarland structure based cryptanalysis of Simon
Hao Chen
2021/1702
CheckShake: Passively Detecting Anomaly in Wi-Fi Security Handshake using Gradient Boosting based Ensemble Learning
Anand Agrawal, Urbi Chatterjee, Rajib Ranjan Maiti
2021/1701
Cryptanalysis of the Cryptosystems Based on the Generalized Hidden Discrete Logarithm Problem
Ma Yanlong
2021/1700
A Unified Framework for Non-Universal SNARKs
Helger Lipmaa
2021/1699
A Compact Digital Signature Scheme Based on the Module-LWR problem*
Hiroki Okada, Atsushi Takayasu, Kazuhide Fukushima, Shinsaku Kiyomoto, Tsuyoshi Takagi
2021/1698
Efficient Random Beacons with Adaptive Security for Ungrindable Blockchains
Aggelos Kiayias, Cristopher Moore, Saad Quader, Alexander Russell
2021/1697
Where Star Wars Meets Star Trek: SABER and Dilithium on the Same Polynomial Multiplier
Andrea Basso, Furkan Aydin, Daniel Dinu, Joseph Friel, Avinash Varna, Manoj Sastry, Santosh Ghosh
2021/1696
Categorization of Faulty Nonce Misuse Resistant Message Authentication
Yu Long Chen, Bart Mennink, and Bart Preneel
2021/1695
Invertible Quadratic Non-Linear Layers for MPC-/FHE-/ZK-Friendly Schemes over $\mathbb F_p^n$
Lorenzo Grassi, Silvia Onofri, Marco Pedicini, Luca Sozzi
2021/1694
RLWE-based distributed key generation and threshold decryption
Ferran Alborch, Ramiro Martínez, and Paz Morillo
2021/1693
Verifiable Decryption for BGV
Tjerand Silde
2021/1692
Private Lives Matter: A Differential Private Functional Encryption Scheme (extended version)
Alexandtros Bakas, Antonis Michalas, Tassos Dimitriou
2021/1691
Quantum commitments and signatures without one-way functions
Tomoyuki Morimae, Takashi Yamakawa
2021/1690
Rotational-Linear Attack: A New Framework of Cryptanalysis on ARX ciphers with Applications to Chaskey
Yaqi Xu, Baofeng Wu, Dongdai Lin
2021/1689
Proof of a conjecture on a special class of matrices over commutative rings of characteristic 2
Baofeng Wu
2021/1688
Low-Complexity Deep Convolutional Neural Networks on Fully Homomorphic Encryption Using Multiplexed Parallel Convolutions
Eunsang Lee, Joon-Woo Lee, Junghyun Lee, Young-Sik Kim, Yongjune Kim, Jong-Seon No, Woosuk Choi
2021/1687
Computational Irrelevancy: Bridging the Gap between Pseudo- and Real Randomness in MPC Protocols
Nariyasu Heseri, Koji Nuida
2021/1686
Hecate: Abuse Reporting in Secure Messengers with Sealed Sender
Rawane Issa, Nicolas Alhaddad, Mayank Varia
2021/1685
Divide and Funnel: a Scaling Technique for Mix-Networks
Debajyoti Das, Sebastian Meiser, Esfandiar Mohammadi, and Aniket Kate
2021/1684
Cryptanalysis of Candidate Obfuscators for Affine Determinant Programs
Li Yao, Yilei Chen, Yu Yu
2021/1683
PUBA: Privacy-Preserving User-Data Bookkeeping and Analytics
Valerie Fetzer, Marcel Keller, Sven Maier, Markus Raiber, Andy Rupp, Rebecca Schwerdt
2021/1682
Making Private Function Evaluation Safer, Faster, and Simpler
Yi Liu, Qi Wang, Siu-Ming Yiu
2021/1681
On the security of OSIDH
Pierrick Dartois, Luca De Feo
2021/1680
Improved Constructions of Anonymous Credentials From Structure-Preserving Signatures on Equivalence Classes
Aisling Connolly, Pascal Lafourcade, Octavio Perez Kempner
2021/1679
Incompressible Cryptography
Jiaxin Guan, Daniel Wichs, Mark Zhandry
2021/1678
Zero-Knowledge for Homomorphic Key-Value Commitments with Applications to Privacy-Preserving Ledgers
Matteo Campanelli, Felix Engelmann, Claudio Orlandi
2021/1677
Improving Support-Minors rank attacks: applications to G$e$MSS and Rainbow
John Baena, Pierre Briaud, Daniel Cabarcas, Ray Perlner, Daniel Smith-Tone, Javier Verbel
2021/1676
Cryptographic Symmetric Structures Based on Quasigroups
George Teseleanu
2021/1675
Traceable PRFs: Full Collusion Resistance and Active Security
Sarasij Maitra, David J. Wu
2021/1674
Efficient and Post-Quantum Zero-Knowledge Proofs for Blockchain Confidential Transaction Protocols
Shang GAO, Tianyu ZHENG, Yu GUO, Bin XIAO
2021/1673
Proving as Fast as Computing: Succinct Arguments with Constant Prover Overhead
Noga Ron-Zewi, Ron D. Rothblum
2021/1672
Succinct Zero-Knowledge Batch Proofs for Set Accumulators
Matteo Campanelli, Dario Fiore, Semin Han, Jihye Kim, Dimitris Kolonelos, Hyunok Oh
2021/1671
IronMask: Versatile Verification of Masking Security
Sonia Belaïd, Darius Mercadier, Matthieu Rivain, Abdul Rahman Taleb
2021/1670
The complexity of solving Weil restriction systems
Alessio Caminata, Michela Ceria, Elisa Gorla
2021/1669
Multi-Issuer Anonymous Credentials Without a Root Authority
Kaoutar Elkhiyaoui, Angelo De Caro, Elli Androulaki
2021/1668
Secure Publish-Process-Subscribe System for Dispersed Computing
Weizhao Jin, Bhaskar Krishnamachari, Muhammad Naveed, Srivatsan Ravi, Eduard Sanou, Kwame-Lante Wright
2021/1667
Using data compression and randomization to build an unconditionally secure short key cipher
Boris Ryabko
2021/1666
Approximate Distance-Comparison-Preserving Symmetric Encryption
Georg Fuchsbauer, Riddhi Ghosal, Nathan Hauke, Adam O'Neill
2021/1665
Leakage-Resilient IBE/ABE with Optimal Leakage Rates from Lattices
Qiqi Lai, Feng-Hao Liu, Zhedong Wang
2021/1664
Towards a Simpler Lattice Gadget Toolkit
Shiduo Zhang, Yang Yu
2021/1663
Cryptography from Pseudorandom Quantum States
Prabhanjan Ananth, Luowen Qian, Henry Yuen
2021/1662
Information Security in the Quantum Era. Threats to modern cryptography: Grover’s algorithm
Mihai-Zicu Mina, Emil Simion
2021/1661
Waldo: A Private Time-Series Database from Function Secret Sharing
Emma Dauterman, Mayank Rathee, Raluca Ada Popa, Ion Stoica
2021/1660
Identity-Based Matchmaking Encryption without Random Oracles
Danilo Francati, Alessio Guidi, Luigi Russo, Daniele Venturi
2021/1659
XTR and Tori
Martijn Stam
2021/1658
Identifiable Cheating Entity Flexible Round-Optimized Schnorr Threshold (ICE FROST) Signature Protocol
Alonso González, Hamy Ratoanina, Robin Salen, Setareh Sharifian, Vladimir Soukharev
2021/1657
SoK: Blockchain Light Clients
Panagiotis Chatzigiannis, Foteini Baldimtsi, Konstantinos Chalkias
2021/1656
Efficient Set Membership Proofs using MPC-in-the-Head
Aarushi Goel, Matthew Green, Mathias Hall-Andersen, Gabriel Kaptchuk
2021/1655
Grover on Present: Quantum Resource Estimation
Mostafizar Rahman, Goutam Paul
2021/1654
Quantifiable Assurance: From IPs to Platforms
Bulbul Ahmed, Md Kawser Bepary, Nitin Pundir, Mike Borza, Oleg Raikhman, Amit Garg, Dale Donchin, Adam Cron, Mohamed A Abdel-moneum, Farimah Farahmandi, Fahim Rahman, Mark Tehranipoor
2021/1653
A Note on Non-Interactive Key Exchange from Code Equivalence
Lindsey Knowles, Edoardo Persichetti, Tovohery Randrianarisoa, Paolo Santini
2021/1652
Financially Backed Covert Security
Sebastian Faust, Carmit Hazay, David Kretzler, Benjamin Schlosser
2021/1651
A compiler for multi-key homomorphic signatures for Turing machines
Somayeh Dolatnezhad Samarin, Dario Fiore, Daniele Venturi, Morteza Amini
2021/1650
“They’re not that hard to mitigate”: What Cryptographic Library Developers Think About Timing Attacks
Jan Jancar, Marcel Fourné, Daniel De Almeida Braga, Mohamed Sabt, Peter Schwabe, Gilles Barthe, Pierre-Alain Fouque, Yasemin Acar
2021/1649
A New Security Notion for PKC in the Standard Model: Weaker, Simpler, and Still Realizing Secure Channels
Wasilij Beskorovajnov, Roland Gröll, Jörn Müller-Quade, Astrid Ottenhues, Rebecca Schwerdt
2021/1648
A Scalable SIMD RISC-V based Processor with Customized Vector Extensions for CRYSTALS-Kyber
Huimin Li, Nele Mentens, Stjepan Picek
2021/1647
Privacy-Preserving Authenticated Key Exchange for Constrained Devices
Loïc Ferreira
2021/1646
A Method for Securely Comparing Integers using Binary Trees
Anselme Tueno, Jonas Janneck
2021/1645
Sequential Indifferentiability of Confusion-Diffusion Networks
Qi Da, Shanjie Xu, Chun Guo
2021/1644
Pushing the Limits: Searching for Implementations with the Smallest Area for Lightweight S-Boxes
Zhenyu Lu, Weijia Wang, Kai Hu, Yanhong Fan, Lixuan Wu, Meiqin Wang
2021/1643
STROBE: Stake-based Threshold Random Beacons
Donald Beaver, Konstantinos Chalkias, Mahimna Kelkar, Lefteris Kokoris Kogias, Kevin Lewi, Ladi de Naurois, Valeria Nicolaenko, Arnab Roy, Alberto Sonnino
2021/1642
SecNDP: Secure Near-Data Processing with Untrusted Memory
Wenjie Xiong, Liu Ke, Dimitrije Jankov, Michael Kounavis, Xiaochen Wang, Eric Northup, Jie Amy Yang, Bilge Acun, Carole-Jean Wu, Ping Tak Peter Tang, G. Edward Suh, Xuan Zhang, Hsien-Hsin S. Lee.
2021/1641
Differential Cryptanalysis of WARP
Je Sen Teh, Alex Biryukov
2021/1640
New Differential Cryptanalysis Results for the Lightweight Block Cipher BORON
Je Sen Teh, Li Jing Tham, Norziana Jamil, Wun-She Yap
2021/1639
A Simple Deterministic Algorithm for Systems of Quadratic Polynomials over $\mathbb{F}_2$
Charles Bouillaguet, Claire Delaplace, Monika Trimoska
2021/1638
00
Nguyen Thoi Minh Quan
2021/1637
Internet Security and Quantum Computing
Hilarie Orman
2021/1636
Does Fully Homomorphic Encryption Need Compute Acceleration?
Leo de Castro, Rashmi Agrawal, Rabia Yazicigil, Anantha Chandrakasan, Vinod Vaikuntanathan, Chiraag Juvekar, Ajay Joshi
2021/1635
Synchronous Distributed Key Generation without Broadcasts
Nibesh Shrestha, Adithya Bhat, Aniket Kate, and Kartik Nayak
2021/1634
McEliece needs a Break -- Solving McEliece-1284 and Quasi-Cyclic-2918 with Modern ISD
Andre Esser, Alexander May, Floyd Zweydinger
2021/1633
Zero Knowledge Proofs towards Verifiable Decentralized AI Pipelines
Nitin Singh, Pankaj Dayama, Vinayaka Pandit
2021/1632
Cryptanalysis of RSA Variants with Primes Sharing Most Significant Bits
Meryem Cherkaoui-Semmouni, Abderrahmane Nitaj, Willy Susilo, Joseph Tonien
2021/1631
Secure Sampling of Constant-Weight Words – Application to BIKE
Nicolas Sendrier
2021/1630
Exponential Increment of RSA Attack Range via Lattice Based Cryptanalysis
Abderahmanne Nitaj, Muhammad Rezal Kamel Ariffin, Nurul Nur Hanisah Adenan, Domenica Stefania Merenda, Ali Ahmadian
2021/1629
Increment of Insecure RSA Private Exponent Bound Through Perfect Square RSA Diophantine Parameters Cryptanalysis
Wan Nur Aqlili Ruzai, Abderrahmane Nitaj, Muhammad Rezal Kamel Ariffin, Zahari Mahad, Muhammad Asyraf Asbullah
2021/1628
SoK: Mitigation of Front-running in Decentralized Finance
Carsten Baum, James Hsin-yu Chiang, Bernardo David, Tore Kasper Frederiksen, Lorenzo Gentile
2021/1627
A PKI-based Framework for Establishing Efficient MPC Channels
Daniel Masny, Gaven Watson
2021/1626
A Successful Subfield Lattice Attack on a Fully Homomorphic Encryption Scheme
Martha Norberg Hovd
2021/1625
A note on the QFT randomness spectral test a new approach of DST
Emil SIMION, Elena-Corina CIPU, Vasile-Laurențiu DOSAN, Andrei-Voicu TOMUȚ, Eugen Neacsu
2021/1624
On the IND-CCA1 Security of FHE Schemes
Prastudy Fauzi, Martha Norberg Hovd, Håvard Raddum
2021/1623
On the Short Principal Ideal Problem over some real Kummer fields
Andrea Lesavourey, Thomas Plantard, Willy Susilo
2021/1622
Roulette: A Diverse Family of Feasible Fault Attacks on Masked Kyber
Jeroen Delvaux
2021/1621
Alpha-Rays: Key Extraction Attacks on Threshold ECDSA Implementations
Dmytro Tymokhanov, Omer Shlomovits
2021/1620
Unicity distance of the Zodiac-340 cipher
Joachim von zur Gathen
2021/1619
Code-Based Non-Interactive Key Exchange Can Be Made
Zhuoran Zhang, Fangguo Zhang
2021/1618
Succinct Publicly-Certifiable Proofs (or: Can a Blockchain Verify a Designated-Verifier Proof?)
Matteo Campanelli, Hamidreza Khoshakhlagh
2021/1617
Richelot Isogenies, Pairings on Squared Kummer Surfaces and Applications
Chao Chen, Fangguo Zhang
2021/1616
A Note on the Post-Quantum Security of (Ring) Signatures
Rohit Chatterjee, Kai-Min Chung, Xiao Liang, Giulio Malavolta
2021/1615
High-order Polynomial Comparison and Masking Lattice-based Encryption
Jean-Sébastien Coron, François Gérard, Simon Montoya, Rina Zeitoun
2021/1614
PEPFL: A Framework for a Practical and Efficient Privacy-Preserving Federated Learning
Yange Chen, Baocang Wang, Hang Jiang, Pu Duan, Benyu Zhang, Chengdong Liu, Zhiyong Hong, Yupu Hua
2021/1613
Privacy-preserving Federated Learning with Lightweight and Heterogeneity in IoT
Yange Chen, Baocang Wang, Rongxing Lu, Xu An Wang
2021/1612
Universal Atomic Swaps: Secure Exchange of Coins Across All Blockchains
Sri AravindaKrishnan Thyagarajan, Giulio Malavolta, Pedro Moreno-Sánchez
2021/1611
Solving degree, last fall degree, and related invariants
Alessio Caminata, Elisa Gorla
2021/1610
Factoring Primes to Factor Moduli: Backdooring and Distributed Generation of Semiprimes
Giuseppe Vitto
2021/1609
Polynomial XL: A Variant of the XL Algorithm Using Macaulay Matrices over Polynomial Rings
Hiroki Furue and Momonari Kudo
2021/1608
An Optimized Quantum Implementation of ISD on Scalable Quantum Resources
Andre Esser, Sergi Ramos-Calderer, Emanuele Bellini, José I. Latorre, Marc Manzano
2021/1607
Efficient and Extensive Search Linear Approximations with High for Precise Correlations of Full SNOW-V
ZhaoCun Zhou, DengGuo Feng, Bin Zhang
2021/1606
An Enhanced Long-term Blockchain Scheme Against Compromise of Cryptography
Long Meng, Liqun Chen
2021/1605
Inflation-Tracking Proof-of-Work Crypto-Currencies
Charanjit S. Jutla
2021/1604
The most efficient indifferentiable hashing to elliptic curves of $j$-invariant $1728$
Dmitrii Koshelev
2021/1603
CHEX-MIX: Combining Homomorphic Encryption with Trusted Execution Environments for Two-party Oblivious Inference in the Cloud
Deepika Natarajan, Andrew Loveless, Wei Dai, Ronald Dreslinski
2021/1602
A Note on P/poly Validity of GVW15 Predicate Encryption Scheme
Yupu Hu, Siyue Dong, Baocang Wang, Jun Liu
2021/1601
Post-Quantum Security of the Even-Mansour Cipher
Gorjan Alagic, Chen Bai, Jonathan Katz, Christian Majenz
2021/1600
A New Isogeny Representation and Applications to Cryptography
Antonin Leroux
2021/1599
How to prove any NP statement jointly? Efficient Distributed-prover Zero-Knowledge Protocols
Pankaj Dayama, Arpita Patra, Protik Paul, Nitin Singh, Dhinakaran Vinayagamurthy
2021/1598
Modelling IBE-based Key Exchange Protocol using Tamarin Prover
Srijanee Mookherji, Vanga Odelu, Rajendra Prasath
2021/1597
Cryptographic Analysis of the Bluetooth Secure Connection Protocol Suite
Marc Fischlin and Olga Sanina
2021/1596
SHealS and HealS: isogeny-based PKEs from akey validation method for SIDH
Tako Boris Fouotsa, Christophe Petit
2021/1595
A formula for disaster: a unified approach to elliptic curve special-point-based attacks
Vladimir Sedlacek, Jesús-Javier Chi-Domínguez, Jan Jancar, Billy Bob Brumley
2021/1594
On the Bottleneck Complexity of MPC with Correlated Randomness
Claudio Orlandi, Divya Ravi, Peter Scholl
2021/1593
Interpreting and Mitigating Leakage-abuse Attacks in Searchable Symmetric Encryption
Lei Xu, Huayi Duan, Anxin Zhou, Xingliang Yuan, Cong Wang
2021/1592
The Need for Speed: A Fast Guessing Entropy Calculation for Deep Learning-based SCA
Guilherme Perin, Lichao Wu, Stjepan Picek
2021/1591
Practical Asynchronous Distributed Key Generation
Sourav Das, Thomas Yurek, Zhuolun Xiang, Andrew Miller, Lefteris Kokoris-Kogias, Ling Ren
2021/1590
Garbling, Stacked and Staggered: Faster k-out-of-n Garbled Function Evaluation
David Heath, Vladimir Kolesnikov, Stanislav Peceny
2021/1589
SoK: Validating Bridges as a Scaling Solution for Blockchains
Patrick McCorry, Chris Buckland, Bennet Yee, Dawn Song
2021/1588
IRShield: A Countermeasure Against Adversarial Physical-Layer Wireless Sensing
Paul Staat, Simon Mulzer, Stefan Roth, Veelasha Moonsamy, Aydin Sezgin, Christof Paar
2021/1587
Low-Bandwidth Threshold ECDSA via Pseudorandom Correlation Generators
Damiano Abram, Ariel Nof, Claudio Orlandi, Peter Scholl, Omer Shlomovits
2021/1586
Cryptanalysis of a Type of White-Box Implementations of the SM4 Block Cipher
Jiqiang Lu, Jingyu Li
2021/1585
Searchable Encryption for Conjunctive Queries with Extended Forward and Backward Privacy
Cong Zuo, Shangqi Lai, Xingliang Yuan, Joseph K. Liu, Jun Shao, Huaxiong Wang
2021/1584
ppSAT: Towards Two-Party Private SAT Solving
Ning Luo, Samuel Judson, Timos Antonopoulos, Ruzica Piskac, Xiao Wang
2021/1583
Orientations and the supersingular endomorphism ring problem
Benjamin Wesolowski
2021/1582
CoTree: Push the Limits of Conquerable Space in Collision-Optimized Side-Channel Attacks
Changhai Ou, Debiao He, Zhu Wang, Kexin Qiao, Shihui Zheng, Siew-Kei Lam
2021/1581
Anonymous Authenticated Communication
Fabio Banfi, Ueli Maurer
2021/1580
High Order Side-Channel Security for Elliptic-Curve Implementations
Sonia Belaïd, Matthieu Rivain
2021/1579
Le Mans: Dynamic and Fluid MPC for Dishonest Majority
Rahul Rachuri, Peter Scholl
2021/1578
On Quantum Query Complexities of Collision-Finding in Non-Uniform Random Functions
Tianci Peng, Shujiao Cao, Rui Xue
2021/1577
SNARKBlock: Federated Anonymous Blocklisting from Hidden Common Input Aggregate Proofs
Michael Rosenberg, Mary Maller, Ian Miers
2021/1576
Shared Permutation for Syndrome Decoding: New Zero-Knowledge Protocol and Code-Based Signature
Thibauld Feneuil, Antoine Joux, Matthieu Rivain
2021/1575
Shorter Lattice-Based Group Signatures via ``Almost Free'' Encryption and Other Optimizations
Vadim Lyubashevsky, Ngoc Khanh Nguyen, Maxime Plancon, Gregor Seiler
2021/1574
Ascon PRF, MAC, and Short-Input MAC
Christoph Dobraunig, Maria Eichlseder, Florian Mendel, and Martin Schläffer
2021/1573
Improved Security Bound of \textsf{(E/D)WCDM}
Nilanjan Datta, Avijit Dutta, Kushankur Dutta
2021/1572
Integral Attacks on Pyjamask-96 and Round-Reduced Pyjamask-128 (Full version)
Jiamin Cui, Kai Hu, Qingju Wang, Meiqin Wang
2021/1571
Tight Security for Key-Alternating Ciphers with Correlated Sub-Keys
Stefano Tessaro, Xihu Zhang
2021/1570
Multicast Key Agreement, Revisited
Alexander Bienstock, Yevgeniy Dodis, Yi Tang
2021/1569
ABBY: Automating leakage modeling for side-channels analysis
Omid Bazangani, Alexandre Iooss, Ileana Buhan, Lejla Batina
2021/1568
Impeccable Circuits III
Shahram Rasoolzadeh, Aein Rezaei Shahmirzadi, Amir Moradi
2021/1567
Structural and Statistical Analysis of Multidimensional Linear Approximations of Random Functions and Permutations
Tomer Ashur, Mohsin Khan, Kaisa Nyberg
2021/1566
Towards Using Blockchain Technology to Prevent Diploma Fraud
Qiang Tang
2021/1565
Practical, Round-Optimal Lattice-Based Blind Signatures
Shweta Agrawal, Elena Kirshanova, Damien Stehle, Anshu Yadav
2021/1564
Communication-Efficient Proactive MPC for Dynamic Groups with Dishonest Majorities
Karim Eldefrawy, Tancrède Lepoint, Antonin Leroux
2021/1563
Towards Post-Quantum Security for Cyber-Physical Systems: Integrating PQC into Industrial M2M Communication
Sebastian Paul, Patrik Scheible, Friedrich Wiemer
2021/1562
Concurrently Composable Non-Interactive Secure Computation
Andrew Morgan, Rafael Pass
2021/1561
Quantum Time/Memory/Data Tradeoff Attacks
Orr Dunkelman, Nathan Keller, Eyal Ronen, Adi Shamir
2021/1560
SAND: an AND-RX Feistel lightweight block cipher supporting S-box-based security evaluations
Shiyao Chen, Yanhong Fan, Ling Sun, Yong Fu, Haibo Zhou, Yongqing Li, Meiqin Wang, Weijia Wang, Chun Guo
2021/1559
Facial Template Protection via Lattice-based Fuzzy Extractors
Kaiyi Zhang, Hongrui Cui, Yu Yu
2021/1558
RSA Key Recovery from Digit Equivalence Information
Chitchanok Chuengsatiansup, Andrew Feutrill, Rui Qi Sim, Yuval Yarom
2021/1557
Performance bounds for QC-MDPC codes decoders
Marco Baldi, Alessandro Barenghi, Franco Chiaraluce, Gerardo Pelosi, Paolo Santini
2021/1556
Diving Deep into the Weak Keys of Round Reduced Ascon
Raghvendra Rohit, Santanu Sarkar
2021/1555
Accelerator for Computing on Encrypted Data
Sujoy Sinha Roy, Ahmet Can Mert, Aikata, Sunmin Kwon, Youngsam Shin, Donghoon Yoo
2021/1554
How to Claim a Computational Feat
Clémence Chevignard, Rémi Géraud-Stewart, Antoine Houssais, David Naccache, Edmond de Roffignac
2021/1553
Performance Evaluation of Post-Quantum TLS 1.3 on Resource-Constrained Embedded Systems
George Tasopoulos, Jinhui Li, Apostolos P. Fournaris, Raymond K. Zhao, Amin Sakzad, Ron Steinfeld
2021/1552
Time-memory Trade-offs for Saber+ on Memory-constrained RISC-V
Jipeng Zhang, Junhao Huang, Zhe Liu, Sujoy Sinha Roy
2021/1551
Blockchain for IoT: A Critical Analysis Concerning Performance and Scalability
Ziaur Rahman, Xun Yi, Ibrahim Khalil, Andrei Kelarev
2021/1550
Chaos and Logistic Map based Key Generation Technique for AES-driven IoT Security
Ziaur Rahman, Ibrahim Khalil, Mousumi Sumi
2021/1549
Kicking-the-Bucket: Fast Privacy-Preserving Trading Using Buckets
Mariana Botelho da Gama, John Cartlidge, Antigoni Polychroniadou, Nigel P. Smart, Younes Talibi Alaoui
2021/1548
Just how hard are rotations of $\mathbb{Z}^n$? Algorithms and cryptography with the simplest lattice
Huck Bennett, Atul Ganju, Pura Peetathawatchai, Noah Stephens-Davidowitz
2021/1547
SoK: Plausibly Deniable Storage
Chen Chen, Xiao Liang, Bogdan Carbunar, Radu Sion
2021/1546
Improving Deep Learning Networks for Profiled Side-Channel Analysis Using Performance Improvement Techniques
Damien Robissout, Lilian Bossuet, Amaury Habrard, Vincent Grosso
2021/1545
Longest Chain Consensus Under Bandwidth Constraint
Joachim Neu, Srivatsan Sridhar, Lei Yang, David Tse, Mohammad Alizadeh
2021/1544
Information Dispersal with Provable Retrievability for Rollups
Kamilla Nazirkhanova, Joachim Neu, David Tse
2021/1543
Post-Quantum Zero Knowledge, Revisited (or: How to do Quantum Rewinding Undetectably)
Alex Lombardi, Fermi Ma, Nicholas Spooner
2021/1542
An End-to-End Bitstream Tamper Attack Against Flip-Chip FPGAs
Fahim Rahman, Farimah Farahmandi, Mark Tehranipoor
2021/1541
Revisiting the Security of COMET Authenticated Encryption Scheme
Shay Gueron, Ashwin Jha, Mridul Nandi
2021/1540
Lightweight Swarm Authentication
George Teseleanu
2021/1539
Route Discovery in Private Payment Channel Networks
Zeta Avarikioti, Mahsa Bastankhah, Mohammad Ali Maddah-Ali, Krzysztof Pietrzak, Jakub Svoboda, and Michelle Yeo
2021/1538
SIMC: ML Inference Secure Against Malicious Clients at Semi-Honest Cost
Nishanth Chandran, Divya Gupta, Sai Lakshmi Bhavana Obbattu, Akash Shah
2021/1537
PNB-focused Differential Cryptanalysis of ChaCha Stream Cipher
Shotaro Miyashita, Ryoma Ito, and Atsuko Miyaji
2021/1536
SoK: Tokenization on Blockchain
Gang Wang, Mark Nixon
2021/1535
Light-OCB: Parallel Lightweight Authenticated Cipher with Full Security
Avik Chakraborti, Nilanjan Datta, Ashwin Jha, Cuauhtemoc Manicillas Lopez, Mridul Nandi
2021/1534
An Optimized GHV-Type HE Scheme: Simpler, Faster, and More Versatile
Liang Zhao, Ze Chen, Liqun Chen, Xinyi Huang
2021/1533
The Legendre Symbol and the Modulo-2 Operator in Symmetric Schemes over (F_p)^n
Lorenzo Grassi, Dmitry Khovratovich, Sondre Rønjom, Markus Schofnegger
2021/1532
On the Download Rate of Homomorphic Secret Sharing
Ingerid Fosli, Yuval Ishai, Victor I. Kolobov, Mary Wootters
2021/1531
Squint Hard Enough: Evaluating Perceptual Hashing with Machine Learning
Jonathan Prokos, Tushar M. Jois, Neil Fendley, Roei Schuster, Matthew Green, Eran Tromer, Yinzhi Cao
2021/1530
Experimenting with Collaborative zk-SNARKs: Zero-Knowledge Proofs for Distributed Secrets
Alex Ozdemir, Dan Boneh
2021/1529
Autoguess: A Tool for Finding Guess-and-Determine Attacks and Key Bridges
Hosein Hadipour and Maria Eichlseder
2021/1528
An Alternative Approach for Computing Discrete Logarithms in Compressed SIDH
Kaizhan Lin, Weize Wang, Lin Wang, Chang-An Zhao
2021/1527
CoHA-NTT: A Configurable Hardware Accelerator for NTT-based Polynomial Multiplication
Kemal Derya, Ahmet Can Mert, Erdinç Öztürk, Erkay Savaş
2021/1526
A Performance Evaluation of Pairing-Based Broadcast Encryption Systems
Arush Chhatrapati, Susan Hohenberger, James Trombo, Satyanarayana Vusirikala
2021/1525
Amortizing Rate-1 OT and Applications to PIR and PSI
Melissa Chase, Sanjam Garg, Mohammad Hajiabadi, Jialin Li, Peihan Miao
2021/1524
An Improved Range Proof with Base-3 Construction
Esra Günsay, Cansu Betin Onur, Murat Cenk
2021/1523
Perfect Trees: Designing Energy-Optimal Symmetric Encryption Primitives
Andrea Caforio, Subhadeep Banik, Yosuke Todo, Willi Meier, Takanori Isobe, Fukang Liu, Bin Zhang
2021/1522
On Cryptocurrency Wallet Design
Ittay Eyal
2021/1521
Security evaluation against side-channel analysis at compilation time
Nicolas Bruneau, Charles Christen, Jean-Luc Danger, Adrien Facon, Sylvain Guilley
2021/1520
Ark of the ECC: An open-source ECDSA power analysis attack on a FPGA based Curve P-256 implementation
Jean-Pierre Thibault, Colin O’Flynn, Alex Dewar
2021/1519
Practical Garbled RAM: GRAM with $O(\log^2 n)$ Overhead
David Heath, Vladimir Kolesnikov, Rafail Ostrovsky
2021/1518
Revisiting Mutual Information Analysis: Multidimensionality, Neural Estimation and Optimality Proofs
Valence Cristiani, Maxime Lecomte, Philippe Maurine
2021/1517
HOLMES: Efficient Distribution Testing for Secure Collaborative Learning
Ian Chang, Katerina Sotiraki, Weikeng Chen, Murat Kantarcioglu, Raluca Ada Popa
2021/1516
Post-Quantum Simulatable Extraction with Minimal Assumptions: Black-Box and Constant-Round
Nai-Hui Chia, Kai-Min Chung, Xiao Liang, and Takashi Yamakawa
2021/1515
Blockchain-based Security Framework for Critical Industry 4.0 Cyber-physical System
Ziaur Rahman, Ibrahim Khalil, Xun Yi, Mohammed Atiquzzaman
2021/1514
Clarion: Anonymous Communication from Multiparty Shuffling Protocols
Saba Eskandarian, Dan Boneh
2021/1513
InterTrust: Towards an Efficient Blockchain Interoperability Architecture with Trusted Services
Gang Wang, Mark Nixon
2021/1512
BLOCK CIPHER DEFINED BY MATRIX PRESENTATION OF QUASIGROUPS
Smile Markovski, Vesna Dimitrova, Zlatka Trajcheska, Marija Petkovska, Mile Kostadinoski, Damjan Buhov
2021/1511
Compressed SIKE Round 3 on ARM Cortex-M4
Mila Anastasova, Mojtaba Bisheh-Niasar, Reza Azarderakhsh, Mehran Mozaffari Kermani
2021/1510
Pattern Devoid Cryptography
Gideon Samid
2021/1509
More Lessons: Analysis of PUF-based Authentication Protocols for IoT
Karim Lounis, Mohammad Zulkernine
2021/1508
High-Speed Hardware Architectures and FPGA Benchmarking of CRYSTALS-Kyber, NTRU, and Saber
Viet Ba Dang, Kamyar Mohajerani, Kris Gaj
2021/1507
Parallel Quantum Addition for Korean Block Cipher
Kyungbae Jang, Gyeongju Song, Hyunjun Kim, Hyeokdong Kwon, Hyunji Kim, Hwajeong Seo
2021/1506
z-OTS: a one-time hash-based digital signaturescheme with fast verification
Amos Zheng, Marcos A. Simplicio Jr.
2021/1505
EVA Improved: Compiler and Extension Library for CKKS
Sangeeta Chowdhary, Wei Dai, Kim Laine, Olli Saarikivi
2021/1504
CCA SecureA Posteriori Openable Encryption in the Standard Model
Xavier Bultel
2021/1503
Interaction-Preserving Compilers for Secure Computation
Nico Döttling, Vipul Goyal, Giulio Malavolta, Justin Raizes
2021/1502
Strong and Tight Security Guarantees against Integral Distinguishers
Phil Hebborn, Baptiste Lambin, Gregor Leander, Yosuke Todo
2021/1501
Relations between Privacy, Verifiability, Accountability and Coercion-Resistance in Voting Protocols
Alisa Pankova, Jan Willemson
2021/1500
Succinct Erasure Coding Proof Systems
Nicolas Alhaddad, Sisi Duan, Mayank Varia, Haibin Zhang
2021/1499
Improved Lattice-Based Mix-Nets for Electronic Voting
Valeh Farzaliyev, Jan Willemson, Jaan Kristjan Kaasik
2021/1498
Rectangular, Range, and Restricted AONTs: Three Generalizations of All-or-Nothing Transforms
Navid Nasr Esfahani, Douglas Stinson
2021/1497
GMMT: A Revocable Group Merkle Multi-Tree Signature Scheme
Mahmoud Yehia, Riham AlTawy, T. Aaron Gulliver
2021/1496
Security Analysis Of DGM and GM Group Signature Schemes Instantiated With XMSS-T
Mahmoud Yehia, Riham AlTawy, T. Aaron Gulliver
2021/1495
Veri
Mahmoud Yehia, Riham AlTawy, T. Aaron Gulliver
2021/1494
On the efficiency of a general attack against the MOBS cryptosystem
Christopher Battarbee, Delaram Kahrobaei, Dylan Tailor, Siamak F. Shahandashti
2021/1493
VASA: Vector AES Instructions for Security Applications
Jean-Pierre Münch, Thomas Schneider, Hossein Yalame
2021/1492
SoK: Password-Authenticated Key Exchange -- Theory, Practice, Standardization and Real-World Lessons
Feng Hao, Paul C. van Oorschot
2021/1491
The Hidden Lattice Problem
Luca Notarnicola, Gabor Wiese
2021/1490
Precio: Private Aggregate Measurement via Oblivious Shuffling
F. Betül Durak, Chenkai Weng, Erik Anderson, Kim Laine, and Melissa Chase
2021/1489
Estimating the Effectiveness of Lattice Attacks
Kotaro Abe, Makoto Ikeda
2021/1488
Accelerating the Delfs-Galbraith algorithm with fast subfield root detection
Maria Corte-Real Santos, Craig Costello, Jia Shi
2021/1487
A Cryptographic View of Deep-Attestation, or how to do Provably-Secure Layer-Linking
Ghada Arfaoui, Pierre-Alain Fouque, Thibaut Jacques, Pascal Lafourcade, Adina Nedelcu, Cristina Onete, Léo Robert
2021/1486
Mitaka: a simpler, parallelizable, maskable variant of Falcon
Thomas Espitau, Pierre-Alain Fouque, François Gérard, Mélissa Rossi, Akira Takahashi, Mehdi Tibouchi, Alexandre Wallet, Yang Yu
2021/1485
Don't Reject This: Key-Recovery Timing Attacks Due to Rejection-Sampling in HQC and BIKE
Qian Guo, Clemens Hlauschek, Thomas Johansson, Norman Lahr, Alexander Nilsson, Robin Leander Schröder
2021/1484
On Forging SPHINCS+-Haraka Signatures on a Fault-tolerant Quantum Computer
Robin M. Berger, Marcel Tiepelt
2021/1483
A Practical Forward-Secure DualRing
Nan Li, Yingjiu Li, Atsuko Miyaji, Yangguang Tian, Tsz Hon Yuen
2021/1482
The Optimal Error Resilience of Interactive Communication Over Binary Channels
Meghal Gupta, Rachel Yun Zhang
2021/1481
Interactive Error Correcting Codes Over Binary Erasure Channels Resilient to $>\frac12$ Adversarial Corruption
Meghal Gupta, Yael Tauman Kalai, Rachel Zhang
2021/1480
Extractors: Low Entropy Requirements Colliding With Non-Malleability
Divesh Aggarwal, Eldon Chung, Maciej Obremski
2021/1479
Reducing the Cost of Machine Learning Differential Attacks Using Bit Selection and aPartial ML-Distinguisher
Amirhossein Ebrahimi, Francesco Regazzoni, Paolo Palmieri
2021/1478
Zarcanum: A Proof-of-Stake Scheme for Confidential Transactions with Hidden Amounts
sowle, koe
2021/1477
Multisignature with double threshold condition in the blockchain and its application to and strong keys generating
Ruslan Skuratovskii, Alexandr Kalenyk
2021/1476
Multivariate public key cryptography with polynomial composition
Emile Hautefeuille
2021/1475
Circuit-based PSI for Covid-19 Risk Scoring
Leonie Reichert, Marcel Pazelt, Björn Scheuermann
2021/1474
Foundations of Transaction Fee Mechanism Design
Hao Chung, Elaine Shi
2021/1473
Computational self-testing for entangled magic states
Akihiro Mizutani, Yuki Takeuchi, Ryo Hiromasa, Yusuke Aikawa, Seiichiro Tani
2021/1472
Improving Cryptography Based On Entropoids
Anisha Mukherjee, Saibal K. Pal
2021/1471
Efficient Searchable Symmetric Encryption for Join Queries
Charanjit Jutla, Sikhar Patranabis
2021/1470
Concurrent-Secure Two-Party Computation in Two Rounds from Subexponential LWE
Saikrishna Badrinarayanan, Rex Fernando, Amit Sahai
2021/1469
New Indifferentiability Security Proof of MDPH Hash Function
Chun Guo, Tetsu Iwata, Kazuhiko Minematsu
2021/1468
LeakageVerif: Scalable and Efficient Leakage Verification in Symbolic Expressions
Quentin L. Meunier, Etienne Pons, Karine Heydemann
2021/1467
On the Round Complexity of Black-box Secure MPC
Yuval Ishai, Dakshita Khurana, Amit Sahai, Akshayaram Srinivasan
2021/1466
On semigroups of multivariate transformations constructed in terms of time dependent linguistic graphs and solutions of Post Quantum Multivariate Cryptography.
V. Ustimenko
2021/1465
Themis: Fast, Strong Order-Fairness in Byzantine Consensus
Mahimna Kelkar, Soubhik Deb, Sishan Long, Ari Juels, Sreeram Kannan
2021/1464
Polynomial-time targeted attacks on coin tossing for any number of corruptions
Omid Etesami, Ji Gao, Saeed Mahloujifar, Mohammad Mahmoody
2021/1463
3-Party Distributed ORAM from Oblivious Set Membership
Brett Hemenway Falk, Daniel Noble, Rafail Ostrovsky
2021/1462
Prime pairing in algorithms searching for smooth group order
Pavel Atnashev, George Woltman
2021/1461
A Unified Cryptoprocessor for Lattice-based Signature and Key-exchange
Aikata Aikata, Ahmet Can Mert, David Jacquemin, Amitabh Das, Donald Matthews, Santosh Ghosh, Sujoy Sinha Roy
2021/1460
Fine-Grained Cryptanalysis: Tight Conditional Bounds for Dense k-SUM and k-XOR
Itai Dinur, Nathan Keller, and Ohad Klein
2021/1459
Privacy-preserving Identity Management System
Jeonghyuk Lee, Jaekyung Choi, Hyunok Oh, Jihye Kim
2021/1458
QC-MDPC codes DFR and the IND-CCA security of BIKE
Valentin Vasseur
2021/1457
An In-Depth Symbolic Security Analysis of the ACME Standard
Karthikeyan Bhargavan, Abhishek Bichhawat, Quoc Huy Do, Pedram Hosseyni, Ralf Kuesters, Guido Schmitz, Tim Wuertele
2021/1456
Server-Aided Continuous Group Key Agreement
Joël Alwen, Dominik Hartmann, Eike Kiltz, Marta Mularczyk
2021/1455
Dynamic Random Probing Expansion with Quasi Linear Asymptotic Complexity
Sonia Belaïd, Matthieu Rivain, Abdul Rahman Taleb, Damien Vergnaud
2021/1454
Russian Federal Remote E-voting Scheme of 2021 -- Protocol Description and Analysis
Jelizaveta Vakarjuk, Nikita Snetkov, Jan Willemson
2021/1453
A State-Separating Proof for Yao’s Garbling Scheme
Chris Brzuska and Sabine Oechsner
2021/1452
A Lightweight Implementation of Saber Resistant Against Side-Channel Attacks
Abubakr Abdulgadir, Kamyar Mohajerani, Viet Ba Dang, Jens-Peter Kaps, Kris Gaj
2021/1451
High-Performance Hardware Implementation of CRYSTALS-Dilithium
Luke Beckwith, Duc Tri Nguyen, Kris Gaj
2021/1450
Efficient Zero-Knowledge Argument in Discrete Logarithm Setting: Sublogarithmic Proof or Sublinear Verifier
Sungwook Kim, Hyeonbum Lee, Jae Hong Seo
2021/1449
One-more Unforgeability of Blind ECDSA
Xianrui Qin, Cailing Cai, Tsz Hon Yuen
2021/1448
Secure Featurization and Applications to Secure Phishing Detection
Akash Shah, Nishanth Chandran, Mesfin Dema, Divya Gupta, Arun Gururajan, Huan Yu
2021/1447
Mixed Certificate Chains for the Transition to Post-Quantum Authentication in TLS 1.3
Sebastian Paul, Yulia Kuzovkova, Norman Lahr, Ruben Niederhagen
2021/1446
Batch point compression in the context of advanced pairing-based protocols
Dmitrii Koshelev
2021/1445
Sleepy Channels: Bitcoin-Compatible Bi-directional Payment Channels without Watchtowers
Lukas Aumayr, Sri AravindaKrishnan Thyagarajan, Giulio Malavolta, Pedro Moreno-Sanchez, Matteo Maffei
2021/1444
Streamlined NTRU Prime on FPGA
Bo-Yuan Peng, Adrian Marotzke, Ming-Han Tsai, Bo-Yin Yang, Ho-Lin Chen
2021/1443
Platypus: A Central Bank Digital Currency with Unlinkable Transactions and Privacy Preserving Regulation
Karl Wüst, Kari Kostiainen, Noah Delius, Srdjan Capkun
2021/1442
On the {\sf P/poly} Validity of the Agr17 FE Scheme
Yupu Hu, Siyue Dong, and Baocang Wang
2021/1441
Length-preserving encryption with HCTR2
Paul Crowley, Nathan Huckleberry, and Eric Biggers
2021/1440
Improved Circuit-based PSI via Equality Preserving Compression
Kyoohyung Han, Dukjae Moon, Yongha Son
2021/1439
An Addendum to the ZUC-256 Stream Cipher
ZUC Design Team
2021/1438
Incremental Offline/Online PIR (extended version)
Yiping Ma, Ke Zhong, Tal Rabin, and Sebastian Angel
2021/1437
ModuloNET: Neural Networks Meet Modular Arithmetic for Efficient Hardware Masking
Anuj Dubey, Afzal Ahmad, Muhammad Adeel Pasha, Rosario Cammarota, Aydin Aysu
2021/1436
Efficient Representation of Numerical Optimization Problems for SNARKs
Sebastian Angel, Andrew J. Blumberg, Eleftherios Ioannidis, Jess Woods
2021/1435
Vectorial Decoding Algorithm for Fast Correlation Attack and Its Applications to Stream Cipher Grain-128a
ZhaoCun Zhou, DengGuo Feng, Bin Zhang
2021/1434
The Language's Impact on the Enigma Machine
Daniel Matyas Perendi, Prosanta Gope
2021/1433
Oblivious Transfer from Trapdoor Permutations in Minimal Rounds
Arka Rai Choudhuri, Michele Ciampi, Vipul Goyal, Abhishek Jain, Rafail Ostrovsky
2021/1432
Wavelet: Code-based postquantum signatures with fast verification on microcontrollers
Gustavo Banegas, Thomas Debris-Alazard, Milena Nedeljković, Benjamin Smith
2021/1431
Secure and Efficient Multi-Key FHE Scheme Supporting Multi-bit Messages from LWE Preserving Non-Interactive Decryption
Chinmoy Biswas, Ratna Dutta
2021/1430
Improved Zero-Knowledge Argument of Encrypted Extended Permutation
Yi Liu, Qi Wang, Siu-Ming Yiu
2021/1429
Reviewing ISO/IEC Standard for Time-stamping Services
Long Meng, Liqun Chen
2021/1428
Non-randomness of S-unit lattices
Daniel J. Bernstein, Tanja Lange
2021/1427
Public-Key Quantum Money with a Classical Bank
Omri Shmueli
2021/1426
On Unpadded NTRU Quantum (In)Security
Théodore Conrad-Frenkiel, Rémi Géraud-Stewart, David Naccache
2021/1425
Improving First-Order Threshold Implementations of SKINNY
Andrea Caforio, Daniel Collins, Ognjen Glamocanin, Subhadeep Banik
2021/1424
PREs with HRA Security and Key Privacy Based on Standard LWE Assumptions
Yang Wang, Yanmin Zhao, Mingqiang Wang
2021/1423
Encryption to the Future: A Paradigm for Sending Secret Messages to Future (Anonymous) Committees
Matteo Campanelli, Bernardo David, Hamidreza Khoshakhlagh, Anders Konring, Jesper Buus Nielsen
2021/1422
Higher-Order Masked Ciphertext Comparison for Lattice-Based Cryptography
Jan-Pieter D'Anvers, Daniel Heinz, Peter Pessl, Michiel van Beirendonck, Ingrid Verbauwhede
2021/1421
Revisiting Meet-in-the-Middle Cryptanalysis of SIDH/SIKE with Application to the $IKEp182 Challenge
Aleksei Udovenko and Giuseppe Vitto
2021/1420
Extending the Tally-Hiding Ordinos System: Implementations for Borda, Hare-Niemeyer, Condorcet, and Instant-Runoff Voting
Fabian Hertel, Nicolas Huber, Jonas Kittelberger, Ralf Kuesters, Julian Liedtke, Daniel Rausch
2021/1419
With a Little Help from My Friends: Constructing Practical Anonymous Credentials
Lucjan Hanzlik, Daniel Slamanig
2021/1418
Autoencoder Assist: An Efficient Profiling Attack on High-dimensional Datasets
Qi Lei, Zijia Yang, Qin Wang, Yaoling Ding, Zhe Ma, An Wang
2021/1417
How to Handle Invalid Queries for Malicious-Private Protocols Based on Homomorphic Encryption
Koji Nuida
2021/1416
SME: Scalable Masking Extensions
Ben Marshall, Dan Page
2021/1415
A Note on the Pseudorandomness of Low-Degree Polynomials over the Integers
Aayush Jain, Alexis Korb, Paul Lou, Amit Sahai
2021/1414
Exploring Feature Selection Scenarios for Deep Learning-based Side-Channel Analysis
Guilherme Perin, Lichao Wu, Stjepan Picek
2021/1413
Three Attacks on Proof-of-Stake Ethereum
Caspar Schwarz-Schilling, Joachim Neu, Barnabé Monnot, Aditya Asgaonkar, Ertem Nusret Tas, David Tse
2021/1412
A General Framework of Homomorphic Encryption for Multiple Parties with Non-Interactive Key-Aggregation
Hyesun Kwak, Dongwon Lee, Yongsoo Song, and Sameer Wagh
2021/1411
Analysis of Client-side Security for Long-term Time-stamping Services
Long Meng, Liqun Chen
2021/1410
Franchised Quantum Money
Bhaskar Roberts, Mark Zhandry
2021/1409
Hiding in Plain Sight: Memory-tight Proofs via Randomness Programming
Ashrujit Ghoshal, Riddhi Ghosal, Joseph Jaeger, Stefano Tessaro
2021/1408
Focus is Key to Success: A Focal Loss Function for Deep Learning-based Side-channel Analysis
Maikel Kerkhof, Lichao Wu, Guilherme Perin, Stjepan Picek
2021/1407
A Concrete Treatment of Efficient Continuous Group Key Agreement via Multi-Recipient PKEs
Keitaro Hashimoto, Shuichi Katsumata, Eamonn Postlethwaite, Thomas Prest, Bas Westerbaan
2021/1406
Non-Slanderability of Linkable Spontaneous Anonymous Group Signature (LSAG)
Veronika Kuchta, Joseph K. Liu
2021/1405
Leaking Arbitrarily Many Secrets: Any-out-of-Many Proofs and Applications to RingCT Protocols
Tianyu Zheng, Shang Gao, Yubo Song, Bin Xiao
2021/1404
Non-interactive Distributional Indistinguishability (NIDI) and Non-Malleable Commitments
Dakshita Khurana
2021/1403
Efficient Adaptively-Secure Byzantine Agreement for Long Messages
Amey Bhangale, Chen-Da Liu-Zhang, Julian Loss, Kartik Nayak
2021/1402
Guide to Fully Homomorphic Encryption over the [Discretized] Torus
Marc Joye
2021/1401
HIDE & SEEK: Privacy-Preserving Rebalancing on Payment Channel Networks
Zeta Avarikioti, Krzysztof Pietrzak, Iosif Salem, Stefan Schmid, Samarth Tiwari, Michelle Yeo
2021/1400
Three Input Exclusive-OR Gate Support For Boyar-Peralta's Algorithm (Extended Version)
Anubhab Baksi, Vishnu Asutosh Dasu, Banashri Karmakar, Anupam Chattopadhyay, Takanori Isobe
2021/1399
Iterated Inhomogeneous Polynomials
Jiaxin Guan, Mark Zhandry
2021/1398
Universally Composable Almost-Everywhere Secure Computation
Nishanth Chandran, Pouyan Forghani, Juan Garay, Rafail Ostrovsky, Rutvik Patel, Vassilis Zikas
2021/1397
Practical Non-interactive Publicly Verifiable Secret Sharing with Thousands of Parties
Craig Gentry, Shai Halevi, Vadim Lyubashevsky
2021/1396
NTT software optimization using an extended Harvey butterfly
Jonathan Bradbury, Nir Drucker, Marius Hillenbrand
2021/1395
Homomorphic Secret Sharing for Multipartite and General Adversary Structures Supporting Parallel Evaluation of Low-degree Polynomials
Reo Eriguchi, Koji Nuida
2021/1394
Rethinking Modular Multi-Exponentiation in Real-World Applications
Vidal Attias, Luigi Vigneri, Vassil Dimitrov
2021/1393
Fiat–Shamir Bulletproofs are Non-Malleable (in the Algebraic Group Model)
Chaya Ganesh, Claudio Orlandi, Mahak Pancholi, Akira Takahashi, Daniel Tschudi
2021/1392
Differential fault attack on DEFAULT
Chandan Dey, Sumit Kumar Pandey, Tapabrata Roy, Santanu Sarkar
2021/1391
A note on a Claim of Eldar & Hallgren: LLL already solves it
Léo Ducas, Wessel van Woerden
2021/1390
UC Secure Private Branching Program and Decision Tree Evaluation
Keyu Ji, Bingsheng Zhang, Tianpei Lu, Lichun Li, Kui Ren
2021/1389
DPCrypto: Acceleration of Post-quantum Cryptographic Algorithms using Dot-Product Instruction on GPUs
Wai-Kong Lee, Hwajeong Seo, Seong Oun Hwang, Angshuman Karmakar, Jose Maria Bermudo Mera, Ramachandra Achar
2021/1388
Modeling Large S-box in MILP and a (Related-key) Differential Attack on Full Round PIPO-64/128
Tarun Yadav, Manoj Kumar
2021/1387
Triplicate functions
Lilya Budaghyan, Ivana Ivkovic, Nikolay Kaleyski
2021/1386
Efficient Threshold-Optimal ECDSA
Michaella Pettit
2021/1385
BlindOR: An Efficient Lattice-Based Blind Signature Scheme from OR-Proofs
Nabil Alkeilani Alkadri, Patrick Harasser, Christian Janson
2021/1384
Log-$\mathcal{S}$-unit lattices using Explicit Stickelberger Generators to solve Approx Ideal-SVP
Olivier Bernard, Andrea Lesavourey, Tuong-Huy Nguyen, Adeline Roux-Langlois
2021/1383
MHz2k: MPC from HE over $\mathbb{Z}_{2^k}$ with New Packing, Simpler Reshare, and Better ZKP
Jung Hee Cheon, Dongwoo Kim, Keewoo Lee
2021/1382
ZPiE: Zero-knowledge Proofs in Embedded systems
Xavier Salleras, Vanesa Daza
2021/1381
Multi-Authority ABE, Revisited
Miguel Ambrona, Romain Gay
2021/1380
Orca: Blocklisting in Sender-Anonymous Messaging
Nirvan Tyagi, Julia Len, Ian Miers, Thomas Ristenpart
2021/1379
Ofelimos: Combinatorial Optimization via Proof-of-Useful-Work \\ A Provably Secure Blockchain Protocol
Matthias Fitzi, Aggelos Kiayias, Giorgos Panagiotakos, Alexander Russell
2021/1378
Cryptanalysis of Efficient Masked Ciphers: Applications to Low Latency
Tim Beyne, Siemen Dhooghe, Amir Moradi, Aein Rezaei Shahmirzadi
2021/1377
Fiat-Shamir Transformation of Multi-Round Interactive Proofs
Thomas Attema, Serge Fehr, Michael Klooß
2021/1376
Phoenix: Secure Computation in an Unstable Network with Dropouts and Comebacks
Ivan Damgård, Daniel Escudero, Antigoni Polychroniadou
2021/1375
How to Prove Schnorr Assuming Schnorr: Security of Multi- and Threshold Signatures
Elizabeth Crites, Chelsea Komlo, Mary Maller
2021/1374
Information-Combining Differential Fault Attacks on DEFAULT
Marcel Nageler, Christoph Dobraunig, and Maria Eichlseder
2021/1373
Highly Efficient OT-Based Multiplication Protocols
Iftach Haitner, Nikolaos Makriyannis, Samuel Ranellucci, Eliad Tsfadia
2021/1372
Arrows in a Quiver: A Secure Certificateless Group Key Distribution Protocol for Drones
Eugene Frimpong, Reyhaneh Rabbaninejad, Antonis Michalas
2021/1371
A Generic Construction of CCA-secure Attribute-based Encryption with Equality Test
Kyoichi Asano, Keita Emura, Atsushi Takayasu, and Yohei Watanabe
2021/1370
Masquerade: Verifiable Multi-Party Aggregation with Secure Multiplicative Commitments
Dimitris Mouris, Nektarios Georgios Tsoutsos
2021/1369
Faster Isogenies for Quantum-Safe SIKE
Rami Elkhatib, Brian Koziel, Reza Azarderakhsh
2021/1368
Isogeny-based Group Signatures and Accountable Ring Signatures in QROM
Kai-Min Chung, Yao-Ching Hsieh, Mi-Ying Huang, Yu-Hsuan Huang, Tanja Lange, and Bo-Yin Yang
2021/1367
Hybrid Steganography deployed in hospitals for compression of medical images
Avinash Vijayarangan, K. R. Sekar, R. Srikanth
2021/1366
Group Signatures and More from Isogenies and Lattices: Generic, Simple, and Efficient
Ward Beullens, Samuel Dobson, Shuichi Katsumata, Yi-Fu Lai, Federico Pintore
2021/1365
Collusion Resistant Revocable Ring Signatures and Group Signatures from Hard Homogeneous Spaces
Yi-Fu Lai, Samuel Dobson
2021/1364
Non-applicability of the Gaborit&Aguilar-Melchor patent to Kyber and Saber
Vadim Lyubashevsky, Damien Stehlé
2021/1363
On Entropy and Bit Patterns of Ring Oscillator Jitter
Markku-Juhani O. Saarinen
2021/1362
Practical Multiple Persistent Faults Analysis
Hadi Soleimany, Nasour Bagheri, Hosein Hadipour, Prasanna Ravi, Shivam Bhasin, Sara Mansouri
2021/1361
Plumo: An Ultralight Blockchain Client
Psi Vesely, Kobi Gurkan, Michael Straka, Ariel Gabizon, Philipp Jovanovic, Georgios Konstantopoulos, Asa Oines, Marek Olszewski, Eran Tromer
2021/1360
Updatable Trapdoor SPHFs: Modular Construction of Updatable Zero-Knowledge Arguments and More
Behzad Abdolmaleki, Daniel Slamanig
2021/1359
Families of SNARK-friendly 2-chains of elliptic curves
Youssef El Housni, Aurore Guillevic
2021/1358
The Hardness of LWE and Ring-LWE: A Survey
David Balbás
2021/1357
Two-Round Concurrently Secure Two-Party Computation
Behzad Abdolmaleki, Giulio Malavolta, Ahmadreza Rahimi
2021/1356
Structural Mutual Information and Its Application
Youliang Tian, Zhiying Zhang, Jinbo Xiong, Jianfeng Ma
2021/1355
Curve448 on 32-bit ARM Cortex-M4
Hwajeong Seo, Reza Azarderakhsh
2021/1354
SoK: On the Security of Cryptographic Problems from Linear Algebra
Carl Bootland, Wouter Castryck, Alan Szepieniec, Frederik Vercauteren
2021/1353
Noise-Tolerant Quantum Tokens for MAC
Amit Behera, Or Sattath, Uriel Shinar
2021/1352
A Thorough Treatment of Highly-Efficient NTRU Instantiations
Julien Duman, Kathrin Hövelmanns, Eike Kiltz, Vadim Lyubashevsky, Gregor Seiler, Dominique Unruh
2021/1351
Faster Lattice-Based KEMs via a Generic Fujisaki-Okamoto Transform Using Prefix Hashing
Julien Duman, Eike Kiltz, Kathrin Hövelmanns, Vadim Lyubashevsky, Gregor Seiler
2021/1350
Generalized Proof of Liabilities
Yan Ji, Konstantinos Chalkias
2021/1349
Updatable Private Set Intersection
Saikrishna Badrinarayanan, Peihan Miao, Tiancheng Xie
2021/1348
Beyond quadratic speedups in quantum attacks on symmetric schemes
Xavier Bonnetain, André Schrottenloher, Ferdinand Sibleyras
2021/1347
TOTA: Fully Homomorphic Encryption with Smaller Parameters and Stronger Security
Zhaomin Yang, Xiang Xie, Huajie Shen, Shiying Chen, Jun Zhou
2021/1346
WeStat: a Privacy-Preserving Mobile Data Usage Statistics System
Sébastien Canard, Nicolas Desmoulins, Sébastien Hallay, Adel Hamdi, Dominique Le Hello
2021/1345
New Attacks on LowMC instances with a Single Plaintext/Ciphertext pair
Subhadeep Banik, Khashayar Barooti, Serge Vaudenay, Hailun Yan
2021/1344
Racing BIKE: Improved Polynomial Multiplication and Inversion in Hardware
Jan Richter-Brockmann, Ming-Shing Chen, Santosh Ghosh, Tim Güneysu
2021/1343
A Non-heuristic Approach to Time-space Tradeoffs and Optimizations for BKW
Hanlin Liu, Yu Yu
2021/1342
Efficient Functional Commitments: How to Commit to a Private Function
Dan Boneh, Wilson Nguyen, Alex Ozdemir
2021/1341
Anonymous Whistleblowing over Authenticated Channels
Thomas Agrikola, Geoffroy Couteau, Sven Maier
2021/1340
TEDT2 - Highly Secure Leakage-resilient TBC-based Authenticated Encryption
Eik List
2021/1339
Safe-Error Analysis of Post-Quantum Cryptography Mechanisms
Luk Bettale, Simon Montoya, Guénaël Renault
2021/1338
Embedded Multilayer Equations: a New Hard Problem for Constructing Post-Quantum Signatures Smaller than RSA (without Hardness Assumption)
Dongxi Liu
2021/1337
Large-Precision Homomorphic Sign Evaluation using FHEW/TFHE Bootstrapping
Zeyu Liu, Daniele Micciancio, Yuriy Polyakov
2021/1336
Improved Computational Extractors and their Applications
Dakshita Khurana, Akshayaram Srinivasan
2021/1335
Integer Functions Suitable for Homomorphic Encryption over Finite Fields
Ilia Iliashenko, Christophe Nègre, Vincent Zucca
2021/1334
Indistinguishability Obfuscation from LPN over F_p, DLIN, and PRGs in NC^0
Aayush Jain, Huijia Lin, Amit Sahai
2021/1333
Paradoxical Compression with Verifiable Delay Functions
Thomas Pornin
2021/1332
On the Lattice Isomorphism Problem, Quadratic Forms, Remarkable Lattices, and Cryptography
Léo Ducas, Wessel van Woerden
2021/1331
Communicating Through Subliminal-Free Signatures
George Teseleanu
2021/1330
On the security of ECDSA with additive key derivation and presignatures
Jens Groth, Victor Shoup
2021/1329
Trail Search with CRHS Equations
John Petter Indrøy, Håvard Raddum
2021/1328
Cross Subkey Side Channel Analysis Based on Small Samples
Fanliang Hu, Huanyu Wang, Junnian Wang
2021/1327
Secure Multiparty Computation in the Bounded Storage Model
Jiahui Liu, Satyanarayana Vusirikala
2021/1326
FuzzyKey: Comparing Fuzzy Cryptographic Primitives on Resource-Constrained Devices
Mo Zhang, Eduard Marin, David Oswald, Dave Singelee
2021/1325
Decentralized Multi-Authority ABE for NC^1 from Computational-BDH
Pratish Datta, Ilan Komargodski, Brent Waters
2021/1324
Lockable Obfuscation from Circularly Insecure Fully Homomorphic Encryption
Kamil Kluczniak
2021/1323
Anonymity of NIST PQC Round 3 KEMs
Keita Xagawa
2021/1322
A New Adaptive Attack on SIDH
Tako Boris Fouotsa, Christophe Petit
2021/1321
Blockchain-based Privacy-preserving Fair Data Trading Protocol
Yao Jiang Galteland, Shuang Wu
2021/1320
Faster Key Generation of Supersingular Isogeny Diffie-Hellman
Kaizhan Lin, Fangguo Zhang, Chang-An Zhao
2021/1319
Maliciously-Secure MrNISC in the Plain Model
Rex Fernando, Aayush Jain, Ilan Komargodski
2021/1318
Supersingular Isogeny-Based Ring Signature
Maryam Sheikhi Garjan, N. Gamze Orhon Kılıç, Murat Cenk
2021/1317
m-Stability: Threshold Security Meets Transferable Utility
Osman Biçer, Burcu Yıldız, and Alptekin Küpçü
2021/1316
Towards Human Dependency Elimination: AI Approach to SCA Robustness Assessment
Unai Rioja, Lejla Batina, Igor Armendariz, Jose Luis Flores
2021/1315
Certified Everlasting Zero-Knowledge Proof for QMA
Taiga Hiroka, Tomoyuki Morimae, Ryo Nishimaki, Takashi Yamakawa
2021/1314
High-order Table-based Conversion Algorithms and Masking Lattice-based Encryption
Jean-Sébastien Coron, François Gérard, Simon Montoya, Rina Zeitoun
2021/1313
Hybrid Memristor-CMOS Obfuscation Against Untrusted Foundries
Amin Rezaei, Jie Gu, Hai Zhou
2021/1312
Selectively Linkable Group Signatures - Stronger Security and Preserved Verifiability
Ashley Fraser, Lydia Garms, Anja Lehmann
2021/1311
Power analysis attack on Kyber
Alexandre Karlov, Natacha Linard de Guertechin
2021/1310
Related-Tweak Impossible Differential Cryptanalysis of Reduced-Round TweAES
Chao Niu, Muzhou Li, Meiqin Wang, Qingju Wang, Siu-Ming Yiu
2021/1309
Faster Final Exponentiation on the KSS18 Curve
Shiping Cai, Zhi Hu, Chang-An Zhao
2021/1308
No-Commit Proofs: Defeating Livelock in BFT
Neil Giridharan, Heidi Howard, Ittai Abraham, Natacha Crooks, Alin Tomescu
2021/1307
In-depth Analysis of Side-Channel Countermeasures for CRYSTALS-Kyber Message Encoding on ARM Cortex-M4
Hauke Malte Steffen, Lucie Johanna Kogelheide, Timo Bartkewitz
2021/1306
Probabilistic micropayments with transferability
Taisei Takahashi, Akira Otsuka
2021/1305
(Compact) Adaptively Secure FE for Attribute-Weighted Sums from k-Lin
Pratish Datta, Tapas Pal
2021/1304
An Open Problem on the Bentness of Mesnager’s Functions
Chunming Tang, Peng Han, Qi Wang, Jun Zhang, Yanfeng Qi
2021/1303
Black-Box Accumulation Based on Lattices
Sebastian H. Faller, Pascal Baumer, Michael Klooß, Alexander Koch, Astrid Ottenhues, Markus Raiber
2021/1302
Using Blockchain to Achieve Decentralized Privacy In IoT Healthcare
Sajad Meisami, Mohammad Beheshti-Atashgah, Mohammad Reza Aref
2021/1301
An Isogeny-Based ID Protocol Using Structured Public Keys
Karim Baghery, Daniele Cozzo, Robi Pedersen
2021/1300
Report and Trace Ring Signatures
Ashley Fraser, Elizabeth A. Quaglia
2021/1299
Towards Quantum Large-Scale Password Guessing on Real-World Distributions
Markus Dürmuth, Maximilian Golla, Philipp Markert, Alexander May, Lars Schlieper
2021/1298
Post-Quantum Authentication with Lightweight Cryptographic Primitives
Henrique Faria, José Manuel Valença
2021/1297
Listen to Your Heart: Evaluation of the Cardiologic Ecosystem
Endres Puschner, Christoph Saatjohann, Markus Willing, Christian Dresen, Julia Köbe, Benjamin Rath, Christof Paar, Lars Eckardt, Uwe Haverkamp, Sebastian Schinzel
2021/1296
Partition Oracles from Weak Key Forgeries
Marcel Armour, Carlos Cid
2021/1295
Improved Quantum Hypercone Locality Sensitive Filtering in Lattice Sieving
Max Heiser
2021/1294
Quantum Money from Quaternion Algebras
Daniel M. Kane, Shahed Sharif, Alice Silverberg
2021/1293
TIDE: A novel approach to constructing timed-release encryption
Angelique Faye Loe, Liam Medley, Christian O’Connell, Elizabeth A. Quaglia
2021/1292
A Fast Large-Integer Extended GCD Algorithm and Hardware Design for Verifiable Delay Functions and Modular Inversion
Kavya Sreedhar, Mark Horowitz, Christopher Torng
2021/1291
MyOPE: Malicious securitY for Oblivious Polynomial Evaluation
Malika Izabachène, Anca Nitulescu, Paola de Perthuis, David Pointcheval
2021/1290
Large-Scale Non-Interactive Threshold Cryptosystems in the YOSO Model
Andreas Erwig, Sebastian Faust, Siavash Riahi
2021/1289
Verifiable Isogeny Walks: Towards an Isogeny-based Postquantum VDF
Jorge Chavez-Saab, Francisco Rodríguez Henríquez, Mehdi Tibouchi
2021/1288
FO-like Combiners and Hybrid Post-Quantum Cryptography
Loïs Huguenin-Dumittan, Serge Vaudenay
2021/1287
The Exact Security of BIP32 Wallets
Poulami Das, Andreas Erwig, Sebastian Faust, Julian Loss, Siavash Riahi
2021/1286
Post-quantum Efficient Proof for Graph 3-Coloring Problem
Ehsan Ebrahimi
2021/1285
Convexity of division property transitions: theory, algorithms and compact models
Aleksei Udovenko
2021/1284
APAS: Application-Specific Accelerators for RLWE-based Homomorphic Linear Transformations
Song Bian, Dur E Shahwar Kundi, Kazuma Hirozawa, Weiqiang Liu, Takashi Sato
2021/1283
Parallel Verification of Serial MAC and AE Modes
Kazuhiko Minematsu, Akiko Inoue, Katsuya Moriwaki, Maki Shigeri, Hiroyasu Kubo
2021/1282
On the Claims of Weak Block Synchronization in Bitcoin
Seungjin Baek, Hocheol Nam, Yongwoo Oh, Muoi Tran, Min Suk Kang
2021/1281
Leveled Homomorphic Encryption Schemes with Hensel Codes
David W. H. A. da Silva, Luke Harmon, Gaetan Delavignette, and Carlos Araujo
2021/1280
Snoopy: Surpassing the Scalability Bottleneck of Oblivious Storage
Emma Dauterman, Vivian Fang, Ioannis Demertzis, Natacha Crooks, Raluca Ada Popa
2021/1279
Quantum Diffie-Hellman Key Exchange
Dirk Fischer
2021/1278
A survey of algorithmic methods in IC reverse engineering
Leonid Azriel, Julian Speith, Nils Albartus, Ran Ginosara, Avi Mendelson, Christof Paar
2021/1277
LifeLine for FPGA Protection: Obfuscated Cryptography for Real-World Security
Florian Stolz, Nils Albartus, Julian Speith, Simon Klix, Clemens Nasenberg, Aiden Gula, Marc Fyrbiak, Christof Paar, Tim Güneysu, Russell Tessier
2021/1276
On the Security and Performance of Blockchain Sharding
Runchao Han, Jiangshan Yu, Haoyu Lin, Shiping Chen, Paulo Esteves-Veríssimo
2021/1275
Counterexample to OWF Self-XOR Being a DOWF
Nathan Geier
2021/1274
A Tight Computational Indistinguishability Bound for Product Distributions
Nathan Geier
2021/1273
OpenSquare: Decentralized Repeated Modular Squaring Service
Sri AravindaKrishnan Thyagarajan, Tiantian Gong, Adithya Bhat, Aniket Kate, Dominique Schröder
2021/1272
Efficient CCA Timed Commitments in Class Groups
Sri AravindaKrishnan Thyagarajan, Guilhem Castagnos, Fabien Laguillaumie, Giulio Malavolta
2021/1271
Computing the Jacobi symbol using Bernstein-Yang
Mike Hamburg
2021/1270
Speak Much, Remember Little: Cryptography in the Bounded Storage Model, Revisited
Yevgeniy Dodis, Willy Quach, Daniel Wichs
2021/1269
Practical Continuously Non-Malleable Randomness Encoders in the Random Oracle Model
Antonio Faonio
2021/1268
Simulation-Based Bi-Selective Opening Security for Public Key Encryption
Junzuo Lai, Rupeng Yang, Zhengan Huang, Jian Weng
2021/1267
Tight Quantum Indifferentiability of a Rate-1/3 Compression Function
Jan Czajkowski
2021/1266
Update-Sensitive Structured Encryption with Backward Privacy
Zhiqiang Wu, Jin Wang, Keqin Li
2021/1265
Special Soundness in the Random Oracle Model
Douglas Wikström
2021/1264
Verifiably-Extractable OWFs and Their Applications to Subversion Zero-Knowledge
Prastudy Fauzi, Helger Lipmaa, Janno Siim, Michal Zajac, Arne Tobias Ødegaard
2021/1263
Transparency Dictionaries with Succinct Proofs of Correct Operation
Ioanna Tzialla, Abhiram Kothapalli, Bryan Parno, Srinath Setty
2021/1262
Reverse Firewalls for Adaptively Secure MPC without Setup
Suvradip Chakraborty, Chaya Ganesh, Mahak Pancholi, Pratik Sarkar
2021/1261
Identity-Based Encryption for Fair Anonymity Applications: Defining, Implementing, and Applying Rerandomizable RCCA-secure IBE
Yi Wang, Rongmao Chen, Xinyi Huang, Jianting Ning, Baosheng Wang, Moti Yung
2021/1260
Compare Before You Buy: Privacy-Preserving Selection of Threat Intelligence Providers
Jelle Vos, Zekeriya Erkin, Christian Doerr
2021/1259
Parallel Repetition of $(k_1,\dots,k_{\mu})$-Special-Sound Multi-Round Interactive Proofs
Thomas Attema and Serge Fehr
2021/1258
Bit Security as Computational Cost for Winning Games with High Probability
Shun Watanabe, Kenji Yasunaga
2021/1257
Spreading the Privacy Blanket: Differentially Oblivious Shuffling for Differential Privacy
S. Dov Gordon, Jonathan Katz, Mingyu Liang, Jiayu Xu
2021/1256
Oblivious Message Retrieval
Zeyu Liu, Eran Tromer
2021/1255
How to Find Ternary LWE Keys Using Locality Sensitive Hashing
Elena Kirshanova, Alexander May
2021/1254
Vector and Functional Commitments from Lattices
Chris Peikert, Zachary Pepin, Chad Sharp
2021/1253
EasyPQC: Verifying Post-Quantum Cryptography
Manuel Barbosa, Gilles Barthe, Xiong Fan, Benjamin Grégoire, Shih-Han Hung, Jonathan Katz, Pierre-Yves Strub, Xiaodi Wu, Li Zhou
2021/1252
Complete Practical Side-Channel-Assisted Reverse Engineering of AES-Like Ciphers
Andrea Caforio, Fatih Balli, Subhadeep Banik
2021/1251
Efficient NIZKs for Algebraic Sets
Geoffroy Couteau, Helger Lipmaa, Roberto Parisella, Arne Tobias Ødegaard
2021/1250
Efficient Leakage-Resilient MACs without Idealized Assumptions
Francesco Berti, Chun Guo, Thomas Peters, François-Xavier Standaert
2021/1249
Flexible Anonymous Transactions (FLAX): Towards Privacy-Preserving and Composable Decentralized Finance
Wei Dai
2021/1248
The Adversary Capabilities In Practical Byzantine Fault Tolerance
Yongge Wang
2021/1247
A Geometric Approach to Linear Cryptanalysis
Tim Beyne
2021/1246
Astrolabous: A Universally Composable Time-Lock Encryption Scheme
Myrto Arapinis, Nikolaos Lamprou, Thomas Zacharias
2021/1245
SeqL+: Secure Scan-Obfuscation with Theoretical and Empirical Validation
Seetal Potluri, Shamik Kundu, Akash Kumar, Kanad Basu, Aydin Aysu
2021/1244
IvyCross: A Privacy-Preserving and Concurrency Control Framework for Blockchain Interoperability
Ming Li, Jian Weng, Yi Li, Yongdong Wu, Jiasi Weng, Dingcheng Li, Guowen Xu, Robert Deng
2021/1243
Syndrome Decoding Estimator
Andre Esser, Emanuele Bellini
2021/1242
Non-Interactive Differentially Anonymous Router
Benedikt Bünz, Yuncong Hu, Shin’ichiro Matsuo, Elaine Shi
2021/1241
Shuffling Public Keys (A Peer-to-peer Voting Algorithm)
Santi J. Vives
2021/1240
Count Me In! Extendability for Threshold Ring Signatures
Diego F. Aranha, Mathias Hall-Andersen, Anca Nitulescu, Elena Pagnin, Sophia Yakoubov
2021/1239
Quantum Linearization Attacks
Xavier Bonnetain, Gaëtan Leurent, María Naya-Plasencia, André Schrottenloher
2021/1238
Generic Framework for Key-Guessing Improvements
Marek Broll, Federico Canale, Antonio Flórez-Gutiérrez, Gregor Leander, María Naya-Plasencia
2021/1237
Hierarchical Integrated Signature and Encryption
Yu Chen, Qiang Tang, Yuyu Wang
2021/1236
Architecture Support for Bitslicing
Pantea Kiaei, Tom Conroy, Patrick Schaumont
2021/1235
Saidoyoki: Evaluating side-channel leakage in pre- and post-silicon setting
Pantea Kiaei, Zhenyuan Liu, Ramazan Kaan Eren, Yuan Yao, Patrick Schaumont
2021/1234
Policy-Compliant Signatures
Christian Badertscher, Christian Matt, Hendrik Waldner
2021/1233
Blockchains Enable Non-Interactive MPC
Vipul Goyal, Elisaweta Masserova, Bryan Parno, Yifan Song
2021/1232
Gröbner Basis Attack on STARK-Friendly Symmetric-Key Primitives: JARVIS, MiMC and GMiMCerf
Gizem Kara, Oğuz Yayla
2021/1231
Estimating (Miner) Extractable Value is Hard, Let’s Go Shopping!
Aljosha Judmayer, Nicholas Stifter, Philipp Schindler, Edgar Weippl
2021/1230
Two-Round Maliciously Secure Computation with Super-Polynomial Simulation
Amit Agarwal, James Bartusek, Vipul Goyal, Dakshita Khurana, Giulio Malavolta
2021/1229
Direct Product Hardness Amplification
David Lanzenberger, Ueli Maurer
2021/1228
Computational Robust (Fuzzy) Extractors for CRS-dependent Sources with Minimal Min-entropy
Hanwen Feng, Qiang Tang
2021/1227
Efficient Boolean Search over Encrypted Data with Reduced Leakage
Sarvar Patel, Giuseppe Persiano, Joon Young Seo, Kevin Yeo
2021/1226
Succinct LWE Sampling, Random Polynomials, and Obfuscation
Lalita Devadas, Willy Quach, Vinod Vaikuntanathan, Hoeteck Wee, Daniel Wichs
2021/1225
Massive Superpoly Recovery with Nested Monomial Predictions
Kai Hu, Siwei Sun, Yosuke Todo, Meiqin Wang, Qingju Wang
2021/1224
Trojan-Resilience without Cryptography
Suvradip Chakraborty, Stefan Dziembowski, Malgorzata Galazka, Tomasz Lizurej, Krzysztof Pietrzak, Michelle Yeo
2021/1223
Generalized Pseudorandom Secret Sharing and Efficient Straggler-Resilient Secure Computation
Fabrice Benhamouda, Elette Boyle, Niv Gilboa, Shai Halevi, Yuval Ishai, Ariel Nof
2021/1222
Fault-enabled chosen-ciphertext attacks on Kyber
Julius Hermelink, Peter Pessl, Thomas Pöppelmann
2021/1221
Simple, Fast Malicious Multiparty Private Set Intersection
Ofri Nevo, Ni Trieu, Avishay Yanai
2021/1220
Digital Signatures with Memory-Tight Security in the Multi-Challenge Setting
Denis Diemert, Kai Gellert, Tibor Jager, Lin Lyu
2021/1219
Towards Tight Adaptive Security of Non-Interactive Key Exchange
Julia Hesse, Dennis Hofheinz, Lisa Kohl, Roman Langrehr
2021/1218
Algebraic Adversaries in the Universal Composability Framework
Michel Abdalla, Manuel Barbosa, Jonathan Katz, Julian Loss, Jiayu Xu
2021/1217
EMFI for Safety-Critical Testing of Automotive Systems
Colin O'Flynn
2021/1216
Toward Optimal Deep-Learning Based Side-Channel Attacks: Probability Concentration Inequality Loss and Its Usage
Akira Ito, Rei Ueno, Naofumi Homma
2021/1215
Optimization of Homomorphic Comparison Algorithm on RNS-CKKS Scheme
Eunsang Lee, Joon-Woo Lee, Young-Sik Kim, Jong-Seon No
2021/1214
Black-Box Impossibilities of Obtaining 2-Round Weak ZK and Strong WI from Polynomial Hardness
Susumu Kiyoshima
2021/1213
DualRing: Generic Construction of Ring Signatures with Efficient Instantiations
Tsz Hon Yuen, Muhammed F. Esgin, Joseph K. Liu, Man Ho Au, Zhimin Ding
2021/1212
SPEEDY on Cortex--M3: Efficient Software Implementation of SPEEDY on ARM Cortex--M3
Hyunjun Kim, Kyungbae Jang, Gyeongju Song, Minjoo Sim, Siwoo Eum, Hyunji Kim, Hyeokdong Kwon, Wai-Kong Lee, Hwajeong Seo
2021/1211
Grover on SPEEDY
Gyeongju Song, Kyungbae Jang, Hyunjun Kim, Siwoo Eum, Minjoo Sim, Hyunji Kim, Wai-Kong Lee, Hwajeong Seo
2021/1210
LedMAC: More Efficient Variants of LightMAC
Yaobin Shen, Lei Wang, Dawu Gu
2021/1209
Simple and Efficient Batch Verification Techniques for Verifiable Delay Functions
Lior Rotem
2021/1208
On Actively-Secure Elementary MPC Reductions
Benny Applebaum, Aarushi Goel
2021/1207
Non-Malleable Vector Commitments via Local Equivocability
Lior Rotem and Gil Segev
2021/1206
Efficient Perfectly Secure Computation with Optimal Resilience
Ittai Abraham, Gilad Asharov, Avishay Yanai
2021/1205
FASTA - a stream cipher for fast FHE evaluation
Carlos Cid, John Petter Indrøy, Håvard Raddum
2021/1204
Attacks on Pseudo Random Number Generators Hiding a Linear Structure
Florette Martinez
2021/1203
The irreducible vectors of a lattice: Some theory and applications
Emmanouil Doulgerakis, Thijs Laarhoven, Benne de Weger
2021/1202
Design Space Exploration of SABER in 65nm ASIC
Malik Imran, Felipe Almeida, Jaan Raik, Andrea Basso, Sujoy Sinha Roy, Samuel Pagliarini
2021/1201
Provably Improving Election Verifiability in Belenios
Sevdenur Baloglu, Sergiu Bursuc, Sjouke Mauw, Jun Pang
2021/1200
KDM Security for the Fujisaki-Okamoto Transformations in the QROM
Fuyuki Kitagawa, Ryo Nishimaki
2021/1199
Compressed Oblivious Encoding for Homomorphically Encrypted Search
Seung Geol Choi, Dana Dachman-Soled, S. Dov Gordon, Linsheng Liu, Arkady Yerukhimovich
2021/1198
Clustering Effect in Simon and Simeck
Gaëtan Leurent, Clara Pernot, André Schrottenloher
2021/1197
($\epsilon,\delta$)-indistinguishable Mixing for Cryptocurrencies
Mingyu Liang, Ioanna Karantaidou, Foteini Baldimtsi, Dov Gordon, Mayank Varia
2021/1196
Concurrent Composition of Differential Privacy
Salil Vadhan, Tianhao Wang
2021/1195
Do you feel a chill? Using PIR against chilling effects for censorship-resistant publishing
Miti Mazmudar, Stan Gurtler, Ian Goldberg
2021/1194
Automated Truncation of Differential Trails and Trail Clustering in ARX
Alex Biryukov, Luan Cardoso dos Santos, Daniel Feher, Vesselin Velichkov, Giuseppe Vitto
2021/1193
JUBILEE: Secure Debt Relief and Forgiveness
David Cerezo Sánchez
2021/1192
Simple Constructions from (Almost) Regular One-Way Functions
Noam Mazor, Jiapeng Zhang
2021/1191
A Simpler Model for Recovering Superpoly onTrivium
Stéphanie Delaune, Patrick Derbez, Arthur Gontier, Charles Prud'homme
2021/1190
Differential Fault Attack on Lightweight Block Cipher PIPO
SeongHyuck Lim, JaeSeung Han, Tae-Ho Lee, Dong-Guk Han
2021/1189
A Configurable Crystals-Kyber Hardware Implementation with Side-Channel Protection
Arpan Jati, Naina Gupta, Anupam Chattopadhyay, Somitra Kumar Sanadhya
2021/1188
Interhead Hydra Two Heads are Better than One
Maxim Jourenko, Mario Larangeira, Keisuke Tanaka
2021/1187
Post-Quantum Signal Key Agreement with SIDH
Samuel Dobson, Steven D. Galbraith
2021/1186
A Privacy-Preserving Distributed Identity Offline-First PoCP Blockchain Paradigm
Andrew M. K. Nassief
2021/1185
Giving an Adversary Guarantees (Or: How to Model Designated Verifier Signatures in a Composable Framework)
Ueli Maurer, Christopher Portmann, Guilherme Rito
2021/1184
On Time-Lock Cryptographic Assumptions in Abelian Hidden-Order Groups
Aron van Baarsen, Marc Stevens
2021/1183
ZKAttest: Ring and Group Signatures for Existing ECDSA Keys
Armando Faz-Hernández, Watson Ladd, Deepak Maram
2021/1182
Opportunistic Algorithmic Double-Spending: How I learned to stop worrying and hedge the Fork
Nicholas Stifter, Aljosha Judmayer, Philipp Schindler, Edgar Weippl
2021/1181
Rosita++: Automatic Higher-Order Leakage Elimination from Cryptographic Code
Madura A. Shelton, Łukasz Chmielewski, Niels Samwel, Markus Wagner, Lejla Batina, Yuval Yarom
2021/1180
The Effect of False Positives: Why Fuzzy Message Detection Leads to Fuzzy Privacy Guarantees?
István András Seres, Balázs Pejó, Péter Burcsi
2021/1179
Improved Attacks on GIFT-64
Ling Sun, Wei Wang, Meiqin Wang
2021/1178
Onion Routing with Replies
Christiane Kuhn, Dennis Hofheinz, Andy Rupp, and Thorsten Strufe
2021/1177
Algebraic Restriction Codes and their Applications
Divesh Aggarwal, Nico Döttling, Jesko Dujmovic, Mohammad Hajiabadi, Giulio Malavolta, Maciej Obremski
2021/1176
Amortized Threshold Symmetric-key Encryption
Mihai Christodorescu, Sivanarayana Gaddam, Pratyay Mukherjee, Rohit Sinha
2021/1175
Adaptive Security of Multi-Party Protocols, Revisited
Martin Hirt, Chen-Da Liu-Zhang, Ueli Maurer
2021/1174
On Communication-Efficient Asynchronous MPC with Adaptive Security
Annick Chopard, Martin Hirt, Chen-Da Liu-Zhang
2021/1173
Lelantus Spark: Secure and Flexible Private Transactions
Aram Jivanyan and Aaron Feickert
2021/1172
Systematizing Core Properties of Pairing-Based Attribute-Based Encryption to Uncover Remaining Challenges in Enforcing Access Control in Practice
Marloes Venema, Greg Alpár, Jaap-Henk Hoepman
2021/1171
FAST: Secure and High Performance Format-Preserving Encryption and Tokenization
F. Betül Durak, Henning Horst, Michael Horst, Serge Vaudenay
2021/1170
Downgradable Identity-Based Signatures and Trapdoor Sanitizable Signatures from Downgradable Affine MACs
Masahito Ishizaka, Shinsaku Kiyomoto
2021/1169
As easy as ABC: Optimal (A)ccountable (B)yzantine (C)onsensus is easy!
Pierre Civit, Seth Gilbert, Vincent Gramoli, Rachid Guerraoui, Jovan Komatovic
2021/1168
Toward a Fully Secure Authenticated Encryption Scheme From a Pseudorandom Permutation (Full Version)
Wonseok Choi, Byeonghak Lee, Jooyoung Lee, Yeongmin Lee
2021/1167
fflonk: a Fast-Fourier inspired verifier efficient version of PlonK
Ariel Gabizon, Zachary J. Williamson
2021/1166
Fine-tuning the ISO/IEC Standard LightMAC
Soumya Chattopadhyay, Ashwin Jha, Mridul Nandi
2021/1165
Reputation at Stake! A Trust Layer over Decentralized Ledger for Multiparty Computation and Reputation-Fair Lottery
Mario Larangeira
2021/1164
Cube Attacks on Round-Reduced TinyJAMBU
Wil Liam Teng, Iftekhar Salam, Wei-Chuen Yau, Josef Pieprzyk, Raphaël C. -W. Phan
2021/1163
Information-Theoretically Secure MPC against Mixed Dynamic Adversaries
Ivan Damgård, Daniel Escudero, Divya Ravi
2021/1162
Software Implementation of Optimal Pairings on Elliptic Curves with Odd Prime Embedding Degrees
Yu Dai, Zijian Zhou, Fangguo Zhang, Chang-An Zhao
2021/1161
Balanced Non-Adjacent Forms
Marc Joye
2021/1160
Classical Attacks on a Variant of the RSA Cryptosystem
Abderrahmane Nitaj, Muhammad Rezal Kamel Ariffin, Nurul Nur Hanisah Adenan, Nur Azman Abu
2021/1159
Compact and Malicious Private Set Intersection for Small Sets
Mike Rosulek, Ni Trieu
2021/1158
Grafting Key Trees: Efficient Key Management for Overlapping Groups
Joël Alwen, Benedikt Auerbach, Mirza Ahad Baig, Miguel Cueto, Karen Klein, Guillermo Pascual-Perez, Krzysztof Pietrzak, Michael Walter
2021/1157
Private Approximate Nearest Neighbor Search with Sublinear Communication
Sacha Servan-Schreiber, Simon Langowski, Srinivas Devadas
2021/1156
Evolving Secret Sharing in Almost Semi-honest Model
Jyotirmoy Pramanik, Avishek Adhikari
2021/1155
GPS: Integration of Graphene, PALISADE, and SGX for Large-scale Aggregations of Distributed Data
Jonathan Takeshita, Colin McKechney, Justin Pajak, Antonis Papadimitriou, Ryan Karl, Taeho Jung
2021/1154
1, 2, 3, Fork: Counter Mode Variants based on a Generalized Forkcipher
Elena Andreeva, Amit Singh Bhati, Bart Preneel, Damian Vizar
2021/1153
SynCirc: Efficient Synthesis of Depth-Optimized Circuits for Secure Computation
Arpita Patra, Thomas Schneider, Ajith Suresh, Hossein Yalame
2021/1152
Bandersnatch: a fast elliptic curve built over the BLS12-381 scalar field
Simon Masson, Antonio Sanso, and Zhenfei Zhang
2021/1151
Efficient Modular Multiplication
Joppe W. Bos, Thorsten Kleinjung, Dan Page
2021/1150
Silver: Silent VOLE and Oblivious Transfer from Hardness of Decoding Structured LDPC Codes
COUTEAU Geoffroy, Peter Rindal, Srinivasan Raghuraman
2021/1149
Machine-checked ZKP for NP-relations: Formally Verified Security Proofs and Implementations of MPC-in-the-Head
José Bacelar Almeida, Manuel Barbosa, Manuel L Correia, Karim Eldefrawy, Stéphane Graham-Lengrand, Hugo Pacheco, Vitor Pereira
2021/1148
Fighting Fake News in Encrypted Messaging with the Fuzzy Anonymous Complaint Tally System (FACTS)
Linsheng Liu, Daniel S. Roche, Austin Theriault, Arkady Yerukhimovich
2021/1147
Clockwork Finance: Automated Analysis of Economic Security in Smart Contracts
Kushal Babel, Philip Daian, Mahimna Kelkar, Ari Juels
2021/1146
Key Encapsulation Mechanism with Tight Enhanced Security in the Multi-User Setting: Impossibility Result and Optimal Tightness
Shuai Han, Shengli Liu, Dawu Gu
2021/1145
Recurring Contingent Payment for Proofs of Retrievability
Aydin Abadi, Steven J. Murdoch, Thomas Zacharias
2021/1144
MAYO: Practical Post-Quantum Signatures from Oil-and-Vinegar Maps
Ward Beullens
2021/1143
Facial Recognition for Remote Electronic Voting – Missing Piece of the Puzzle or Yet Another Liability?
Sven Heiberg, Kristjan Krips, Jan Willemson, Priit Vinkel
2021/1142
The Elliptic Net Algorithm Revisited
Shiping Cai, Zhi Hu, Zheng-An Yao, Chang-An Zhao
2021/1141
Round-Efficient Byzantine Agreement and Multi-Party Computation with Asynchronous Fallback
Giovanni Deligios, Martin Hirt, Chen-Da Liu-Zhang
2021/1140
Computing Discrete Logarithms
Robert Granger, Antoine Joux
2021/1139
HyperLogLog: Exponentially Bad in Adversarial Settings
Kenneth G. Paterson, Mathilde Raynal
2021/1138
Optimal Good-case Latency for Rotating Leader Synchronous BFT
Ittai Abraham, Kartik Nayak, Nibesh Shrestha
2021/1137
qTESLA: Practical Implementations of a Quantum Attack Resistant Signature Scheme
Michael Burger, Juliane Krämer, Christian Bischof
2021/1136
A new Parallelization for p3Enum and Parallelized Generation of Optimized Pruning Functions
Michael Burger, Christian Bischof, Juliane Krämer
2021/1135
FDFB: Full Domain Functional Bootstrapping Towards Practical Fully Homomorphic Encryption
Kamil Kluczniak, Leonard Schild
2021/1134
Some observations on ZUC-256
Alexander Maximov
2021/1133
Multiradical isogenies
Wouter Castryck, Thomas Decru
2021/1132
Safe-Error Attacks on SIKE and CSIDH
Fabio Campos, Juliane Krämer, Marcel Müller
2021/1131
Multi-key Fully Homomorphic Encryption Scheme with Compact Ciphertexts
Tanping Zhou, Long Chen, Xiaoliang Che, Wenchao Liu, Zhenfeng Zhang, Xiaoyuan Yang
2021/1130
A note on group membership tests for $\G_1$, $\G_2$ and $\G_T$ on BLS pairing-friendly curves
Michael Scott
2021/1129
Beauty of Cryptography: the Cryptographic Sequences and the Golden Ratio
Shenghui Su, Jianhua Zheng, Shuwang Lv
2021/1128
Continuously Non-Malleable Secret Sharing: Joint Tampering, Plain Model and Capacity
Gianluca Brian, Antonio Faonio, Daniele Venturi
2021/1127
Bigdata-facilitated Two-party Authenticated Key Exchange for IoT
Bowen Liu, Qiang Tang, Jianying Zhou
2021/1126
Turn-Based Communication Channels
Carlo Brunetta, Mario Larangeira, Bei Liang, Aikaterini Mitrokotsa, Keisuke Tanaka
2021/1125
Towards Explaining Epsilon: A Worst-Case Study of Differential Privacy Risks
Luise Mehner, Saskia Nuñez von Voigt, Florian Tschorsch
2021/1124
A Semi-Permanent Stuck-At Fault Analysis on AES Rijndael SBox
Priyanka Joshi, Bodhisatwa Mazumdar
2021/1123
Oblivious RAM with Worst-Case Logarithmic Overhead
Gilad Asharov, Ilan Komargodski, Wei-Kai Lin, Elaine Shi
2021/1122
And Paper-Based is Better? Towards Comparability of Classic and Cryptographic Voting Schemes
Marc Nemes, Rebecca Schwerdt, Dirk Achenbach, Bernhard Löwe, Jörn Müller-Quade
2021/1121
Constant-Time Arithmetic for Safer Cryptography
Lúcás Críostóir Meier, Simone Colombo, Marin Thiercelin, Bryan Ford
2021/1120
Simpira Gets Simpler: Optimized Simpira on Microcontrollers
Minjoo Sim, Siwoo Eum, Hyeokdong Kwon, Kyungbae Jang, Hyunjun Kim, Hyunji Kim, Gyeongju Song, Wai-Kong Lee, Hwajeong Seo
2021/1119
Automatic Classical and Quantum Rebound Attacks on AES-like Hashing by Exploiting Related-key Differentials
Xiaoyang Dong, Zhiyu Zhang, Siwei Sun, Congming Wei, Xiaoyun Wang, Lei Hu
2021/1118
THC: Practical and Cost-Effective Verification of Delegated Computation
Pablo Rauzy, Ali Nehme
2021/1117
All the Polynomial Multiplication You Need on RISC-V
Hwajeong Seo, Hyeokdong Kwon, Siwoo Eum, Kyungbae Jang, Hyunjun Kim, Hyunji Kim, Minjoo Sim, Gyeongju Song, Wai-Kong Lee
2021/1116
Labeled PSI from Homomorphic Encryption with Reduced Computation and Communication
Kelong Cong, Radames Cruz Moreno, Mariana Botelho da Gama, Wei Dai, Ilia Iliashenko, Kim Laine, Michael Rosenberg
2021/1115
Evolving Secret Sharing Schemes Based on Polynomial Evaluations and Algebraic Geometry Codes
Chaoping Xing, Chen Yuan
2021/1114
Remarks on MOBS and cryptosystems using semidirect products
Chris Monico
2021/1113
On the Security of Doubly Efficient PIR
Elette Boyle, Justin Holmgren, Fermi Ma, Mor Weiss
2021/1112
Key agreement: security / division
Daniel R. L. Brown
2021/1111
A Low-Randomness Second-Order Masked AES
Tim Beyne, Siemen Dhooghe, Adrián Ranea, Danilo Šijačić
2021/1110
Secure and Efficient Software Masking on Superscalar Pipelined Processors
Barbara Gigerl, Robert Primas, Stefan Mangard
2021/1109
On Actively Secure Fine-grained Access Structures from Isogeny Assumptions
Philipp Muth, Fabio Campos
2021/1108
Preservation of DNA Privacy During the Large Scale Detection of COVID
Marcel Hollenstein, David Naccache, Peter B. Roenne, Peter Y A Ryan, Robert Weil, Ofer Yifrach-Stav
2021/1107
Multi-Leak Deep-Learning Side-Channel Analysis
Fanliang Hu, Huanyu Wang, Junnian Wang
2021/1106
Primary Elements in Cyclotomic Fields with Applications to Power Residue Symbols, and More
Eric Brier, Rémi Géraud-Stewart, Marc Joye, David Naccache
2021/1105
Improved Linear Approximations of SNOW-V and SNOW-Vi
Zhen Shi, Chenhui Jin, Yu Jin
2021/1104
New Cryptanalysis of ZUC-256 Initialization Using Modular Differences
Fukang Liu, Willi Meier, Santanu Sarkar, Gaoli Wang, Ryoma Ito, Takanori Isobe
2021/1103
Exploring Differential-Based Distinguishers and Forgeries for ASCON
David Gerault, Thomas Peyrin, Quan Quan Tan
2021/1102
Construction and Implementation of Practical Reusable and Robust Fuzzy Extractors for Fingerprint
Lin You, Wang Cheng, Gengran Hu
2021/1101
Differential Privacy in Constant Function Market Makers
Tarun Chitra, Guillermo Angeris, Alex Evans
2021/1100
REDsec: Running Encrypted Discretized Neural Networks in Seconds
Lars Folkerts, Charles Gouert, Nektarios Georgios Tsoutsos
2021/1099
MILP modeling of Boolean functions by minimum number of inequalities
Aleksei Udovenko
2021/1098
Individual Verifiability and Revoting in the Estonian Internet Voting System
Olivier Pereira
2021/1097
The Hadamard square of concatenated linear codes
Ivan Chizhov, Alexandra Davletshina
2021/1096
Mt. Random: Multi-Tiered Randomness Beacons
Ignacio Cascudo, Bernardo David, Omer Shlomovits, and Denis Varlakov
2021/1095
Analyzing Masked Ciphers Against Transition and Coupling Effects
Siemen Dhooghe
2021/1094
Resilient Uniformity: Applying Resiliency in Masking
Siemen Dhooghe, Svetla Nikova
2021/1093
Quantum Algorithms for Variants of Average-Case Lattice Problems via Filtering
Yilei Chen, Qipeng Liu, Mark Zhandry
2021/1092
SoK: Deep Learning-based Physical Side-channel Analysis
Stjepan Picek, Guilherme Perin, Luca Mariot, Lichao Wu, Lejla Batina
2021/1091
No (Good) Loss no Gain: Systematic Evaluation of Loss functions in Deep Learning-based Side-channel Analysis
Maikel Kerkhof, Lichao Wu, Guilherme Perin, Stjepan Picek
2021/1090
Towards Accountability in CRS Generation
Prabhanjan Ananth, Gilad Asharov, Hila Dahari, Vipul Goyal
2021/1089
Threshold scheme to share a secret by means of sound ranging
Sergij V. Goncharov
2021/1088
Studying Bitcoin privacy attacks and their Impact on Bitcoin-based Identity Methods
Simin Ghesmati, Walid Fdhila, Edgar Weippl
2021/1087
Methods for Decentralized Identities: Evaluation and Insights
Walid Fdhila, Nicholas Stifter, Kristian Kostal, Cihan Saglam, Markus Sabadello
2021/1086
How do the Arbiter PUFs Sample the Boolean Function Class?
Animesh Roy, Dibyendu Roy, Subhamoy Maitra
2021/1085
Homomorphic Encryption for Multiple Users with Less Communications
Jeongeun Park
2021/1084
Towards the Least Inequalities for Describing a Subset in $Z_2^n$
Yao Sun
2021/1083
Modular Design of Secure Group Messaging Protocols and the Security of MLS
Joël Alwen, Sandro Coretti, Yevgeniy Dodis, Yiannis Tselekounis
2021/1082
Some remarks on how to hash faster onto elliptic curves
Dmitrii Koshelev
2021/1081
OnionPIR: Response Efficient Single-Server PIR
Muhammad Haris Mughees, Hao Chen, Ling Ren
2021/1080
SplitGuard: Detecting and Mitigating Training-Hijacking Attacks in Split Learning
Ege Erdogan, Alptekin Kupcu, A. Ercument Cicek
2021/1079
The Exact Complexity of Pseudorandom Functions and Tight Barriers to Lower Bound Proofs
Zhiyuan Fan, Jiatu Li, Tianqi Yang
2021/1078
Reflection, Rewinding, and Coin-Toss in EasyCrypt
Denis Firsov, Dominique Unruh
2021/1077
MProve+ : Privacy Enhancing Proof of Reserves Protocol for Monero
Arijit Dutta, Suyash Bagad, Saravanan Vijayakumaran
2021/1076
Hardness of KT Characterizes Parallel Cryptography
Hanlin Ren, Rahul Santhanam
2021/1075
The security of the code-based signature scheme based on the Stern identification protocol
Victoria Vysotskaya, Ivan Chizhov
2021/1074
UnSplit: Data-Oblivious Model Inversion, Model Stealing, and Label Inference Attacks Against Split Learning
Ege Erdogan, Alptekin Kupcu, A. Ercument Cicek
2021/1073
"Act natural!": Having a Private Chat on a Public Blockchain
Thore Tiemann, Sebastian Berndt, Thomas Eisenbarth, and Maciej Liskiewicz
2021/1072
Streaming SPHINCS+ for Embedded Devices using the Example of TPMs
Ruben Niederhagen, Johannes Roth, Julian Wälde
2021/1071
Improved Verifiability for BeleniosVS
Thomas Haines, Rajeev Gore
2021/1070
Onyx: New Encryption and Signature Schemes with Multivariate Public Key in Degree 3
Gilles Macario-Rat, Jacques Patarin
2021/1069
Djed: A Formally Verified Crypto-Backed Pegged Algorithmic Stablecoin
Joachim Zahnentferner, Dmytro Kaidalov, Jean-Frédéric Etienne, and Javier Díaz
2021/1068
A Simple Post-Quantum Non-Interactive Zero-Knowledge Proof from Garbled Circuits
Hongrui Cui, Kaiyi Zhang
2021/1067
A Tale of Twin Primitives: Single-chip Solution for PUFs and TRNGs
Kuheli Pratihar, Urbi Chatterjee, Manaar Alam, Debdeep Mukhopadhyay, Rajat Subhra Chakraborty
2021/1066
Taphonomical Security: (DNA) Information with Foreseeable Lifespan
Fatima-Ezzahra El Orche, Marcel Hollenstein, Sarah Houdaigoui, David Naccache, Daria Pchelina, Peter B. Roenne, Peter Y. A. Ryan, Julien Weibel, Robert Weil
2021/1065
Time, Privacy, Robustness, Accuracy: Trade Offs for the Open Vote Network Protocol
Gergei Bana, Marco Biroli, Megi Dervishi, Fatima-Ezzahra El Orche, Rémi Géraud-Stewart, David Naccache, Peter B. Roenne, Peter Y. A. Ryan, Hugo Waltsburger
2021/1064
Glowworm Attack: Optical TEMPEST Sound Recovery via a Device’s Power Indicator LED
Ben Nassi, Yaron Pirutin, Tomer Cohen Galor, Yuval Elovici, Boris Zadov
2021/1063
Cairo – a Turing-complete STARK-friendly CPU architecture
Lior Goldberg, Shahar Papini, Michael Riabzev
2021/1062
On the Nonsingularity and Equivalence of NFSRs
Yingyin Pan, Jianghua Zhong, Dongdai Lin
2021/1061
Edwards curves and FFT-based multiplication
Pavel Atnashev, George Woltman
2021/1060
Discovering New $L$-Function Relations Using Algebraic Sieving
Hadrien Barral, Éric Brier, Rémi Géraud-Stewart, Arthur Léonard, David Naccache, Quentin Vermande, Samuel Vivien
2021/1059
Revisiting cryptanalysis on ChaCha from Crypto 2020 and Eurocrypt 2021
Sabyasachi Dey, Chandan Dey, Santanu Sarkar, Willi Meier
2021/1058
Cryptanalysis of Caesar using Quantum Support Vector Machine
Hyunji Kim, Gyeongju Song, Kyoungbae Jang, Hwajeong Seo
2021/1057
An Efficient Data Protection Scheme Based on Hierarchical ID-Based Encryption for Message Queueing Telemetry Transport
Chun-I Fan, Cheng-Han Shie, Yi-Fan Tseng, Hui-Chun Huang
2021/1056
Revocable Attribute-Based Encryption for Multi-Keyword Search in Clouds
Chun-I Fan, Si-Jing Wu, Yi-Fan Tseng
2021/1055
Threshold Schnorr with Stateless Deterministic Signing from Standard Assumptions
François Garillot, Yashvanth Kondi, Payman Mohassel, Valeria Nikolaenko
2021/1054
One-time Traceable Ring Signatures
Alessandra Scafuro, Bihan Zhang
2021/1053
XDIVINSA: eXtended DIVersifying INStruction Agent to Mitigate Power Side-Channel Leakage
Thinh H. Pham, Ben Marshall, Alexander Fell, Siew-Kei Lam, Daniel Page
2021/1052
Comparing Lattice Families for Bounded Distance Decoding near Minkowski’s Bound.
Oleksandra Lapiha
2021/1051
Collisions in Supersingular Isogeny Graphs and the SIDH-based Identification Protocol
Wissam Ghantous, Shuichi Katsumata, Federico Pintore, Mattia Veroni
2021/1050
Privacy-Enhancing Group Signcryption Scheme
Sara Ricci, Petr Dzurenda, Jan Hajny, Lukas Malina
2021/1049
Binary Search in Secure Computation
Marina Blanton, Chen Yuan
2021/1048
Aggregating and thresholdizing hash-based signatures using STARKs
Irakliy Khaburzaniya, Konstantinos Chalkias, Kevin Lewi, Harjasleen Malvai
2021/1047
A Correlation Attack on Full SNOW-V and SNOW-Vi
Zhen Shi, Chenhui Jin, Jiyan Zhang, Ting Cui, Lin Ding, Yu Jin
2021/1046
On the modifier Q for multivariate signature schemes
Yasufumi Hashimoto
2021/1045
An improvement of algorithms to solve under-defined systems of multivariate quadratic equations
Yasufumi Hashimoto
2021/1044
On the security of Hufu-UOV
Yasufumi Hashimoto
2021/1043
Brakedown: Linear-time and field-agnostic SNARKs for R1CS
Alexander Golovnev, Jonathan Lee, Srinath Setty, Justin Thaler, and Riad S. Wahby
2021/1042
Rate One-Third Non-malleable Codes
Divesh Aggarwal, Sruthi Sekar, Bhavana Kanukurthi, Maciej Obremski, Sai Lakshmi Bhavana Obbattu
2021/1041
On the Multiplicative Complexity of Cubic Boolean Functions
Meltem Sonmez Turan, Rene Peralta
2021/1040
MUSE: Secure Inference Resilient to Malicious Clients
Ryan Lehmkuhl, Pratyush Mishra, Akshayaram Srinivasan, Raluca Ada Popa
2021/1039
Neyman’s Smoothness Test: a Trade-off between Moment-based and Distribution-based Leakage Detections
Si Gao, Elisabeth Oswald, Yan Yan
2021/1038
Reinforced Concrete: A Fast Hash Function for Verifiable Computation
Lorenzo Grassi, Dmitry Khovratovich, Reinhard Lüftenegger, Christian Rechberger, Markus Schofnegger, Roman Walch
2021/1037
Randomness Bounds for Private Simultaneous Messages and Conditional Disclosure of Secrets
Akinori Kawachi, Maki Yoshida
2021/1036
Lelantus-CLA
Pyrros Chaidos, Vladislav Gelfer
2021/1035
SoK: Cryptanalysis of Encrypted Search with LEAKER - A framework for LEakage AttacK Evaluation on Real-world data
Seny Kamara, Abdelkarim Kati, Tarik Moataz, Thomas Schneider, Amos Treiber, Michael Yonli
2021/1034
Optimal encodings to elliptic curves of $j$-invariants $0$, $1728$
Dmitrii Koshelev
2021/1033
Limits of Polynomial Packings for $\mathbb{Z}_{p^k}$ and $\mathbb{F}_{p^k}$
Jung Hee Cheon, Keewoo Lee
2021/1032
AdVeil: A Private Targeted Advertising Ecosystem
Sacha Servan-Schreiber, Kyle Hogan, Srinivas Devadas
2021/1031
Commitment Schemes from Supersingular Elliptic Curve Isogeny Graphs
Bruno Sterner
2021/1030
A lightweight ISE for ChaCha on RISC-V
Ben Marshall, Daniel Page, Thinh Hung Pham
2021/1029
LOVE a pairing
Diego F. Aranha, Elena Pagnin, Francisco Rodríguez-Henríquez
2021/1028
Structural Attack (and Repair) of Diffused-Input-Blocked-Output White-Box Cryptography
Claude Carlet, Sylvain Guilley, Sihem Mesnager
2021/1027
On Fingerprinting Attacks and Length-Hiding Encryption
Kai Gellert, Tibor Jager, Lin Lyu, Tom Neuschulten
2021/1026
On the Hardness of Ring/Module/Polynomial LWR Problems
Yang Wang, Yanmin Zhao, Mingqiang Wang
2021/1025
Efficient Information-Theoretic Multi-Party Computation over Non-Commutative Rings
Daniel Escudero, Eduardo Soria-Vazquez
2021/1024
Efficient Implementation of Lightweight Hash Functions on GPU and Quantum Computers for IoT Applications
Wai-Kong Lee, Kyungbae Jang, Gyeongju Song, Hyunji Kim, Seong Oun Hwang, Hwajeong Seo
2021/1023
SIDH Proof of Knowledge
Luca De Feo, Samuel Dobson, Steven D. Galbraith, Lukas Zobernig
2021/1022
Zero-Knowledge Middleboxes
Paul Grubbs, Arasu Arun, Ye Zhang, Joseph Bonneau, Michael Walfish
2021/1021
Power-based Side Channel Attack Analysis on PQC Algorithms
Tendayi Kamucheka, Michael Fahr, Tristen Teague, Alexander Nelson, David Andrews, Miaoqing Huang
2021/1020
Designing a Practical Code-based Signature Scheme from Zero-Knowledge Proofs with Trusted Setup
Shay Gueron, Edoardo Persichetti, Paolo Santini
2021/1019
Implementing and Measuring KEMTLS
Sofía Celi, Armando Faz-Hernández, Nick Sullivan, Goutam Tamvada, Luke Valenta, Thom Wiggers, Bas Westerbaan, Christopher A. Wood
2021/1018
Obfustopia Built on Secret-Key Functional Encryption
Fuyuki Kitagawa, Ryo Nishimaki, Keisuke Tanaka
2021/1017
Improve Neural Distinguisher for Cryptanalysis
Zezhou Hou, Jiongjiong Ren, Shaozhen Chen
2021/1016
Quantum collision finding for homomorphic hash functions
Juan Carlos Garcia-Escartin, Vicent Gimeno, Julio José Moyano-Fernández
2021/1015
Look-up the Rainbow: Efficient Table-based Parallel Implementation of Rainbow Signature on 64-bit ARMv8 Processors
Hyeokdong Kwon, Hyunjun Kim, Minjoo Sim, Wai-Kong Lee, Hwajeong Seo
2021/1014
SoC Security Properties and Rules
Nusrat Farzana Dipu, Farimah Farahmandi, Mark Tehranipoor
2021/1013
Iterative Oblivious Pseudo-Random Functions and Applications
Erik-Oliver Blass, Florian Kerschbaum, Travis Mayberry
2021/1012
A Formal Security Analysis of the W3C Web Payment APIs: Attacks and Verification
Quoc Huy Do, Pedram Hosseyni, Ralf Kuesters, Guido Schmitz, Nils Wenzler, Tim Wuertele
2021/1011
A Fast and Flexible Multi-Client Functional Encryption for Set Intersection
Mojtaba Rafiee
2021/1010
Circuit friendly, post-quantum dynamic accumulators from RingSIS with logarithmic prover time
Endre (Silur) Abraham
2021/1009
Polynomial Representation Is Tricky: Maliciously Secure Private Set Intersection Revisited
Aydin Abadi, Steven J. Murdoch, Thomas Zacharias
2021/1008
Public-key Authenticated Encryption with Keyword Search: Cryptanalysis, Enhanced Security, and Quantum-resistant Instantiation
Zi-Yuan Liu, Yi-Fan Tseng, Raylin Tso, Masahiro Mambo, Yu-Chi Chen
2021/1007
Provably Solving the Hidden Subset Sum Problem via Statistical Learning
Jean-Sebastien Coron, Agnese Gini
2021/1006
UOV-Pepper: New Public Key Short Signature in Degree 3
Gilles Macario-Rat, Jacques Patarin
2021/1005
On the Construction and Cryptanalysis of Multi-Ciphers
Arush Chhatrapati
2021/1004
Towards Attack Resilient Arbiter PUF-Based Strong PUFs
Nils Wisiol
2021/1003
SCA-secure ECC in software – mission impossible?
Lejla Batina, Łukasz Chmielewski, Björn Haase, Niels Samwel, Peter Schwabe
2021/1002
Online Linear Extractors for Independent Sources
Yevgeniy Dodis, Siyao Guo, Noah Stephens-Davidowitz, Zhiye Xie
2021/1001
Classical Binding for Quantum Commitments
Nir Bitansky, Zvika Brakerski
2021/1000
A Lattice-based Provably Secure Multisignature Scheme in Quantum Random Oracle Model
Masayuki Fukumitsu, Shingo Hasegawa
2021/999
NTRU Fatigue: How Stretched is Overstretched?
Léo Ducas, Wessel van Woerden
2021/998
Polynomial multiplication on embedded vector architectures
Hanno Becker, Jose Maria Bermudo Mera, Angshuman Karmakar, Joseph Yiu, Ingrid Verbauwhede
2021/997
Higher-Order Lookup Table Masking in Essentially Constant Memory
Annapurna Valiveti, Srinivas Vivek
2021/996
Kadcast-NG: A Structured Broadcast Protocol for Blockchain Networks
Elias Rohrer, Florian Tschorsch
2021/995
Multi-moduli NTTs for Saber on Cortex-M3 and Cortex-M4
Amin Abdulrahman, Jiun-Peng Chen, Yu-Jia Chen, Vincent Hwang, Matthias J. Kannwischer, Bo-Yin Yang
2021/994
BKW Meets Fourier: New Algorithms for LPN with Sparse Parities
Dana Dachman-Soled, Huijing Gong, Hunter Kippen, Aria Shahverdi
2021/993
FLOD: Oblivious Defender for Private Byzantine-Robust Federated Learning with Dishonest-Majority
Ye Dong, Xiaojun Chen, Kaiyun Li, Dakui Wang, Shuai Zeng
2021/992
Faster Public-key Compression of SIDH with Less Memory
Kaizhan Lin, Jianming Lin, Weize Wang, Chang-An Zhao
2021/991
Fake it till you make it: Data Augmentation using Generative Adversarial Networks for all the crypto you need on small devices
Naila Mukhtar, Lejla Batina, Stjepan Picek, Yinan Kong
2021/990
Secret Keys in Genus-2 SIDH
Sabrina Kunzweiler, Yan Bo Ti, Charlotte Weitkämper
2021/989
Stateful KEM: Towards Optimal Robust Combiner for Key Encapsulation Mechanism
Jia Xu, Yiwen Gao, Hoon Wei Lim, Hongbing Wang, Ee-Chien Chang
2021/988
Concurrent Signatures from a Variety of Keys
George Teseleanu
2021/987
A Formal Security Analysis of Session Resumption Across Hostnames
Kai Gellert, Tobias Handirk
2021/986
Neon NTT: Faster Dilithium, Kyber, and Saber on Cortex-A72 and Apple M1
Hanno Becker, Vincent Hwang, Matthias J. Kannwischer, Bo-Yin Yang, Shang-Yi Yang
2021/985
PUF Security: Reviewing The Validity of Spoofing Attack Against Safe is the New Smart
Karim Lounis
2021/984
On the Use of the Legendre Symbol in Symmetric Cipher Design
Alan Szepieniec
2021/983
A Cryptographic Hash Function from Markoff Triples
Elena Fuchs, Kristin Lauter, Matthew Litman, Austin Tran
2021/982
Quantum Implementation and Resource Estimates for RECTANGLE and KNOT
Anubhab Baksi, Kyungbae Jang, Gyeongju Song, Hwajeong Seo, Zejun Xiang
2021/981
Deep Learning-based Side-channel Analysis against AES Inner Rounds
Sudharshan Swaminathan, Lukasz Chmielewski, Guilherme Perin, Stjepan Picek
2021/980
Binary Field Montgomery Multiplication on Quantum Computers
Kyoungbae Jang, Gyeong Ju Song, Hyunji Kim, Hyeokdong Kwon, Wai-Kong Lee, Zhi Hu, Hwajeong Seo
2021/979
Constant-Overhead Zero-Knowledge for RAM Programs
Nicholas Franzese, Jonathan Katz, Steve Lu, Rafail Ostrovsky, Xiao Wang, Chenkai Weng
2021/978
Polymath: Low-Latency MPC via Secure Polynomial Evaluations and its Applications
Donghang Lu, Albert Yu, Aniket Kate, Hemanta Maji
2021/977
Shorter and Faster Post-Quantum Designated-Verifier zkSNARKs from Lattices
Yuval Ishai, Hang Su, David J. Wu
2021/976
Reinventing BrED: A Practical Construction Formal Treatment of Broadcast Encryption with Dealership
Avishek Majumder and Sayantan Mukherjee
2021/975
Bridges connecting Encryption Schemes
Mugurel Barcau, Cristian Lupascu, Vicentiu Pasol, George C. Turcas
2021/974
Fast Keyword Search over Encrypted Data with Short Ciphertext in Clouds
Yi-Fan Tseng, Chun-I Fan, Zi-Cheng Liu
2021/973
A Multiplatform Parallel Approach for Lattice Sieving Algorithms
Michał Andrzejczak, Kris Gaj
2021/972
Partial Key Exposure Attack on Short Secret Exponent CRT-RSA
Alexander May, Julian Nowakowski, Santanu Sarkar
2021/971
Tighter Security for Schnorr Identification and Signatures: A High-Moment Forking Lemma for $\Sigma$-Protocols
Lior Rotem, Gil Segev
2021/970
Short Identity-Based Signatures with Tight Security from Lattices
Jiaxin Pan, Benedikt Wagner
2021/969
Influence of a Set of Variables on a Boolean Function
Aniruddha Biswas, Palash Sarkar
2021/968
Quantum-Resistance Meets White-Box Cryptography: How to Implement Hash-Based Signatures against White-Box Attackers?
Kemal Bicakci, Kemal Ulker, Yusuf Uzunay, Halis Taha Şahin, Muhammed Said Gündoğan
2021/967
Assessment of Quantum Threat To Bitcoin and Derived Cryptocurrencies
Stephen Holmes, Liqun Chen
2021/966
Soteria: Preserving Privacy in Distributed Machine Learning
Cláudia Brito, Pedro Ferreira, Bernardo Portela, Rui Oliveira, João Paulo
2021/965
Automatic Search for Bit-based Division Property
Shibam Ghosh, Orr Dunkelman
2021/964
Secure Quantum Computation with Classical Communication
James Bartusek
2021/963
Post-Quantum Key-Blinding for Authentication in Anonymity Networks
Edward Eaton, Douglas Stebila, Roy Stracovsky
2021/962
Practically Solving LPN
Thom Wiggers, Simona Samardjiska
2021/961
Cryptimeleon: A Library for Fast Prototyping of Privacy-Preserving Cryptographic Schemes
Jan Bobolz, Fabian Eidens, Raphael Heitjohann, Jeremy Fell
2021/960
The SPEEDY Family of Block Ciphers - Engineering an Ultra Low-Latency Cipher from Gate Level for Secure Processor Architectures
Gregor Leander, Thorben Moos, Amir Moradi, Shahram Rasoolzadeh
2021/959
The Best of Two Worlds: Deep Learning-assisted Template Attack
Lichao Wu, Guilherme Perin, Stjepan Picek
2021/958
When the Decoder Has to Look Twice: Glitching a PUF Error Correction
Jonas Ruchti, Michael Gruber, Michael Pehl
2021/957
Three-Round Secure Multiparty Computation from Black-Box Two-Round Oblivious Transfer
Arpita Patra, Akshayaram Srinivasan
2021/956
Chosen Ciphertext k-Trace Attacks on Masked CCA2 Secure Kyber
Mike Hamburg, Julius Hermelink, Robert Primas, Simona Samardjiska, Thomas Schamberger, Silvan Streit, Emanuele Strieder, Christine van Vredendaal
2021/955
Higher-degree supersingular group actions
Mathilde Chenu, Benjamin Smith
2021/954
Scabbard: a suite of efficient learning with rounding key-encapsulation mechanisms
Jose Maria Bermudo Mera, Angshuman Karmakar, Suparna Kundu, Ingrid Verbauwhede
2021/953
State-free End-to-End Encrypted Storage and Chat Systems based on Searchable Encryption
Keita Emura, Ryoma Ito, Sachiko Kanamori, Ryo Nojima, Yohei Watanabe
2021/952
On the Evaluation of Deep Learning-based Side-channel Analysis
Lichao Wu, Guilherme Perin, Stjepan Picek
2021/951
Bitslice Masking and Improved Shuffling: How and When to Mix Them in Software?
Melissa Azouaoui, Olivier Bronchain, Vincent Grosso, Kostas Papagiannopoulos, François-Xavier Standaert
2021/950
Exploring Crypto-Physical Dark Matter and Learning with Physical Rounding Towards Secure and Efficient Fresh Re-Keying
Sébastien Duval, Pierrick Méaux, Charles Momin, François-Xavier Standaert
2021/949
A High-Speed Architecture for the Reduction in VDF Based on a Class Group
Yifeng Song, Danyang Zhu, Jing Tian, Zhongfeng Wang
2021/948
How to Make a Secure Index for Searchable Symmetric Encryption, Revisited
Yohei Watanabe, Takeshi Nakai, Kazuma Ohara, Takuya Nojima, Yexuan Liu, Mitsugu Iwamoto, Kazuo Ohta
2021/947
Autocorrelations of vectorial Boolean functions
Anne Canteaut, Lukas Kölsch, Chao Li, Chunlei Li, Kangquan Li, Longjiang Qu, Friedrich Wiemer
2021/946
Hidden Cosets and Applications to Unclonable Cryptography
Andrea Coladangelo, Jiahui Liu, Qipeng Liu, Mark Zhandry
2021/945
Limits on the Adaptive Security of Yao's Garbling
Chethan Kamath, Karen Klein, Krzysztof Pietrzak, Daniel Wichs
2021/944
Systematic Side-channel Analysis of Curve25519 with Machine Learning
Léo Weissbart, Łukasz Chmielewski, Stjepan Picek, Lejla Batina
2021/943
Breaking the Circuit-Size Barrier for Secure Computation under Quasi-Polynomial LPN
Geoffroy Couteau, Pierre Meyer
2021/942
Compact Ring Signatures from Learning With Errors
Rohit Chatterjee, Sanjam Garg, Mohammad Hajiabadi, Dakshita Khurana, Xiao Liang, Giulio Malavolta, Omkant Pandey, Sina Shiehian
2021/941
Spectral Approach to Process the (Multivariate) High-Order Template Attack against Any Masking Scheme
Maamar Ouladj, Sylvain Guilley, Philippe Guillot, and Farid Mokrane
2021/940
SecretStore: A Secrecy as a Service model to enable the Cloud Storage to store user's secret data
Ripon Patgiri, Malaya Dutta Borah, Laiphrakpam Dolendro Singh
2021/939
OmniLytics: A Blockchain-based Secure Data Market for Decentralized Machine Learning
Jiacheng Liang, Songze Li, Wensi Jiang, Bochuan Cao, Chaoyang He
2021/938
Plactic signatures (insecure?)
Daniel R. L. Brown
2021/937
Storing data that is updated regularly on a client machine securely
Artem Los
2021/936
FIVER -- Robust Verification of Countermeasures against Fault Injections
Jan Richter-Brockmann, Aein Rezaei Shahmirzadi, Pascal Sasdrich, Amir Moradi, Tim Güneysu
2021/935
ROTed: Random Oblivious Transfer for embedded devices
Pedro Branco, Luís Fiolhais, Manuel Goulão, Paulo Martins, Paulo Mateus, Leonel Sousa
2021/934
ECLIPSE: Enhanced Compiling method for Pedersen-committed zkSNARK Engines
Diego F. Aranha, Emil Madsen Bennedsen, Matteo Campanelli, Chaya Ganesh, Claudio Orlandi, Akira Takahashi
2021/933
Fast Factoring Integers by SVP Algorithms, corrected
Claus Peter Schnorr
2021/932
Succinct Functional Commitment for a Large Class of Arithmetic Circuits
Helger Lipmaa, Kateryna Pavlyk
2021/931
Practical Key Recovery Attacks on FlexAEAD
Orr Dunkelman, Maria Eichlseder, Daniel Kales, Nathan Keller, Gaëtan Leurent, and Markus Schofnegger
2021/930
Darlin: Recursive Proofs using Marlin
Ulrich Haböck, Alberto Garoffolo, Daniele Di Benedetto
2021/929
A polynomial time key-recovery attack on the Sidon cryptosystem
Pierre Briaud, Jean-Pierre Tillich, Javier Verbel
2021/928
Necessary and Sufficient Conditions for Galois NFSRs Equivalent to Fibonacci Ones and Their Application to the Stream Cipher Trivium
Jianghua Zhong, Yingyin Pan, Wenhui Kong, Dongdai Lin
2021/927
A New Simple Technique to Bootstrap Various Lattice Zero-Knowledge Proofs to QROM Secure NIZKs
Shuichi Katsumata
2021/926
On Treewidth, Separators and Yao's Garbling
Chethan Kamath, Karen Klein, Krzysztof Pietrzak
2021/925
Bilinear Map Based One-Time Signature Scheme with Secret Key Exposure
Marten van Dijk, Deniz Gurevin, Chenglu Jin, Omer Khan, Phuong Ha Nguyen
2021/924
On Removing Rejection Conditions in Practical Lattice-Based Signatures
Rouzbeh Behnia, Yilei Chen, Daniel Masny
2021/923
On the (in)security of ElGamal in OpenPGP
Luca De Feo, Bertram Poettering, Alessandro Sorniotti
2021/922
Provably Secure Short Signature Scheme from Isogeny between Elliptic Curves
Kunal Dey, Sumit Kumar Debnath
2021/921
Semilinear Transformations in Coding Theory: A New Technique in Code-Based Cryptography
Wenshuo Guo, Fang-Wei Fu
2021/920
Non-malleable Commitments against Quantum Attacks
Nir Bitansky, Huijia Lin, Omri Shmueli
2021/919
The supersingular isogeny path and endomorphism ring problems are equivalent
Benjamin Wesolowski
2021/918
The Round Complexity of Quantum Zero-Knowledge
Orestis Chardouvelis, Giulio Malavolta
2021/917
CODBS: A cascading oblivious search protocol optimized for real-world relational database indexes
Rogério Pontes, Bernardo Portela, Manuel Barbosa, Ricardo Vilaça
2021/916
Mithril: Stake-based Threshold Multisignatures
Pyrros Chaidos and Aggelos Kiayias
2021/915
A PCP Theorem for Interactive Proofs and Applications
Gal Arnon, Alessandro Chiesa, Eylon Yogev
2021/914
Principal Component Analysis using CKKS Homomorphic Encryption Scheme
Samanvaya Panda
2021/913
Practical complexities of probabilistic algorithms for solving Boolean polynomial systems
Stefano Barbero, Emanuele Bellini, Carlo Sanna, Javier Verbel
2021/912
On the looseness of FO derandomization
Daniel J. Bernstein
2021/911
SoK: Understanding BFT Consensus in the Age of Blockchains
Gang Wang
2021/910
SECDSA: Mobile signing and authentication under classical ``sole control''
Eric Verheul
2021/909
Efficiency through Diversity in Ensemble Models applied to Side-Channel Attacks – A Case Study on Public-Key Algorithms –
Gabriel Zaid, Lilian Bossuet, Amaury Habrard, Alexandre Venelli
2021/908
Selection of sampling keys for cryptographic tests
George Marinakis
2021/907
zkKYC: A solution concept for KYC without knowing your customer, leveraging self-sovereign identity and zero-knowledge proofs
Pieter Pauwels
2021/906
Two Public-Key Cryptosystems Based on Expanded Gabidulin Codes
Wenshuo Guo, Fang-Wei Fu
2021/905
A Tale of Two Boards: On the Influence of Microarchitecture on Side-Channel Leakage
Vipul Arora, Ileana Buhan, Guilherme Perin, Stjepan Picek
2021/904
Spatial Dependency Analysis to Extract Information from Side-Channel Mixtures
Aurélien Vasselle, Hugues Thiebeauld, Philippe Maurine
2021/903
Nowhere to Leak: Forward and Backward Private Symmetric Searchable Encryption in the Multi-Client Setting (Extended Version)
Alexandros Bakas, Antonis Michalas
2021/902
Breaking Masked and Shuffled CCA Secure Saber KEM by Power Analysis
Kalle Ngo, Elena Dubrova, Thomas Johansson
2021/901
Resolvable Block Designs in Construction of Approximate Real MUBs that are Sparse
Ajeet Kumar, Subhamoy Maitra
2021/900
ANS-based Compression and Encryption with 128-bit Security
Seyit Camtepe, Jarek Duda, Arash Mahboubi, Pawel Morawiecki, Surya Nepal, Marcin Pawlowski, Josef Pieprzyk
2021/899
Homomorphic decryption in blockchains via compressed discrete-log lookup tables
Panagiotis Chatzigiannis, Konstantinos Chalkias, Valeria Nikolaenko
2021/898
On Extremal Expanding Algebraic Graphs and post-quantum secure delivery of passwords, encryption maps and tools for multivariate digital signatures.
Vasyl Ustimenko
2021/897
A Rational Protocol Treatment of 51% Attacks
Christian Badertscher, Yun Lu, Vassilis Zikas
2021/896
Rebuttal to claims in Section 2.1 of the ePrint report 2021/583 "Entropoid-based cryptography is group exponentiation in disguise"
Danilo Gligoroski
2021/895
Targeted Lossy Functions and Applications
Willy Quach, Brent Waters, Daniel Wichs
2021/894
History of Cryptographic Key Sizes
Nigel P. Smart, Emmanuel Thome
2021/893
DEMO: AirCollect: Efficiently Recovering Hashed Phone Numbers Leaked via Apple AirDrop
Alexander Heinrich, Matthias Hollick, Thomas Schneider, Milan Stute, Christian Weinert
2021/892
Low-Latency Keccak at any Arbitrary Order
Sara Zarei, Aein Rezaei Shahmirzadi, Hadi Soleimany, Raziye Salarifard, Amir Moradi
2021/891
White Box Traitor Tracing
Mark Zhandry
2021/890
On One-way Functions and Sparse Languages
Yanyi Liu, Rafael Pass
2021/889
Counterexamples to New Circular Security Assumptions Underlying iO
Sam Hopkins, Aayush Jain, Huijia Lin
2021/888
Lifting Standard Model Reductions to Common Setup Assumptions
Ngoc Khanh Nguyen, Eftychios Theodorakis, Bogdan Warinschi
2021/887
Authenticated Key Exchange Protocol in the Standard Model under Weaker Assumptions
Janaka Alawatugoda, Taechan Kim
2021/886
Computational Records with Aging Hardware: Controlling Half the Output of SHA-256
Mellila Bouam, Charles Bouillaguet, Claire Delaplace, Camille Noûs
2021/885
MPC-Friendly Symmetric Cryptography from Alternating Moduli: Candidates, Protocols, and Applications
Itai Dinur, Steven Goldfeder, Tzipora Halevi, Yuval Ishai, Mahimna Kelkar, Vivek Sharma, Greg Zaverucha
2021/884
Blockchain Layer Zero: Characterizing the Bitcoin Network through Measurements, Models, and Simulations
Elias Rohrer, Florian Tschorsch
2021/883
Oblivious Key-Value Stores and Amplification for Private Set Intersection
Gayathri Garimella, Benny Pinkas, Mike Rosulek, Ni Trieu, Avishay Yanai
2021/882
Computational Hardness of Optimal FairComputation: Beyond Minicrypt
Hemanta K. Maji, Mingyuan Wang
2021/881
Secure Code-Based Key Encapsulation Mechanism with Short Ciphertext and Secret Key
Jayashree Dey, Ratna Dutta
2021/880
Towards Tight Random Probing Security
Gaëtan Cassiers, Sebastian Faust, Maximilian Orlt, François-Xavier Standaert
2021/879
Rethinking Searchable Symmetric Encryption
Zichen Gui, Kenneth G. Paterson, Sikhar Patranabis
2021/878
Programmable RO (PRO): A Multipurpose Countermeasure against Side-channel and Fault Injection Attacks
Yuan Yao, Pantea Kiaei, Richa Singh, Shahin Tajik, Patrick Schaumont
2021/877
A Fully Anonymous e-Voting Protocol Employing Universal zk-SNARKs and Smart Contracts
Aritra Banerjee
2021/876
Code Constructions and Bounds for Identification via Channels
Onur Gunlu, Joerg Kliewer, Rafael F. Schaefer, Vladimir Sidorenko
2021/875
Hybrid Signal protocol for post-quantum email encryption
Sara Stadler, Vitor Sakaguti, Harjot Kaur, Anna Lena Fehlhaber
2021/874
Chosen-ciphertext Clustering Attack on CRYSTALS-KYBER using the Side-channel Leakage of Barrett Reduction
Bo-Yeon Sim, Aesun Park, Dong-Guk Han
2021/873
KHAPE: Asymmetric PAKE from Key-Hiding Key Exchange
Yanqi Gu, Stanislaw Jarecki, Hugo Krawczyk
2021/872
W-OTS(+) up my Sleeve! A Hidden Secure Fallback for Cryptocurrency Wallets
David Chaum, Mario Larangeira, Mario Yaksetig, William Carter
2021/871
Traceable Secret Sharing and Applications
Vipul Goyal, Yifan Song, Akshayaram Srinivasan
2021/870
SoK: Gröbner Basis Algorithms for Arithmetization Oriented Ciphers
Jan Ferdinand Sauer, Alan Szepieniec
2021/869
MiniLedger: Compact-sized Anonymous and Auditable Distributed Payments
Panagiotis Chatzigiannis, Foteini Baldimtsi
2021/868
Low-Latency Hardware Masking of PRINCE
Nicolai Müller, Thorben Moos, Amir Moradi
2021/867
Key-Policy ABE with Switchable Attributes
Cécile Delerablée, Lénaïck Gouriou, David Pointcheval
2021/866
The One-More Discrete Logarithm Assumption in the Generic Group Model
Balthazar Bauer, Georg Fuchsbauer, Antoine Plouviez
2021/865
Quantum Key Search for Ternary LWE
Iggy van Hoof, Elena Kirshanova, Alexander May
2021/864
A Fast and Simple Partially Oblivious PRF, with Applications
Nirvan Tyagi, Sofı́a Celi, Thomas Ristenpart, Nick Sullivan, Stefano Tessaro, Christopher A. Wood
2021/863
Authenticated Key Exchange and Signatures with Tight Security in the Standard Model
Shuai Han, Tibor Jager, Eike Kiltz, Shengli Liu, Jiaxin Pan, Doreen Riepel, Sven Schäge
2021/862
Receiver-Anonymity in Rerandomizable RCCA-Secure Cryptosystems Resolved
Yi Wang, Rongmao Chen, Guomin Yang, Xinyi Huang, Baosheng Wang, Moti Yung
2021/861
Standard Model Leakage-Resilient Authenticated Key Exchange using Inner-product Extractors
Janaka Alawatugoda, Tatsuaki Okamoto
2021/860
Verification of the security in Boolean masked circuits
Vahid Jahandideh
2021/859
Concrete Evaluation of the Random Probing Security
Vahid Jahandideh
2021/858
Full key recovery side-channel attack against ephemeral SIKE on the Cortex-M4
Aymeric Genêt, Natacha Linard de Guertechin, Novak Kaluđerović
2021/857
Secure Computation for G-Module and its Applications
Qizhi Zhang, Bingsheng Zhang, Lichun Li, Shan Yin, Juanjuan Sun
2021/856
Key Guessing Strategies for Linear Key-Schedule Algorithms in Rectangle Attacks
Xiaoyang Dong, Lingyue Qin, Siwei Sun, Xiaoyun Wang
2021/855
Breaking and Fixing Virtual Channels: Domino Attack and Donner
Lukas Aumayr, Pedro Moreno-Sanchez, Aniket Kate, Matteo Maffei
2021/854
PQC: R-Propping of a Simple Oblivious Transfer
Pedro Hecht
2021/853
Private Signaling
Varun Madathil, Alessandra Scafuro, István András Seres, Omer Shlomovits, Denis Varlakov
2021/852
Improved Structured Encryption for SQL Databases via Hybrid Indexing
David Cash, Ruth Ng, Adam Rivkin
2021/851
Amun: Securing E-Voting Against Over-the-Shoulder Coercion
Riccardo Longo and Chiara Spadafora
2021/850
Resistance of Isogeny-Based Cryptographic Implementations to a Fault Attack
Élise Tasso, Luca De Feo, Nadia El Mrabet, Simon Pontié
2021/849
Curse of Re-encryption: A Generic Power/EM Analysis on Post-Quantum KEMs
Rei Ueno, Keita Xagawa, Yutaro Tanaka, Akira Ito, Junko Takahashi, Naofumi Homma
2021/848
Functional Encryption for Turing Machines with Dynamic Bounded Collusion from LWE
Shweta Agrawal, Monosij Maitra, Narasimha Sai Vempati, Shota Yamada
2021/847
Dynamic Collusion Bounded Functional Encryption from Identity-Based Encryption
Rachit Garg, Rishab Goyal, George Lu, Brent Waters
2021/846
Ergo Hackathon: Crowdfunded Smart Contract Pools Research and Conceptualization
Bronson Brooks Richard, Gary Waugh
2021/845
An Intermediate Secret-Guessing Attack on Hash-Based Signatures
Roland Booth, Yanhong Xu, Sabyasachi Karati, Reihaneh Safavi-Naini
2021/844
A note on IND-qCCA security in the ROM and its applications: CPA security is sufficient for TLS 1.3
Loïs Huguenin-Dumittan, Serge Vaudenay
2021/843
Environmentally Friendly Composable Multi-Party Computation in the Plain Model from Standard (Timed) Assumptions
Brandon Broadnax, Jeremias Mechler, Jörn Müller-Quade
2021/842
PCPs and Instance Compression from a Cryptographic Lens
Liron Bronfman, Ron D. Rothblum
2021/841
MPC for $Q_2$ Access Structures over Rings and Fields
Robin Jadoul, Nigel P. Smart, Barry Van Leeuwen
2021/840
Fault-Injection Attacks against NIST's Post-Quantum Cryptography Round 3 KEM Candidates
Keita Xagawa, Akira Ito, Rei Ueno, Junko Takahashi, Naofumi Homma
2021/839
Prudent Practices in Security Standardization
Feng Hao
2021/838
Anonymous and Distributed Authentication for Peer-to-Peer Networks
Pasan Tennakoon, Supipi Karunathilaka, Rishikeshan Lavakumar, Janaka Alawatugoda
2021/837
On McEliece type cryptosystems using self-dual codes with large minimum weight
Luca Mariot, Stjepan Picek, Radinka Yorgova
2021/836
Towards a Unified Approach to Black-Box Constructions of Zero-Knowledge Proofs
Xiao Liang, Omkant Pandey
2021/835
Practical, Label Private Deep Learning Training based on Secure Multiparty Computation and Differential Privacy
Sen Yuan, Milan Shen, Ilya Mironov, Anderson C. A. Nascimento
2021/834
Unconditional Communication-Efficient MPC via Hall's Marriage Theorem
Vipul Goyal, Antigoni Polychroniadou, Yifan Song
2021/833
ATLAS: Efficient and Scalable MPC in the Honest Majority Setting
Vipul Goyal, Hanjun Li, Rafail Ostrovsky, Antigoni Polychroniadou, Yifan Song
2021/832
Progressive And Efficient Verification For Digital Signatures
Cecilia Boschini, Dario Fiore, Elena Pagnin
2021/831
Private Remote Sources for Secure Multi-Function Computation
Onur Gunlu, Matthieu Bloch, Rafael F. Schaefer
2021/830
Analysis and Protection of the Two-metric Helper Data Scheme
Lars Tebelmann, Ulrich Kühne, Jean-Luc Danger, Michael Pehl
2021/829
Constructing and Deconstructing Intentional Weaknesses in Symmetric Ciphers
Christof Beierle, Tim Beyne, Patrick Felke, Gregor Leander
2021/828
Row, Row, Row Your Boat: How to Not Find Weak Keys in Pilsung
Chitchanok Chuengsatiansup, Eyal Ronen, Gregory G. Rose, Yuval Yarom
2021/827
TransNet: Shift Invariant Transformer Network for Side Channel Analysis
Suvadeep Hajra, Sayandeep Saha, Manaar Alam, Debdeep Mukhopadhyay
2021/826
OpenSSLNTRU: Faster post-quantum TLS key exchange
Daniel J. Bernstein, Billy Bob Brumley, Ming-Shing Chen, Nicola Tuveri
2021/825
Balancing Quality and Efficiency in Private Clustering with Affinity Propagation
Hannah Keller, Helen Möllering, Thomas Schneider, Hossein Yalame
2021/824
Security Characterization of J-PAKE and its Variants
Michel Abdalla, Manuel Barbosa, Peter B. Rønne, Peter Y. A. Ryan, Petra Šala
2021/823
GPU-accelerated PIR with Client-Independent Preprocessing for Large-Scale Applications
Daniel Günther, Maurice Heymann, Benny Pinkas, Thomas Schneider
2021/822
One-out-of-$q$ OT Combiners
Oriol Farràs and Jordi Ribes-González
2021/821
On the hardness of the NTRU problem
Alice Pellet-Mary, Damien Stehlé
2021/820
Further Improving Differential-Linear Attacks: Applications to Chaskey and Serpent
Marek Broll, Federico Canale, Nicolas David, Antonio Florez-Gutierrez, Gregor Leander, María Naya-Plasencia, Yosuke Todo
2021/819
Cryptanalysis of the GPRS Encryption Algorithms GEA-1 and GEA-2
Christof Beierle, Patrick Derbez, Gregor Leander, Gaëtan Leurent, Håvard Raddum, Yann Rotella, David Rupprecht, Lukas Stennes
2021/818
CTng: Secure Certificate and Revocation Transparency
Hemi Leibowitz, Haitham Ghalwash, Ewa Syta, Amir Herzberg
2021/817
Give Me 5 Minutes: Attacking ASCAD with a Single Side-Channel Trace
Olivier Bronchain, Gaëtan Cassiers, François-Xavier Standaert
2021/816
Privacy-Preserving Approximate k-Nearest-Neighbors Search that Hides Access, Query and Volume Patterns
Alexandra Boldyreva, Tianxin Tang
2021/815
Linear Cryptanalysis of FF3-1 and FEA
Tim Beyne
2021/814
A New Way to Achieve Round-Efficient Byzantine Agreement
Matthias Fitzi, Chen-Da Liu-Zhang, Julian Loss
2021/813
Intelligent Composed Algorithms
Frank Byszio, Dr. Klaus-Dieter Wirth, Dr. Kim Nguyen
2021/812
TOPPool: Time-aware Optimized Privacy-Preserving Ridesharing
Elena Pagnin, Gunnar Gunnarsson, Pedram Talebi, Claudio Orlandi, Andrei Sabelfeld
2021/811
A General Purpose Transpiler for Fully Homomorphic Encryption
Shruthi Gorantala, Rob Springer, Sean Purser-Haskell, William Lam, Royce Wilson, Asra Ali, Eric P. Astor, Itai Zukerman, Sam Ruth, Christoph Dibak, Phillipp Schoppmann, Sasha Kulankhina, Alain Forget, David Marn, Cameron Tew, Rafael Misoczki, Bernat Guillen, Xinyu Ye, Dennis Kraft, Damien Desfontaines, Aishe Krishnamurthy, Miguel Guevara, Irippuge Milinda Perera, Yurii Sushko, Bryant Gipson
2021/810
Efficient Asynchronous Byzantine Agreement without Private Setups
Yingzi Gao, Yuan Lu, Zhenliang Lu, Qiang Tang, Jing Xu, Zhenfeng Zhang
2021/809
SoK: Efficient Privacy-preserving Clustering
Aditya Hegde, Helen Möllering, Thomas Schneider, Hossein Yalame
2021/808
SNARGs for $\mathcal{P}$ from LWE
Arka Rai Choudhuri, Abhishek Jain, Zhengzhong Jin
2021/807
Non-Interactive Batch Arguments for NP from Standard Assumptions
Arka Rai Choudhuri, Abhishek Jain, Zhengzhong Jin
2021/806
Boosting the Security of Blind Signature Schemes
Jonathan Katz, Julian Loss, Michael Rosenberg
2021/805
Practical Settlement Bounds for Proof-of-Work Blockchains
Peter Gaži, Ling Ren, Alexander Russell
2021/804
A Note on ``Reduction Modulo $2^{448}-2^{224}-1$''
Timothy Shelton
2021/803
On the Privacy of Protocols based on CPA-Secure Homomorphic Encryption
Adi Akavia, Margarita Vald
2021/802
On Secret Sharing, Randomness, and Random-less Reductions for Secret Sharing
Divesh Aggarwal, Eldon Chung, Maciej Obremski, João Ribeiro
2021/801
Memory-Hard Puzzles in the Standard Model with Applications to Memory-Hard Functions and Resource-Bounded Locally Decodable Codes
Mohammad Hassan Ameri, Alexander R. Block, Jeremiah Blocki
2021/800
i-TiRE: Incremental Timed-Release Encryption or How to use Timed-Release Encryption on Blockchains?
Leemon Baird, Pratyay Mukherjee, Rohit Sinha
2021/799
Lattice Attacks on NTRU and LWE: A History of Refinements
Martin Albrecht, Léo Ducas
2021/798
Probabilistic Dynamic Input Output Automata (Extended Version)
Pierre Civit, Maria Potop-Butucaru
2021/797
LLVM-based Circuit Compilation for Practical Secure Computation
Tim Heldmann, Thomas Schneider, Oleksandr Tkachenko, Christian Weinert, Hossein Yalame
2021/796
How Byzantine is a Send Corruption?
Karim Eldefrawy, Julian Loss, Ben Terner
2021/795
Transforming Secure Comparison Protocol from Passive to Active Adversary Model
Wei Jiang
2021/794
Reverse Engineering the Micro-Architectural Leakage Features of a Commercial Processor
Si Gao, Elisabeth Oswald, Dan Page
2021/793
Property-Preserving Hash Functions for Hamming Distance from Standard Assumptions
Nils Fleischhacker, Kasper Green Larsen, Mark Simkin
2021/792
Pseudo-Random Walk on Ideals: Practical Speed-Up in Relation Collection for Class Group Computation
Madhurima Mukhopadhyay, Palash Sarkar
2021/791
Open Sesame: A Novel Non-SAT-Attack against CAS-Lock
Akashdeep Saha, Urbi Chatterjee, Debdeep Mukhopadhyay, Rajat Subhra Chakraborty
2021/790
A Side-Channel Assisted Attack on NTRU
Amund Askeland, Sondre Rønjom
2021/789
P2DPI: Practical and Privacy-Preserving Deep Packet Inspection
Jongkil Kim, Seyit Camtepe, Joonsang Baek, Willy Susilo, Josef Pieprzyk, Surya Nepal
2021/788
Somewhere Statistical Soundness, Post-Quantum Security, and SNARGs
Yael Tauman Kalai, Vinod Vaikuntanathan, Rachel Yun Zhang
2021/787
Mobile Voting -- Still Too Risky?
Sven Heiberg, Kristjan Krips, Jan Willemson
2021/786
Volume-Hiding Dynamic Searchable Symmetric Encryption with Forward and Backward Privacy
Yongjun Zhao, Huaxiong Wang, Kwok-Yan Lam
2021/785
Lower bounds on lattice sieving and information set decoding
Elena Kirshanova, Thijs Laarhoven
2021/784
Analysis and Recommendations for MAC and Key Lengths in Delayed Disclosure GNSS Authentication Protocols
Ignacio Fernández-Hernández, Tomer Ashur, Vincent Rijmen
2021/783
Privacy-Preserving Machine Learning with Fully Homomorphic Encryption for Deep Neural Network
Joon-Woo Lee, HyungChul Kang, Yongwoo Lee, Woosuk Choi, Jieun Eom, Maxim Deryabin, Eunsang Lee, Junghyun Lee, Donghoon Yoo, Young-Sik Kim, Jong-Seon No
2021/782
On the deployment of FlyClient as a velvet fork: chain-sewing attacks and countermeasures
Tristan Nemoz, Alexei Zamyatin
2021/781
Quantum-Resistant Security for Software Updates on Low-power Networked Embedded Devices
Gustavo Banegas, Koen Zandberg, Adrian Herrmann, Emmanuel Baccelli, Benjamin Smith
2021/780
Netlist Decompilation Workflow for Recovered Design Verification, Validation, and Assurance
Katie Liszewski, Tim McDonley, Josh Delozier, Andrew Elliott, Dylan Jones, Matt Sutter, Adam Kimura
2021/779
More efficient post-quantum KEMTLS with pre-distributed public keys
Peter Schwabe, Douglas Stebila, and Thom Wiggers
2021/778
Efficient secret key reusing attribute-based encryption from lattices
Xinyuan Qian, Wenyuan Wu
2021/777
Asynchronous Data Dissemination and its Applications
Sourav Das, Zhuolun Xiang, Ling Ren
2021/776
SoK: Applying Blockchain Technology in Industrial Internet of Things
Gang Wang
2021/775
Completeness Theorems for Adaptively Secure Broadcast
Ran Cohen, Juan Garay, Vassilis Zikas
2021/774
On Tight Quantum Security of HMAC and NMAC in the Quantum Random Oracle Model
Akinori Hosoyamada, Tetsu Iwata
2021/773
HEX-BLOOM: An Efficient Method for Authenticity and Integrity Verification in Privacy-preserving Computing
Ripon Patgiri, Malaya Dutta Borah
2021/772
Falcon Down: Breaking Falcon Post-Quantum Signature Scheme through Side-Channel Attacks
Emre Karabulut, Aydin Aysu
2021/771
Securing Secure Aggregation: Mitigating Multi-Round Privacy Leakage in Federated Learning
Jinhyun So, Ramy E. Ali, Basak Guler, Jiantao Jiao, Salman Avestimehr
2021/770
Multi-key Private Matching for Compute
Prasad Buddhavarapu, Benjamin M Case, Logan Gore, Andrew Knox, Payman Mohassel, Shubho Sengupta, Erik Taubeneck, Min Xue
2021/769
Post-quantum Asynchronous Deniable Key Exchange and the Signal Handshake
Jacqueline Brendel, Rune Fiedler, Felix Günther, Christian Janson, and Douglas Stebila
2021/768
Privacy-Preserving Decision Trees Training and Prediction
Adi Akavia, Max Leibovich, Yehezkel S. Resheff, Roey Ron, Moni Shahar, Margarita Vald
2021/767
White-box cryptography with global device binding from message-recoverable signatures and token-based obfuscation
Shashank Agrawal, Estuardo Alpirez Bock, Yilei Chen, Gaven Watson
2021/766
Etherless Ethereum Tokens: Simulating Native Tokens in Ethereum
John Andrews, Michele Ciampi, Vassilis Zikas
2021/765
Dynamic Volume-Hiding Encrypted Multi-Maps with Applications to Searchable Encryption
Ghous Amjad, Sarvar Patel, Giuseppe Persiano, Kevin Yeo, Moti Yung
2021/764
Covert Learning: How to Learn with an Untrusted Intermediary
Ran Canetti, Ari Karchmer
2021/763
Fragment and Forge: Breaking Wi-Fi Through Frame Aggregation and Fragmentation
Mathy Vanhoef
2021/762
A wide class of Boolean functions generalizing the hidden weight bit function
Claude Carlet
2021/761
Parameterization of Boolean functions by vectorial functions and associated constructions
Claude Carlet
2021/760
Analysis of CryptoNote Transaction Graphs using the Dulmage-Mendelsohn Decomposition
Saravanan Vijayakumaran
2021/759
Cerebro: A Platform for Multi-Party Cryptographic Collaborative Learning
Wenting Zheng, Ryan Deng, Weikeng Chen, Raluca Ada Popa, Aurojit Panda, Ion Stoica
2021/758
Quantum cryptography based on an algorithm for determining simultaneously all the mappings of a Boolean function
Koji Nagata, Renata Wong, Do Ngoc Diep, Tadao Nakamura
2021/757
On the Dual of Generalized Bent Functions
Jiaxin Wang, Fang-Wei Fu
2021/756
A Novel Completeness Test and its Application to Side Channel Attacks and Simulators
Si Gao, Elisabeth Oswald
2021/755
Tetrad: Actively Secure 4PC for Secure Training and Inference
Nishat Koti, Arpita Patra, Rahul Rachuri, Ajith Suresh
2021/754
Privacy-Preserving Training of Tree Ensembles over Continuous Data
Samuel Adams, Chaitali Choudhary, Martine De Cock, Rafael Dowsley, David Melanson, Anderson C. A. Nascimento, Davis Railsback, Jianwei Shen
2021/753
Anonymous Device Authorization for Cellular Networks
Abida Haque, Varun Madathil, Bradley Reaves, Alessandra Scafuro
2021/752
Quantum Reduction of Finding Short Code Vectors to the Decoding Problem
Thomas Debris-Alazard, Maxime Remaud, Jean-Pierre Tillich
2021/751
Grain-128AEADv2: Strengthening the Initialization Against Key Reconstruction
Martin Hell, Thomas Johansson, Alexander Maximov, Willi Meier, Hirotaka Yoshida
2021/750
Appenzeller to Brie: Efficient Zero-Knowledge Proofs for Mixed-Mode Arithmetic and $\mathbb{Z}_{2^k}$
Carsten Baum, Lennart Braun, Alexander Munch-Hansen, Benoit Razet, Peter Scholl
2021/749
Three Halves Make a Whole? Beating the Half-Gates Lower Bound for Garbled Circuits
Mike Rosulek, Lawrence Roy
2021/748
A Complete Characterization of Game-Theoretically Fair, Multi-Party Coin Toss
Ke Wu, Gilad Asharov, Elaine Shi
2021/747
Elmo: Recursive Virtual Payment Channels for Bitcoin
Aggelos Kiayias, Orfeas Stefanos Thyfronitis Litos
2021/746
What is All the FaaS About? - Remote Exploitation of FPGA-as-a-Service Platforms
Nitin Pundir, Fahim Rahman, Farimah Farahmandi, Mark Tehranipoor
2021/745
Generic-Group Identity-Based Encryption: A Tight Impossibility Result
Gili Schul-Ganz, Gil Segev
2021/744
Proofs of Isogeny Knowledge and Application to Post-quantum One-Time Verifiable Random Function
Antonin Leroux
2021/743
Manta: a Plug and Play Private DeFi Stack
Shumo Chu, Yu Xia, Zhenfei Zhang
2021/742
Conclave: A Collective Stake Pool Protocol
Dimitris Karakostas, Aggelos Kiayias, Mario Larangeira
2021/741
NTRU leads to Anonymous, Robust Public-Key Encryption
Keita Xagawa
2021/740
The Boneh-Katz Transformation, Revisited: Pseudorandom/Obliviously-Samplable PKE from Lattices and Codes and Its Application
Keita Xagawa
2021/739
A New Approach to Garbled Circuits
Anasuya Acharya, Tomer Ashur, Efrat Cohen, Carmit Hazay, Avishay Yanai
2021/738
On the Impossibility of Purely Algebraic Signatures
Nico Döttling, Dominik Hartmann, Dennis Hofheinz, Eike Kiltz, Sven Schäge, Bogdan Ursu
2021/737
GIFT-COFB is Tightly Birthday Secure with Encryption Queries
Akiko Inoue, Kazuhiko Minematsu
2021/736
Adam in Private: Secure and Fast Training of Deep Neural Networks with Adaptive Moment Estimation
Nuttapong Attrapadung, Koki Hamada, Dai Ikarashi, Ryo Kikuchi, Takahiro Matsuda, Ibuki Mishina, Hiraku Morita, Jacob C. N. Schuldt
2021/735
Side-Channel Protections for Picnic Signatures
Diego F. Aranha, Sebastian Berndt, Thomas Eisenbarth, Okan Seker, Akira Takahashi, Luca Wilke, Greg Zaverucha
2021/734
Guarding the First Order: The Rise of AES Maskings
Amund Askeland, Siemen Dhooghe, Svetla Nikova, Vincent Rijmen, and Zhenda Zhang
2021/733
GenoPPML – a framework for genomic privacy-preserving machine learning
Sergiu Carpov, Nicolas Gama, Mariya Georgieva, Dimitar Jetchev
2021/732
Preimage Attacks on 4-round Keccak by Solving Multivariate Quadratic Systems
Congming Wei, Chenhao Wu, Ximing Fu, Xiaoyang Dong, Kai He, Jue Hong, Xiaoyun Wang
2021/731
Pasta: A Case for Hybrid Homomorphic Encryption
Christoph Dobraunig, Lorenzo Grassi, Lukas Helminger, Christian Rechberger, Markus Schofnegger, Roman Walch
2021/730
Mystique: Efficient Conversions for Zero-Knowledge Proofs with Applications to Machine Learning
Chenkai Weng, Kang Yang, Xiang Xie, Jonathan Katz, Xiao Wang
2021/729
Improved Programmable Bootstrapping with Larger Precision and Efficient Arithmetic Circuits for TFHE
Ilaria Chillotti, Damien Ligier, Jean-Baptiste Orfila, Samuel Tap
2021/728
Laconic Private Set Intersection and Applications
Navid Alamati, Pedro Branco, Nico Döttling, Sanjam Garg, Mohammad Hajiabadi, Sihang Pu
2021/727
SoK: Privacy-Preserving Computing in the Blockchain Era
Ghada Almashaqbeh, Ravital Solomon
2021/726
Asymmetric All-or-nothing Transforms
Navid Nasr Esfahani, Douglas R. Stinson
2021/725
KEMTLS with Delayed Forward Identity Protection in (Almost) a Single Round Trip
Felix Günther, Simon Rastikian, Patrick Towa, Thom Wiggers
2021/724
Tri-op redactable blockchains with block modification, removal, and insertion
Mohammad Sadeq Dousti, Alptekin Küpçü
2021/723
Cache attack on MISTY1
Haopeng Fan, Wenhao Wang, Yongjuan Wang, Wenyu Zhang, Qingjun Yuan
2021/722
Chosen Ciphertext Secure Keyed Two-Level Homomorphic Encryption
Yusaku Maeda, Koji Nuida
2021/721
Index Calculus Attacks on Hyperelliptic Jacobians with Effective Endomorphisms
Sulamithe Tsakou, Sorina Ionica
2021/720
On Reverse Engineering Neural Network Implementation on GPU
Łukasz Chmielewski, Léo Weissbart
2021/719
Enhancing Differential-Neural Cryptanalysis
Zhenzhen Bao, Jian Guo, Meicheng Liu, Li Ma, Yi Tu
2021/718
Will You Cross the Threshold for Me? - Generic Side-Channel Assisted Chosen-Ciphertext Attacks on NTRU-based KEMs
Prasanna Ravi, Martianus Frederic Ezerman, Shivam Bhasin, Anupam Chattopadhyay, Sujoy Sinha Roy
2021/717
Ablation Analysis for Multi-device Deep Learning-based Physical Side-channel Analysis
Lichao Wu, Yoo-Seung Won, Dirmanto Jap, Guilherme Perin, Shivam Bhasin, Stjepan Picek
2021/716
SSE and SSD: Page-Efficient Searchable Symmetric Encryption
Angèle Bossuat, Raphael Bost, Pierre-Alain Fouque, Brice Minaud, Michael Reichle
2021/715
Hours of Horus: Keyless Cryptocurrency Wallets
Dionysis Zindros
2021/714
CARiMoL: A Configurable Hardware Accelerator for Ringand Module Lattice-Based Post-Quantum Cryptography
Afifa Ishtiaq, Dr. Muhammad Shafique, Dr. Osman Hassan
2021/713
Public Key Encryption with Flexible Pattern Matching
Élie Bouscatié, Guilhem Castagnos, Olivier Sanders
2021/712
DEFAULT: Cipher Level Resistance Against Differential Fault Attack
Anubhab Baksi, Shivam Bhasin, Jakub Breier, Mustafa Khairallah, Thomas Peyrin, Sumanta Sarkar, Siang Meng Sim
2021/711
The Matrix Reloaded: Multiplication Strategies in FrodoKEM
Joppe W. Bos, Maximilian Ofner, Joost Renes, Tobias Schneider, Christine van Vredendaal
2021/710
VOProof: Efficient zkSNARKs from Vector Oracle Compilers
Yuncong Zhang, Alan Szepieniec, Ren Zhang, Shi-Feng Sun, Geng Wang, and Dawu Gu
2021/709
Bounded Collusion ABE for TMs from IBE
Rishab Goyal, Ridwan Syed, Brent Waters
2021/708
Anonymous, Robust Post-Quantum Public Key Encryption
Paul Grubbs, Varun Maram, Kenneth G. Paterson
2021/707
Lattice Enumeration for Tower NFS: a 521-bit Discrete Logarithm Computation
Gabrielle De Micheli, Pierrick Gaudry, Cécile Pierrot
2021/706
Cryptanalysis of an oblivious PRF from supersingular isogenies
Andrea Basso, Péter Kutas, Simon-Philipp Merz, Christophe Petit, Antonio Sanso
2021/705
Bridging Machine Learning and Cryptanalysis via EDLCT
Yi Chen, Hongbo Yu
2021/704
IBM Digital Health Pass Whitepaper: A Privacy-Respectful Platform for Proving Health Status
Elli Androulaki, Ilie Circiumaru, Jesus Diaz Vico, Miguel Prada, Alessandro Sorniotti, Marc Stoecklin, Marko Vukolic, Marie Wallace
2021/703
Automatic Quantum Multi-collision Distinguishers and Rebound Attacks with Triangulation Algorithm
Zhenzhen Bao, Jian Guo, Shun Li, and Phuong Pham
2021/702
Symmetric Key Exchange with Full Forward Security and Robust Synchronization
Colin Boyd, Gareth T. Davies, Bor de Kock, Kai Gellert, Tibor Jager, Lise Millerjord
2021/701
Multidimentional ModDiv public key exchange protocol
Samir Bouftass
2021/700
DeCSIDH: Delegating isogeny computations in the CSIDH setting
Robi Pedersen
2021/699
Radical Isogenies on Montgomery Curves
Hiroshi Onuki, Tomoki Moriya
2021/698
Multi-Dimensional Sub/Super-Range Signatures
Masahito Ishizaka, Shinsaku Kiyomoto
2021/697
GoAT: File Geolocation via Anchor Timestamping
Deepak Maram, Iddo Bentov, Mahimna Kelkar, and Ari Juels
2021/696
The "quantum annoying" property of password-authenticated key exchange protocols
Edward Eaton, Douglas Stebila
2021/695
Adaptively Secure Lattice-based Revocable IBE in the QROM: Compact Parameters, Tight Security, and Anonymity
Atsushi Takayasu
2021/694
On Interactive Oracle Proofs for Boolean R1CS Statements
Ignacio Cascudo, Emanuele Giunta
2021/693
Hardware Penetration Testing Knocks Your SoCs Off
Mark Fischer, Fabian Langer, Johannes Mono, Clemens Nasenberg, Nils Albartus
2021/692
Shorter Signatures Based on Tailor-Made Minimalist Symmetric-Key Crypto
Christoph Dobraunig, Daniel Kales, Christian Rechberger, Markus Schofnegger, Greg Zaverucha
2021/691
General Bootstrapping Approach for RLWE-based Homomorphic Encryption
Andrey Kim, Maxim Deryabin, Jieun Eom, Rakyong Choi, Yongwoo Lee, Whan Ghang, Donghoon Yoo
2021/690
On Communication Models and Best-Achievable Security in Two-Round MPC
Aarushi Goel, Abhishek Jain, Manoj Prabhakaran, Rajeev Raghunath
2021/689
OSHA: A General-purpose and Next Generation One-way Secure Hash Algorithm
Ripon Patgiri
2021/688
Statistical ZAPs from Group-Based Assumptions
Geoffroy Couteau, Shuichi Katsumata, Elahe Sadeghi, Bogdan Ursu
2021/687
Towards Understanding Practical Randomness Beyond Noise: Differential Privacy and Mixup
Hanshen Xiao, Srinivas Devadas
2021/686
Meteor: Cryptographically Secure Steganography for Realistic Distributions
Gabriel Kaptchuk, Tushar M. Jois, Matthew Green, Aviel Rubin
2021/685
Blind Side-Channel SIFA
Melissa Azouaoui, Kostas Papagiannopoulos, Dominik Zürner
2021/684
Tight Setup Bounds for Identifiable Abort
Nicholas Brandt
2021/683
S2Dedup: SGX-enabled Secure Deduplication
Tânia Esteves, Mariana Miranda, João Paulo, Bernardo Portela
2021/682
Batching Base Oblivious Transfers
Ian McQuoid, Mike Rosulek, Lawrence Roy
2021/681
Learnability of Multiplexer PUF and $S_N$-PUF : A Fourier-based Approach
Durba Chatterjee, Debdeep Mukhopadhyay, Aritra Hazra
2021/680
Efficient Attribute Based Encryption for Boolean Circuits
Alexandru Ionita
2021/679
Permutation Based EDM: An Inverse Free BBB Secure PRF
Avijit Dutta, Mridul Nandi, Suprita Talnikar
2021/678
Faster indifferentiable hashing to elliptic $\mathbb{F}_{\!q^2}$-curves
Dmitrii Koshelev
2021/677
Generalized Galbraith's Test: Characterization and Applications to Anonymous IBE Schemes
Paul Cotan and George Teseleanu
2021/676
Extending the GLS endomorphism to speed up GHS Weil descent using Magma
Jesús-Javier Chi-Domínguez, Francisco Rodríguez-Henríquez, Benjamin Smith
2021/675
3-round Feistel is Not Superpseudorandom Over Any Group
Hector B. Hougaard
2021/674
On the Effect of the Key-expansion Algorithm in Simon-like Ciphers
Jinyu Lu, Yunwen Liu, Tomer Ashur, Chao Li
2021/673
zkCNN: Zero Knowledge Proofs for Convolutional Neural Network Predictions and Accuracy
Tianyi Liu, Xiang Xie, Yupeng Zhang
2021/672
PQC: R-Propping a Chaotic Cellular Automata
Pedro Hecht
2021/671
Multi-Threshold Byzantine Fault Tolerance
Atsuki Momose, Ling Ren
2021/670
AOT: Anonymization by Oblivious Transfer
Farid Javani, Alan T. Sherman
2021/669
Pravuil: Global Consensus for a United World
David Cerezo Sánchez
2021/668
Grover on SM3
Gyeongju Song, Kyungbae Jang, Hyunji Kim, Wai-Kong Lee, Zhi Hu, Hwajeong Seo
2021/667
Optimized Implementation of SM4 on AVR Microcontrollers, RISC-V Processors, and ARM Processors
Hyeokdong Kwon, Hyunjun Kim, Siwoo Eum, Minjoo Sim, Hyunji Kim, Wai-Kong Lee, Zhi Hu, Hwajeong Seo
2021/666
Secure cloud-of-clouds storage with space-efficient secret sharing
Ahad Niknia, Miguel Correia, Jaber Karimpour
2021/665
On the algebraic immunity of direct sum constructions
Pierrick Méaux
2021/664
A Trustless GQ Multi-Signature Scheme with Identifiable Abort
Handong Cui and Tsz Hon Yuen
2021/663
On the Design and Misuse of Microcoded (Embedded) Processors — A Cautionary Note
Nils Albartus, Clemens Nasenberg, Florian Stolz, Marc Fyrbiak, Christof Paar, Russell Tessier
2021/662
Verifying Post-Quantum Signatures in 8 kB of RAM
Ruben Gonzalez, Andreas Hülsing, Matthias J. Kannwischer, Juliane Krämer, Tanja Lange, Marc Stöttinger, Elisabeth Waitz, Thom Wiggers, Bo-Yin Yang
2021/661
Linear Cryptanalyses of Three AEADs with GIFT-128 as Underlying Primitives
Ling Sun, Wei Wang, Meiqin Wang
2021/660
Best-Possible Unpredictable Proof-of-Stake: An Impossibility and a Practical Design
Lei Fan, Jonathan Katz, Zhenghao Lu, Phuc Thai, and Hong-Sheng Zhou
2021/659
Technical report: CoPHEE: Co-processor forPartially Homomorphic Encrypted Execution
Mohammed Nabeel, Mohammed Ashraf, Eduardo Chielle, Nektarios G. Tsoutsos, Michail Maniatakos
2021/658
A Practical Adaptive Key Recovery Attack on the LGM (GSW-like) Cryptosystem
Prastudy Fauzi, Martha Norberg Hovd, Håvard Raddum
2021/657
Locally Reconstructable Non-malleable Secret Sharing
Bhavana Kanukurthi, Sai Lakshmi Bhavana Obbattu, Sruthi Sekar, Jenit Tomy
2021/656
Automated Search Oriented to Key Recovery on Ciphers with Linear Key Schedule: Applications to Boomerangs in SKINNY and ForkSkinny
Lingyue Qin, Xiaoyang Dong, Xiaoyun Wang, Keting Jia, Yunwen Liu
2021/655
On the Effect of Projection on Rank Attacks in Multivariate Cryptography
Morten Øygarden, Daniel Smith-Tone, Javier Verbel
2021/654
Non-Interactive, Secure Verifiable Aggregation for Decentralized, Privacy-Preserving Learning
Carlo Brunetta, Georgia Tsaloli, Bei Liang, Gustavo Banegas, Aikaterini Mitrokotsa
2021/653
Smooth Zero-Knowledge Hash Functions
Behzad Abdolmaleki, Hamidreza Khoshakhlagh, Helger Lipmaa
2021/652
Detector+: An Approach for Detecting, Isolating, and Preventing Timing Attacks
Arsalan Javeed, Cemal Yilmaz, Erkay Savas
2021/651
Leo: A Programming Language for Formally Verified, Zero-Knowledge Applications
Collin Chin, Howard Wu, Raymond Chu, Alessandro Coglio, Eric McCarthy, Eric Smith
2021/650
Structured Leakage and Applications to Cryptographic Constant-Time and Cost
Gilles Barthe, Benjamin Gregoire, Vincent Laporte, Swarn Priya
2021/649
On the Algebraic Immunity - Resiliency trade-off, implications for Goldreich's Pseudorandom Generator
Aurélien Dupin, Pierrick Méaux, Mélissa Rossi
2021/648
Security of COFB against Chosen Ciphertext Attacks
Mustafa Khairallah
2021/647
privateDH: An Enhanced Diffie-Hellman Key-Exchange Protocol using RSA and AES Algorithm
Ripon Patgiri
2021/646
Optimization of Advanced Encryption Standard on Graphics Processing Units
Cihangir Tezcan
2021/645
Legendre PRF (Multiple) Key Attacks and the Power of Preprocessing
Alexander May, Floyd Zweydinger
2021/644
Cryptanalysis of Semidirect Product Key Exchange Using Matrices Over Non-Commutative Rings
Christopher Battarbee, Delaram Kahrobaei, Siamak F. Shahandashti
2021/643
On MILP-based Automatic Search for Bit-Based Division Property for Ciphers with (large) Linear Layers
Muhammad ElSheikh, Amr M. Youssef
2021/642
On the Cryptographic Deniability of the Signal Protocol
Nihal Vatandas, Rosario Gennaro, Bertrand Ithurburn, Hugo Krawczyk
2021/641
Hydra: Succinct Fully Pipelineable Interactive Arguments of Knowledge
William Zhang, Yu Xia
2021/640
Security and Trust in Open Source Security Tokens
Marc Schink, Alexander Wagner, Florian Unterstein, Johann Heyszl
2021/639
Indifferentiable Signatures: High Performance and Fallback Security
Charalampos Papamanthou, Cong Zhang, Hong-Sheng Zhou
2021/638
Efficient Constructions of Pairing Based Accumulators
Ioanna Karantaidou, Foteini Baldimtsi
2021/637
Doubly-Affine Extractors, and their Applications
Yevgeniy Dodis, Kevin Yeo
2021/636
Communication Complexity of Private simultaneous Quantum Messages Protocols
Akinori Kawachi, Harumichi Nishimura
2021/635
symKrypt: A General-purpose and Lightweight Symmetric-Key Cryptography
Ripon Patgiri
2021/634
Setting Up Efficient TFHE Parameters for Multivalue Plaintexts and Multiple Additions
Jakub Klemsa
2021/633
CTIDH: faster constant-time CSIDH
Gustavo Banegas, Daniel J. Bernstein, Fabio Campos, Tung Chou, Tanja Lange, Michael Meyer, Benjamin Smith, Jana Sotáková
2021/632
Internet Computer Consensus
Jan Camenisch, Manu Drijvers, Timo Hanke, Yvonne-Anne Pignolet, Victor Shoup, Dominic Williams
2021/631
SwapCT: Swap Confidential Transactions for Privacy-Preserving Multi-Token Exchanges
Felix Engelmann, Lukas Müller, Andreas Peter, Frank Kargl, Christoph Bösch
2021/630
Non-Interactive CCA2-Secure Threshold Cryptosystems: Achieving Adaptive Security in the Standard Model Without Pairings
Julien Devevey, Benoît Libert, Khoa Nguyen, Thomas Peters, Moti Yung
2021/629
SoK: How private is Bitcoin? Classification and Evaluation of Bitcoin Mixing Techniques
Simin Ghesmati, Walid Fdhila, Edgar Weippl
2021/628
The Availability-Accountability Dilemma and its Resolution via Accountability Gadgets
Joachim Neu, Ertem Nusret Tas, David Tse
2021/627
VeRSA: Verifiable Registries with Efficient Client Audits from RSA Authenticated Dictionaries
Nirvan Tyagi, Ben Fisch, Andrew Zitek, Joseph Bonneau, Stefano Tessaro
2021/626
Help, my Signal has bad Device! Breaking the Signal Messenger’s Post-CompromiseSecurity through a Malicious Device
Jan Wichelmann, Sebastian Berndt, Claudius Pott, Thomas Eisenbarth
2021/625
Plactic key agreement (insecure?)
Daniel R. L. Brown
2021/624
Group Structure in Correlations and its Applications in Cryptography
Guru-Vamsi Policharla, Manoj Prabhakaran, Rajeev Raghunath, Parjanya Vyas
2021/623
Mining in Logarithmic Space
Aggelos Kiayias, Nikos Leonardos, Dionysis Zindros
2021/622
Stealth: A Highly Secured End-to-End Symmetric Communication Protocol
Ripon Patgiri, Naresh Babu Muppalaneni
2021/621
R-SWAP: Relay based atomic cross-chain swap protocol
Léonard Lys, Arthur Micoulet, Maria Potop-Butucaru
2021/620
Algebraic attacks on block ciphers using quantum annealing
Elżbieta Burek, Michał Misztal, Michał Wroński
2021/619
Polar Coding for Ring-LWE-Based Public Key Encryption
Jiabo Wang, Cong Ling
2021/618
Quantum Secure Privacy Preserving Technique to Obtain the Intersection of Two Datasets for Contact Tracing
Sumit Kumar Debnath, Vikas Srivastava, Tapaswini Mohanty, Nibedita Kundu, Kouichi Sakurai
2021/617
Quantum Encryption with Certified Deletion, Revisited: Public Key, Attribute-Based, and Classical Communication
Taiga Hiroka, Tomoyuki Morimae, Ryo Nishimaki, Takashi Yamakawa
2021/616
An Efficient and Generic Construction for Signal's Handshake (X3DH): Post-Quantum, State Leakage Secure, and Deniable
Keitaro Hashimoto, Shuichi Katsumata, Kris Kwiatkowski, Thomas Prest
2021/615
A Tutorial on Concurrent Zero Knowledge
Rafael Pass
2021/614
Unprovability of Leakage-Resilient Cryptography Beyond the Information-Theoretic Limit
Rafael Pass
2021/613
Attribute-Based Conditional Proxy Re-Encryption in the Standard Model under LWE
Xiaojian Liang, Jian Weng, Anjia Yang, Lisha Yao, Zike Jiang, Zhenghao Wu
2021/612
Privacy-preserving Density-based Clustering
Beyza Bozdemir, Sébastien Canard, Orhan Ermis, Helen Möllering, Melek Önen, Thomas Schneider
2021/611
Some Applications of Hamming Weight Correlations
Fatih Balli, Andrea Caforio, Subhadeep Banik
2021/610
A Weighted Bit Flipping Decoder for QC-MDPC-based Cryptosystems
Alexander Nilsson, Irina E. Bocharova, Boris D. Kudryashov, Thomas Johansson
2021/609
FairMM: A Fast and Frontrunning-Resistant Crypto Market-Maker
Michele Ciampi, Muhammad Ishaq, Malik Magdon-Ismail, Rafail Ostrovsky, Vassilis Zikas
2021/608
Layering diverse cryptography to lower risks of future and secret attacks: post-quantum estimates
Daniel R. L. Brown
2021/607
Signed (Group) Diffie-Hellman Key Exchange with Tight Security
Jiaxin Pan, Chen Qian, Magnus Ringerud
2021/606
ZK-PCPs from Leakage-Resilient Secret Sharing
Carmit Hazay, Muthuramakrishnan Venkitasubramaniam, Mor Weiss
2021/605
On the Randomness Complexity of Interactive Proofs and Statistical Zero-Knowledge Proofs
Benny Applebaum, Eyal Golombek
2021/604
Masked Triples: Amortizing Multiplication Triples across Conditionals
David Heath, Vladimir Kolesnikov, Stanislav Peceny
2021/603
Making Synchronous BFT Protocols Secure in the Presence of Mobile Sluggish Faults
Justin Kim, Vandan Mehta, Kartik Nayak, Nibesh Shrestha
2021/602
Autonomous Secure Remote Attestation even when all Used and to be Used Digital Keys Leak
Marten van Dijk, Deniz Gurevin, Chenglu Jin, Omer Khan, Phuong Ha Nguyen
2021/601
The Art of Labeling: Task Augmentation for Private(Collaborative) Learning on Transformed Data
Hanshen Xiao, Srinivas Devadas
2021/600
Subfield Algorithms for Ideal- and Module-SVP Based on the Decomposition Group
Christian Porter, Andrew Mendelsohn, Cong Ling
2021/599
Hyperproofs: Aggregating and Maintaining Proofs in Vector Commitments
Shravan Srinivasan, Alexander Chepurnoy, Charalampos Papamanthou, Alin Tomescu, Yupeng Zhang
2021/598
Proof of Assets in the Diem Blockchain
Panagiotis Chatzigiannis, Konstantinos Chalkias
2021/597
Accelerated RISC-V for Post-Quantum SIKE
Rami Elkhatib, Reza Azarderakhsh, Mehran Mozaffari-Kermani
2021/596
Mutual Accountability Layer: Accountable Anonymity within Accountable Trust
Vanesa Daza, Abida Haque, Alessandra Scafuro, Alexandros Zacharakis, Arantxa Zapico
2021/595
Securing Parallel-chain Protocols under Variable Mining Power
Xuechao Wang, Viswa Virinchi Muppirala, Lei Yang, Sreeram Kannan, Pramod Viswanath
2021/594
Zero Knowledge Contingent Payments for Trained Neural Networks
Zhelei Zhou, Xinlei Cao, Jian Liu, Bingsheng Zhang, Kui Ren
2021/593
Differentially Oblivious Database Joins: Overcoming the Worst-Case Curse of Fully Oblivious Algorithms
Shumo Chu, Danyang Zhuo, Elaine Shi, T-H. Hubert Chan
2021/592
Side Channel Analysis against the ANSSI’s protected AES implementation on ARM
Loïc Masure, Rémi Strullu
2021/591
Automated Detection of Side Channels in Cryptographic Protocols: DROWN the ROBOTs!
Jan Peter Drees, Pritha Gupta, Eyke Hüllermeier, Tibor Jager, Alexander Konze, Claudia Priesterjahn, Arunselvan Ramaswamy, Juraj Somorovsky
2021/590
An Algebraic Framework for Universal and Updatable SNARKs
Carla Ràfols, Arantxa Zapico
2021/589
White-Box Encryption Scheme Using a Quantum Memory
Hidenori Kuwakado, Shoichi Hirose, Masahiro Mambo
2021/588
A Novel Proof of Shuffle: Exponentially Secure Cut-and-Choose
Thomas Haines, Johannes Mueller
2021/587
PrORAM: Fast $O(\log n)$ Private Coin ZK ORAM
David Heath, Vladimir Kolesnikov
2021/586
A New Approach for finding Low-Weight Polynomial Multiples
Laila El Aimani
2021/585
Exact Lattice Sampling from Non-Gaussian Distributions
Maxime Plançon, Thomas Prest
2021/584
Effects of Quantization on the Multiple-Round Secret-Key Capacity
Onur Gunlu, Ueli Maurer, Joao Ribeiro
2021/583
Entropoids: Groups in Disguise
Lorenz Panny
2021/582
ethSTARK Documentation
StarkWare
2021/581
Breaking CAS-Lock and Its Variants by Exploiting Structural Traces
Abhrajit Sengupta, Nimisha Limaye, Ozgur Sinanoglu
2021/580
Lightweight, Maliciously Secure Verifiable Function Secret Sharing
Leo de Castro, Antigoni Polychroniadou
2021/579
Quantum Key-length Extension
Joseph Jaeger, Fang Song, Stefano Tessaro
2021/578
Cryptanalytic Applications of the Polynomial Method for Solving Multivariate Equation Systems over GF(2)
Itai Dinur
2021/577
Soft Power: Upgrading Chain Macroeconomic Policy Through Soft Forks
Dionysis Zindros
2021/576
Prio+: Privacy Preserving Aggregate Statistics via Boolean Shares
Surya Addanki, Kevin Garbe, Eli Jaffe, Rafail Ostrovsky, and Antigoni Polychroniadou
2021/575
Superposition Meet-in-the-Middle Attacks: Updates on Fundamental Security of AES-like Hashing
Zhenzhen Bao, Jian Guo, Danping Shi, Yi Tu
2021/574
Constructing More Quadratic APN Functions with the QAM Method
Yuyin Yu, Leo Perrin
2021/573
Compactness of Hashing Modes and Efficiency beyond Merkle Tree
Elena Andreeva, Rishiraj Bhattacharyya, Arnab Roy
2021/572
Sine Series Approximation of the Mod Function for Bootstrapping of Approximate HE
Charanjit Singh Jutla, Nathan Manohar
2021/571
Post-Quantum Cryptography: Computational-Hardness Assumptions and Beyond
Thomas Attema, Nicole Gervasoni, Michiel Marcus, Gabriele Spini
2021/570
Lattice sieving via quantum random walks
André Chailloux, Johanna Loyer
2021/569
Automated Generation of Masked Hardware
David Knichel, Amir Moradi, Nicolai Müller, Pascal Sasdrich
2021/568
ReTRACe: Revocable and Traceable Blockchain Rewrites using Attribute-based Cryptosystems
Gaurav Panwar, Roopa Vishwanathan, Satyajayant Misra
2021/567
Forward-secure Multi-user Aggregate Signatures based on zk-SNARKs
Jeonghyuk Lee, Jihye Kim, Hyunok Oh
2021/566
From Random Oracles to Ideal Signatures, and Back
Cong Zhang, Hong-Sheng Zhou
2021/565
The return of Eratosthenes: Secure Generation of RSA Moduli using Distributed Sieving
Cyprien Delpech de Saint Guilhem, Eleftheria Makri, Dragos Rotaru, Titouan Tanguy
2021/564
SMILE: Set Membership from Ideal Lattices with Applications to Ring Signatures and Confidential Transactions
Vadim Lyubashevsky, Ngoc Khanh Nguyen, Gregor Seiler
2021/563
High-Speed NTT-based Polynomial Multiplication Accelerator for CRYSTALS-Kyber Post-Quantum Cryptography
Mojtaba Bisheh-Niasar, Reza Azarderakhsh, Mehran Mozaffari-Kermani
2021/562
A fusion algorithm for solving the hidden shift problem in finite abelian groups
Wouter Castryck, Ann Dooms, Carlo Emerencia, Alexander Lemmens
2021/561
Kyber on ARM64: Compact Implementations of Kyber on 64-bit ARM Cortex-A Processors
Pakize Sanal, Emrah Karagoz, Hwajeong Seo, Reza Azarderakhsh, Mehran Mozaffari-Kermani
2021/560
MOBS (Matrices Over Bit Strings) public key exchange
Nael Rahman, Vladimir Shpilrain
2021/559
A Fresh Approach to Updatable Symmetric Encryption
Andrés Fabrega, Ueli Maurer, Marta Mularczyk
2021/558
Verifiable Decryption in the Head
Kristian Gjøsteen, Thomas Haines, Johannes Müller, Peter Rønne, Tjerand Silde
2021/557
Dual lattice attacks for closest vector problems (with preprocessing)
Thijs Laarhoven, Michael Walter
2021/556
Interactive Physical ZKP for Connectivity:Applications to Nurikabe and Hitori
Leo Robert, Daiki Miyahara, Pascal Lafourcade, Takaaki Mizuk
2021/555
Neural-Network-Based Modeling Attacks on XOR Arbiter PUFs Revisited
Nils Wisiol, Bipana Thapaliya, Khalid T. Mursi, Jean-Pierre Seifert, Yu Zhuang
2021/554
Grover on Caesar and Vigenère Ciphers
Gyeongju Song, Kyungbae Jang, Hyunji Kim, Wai-Kong Lee, Hwajeong Seo
2021/553
PARASITE: PAssword Recovery Attack against Srp Implementations in ThE wild
Daniel De Almeida Braga, Pierre-Alain Fouque, Mohamed Sabt
2021/552
Classical and Quantum algorithms for generic Syndrome Decoding problems and applications to the Lee metric
André Chailloux, Thomas Debris-Alazard, Simona Etinski
2021/551
Efficient Sorting of Homomorphic Encrypted Data with $k$-way Sorting Network
Seungwan Hong, Seunghong Kim, Jiheon Choi, Younho Lee, Jung Hee Cheon
2021/550
Quadratic almost bent functions - their partial characterization and design in the spectral domain
Amar Bapić, Samir Hodžić, Enes Pasalic
2021/549
High-assurance field inversion for curve-based cryptography
Benjamin Salling Hvass, Diego F. Aranha, and Bas Spitters
2021/548
Secure Computation by Secret Sharing Using Input Encrypted with Random Number (Full Paper)
Keiichi Iwamura, Ahmad Akmal Aminuddin Mohd Kamal
2021/547
Cube Attack against 843-Round Trivium
Yao Sun
2021/546
Distinguishing and Key Recovery Attacks on the Reduced-Round SNOW-V and SNOW-Vi
Jin Hoki, Takanori Isobe, Ryoma Ito, Fukang Liu, Kosei Sakamoto
2021/545
MatRiCT+: More Efficient Post-Quantum Private Blockchain Payments
Muhammed F. Esgin, Ron Steinfeld, Raymond K. Zhao
2021/544
Improved guess-and-determine and distinguishing attacks on SNOW-V
Jing Yang, Thomas Johansson, Alexander Maximov
2021/543
The Case for SIKE: A Decade of the Supersingular Isogeny Problem
Craig Costello
2021/542
Symetric encryption algorithms based on the mathematical structure underlying the three body problem
Samir Bouftass.
2021/541
Hardware Deployment of Hybrid PQC
Reza Azarderakhsh, Rami El Khatib, Brian Koziel, Brandon Langenberg
2021/540
Efficient Range Proofs with Transparent Setup from Bounded Integer Commitments
Geoffroy Couteau, Michael Klooß, Huang Lin, Michael Reichle
2021/539
More Efficient Adaptively Secure Revocable Hierarchical Identity-based Encryption with Compact Ciphertexts: Achieving Shorter Keys and Tighter Reductions
Atsushi Takayasu
2021/538
A Composable Look at Updatable Encryption
Françoise Levy-dit-Vehel, Maxime Roméas
2021/537
SoK: Exploring Blockchains Interoperability
Gang Wang
2021/536
Analyzing the Potential of Transport Triggered Architecture for Lattice-based Cryptography Algorithms
Latif AKÇAY, Berna ÖRS
2021/535
On the Possibility of Basing Cryptography on $\EXP \neq \BPP$
Yanyi Liu, Rafael Pass
2021/534
Splitting authentication codes with perfect secrecy: new results, constructions and connections with algebraic manipulation detection codes
Maura B. Paterson, Douglas R. Stinson
2021/533
CryptGPU: Fast Privacy-Preserving Machine Learning on the GPU
Sijun Tan, Brian Knott, Yuan Tian, David J. Wu
2021/532
Rainbow on Cortex-M4
Tung Chou, Matthias J. Kannwischer, Bo-Yin Yang
2021/531
LogStack: Stacked Garbling with $O(b \log b)$ Computation
David Heath, Vladimir Kolesnikov
2021/530
Pre-silicon Architecture Correlation Analysis (PACA): Identifying and Mitigating the Source of Side-channel Leakage at Gate-level
Yuan Yao, Tuna Tufan, Tarun Kathuria, Baris Ege, Ulkuhan Guler, Patrick Schaumont
2021/529
SnarkPack: Practical SNARK Aggregation
Nicolas Gailly, Mary Maller, Anca Nitulescu
2021/528
Verified Multiple-Time Signature Scheme from One-Time Signatures and Timestamping
Denis Firsov, Henri Lakk, Ahto Truu
2021/527
Practical solving of discrete logarithm problem over prime fields using quantum annealing
Michał Wroński
2021/526
Reinforcement Learning-based Design of Side-channel Countermeasures
Jorai Rijsdijk, Lichao Wu, Guilherme Perin
2021/525
On the Importance of Pooling Layer Tuning for Profiling Side-channel Analysis
Lichao Wu, Guilherme Perin
2021/524
Decentralized Multi-Client Functional Encryption for Set Intersection with Improved Efficiency
Kwangsu Lee
2021/523
No Time to Hash: On Super Efficient Entropy Accumulation
Yevgeniy Dodis, Siyao Guo, Noah Stephens-Davidowitz, Zhiye Xie
2021/522
Public-key Cryptosystems and Signature Schemes from p-adic Lattices
Yingpu Deng, Lixia Luo, Yanbin Pan, Zhaonan Wang, Guanju Xiao
2021/521
Improved Circuit Compilation for Hybrid MPC via Compiler Intermediate Representation
Daniel Demmler, Stefan Katzenbeisser, Thomas Schneider, Tom Schuster, Christian Weinert
2021/520
Optimal Randomized Partial Checking for Decryption Mix Nets
Thomas Haines, Johannes Mueller
2021/519
Cryptanalysis of Izza et al.'s Protocol: An Enhanced Scalable and Secure RFID Authentication Protocol for WBAN Within An IoT Environment
Atakan Arslan, Muhammed Ali Bingöl
2021/518
How to Share and Own a Secret
Victor Ermolaev, Gamze Tillem
2021/517
Cryptography from Sublinear-Time Average-Case Hardness of Time-Bounded Kolmogorov Complexity
Yanyi Liu, Rafael Pass
2021/516
A new weak curve fault attack on ECIES: embedded point validation is not enough during decryption
Weiqiong Cao, Hongsong Shi, Hua Chen, Wei Xi, Yuhang Wang
2021/515
Generic Constructions of Revocable Hierarchical Identity-based Encryption
Keita Emura, Atsushi Takayasu, Yohei Watanabe
2021/514
Non-Interactive Zero Knowledge from Sub-exponential DDH
Abhishek Jain, Zhengzhong Jin
2021/513
On One-way Functions from NP-Complete Problems
Yanyi Liu, Rafael Pass
2021/512
Chosen Ciphertext Secure Functional Encryption from Constrained Witness PRF
Tapas Pal, Ratna Dutta
2021/511
What Makes Fiat--Shamir zkSNARKs (Updatable SRS) Simulation Extractable?
Chaya Ganesh, Hamidreza Khoshakhlagh, Markulf Kohlweiss, Anca Nitulescu, Michal Zajac
2021/510
Signer and Message Ambiguity from a Variety of Keys
George Teseleanu
2021/509
On using the same key pair for Ed25519 and an X25519 based KEM
Erik Thormarker
2021/508
Over 100x Faster Bootstrapping in Fully Homomorphic Encryption through Memory-centric Optimization with GPUs
Wonkyung Jung, Sangpyo Kim, Jung Ho Ahn, Jung Hee Cheon, Younho Lee
2021/507
The t-wise Independence of Substitution-Permutation Networks
Tianren Liu, Stefano Tessaro, Vinod Vaikuntanathan
2021/506
Delegating Supersingular Isogenies over $\mathbb{F}_{p^2}$ with Cryptographic Applications
Robi Pedersen and Osmanbey Uzunkol
2021/505
Cryptanalysis of Boyen’s Attribute-Based Encryption Scheme in TCC 2013
Shweta Agrawal, Rajarshi Biswas, Ryo Nishimaki, Keita Xagawa, Xiang Xie, Shota Yamada
2021/504
A Generic Method for Investigating Nonsingular Galois NFSRs
Xiao-Juan Wang, Tian Tian, Wen-Feng Qi
2021/503
Almost-Asynchronous MPC under Honest Majority, Revisited
Matthieu Rambaud, Antoine Urban
2021/502
A Generic Approach to Build Revocable Hierarchical Identity-Based Encryption
Kwangsu Lee, Joon Sik Kim
2021/501
zkHawk: Practical Private Smart Contracts from MPC-based Hawk
Aritra Banerjee, Michael Clear, Hitesh Tewari
2021/500
Order-C Secure Multiparty Computation for Highly Repetitive Circuits
Gabrielle Beck, Aarushi Goel, Abhishek Jain, Gabriel Kaptchuk
2021/499
Optimizing Registration Based Encryption
Kelong Cong, Karim Eldefrawy, Nigel P. Smart
2021/498
SoK: Multi-Device Secure Instant Messaging
Antonio Dimeo, Felix Gohla, Daniel Goßen, Niko Lockenvitz
2021/497
SoK: Design Tools for Side-Channel-Aware Implementations
IR Buhan, Lejla Batina, Yuval Yarom, Patrick Schaumont
2021/496
Applications of SKREM-like symmetric key ciphers
Mircea Digulescu
2021/495
Hiding Data in Plain Sight: Towards Provably Unbreakable Encryption with Short Secret Keys and One-Way Functions
Mircea Digulescu
2021/494
Key-Oblivious Encryption from isogenies and its application to Accountable Tracing Signatures.
Surbhi Shaw, Ratna Dutta
2021/493
Optimizing BIKE for the Intel Haswell and ARM Cortex-M4
Ming-Shing Chen, Tung Chou, Markus Krausz
2021/492
Classic McEliece on the ARM Cortex-M4
Ming-Shing Chen, Tung Chou
2021/491
A toolbox for verifiable tally-hiding e-voting systems
Véronique Cortier, Pierrick Gaudry, Quentin Yang
2021/490
Optimizing Bootstrapping and Evaluating Large FHE Gates in the LWE-based GSW-FHE
Chao Liu, Anyu Wang, Zhongxiang Zheng
2021/489
ROSE: Robust Searchable Encryption with Forward and Backward Security and Practical Performance
Peng Xu, Willy Susilo, Wei Wang, Tianyang Chen, Qianhong Wu, Hai Jin
2021/488
Shorter Lattice-based Zero-Knowledge Proofs for the Correctness of a Shuffle
Javier Herranz, Ramiro Martínez, Manuel Sánchez
2021/487
Xifrat Cryptanalysis - Compute the Mixing Function Without the Key
"Danny" Niu Jianfang
2021/486
Security Analysis of End-to-End Encryption for Zoom Meetings
Takanori Isobe, Ryoma Ito
2021/485
A Hardware Accelerator for Polynomial Multiplication Operation of CRYSTALS-KYBER PQC Scheme
Ferhat Yaman, Ahmet Can Mert, Erdinç Öztürk, Erkay Savaş
2021/484
Efficient Scalable Multi-Party Private Set Intersection Using Oblivious PRF
Alireza Kavousi, Javad Mohajeri, Mahmoud Salmasizadeh
2021/483
Masking Kyber: First- and Higher-Order Implementations
Joppe W. Bos, Marc Gourjon, Joost Renes, Tobias Schneider, Christine van Vredendaal
2021/482
Inconsistency of Simulation and Practice in Delay-based Strong PUFs
Anita Aghaie, Amir Moradi
2021/481
PrivateDrop: Practical Privacy-Preserving Authentication for Apple AirDrop
Alexander Heinrich, Matthias Hollick, Thomas Schneider, Milan Stute, Christian Weinert
2021/480
Fast and Error-Free Negacyclic Integer Convolution using Extended Fourier Transform
Jakub Klemsa
2021/479
Masked Accelerators and Instruction Set Extensions for Post-Quantum Cryptography
Tim Fritzmann, Michiel Van Beirendonck, Debapriya Basu Roy, Patrick Karl, Thomas Schamberger, Ingrid Verbauwhede, Georg Sigl
2021/478
TurboIKOS: Improved Non-interactive Zero Knowledge and Post-Quantum Signatures
Yaron Gvili, Julie Ha, Sarah Scheffler, Mayank Varia, Ziling Yang, Xinyuan Zhang
2021/477
Exploiting ROLLO's Constant-Time Implementations with a Single-Trace Analysis
Agathe Cheriere, Lina Mortajine, Tania Richmond, Nadia El Mrabet
2021/476
Revisiting Lightweight Block Ciphers: Review, Taxonomy and Future directions
Aaqib Bashir Dar, Mashhood Jeelani Lone, Nuzhat Hussain
2021/475
Private Liquidity Matching using MPC
Shahla Atapoor, Nigel P. Smart, Younes Talibi Alaoui
2021/474
Algebraic Attacks on Rasta and Dasta Using Low-Degree Equations
Fukang Liu, Santanu Sarkar, Willi Meier, Takanori Isobe
2021/473
Cryptonomial: A Framework for Private Time-Series Polynomial Calculations
Ryan Karl, Jonathan Takeshita, Alamin Mohammed, Aaron Striegel, Taeho Jung
2021/472
CryptoGram: Fast Private Calculations of Histograms over Multiple Users’ Inputs
Ryan Karl, Jonathan Takeshita, Alamin Mohammed, Aaron Striegel, Taeho Jung
2021/471
Size, Speed, and Security: An Ed25519 Case Study
Cesar Pereida García, Sampo Sovio
2021/470
Upslices, Downslices, and Secret-Sharing with Complexity of $1.5^n$
Benny Applebaum, Oded Nir
2021/469
Entropoid Based Cryptography
Danilo Gligoroski
2021/468
Viaduct: An Extensible, Optimizing Compiler for Secure Distributed Programs (Technical Report)
Coşku Acay, Rolph Recto, Joshua Gancher, Andrew C. Myers, Elaine Shi
2021/467
Key-schedule Security for the TLS 1.3 Standard
Chris Brzuska, Antoine Delignat-Lavaud, Christoph Egger, Cédric Fournet, Konrad Kohbrok, Markulf Kohlweiss
2021/466
A New Key Agreement Scheme Based On A Well-Known Property Of Powers
Michele Fabbrini
2021/465
Cryptanalysis of `MAKE'
Daniel Brown, Neal Koblitz, Jason LeGrow
2021/464
iTimed: Cache Attacks on the Apple A10 Fusion SoC
Gregor Haas, Seetal Potluri, Aydin Aysu
2021/463
Improving Recent Side-Channel Attacks Against the DES Key Schedule
Andreas Wiemers, Johannes Mittmann
2021/462
SoK: How (not) to Design and Implement Post-Quantum Cryptography
James Howe, Thomas Prest, Daniel Apon
2021/461
Second-Order SCA Security with almost no Fresh Randomness
Aein Rezaei Shahmirzadi, Amir Moradi
2021/460
Let’s Take it Offline: Boosting Brute-Force Attacks on iPhone’s User Authentication through SCA
Oleksiy Lisovets, David Knichel, Thorben Moos, Amir Moradi
2021/459
SIRNN: A Math Library for Secure RNN Inference
Deevashwer Rathee, Mayank Rathee, Rahul Kranti Kiran Goli, Divya Gupta, Rahul Sharma, Nishanth Chandran, Aseem Rastogi
2021/458
FAMILY KEY CRYPTOGRAPHY: Interchangeable Symmetric Keys; a Different Cryptographic Paradigm
Gideon Samid
2021/457
Non-Interactive Composition of Sigma-Protocols via Share-then-Hash
Masayuki Abe, Miguel Ambrona, Andrej Bogdanov, Miyako Ohkubo, Alon Rosen
2021/456
Hardening Circuit-Design IP Against Reverse-Engineering Attacks
Animesh Chhotaray, Thomas Shrimpton
2021/455
Guessing Bits: Improved Lattice Attacks on (EC)DSA with Nonce Leakage
Chao Sun, Thomas Espitau, Mehdi Tibouchi, Masayuki Abe
2021/454
Measure-Rewind-Measure: Tighter Quantum Random Oracle Model Proofs for One-Way to Hiding and CCA Security
Veronika Kuchta, Amin Sakzad, Damien Stehle, Ron Steinfeld, Shi-Feng Sun
2021/453
Merkle^2: A Low-Latency Transparency Log System
Yuncong Hu, Kian Hooshmand, Harika Kalidhindi, Seung Jin Yang, Raluca Ada Popa
2021/452
SAT-based Method to Improve Neural Distinguisher and Applications to SIMON
Zezhou Hou, Jiongjiong Ren, Shaozhen Chen
2021/451
RepShard: Reputation-based Sharding Scheme Achieves Linearly Scaling Efficiency and Security Simultaneously
Gang Wang
2021/450
RandChain: Practical Scalable Decentralized Randomness Attested by Blockchain
Gang Wang, Mark Nixon
2021/449
Towards Cloud-assisted Industrial IoT Platform for Large-scale Continuous Condition Monitoring
Gang Wang, Mark Nixon, Mike Boudreaux
2021/448
On the Memory-Tightness of Hashed ElGamal
Ashrujit Ghoshal, Stefano Tessaro
2021/447
Explicit, Closed-form, General bounds for Cuckoo Hashing with a Stash
Daniel Noble
2021/446
Towards practical GGM-based PRF from (Module-)Learning-with-Rounding
Chitchanok Chuengsatiansup, Damien Stehle
2021/445
A Survey on Perfectly-Secure Verifiable Secret-Sharing
Anirudh Chandramouli, Ashish Choudhury, Arpita Patra
2021/444
Xifrat - Compact Public-Key Cryptosystems based on Quasigroups
Daniel Nager, "Danny" Niu Jianfang
2021/443
Constructing a pairing-free certificateless proxy signature scheme from ECDSA
Cholun Kim
2021/442
How to Backdoor a Cipher
Raluca Posteuca, Tomer Ashur
2021/441
Watermarking PRFs from Lattices: Public Extract and Collusion Resistant
Yukun Wang, Mingqiang Wang
2021/440
Two modifications for Loidreau's code-based cryptosystem
Wenshuo Guo, Fangwei Fu
2021/439
Recovering the Key from the Internal State of Grain-128AEAD
Donghoon Chang, Meltem Sonmez Turan
2021/438
More Efficient Shuffle Argument from Unique Factorization
Toomas Krips, Helger Lipmaa
2021/437
Formal security analysis of MPC-in-the-head zero-knowledge protocols
Nikolaj Sidorenco, Sabine Oechsner, Bas Spitters
2021/436
Algebraic Differential Fault Analysis on SIMON block cipher
Duc-Phong Le, Sze Ling Yeo, Khoongming Khoo
2021/435
Non-Interactive Anonymous Router
Elaine Shi, Ke Wu
2021/434
On the Power of Expansion: More Efficient Constructions in the Random Probing Model
Sonia Belaïd, Matthieu Rivain, Abdul Rahman Taleb
2021/433
Formations for the Quantum Random Oracle
Aaram Yun
2021/432
XORBoost: Tree Boosting in the Multiparty Computation Setting
Kevin Deforth, Marc Desgroseilliers, Nicolas Gama, Mariya Georgieva, Dimitar Jetchev, Marius Vuille
2021/431
Unbounded Multi-Party Computation from Learning with Errors
Prabhanjan Ananth, Abhishek Jain, Zhengzhong Jin, Giulio Malavolta
2021/430
Lattice Enumeration on GPUs for fplll
Simon Pohmann, Marc Stevens, Jens Zumbrägel
2021/429
New Practical Multivariate Signatures from a Nonlinear Modifier
Daniel Smith-Tone
2021/428
A Coq proof of the correctness of X25519 in TweetNaCl
Peter Schwabe, Benoît Viguier, Timmy Weerwag, Freek Wiedijk
2021/427
Meet-in-the-Middle Attacks Revisited: Key-recovery, Collision, and Preimage Attacks
Xiaoyang Dong, Jialiang Hua, Siwei Sun, Zheng Li, Xiaoyun Wang, Lei Hu
2021/426
Generic Plaintext Equality and Inequality Proofs (Extended Version)
Olivier Blazy, Xavier Bultel, Pascal Lafourcade, Octavio Perez Kempner
2021/425
Related-Key Analysis of Generalized Feistel Networks with Expanding Round Functions
Yuqing Zhao, Wenqi Yu, Chun Guo
2021/424
Security Analysis of SFrame
Takanori Isobe, Ryoma Ito, Kazuhiko Minematsu
2021/423
On effective computations in special subsemigroups of polynomial transformations and protocol based multivariate cryptosystems
Vasyl Ustimenko
2021/422
Stacking Sigmas: A Framework to Compose $\Sigma$-Protocols for Disjunctions
Aarushi Goel, Matthew Green, Mathias Hall-Andersen, Gabriel Kaptchuk
2021/421
Indistinguishability Obfuscation of Null Quantum Circuits and Applications
James Bartusek, Giulio Malavolta
2021/420
Intel HEXL: Accelerating Homomorphic Encryption with Intel AVX512-IFMA52
Fabian Boemer, Sejun Kim, Gelila Seifu, Fillipe D. M. de Souza, Vinodh Gopal
2021/419
On The Dihedral Coset Problem
Javad Doliskani
2021/418
Ring-LWE over two-to-power cyclotomics is not hard
Hao Chen
2021/417
History Binding Signature
Shlomi Dolev, Matan Liber
2021/416
Cryptocurrencies with Security Policies and Two-Factor Authentication
Florian Breuer, Vipul Goyal, Giulio Malavolta
2021/415
Efficient Verification of Optimized Code: Correct High-speed X25519
Marc Schoolderman, Jonathan Moerman, Sjaak Smetsers, Marko van Eekelen
2021/414
Cryptanalysis of an Anonymous Identity-based Identification Scheme in Ad-Hoc Group without Pairings
Sook Yan Hue, Jason Chia, Ji-Jian Chin
2021/413
Blind Polynomial Evaluation and Data Trading
Yi Liu, Qi Wang, Siu-Ming Yiu
2021/412
Unclonable Encryption, Revisited
Prabhanjan Ananth, Fatih Kaleoglu
2021/411
Privacy, Secrecy, and Storage with Nested Randomized Polar Subcode Constructions
Onur Gunlu, Peter Trifonov, Muah Kim, Rafael F. Schaefer, Vladimir Sidorenko
2021/410
Blindly Follow: SITS CRT and FHE for DCLSMPC of DUFSM
Shlomi Dolev, Stav Doolman
2021/409
On the Anonymity Guarantees of Anonymous Proof-of-Stake Protocols
Markulf Kohlweiss, Varun Madathil, Kartik Nayak, Alessandra Scafuro
2021/408
Limitations on Uncloneable Encryption and Simultaneous One-Way-to-Hiding
Christian Majenz, Christian Schaffner, Mehrdad Tahmasbi
2021/407
Improved Quantum Algorithms for the k-XOR Problem
André Schrottenloher
2021/406
Disappearing Cryptography in the Bounded Storage Model
Jiaxin Guan, Mark Zhandry
2021/405
Revisiting some results on APN and algebraic immune functions
Claude Carlet
2021/404
Chain Reductions for Multi-Signatures and the HBMS Scheme
Mihir Bellare, Wei Dai
2021/403
Atom: A Stream Cipher with Double Key Filter
Subhadeep Banik, Andrea Caforio, Takanori Isobe, Fukang Liu, Willi Meier, Kosei Sakamoto, Santanu Sarkar
2021/402
Leakage Resilient Value Comparison With Application to Message Authentication
Christoph Dobraunig, Bart Mennink
2021/401
Output Prediction Attacks on Block Ciphers using Deep Learning
Hayato Kimura, Keita Emura, Takanori Isobe, Ryoma Ito, Kazuto Ogawa, Toshihiro Ohigashi
2021/400
Size of IK00 Branching Program
Yupu Hu, Xingting Dong, Baocang Wang
2021/399
Latus Incentive Scheme: Enabling Decentralization in Blockchains based on Recursive SNARKs
Alberto Garoffolo, Dmytro Kaidalov, Roman Oliynykov
2021/398
Cryptanalysis of the Binary Permuted Kernel Problem
Thales Bandiera Paiva, Routo Terada
2021/397
SSProve: A Foundational Framework for Modular Cryptographic Proofs in Coq
Philipp G. Haselwarter, Exequiel Rivas, Antoine Van Muylder, Théo Winterhalter, Carmine Abate, Nikolaj Sidorenco, Catalin Hritcu, Kenji Maillard, and Bas Spitters
2021/396
LESS-FM: Fine-tuning Signatures from the Code Equivalence Problem
Alessandro Barenghi, Jean-Francois Biasse, Edoardo Persichetti, Paolo Santini
2021/395
On the Validity of Spoofing Attack Against Safe is the New Smart
Harishma Boyapally, Urbi Chatterjee, Debdeep Mukhopadhyay
2021/394
Quantum Encryption with Certified Deletion: Public Key and Attribute-Based
Ryo Nishimaki, Takashi Yamakawa
2021/393
Key Agreement with Correlated Noise and Multiple Entities or Enrollments
Onur Gunlu
2021/392
How Private Are Commonly-Used Voting Rules?
Ao Liu, Yun Lu, Lirong Xia, Vassilis Zikas
2021/391
New Standards for E-Voting Systems: Reflections on Source Code Examinations
Thomas Haines, Peter Roenne
2021/390
Orthros: A Low-Latency PRF
Subhadeep Banik, Takanori Isobe, Fukang Liu, Kazuhiko Minematsu, Kosei Sakamoto
2021/389
Physically Related Functions: A New Paradigm for Light-weight Key-Exchange
Durba Chatterjee, Harishma Boyapally, Sikhar Patranabis, Urbi Chatterjee, Debdeep Mukhopadhyay, Aritra Hazra
2021/388
Topology-Hiding Communication from Minimal Assumptions.
Marshall Ball, Elette Boyle, Ran Cohen, Lisa Kohl, Tal Malkin, Pierre Meyer, Tal Moran
2021/387
Quantum-access security of the Winternitz one-time signature scheme
Christian Majenz, Chanelle Matadah Manfouo, Maris Ozols
2021/386
SAFELearn: Secure Aggregation for private FEderated Learning
Hossein Fereidooni, Samuel Marchal, Markus Miettinen, Azalia Mirhoseini, Helen Möllering, Thien Duc Nguyen, Phillip Rieger, Ahmad Reza Sadeghi, Thomas Schneider, Hossein Yalame, Shaza Zeitouni
2021/385
Solving the problem of Blockwise Isomorphism of Polynomials with Circulant matrices
Yasufumi Hashimoto
2021/384
Analysis and Probing of Parallel Channels in the Lightning Network
Alex Biryukov, Gleb Naumenko, Sergei Tikhomirov
2021/383
GLV+HWCD for 2y^2=x^3+x/GF(8^91+5)
Daniel R. L. Brown
2021/382
Signatures with Tight Multi-User Security from Search Assumptions
Jiaxin Pan, Magnus Ringerud
2021/381
Towards Practical and Round-Optimal Lattice-Based Threshold and Blind Signatures
Shweta Agrawal, Damien Stehle, Anshu Yadav
2021/380
Certificateless Designated Verifier Proxy Signature
Cholun Kim
2021/379
A Note on the Bias of Rotational Differential-Linear Distinguishers
Yunwen Liu, Zhongfeng Niu, Siwei Sun, Chao Li, Lei Hu
2021/378
Multiparty Reusable Non-Interactive Secure Computation from LWE
Fabrice Benhamouda, Aayush Jain, Ilan Komargodski, Huijia Lin
2021/377
Attacks and weaknesses of BLS aggregate signatures
Nguyen Thoi Minh Quan
2021/376
On the Impossibility of Post-Quantum Black-Box Zero-Knowledge in Constant Rounds
Nai-Hui Chia, Kai-Min Chung, Qipeng Liu, Takashi Yamakawa
2021/375
Round and Communication Balanced Protocols for Oblivious Evaluation of Finite State Machines
Rafael Dowsley, Caleb Horst, Anderson C A Nascimento
2021/374
ZXAD: High-volume Attack Mitigation for Tor
Akshaya Mani, Ian Goldberg
2021/373
T5: Hashing Five Inputs with Three Compression Calls
Yevgeniy Dodis, Dmitry Khovratovich, Nicky Mouha, Mridul Nandi
2021/372
Explicit connections between supersingular isogeny graphs and Bruhat–Tits trees
Laia Amorós, Annamaria Iezzi, Kristin Lauter, Chloe Martindale, Jana Sotáková
2021/371
Construction of minimal linear codes with few weights from weakly regular plateaued functions
Ahmet Sinak
2021/370
Nova: Recursive Zero-Knowledge Arguments from Folding Schemes
Abhiram Kothapalli, Srinath Setty, and Ioanna Tzialla
2021/369
A Note on Algebraic Decomposition Method for Masked Implementation
Shoichi Hirose
2021/368
Memory Optimization Techniques for Computing Discrete Logarithms in Compressed SIKE
Aaron Hutchinson, Koray Karabina, Geovandro Pereira
2021/367
Interpolation Cryptanalysis of Unbalanced Feistel Networks with Low Degree Round Functions
Arnab Roy, Elena Andreeva, Jan Ferdinand Sauer
2021/366
Multiparty Computation with Covert Security and Public Verifiability
Peter Scholl, Mark Simkin, Luisa Siniscalchi
2021/365
Updatable Signatures and Message Authentication Codes
Valerio Cini, Sebastian Ramacher, Daniel Slamanig, Christoph Striecks, Erkan Tairi
2021/364
RAGHAV: A new low power S-P network encryption design for resource constrained environment
GAURAV BANSOD
2021/363
Information Leakages in Code-based Masking: A Unified Quantification Approach
Wei Cheng, Sylvain Guilley, Claude Carlet, Jean-Luc Danger, Sihem Mesnager
2021/362
Cryptanalysis of Round-Reduced SIMON32 Based on Deep Learning
Zezhou Hou, Jiongjiong Ren, Shaozhen Chen
2021/361
Some New Constructions of Generalized Plateaued Functions
Jiaxin Wang, Fang-Wei Fu
2021/360
An Architecture for Blockchain-based Cloud Banking
Thuat Do
2021/359
Cryptanalysis on 'An efficient identity-based proxy signcryption using lattice'
Zi-Yuan Liu, Yi-Fan Tseng, Raylin Tso
2021/358
Time- and Space-Efficient Arguments from Groups of Unknown Order
Alexander R. Block, Justin Holmgren, Alon Rosen, Ron D. Rothblum, Pratik Soni
2021/357
AISY - Deep Learning-based Framework for Side-channel Analysis
Guilherme Perin, Lichao Wu, Stjepan Picek
2021/356
Active Implementation of End-to-End Post-Quantum Encryption
Anton Tutoveanu
2021/355
A Hard Crystal - Implementing Dilithium on Reconfigurable Hardware
Georg Land, Pascal Sasdrich, Tim Güneysu
2021/354
Efficient permutation protocol for MPC in the head
Peeter Laud
2021/353
Fully-succinct Publicly Verifiable Delegation from Constant-Size Assumptions
Alonso González, Alexandros Zacharakis
2021/352
A Configurable Hardware Implementation of XMSS
Jan Philipp Thoma, Tim Güneysu
2021/351
Practical Dynamic Group Signatures Without Knowledge Extractors
Hyoseung Kim, Olivier Sanders, Michel Abdalla, Jong Hwan Park
2021/350
Non-interactive half-aggregation of EdDSA and variants of Schnorr signatures
Konstantinos Chalkias, Francois Garillot, Yashvanth Kondi, Valeria Nikolaenko
2021/349
Post-quantum Resettably-Sound Zero Knowledge
Nir Bitansky, Michael Kellner, Omri Shmueli
2021/348
Decoding supercodes of Gabidulin codes and applications to cryptanalysis
Maxime Bombar, Alain Couvreur
2021/347
Attacking (EC)DSA With Partially Known Multiples of Nonces
Marios Adamoudis, Konstantinos A. Draziotis, Dimitrios Poulakis
2021/346
Round-optimal Honest-majority MPC in Minicrypt and with Everlasting Security
Benny Applebaum, Eliran Kachlon, Arpita Patra
2021/345
Private Blocklist Lookups with Checklist
Dmitry Kogan, Henry Corrigan-Gibbs
2021/344
Efficient and Universally Composable Single Secret Leader Election from Pairings
Dario Catalano, Dario Fiore, Emanuele Giunta
2021/343
Adaptive Security via Deletion in Attribute-Based Encryption: Solutions from Search Assumptions in Bilinear Groups
Rishab Goyal, Jiahui Liu, Brent Waters
2021/342
MPCAuth: Multi-factor Authentication for Distributed-trust Systems
Sijun Tan, Weikeng Chen, Ryan Deng, Raluca Ada Popa
2021/341
Clonable PUF: On the Design of PUFs That Share Equivalent Responses
Takashi Sato, Yuki Tanaka, Song Bian
2021/340
Merkle Trees Optimized for Stateless Clients in Bitcoin
Bolton Bailey, Suryanarayana Sankagiri
2021/339
Non-interactive distributed key generation and key resharing
Jens Groth
2021/338
Lattice-Based Proof of Shuffle and Applications to Electronic Voting
Diego F. Aranha, Carsten Baum, Kristian Gjøsteen, Tjerand Silde, Thor Tunge
2021/337
Identity-certifying Authority-aided Identity-based Searchable Encryption Framework in Cloud Systems
Zi-Yuan Liu, Yi-Fan Tseng, Raylin Tso, Yu-Chi Chen, Masahiro Mambo
2021/336
On Closed-Cycle Loops and Applicability of Nonlinear Product Attacks to DES
Nicolas T. Courtois, Matteo Abbondati, Hamy Ratoanina, Marek Grajek
2021/335
Three Third Generation Attacks on the Format Preserving Encryption Scheme FF3
Ohad Amon, Orr Dunkelman, Nathan Keller, Eyal Ronen, Adi Shamir
2021/334
Post-Quantum Succinct Arguments: Breaking the Quantum Rewinding Barrier
Alessandro Chiesa, Fermi Ma, Nicholas Spooner, Mark Zhandry
2021/333
Sumcheck Arguments and their Applications
Jonathan Bootle, Alessandro Chiesa, Katerina Sotiraki
2021/332
An $\tilde{O}(\log^2 p)$ Approach to Point-Counting on Elliptic Curves From a Prominent Family Over the Prime Field $\mathbb{F}_p$
Yuri Borissov and Miroslav Markov
2021/331
A Probabilistic Public Key Encryption Switching Protocol for Secure Cloud Storage Applications
Radhakrishna Bhat, N R Sunitha, S S Iyengar
2021/330
The Key-Dependent Message Security of Key-Alternating Feistel Ciphers
Pooya Farshim, Louiza Khati, Yannick Seurin, Damien Vergnaud
2021/329
Two Efficient and Regulatory Confidential Transaction Schemes
Min Yang, Changtong Xu, Zhe Xia, Li Wang, Qingshu Meng
2021/328
Mixup Data Augmentation for Deep Learning Side-Channel Attacks
Karim M. Abdellatif
2021/327
Veksel: Simple, Efficient, Anonymous Payments with Large Anonymity Sets from Well-Studied Assumptions
Matteo Campanelli, Mathias Hall-Andersen
2021/326
Bringing State-Separating Proofs to EasyCrypt - A Security Proof for Cryptobox
François Dupressoir, Konrad Kohbrok, and Sabine Oechsner
2021/325
Spectrum: High-Bandwidth Anonymous Broadcast
Zachary Newman, Sacha Servan-Schreiber, Srinivas Devadas
2021/324
Private AI: Machine Learning on Encrypted Data
Kristin E. Lauter
2021/323
0
Nguyen Thoi Minh Quan
2021/322
Rinocchio: SNARKs for Ring Arithmetic
Chaya Ganesh, Anca Nitulescu, Eduardo Soria-Vazquez
2021/321
Abuse Resistant Law Enforcement Access Systems
Matthew Green, Gabriel Kaptchuk, Gijs Van Laer
2021/320
Binding BIKE errors to a key pair
Nir Drucker, Shay Gueron, Dusan Kostic
2021/319
Tradeoff attacks on symmetric ciphers
Orhun Kara
2021/318
Oblivious TLS via Multi-Party Computation
Damiano Abram, Ivan Damgård, Peter Scholl, Sven Trieflinger
2021/317
MPCCache: Privacy-Preserving Multi-Party Cooperative Cache Sharing at the Edge
Duong Tung Nguyen, Ni Trieu
2021/316
Reusable Two-Round MPC from LPN
James Bartusek, Sanjam Garg, Akshayaram Srinivasan, Yinuo Zhang
2021/315
Faster homomorphic comparison operations for BGV and BFV
Ilia Iliashenko, Vincent Zucca
2021/314
On Security Properties of All-or-nothing Transforms
Navid Nasr Esfahani, Douglas R. Stinson
2021/313
Rank Estimation with Bounded Error via Exponential Sampling
Liron David, Avishai Wool
2021/312
Towards Strengthening Deep Learning-based Side Channel Attacks with Mixup
Zhimin Luo, Mengce Zheng, Ping Wang, Minhui Jin, Jiajia Zhang, Honggang Hu
2021/311
Improved Neural Aided Statistical Attack for Cryptanalysis
Yi Chen, Hongbo Yu
2021/310
A New Neural Distinguisher Considering Features Derived from Multiple Ciphertext Pairs
Yi Chen, Yantian Shen, Hongbo Yu, Sitong Yuan
2021/309
SoCCAR: Detecting System-on-Chip Security Violations Under Asynchronous Resets
Xingyu Meng, Kshitij Raj, Atul Prasad Deb Nath, Kanad Basu, Sandip Ray
2021/308
Threshold Garbled Circuits and Ad Hoc Secure Computation
Michele Ciampi, Vipul Goyal, Rafail Ostrovsky
2021/307
A Compressed $\Sigma$-Protocol Theory for Lattices
Thomas Attema, Ronald Cramer, Lisa Kohl
2021/306
Round-Optimal Blind Signatures in the Plain Model from Classical and Quantum Standard Assumptions
Shuichi Katsumata, Ryo Nishimaki, Shota Yamada, Takashi Yamakawa
2021/305
SoK: Game-based Security Models for Group Key Exchange
Bertram Poettering, Paul Rösler, Jörg Schwenk, Douglas Stebila
2021/304
Epoque: Practical End-to-End Verifiable Post-Quantum-Secure E-Voting
Xavier Boyen, Thomas Haines, Johannes Mueller
2021/303
The More The Merrier: Reducing the Cost of Large Scale MPC
S. Dov Gordon, Daniel Starin, Arkady Yerukhimovich
2021/302
Post-Quantum Verifiable Random Function from Symmetric Primitives in PoS Blockchain
Maxime Buser, Rafael Dowsley, Muhammed F. Esgin, Shabnam Kasra Kermanshahi, Veronika Kuchta, Joseph K. Liu, Raphael Phan, Zhenfei Zhang
2021/301
Indifferentiable hashing to ordinary elliptic $\mathbb{F}_{\!q}$-curves of $j=0$ with the cost of one exponentiation in $\mathbb{F}_{\!q}$
Dmitrii Koshelev
2021/300
Invariants for EA- and CCZ-equivalence of APN and AB functions
Nikolay Kaleyski
2021/299
HashSplit: Exploiting Bitcoin Asynchrony to Violate Common Prefix and Chain Quality
Muhammad Saad, Afsah Anwar, Srivatsan Ravi, David Mohaisen
2021/298
On extensions of the one-time-pad
Bhupendra Singh, G. Athithan, Rajesh Pillai
2021/297
HashWires: Hyperefficient Credential-Based Range Proofs
Konstantinos Chalkias, Shir Cohen, Kevin Lewi, Fredric Moezinia, Yolan Romailler
2021/296
Revisiting Fault Adversary Models - Hardware Faults in Theory and Practice
Jan Richter-Brockmann, Pascal Sasdrich, Tim Güneysu
2021/295
Enhancing Processor Design Obfuscation Through Security-Aware On-Chip Memory and Data Path Design
Michael Zuzak, Ankur Srivastava
2021/294
Code-based signatures without trapdoors through restricted vectors
Marco Baldi, Franco Chiaraluce, Paolo Santini
2021/293
Thinking Outside the Superbox
Nicolas Bordes, Joan Daemen, Daniël Kuijsters, Gilles Van Assche
2021/292
Quantum Collision Attacks on Reduced SHA-256 and SHA-512
Akinori Hosoyamada, Yu Sasaki
2021/291
Bandwidth-efficient threshold EC-DSA revisited: Online/Offline Extensions, Identifiable Aborts, Proactivity and Adaptive Security
Guilhem Castagnos, Dario Catalano, Fabien Laguillaumie, Federico Savasta, Ida Tucker
2021/290
Dummy Shuffling against Algebraic Attacks in White-box Implementations
Alex Biryukov, Aleksei Udovenko
2021/289
Reactive Key-Loss Protection in Blockchains
Sam Blackshear, Konstantinos Chalkias, Panagiotis Chatzigiannis, Riyaz Faizullabhoy, Irakliy Khaburzaniya, Eleftherios Kokoris Kogias, Joshua Lind, David Wong, Tim Zakian
2021/288
Redeeming Reset Indifferentiability and Post-Quantum Groups
Mark Zhandry
2021/287
A Deeper Look at Machine Learning-Based Cryptanalysis
Adrien Benamira, David Gerault, Thomas Peyrin, Quan Quan Tan
2021/286
Fiat-Shamir via List-Recoverable Codes (or: Parallel Repetition of GMW is not Zero-Knowledge)
Justin Holmgren, Alex Lombardi, Ron D. Rothblum
2021/285
Quadratic Secret Sharing and Conditional Disclosure of Secrets
Amos Beimel, Hussien Othman, Naty Peter
2021/284
The Eye of Horus: Spotting and Analyzing Attacks on Ethereum Smart Contracts
Christof Ferreira Torres, Antonio Ken Iannillo, Arthur Gervais, Radu State
2021/283
P2DEX: Privacy-Preserving Decentralized Cryptocurrency Exchange
Carsten Baum, Bernardo David, Tore Frederiksen
2021/282
One-way functions and malleability oracles: Hidden shift attacks on isogeny-based protocols
Péter Kutas, Simon-Philipp Merz, Christophe Petit, Charlotte Weitkämper
2021/281
Subquadratic SNARGs in the Random Oracle Model
Alessandro Chiesa, Eylon Yogev
2021/280
Online-Extractability in the Quantum Random-Oracle Model
Jelle Don, Serge Fehr, Christian Majenz, Christian Schaffner
2021/279
Information-Set Decoding with Hints
Anna-Lena Horlemann, Sven Puchinger, Julian Renner, Thomas Schamberger, Antonia Wachter-Zeh
2021/278
More Communication Lower Bounds for Information-Theoretic MPC
Ivan Damgård, Boyang Li, Nikolaj I. Schwartzbach
2021/277
On the Integer Polynomial Learning with Errors Problem
Julien Devevey, Amin Sakzad, Damien Stehlé, Ron Steinfeld
2021/276
Improved Proxy Re-encryption Scheme for Symmetric Key Cryptography
Amril Syalim, Takashi Nishide, Kouichi Sakurai
2021/275
Design Space Exploration of Galois and Fibonacci Configuration based on Espresso Stream Cipher
Zhengyuan Shi, Gangqiang Yang, Hailiang Xiong, Fudong Li, Honggang Hu
2021/274
Large Message Homomorphic Secret Sharing from DCR and Applications
Lawrence Roy, Jaspal Singh
2021/273
On the (In)Security of the Diffie-Hellman Oblivious PRF with Multiplicative Blinding
Stanislaw Jarecki, Hugo Krawczyk, Jiayu Xu
2021/272
Isogeny-based key compression without pairings
Geovandro C. C. F. Pereira, Paulo S. L. M. Barreto
2021/271
On the CCA Compatibility of Public-Key Infrastructure
Dakshita Khurana, Brent Waters
2021/270
PQC: R-Propping of a New Group-Based Digital Signature
Pedro Hecht
2021/269
Steel: Composable Hardware-based Stateful and Randomised Functional Encryption
Pramod Bhatotia, Markulf Kohlweiss, Lorenzo Martinico, Yiannis Tselekounis
2021/268
Revisiting Updatable Encryption: Controlled Forward Security, Constructions and a Puncturable Perspective
Daniel Slamanig and Christoph Striecks
2021/267
Ciminion: Symmetric Encryption Based on Toffoli-Gates over Large Finite Fields
Christoph Dobraunig, Lorenzo Grassi, Anna Guinet, Daniël Kuijsters
2021/266
VOLE-PSI: Fast OPRF and Circuit-PSI from Vector-OLE
Peter Rindal and Phillipp Schoppmann
2021/265
On the Hardness of Module-LWE with Binary Secret
Katharina Boudgoust, Corentin Jeudy, Adeline Roux-Langlois, Weiqiang Wen
2021/264
FAST: Fair Auctions via Secret Transactions
Bernardo David, Lorenzo Gentile, Mohsen Pourpouneh
2021/263
Non-Interactive Half-Aggregate Signatures Based on Module Lattices - A First Attempt
Katharina Boudgoust, Adeline Roux-Langlois
2021/262
The Rise of Paillier: Homomorphic Secret Sharing and Public-Key Silent OT
Claudio Orlandi, Peter Scholl, Sophia Yakoubov
2021/261
MIRACLE: MIcRo-ArChitectural Leakage Evaluation
Ben Marshall, Dan Page, James Webb
2021/260
A Geometric Approach to Homomorphic Secret Sharing
Yuval Ishai, Russell W. F. Lai, Giulio Malavolta
2021/259
Fully projective radical isogenies in constant-time
Jesús-Javier Chi-Domínguez, Krijn Reijnders
2021/258
Secure Wire Shuffling in the Probing Model
Jean-Sebastien Coron, Lorenzo Spignoli
2021/257
Cryptanalysis of the quantum public-key cryptosystem OTU under heuristics from combinatorial statements
Shoichi Kamada
2021/256
Gage MPC: Bypassing Residual Function Leakage for Non-Interactive MPC
Ghada Almashaqbeh, Fabrice Benhamouda, Seungwook Han, Daniel Jaroslawicz, Tal Malkin, Alex Nicita, Tal Rabin, Abhishek Shah, Eran Tromer
2021/255
Low-Memory Algebraic Attacks on Round-Reduced LowMC
Fukang Liu, Takanori Isobe, Willi Meier
2021/254
Multivariate Public Key Cryptosystem from Sidon Spaces
Netanel Raviv, Ben Langton, Itzhak Tamo
2021/253
Improved single-round secure multiplication using regenerating codes
Mark Abspoel, Ronald Cramer, Daniel Escudero, Ivan Damgård, Chaoping Xing
2021/252
A Resource Binding Approach to Logic Obfuscation
Michael Zuzak, Yuntao Liu, Ankur Srivastava
2021/251
Generic Compiler for Publicly Verifiable Covert Multi-Party Computation
Sebastian Faust, Carmit Hazay, David Kretzler, Benjamin Schlosser
2021/250
Key Agreement with Physical Unclonable Functions and Biometric Identifiers
Onur Gunlu
2021/249
NeuroSCA: Evolving Activation Functions for Side-channel Analysis
Karlo Knezevic, Juraj Fulir, Domagoj Jakobovic, Stjepan Picek
2021/248
Everlasting UC Commitments from Fully Malicious PUFs
Bernardo Magri, Giulio Malavolta, Dominique Schröder, Dominique Unruh
2021/247
Generic Hardware Private Circuits - Towards Automated Generation of Composable Secure Gadgets
David Knichel, Pascal Sasdrich, Amir Moradi
2021/246
Master-Key KDM-Secure ABE via Predicate Encoding
Shengyuan Feng, Junqing Gong, Jie Chen
2021/245
On the Ideal Shortest Vector Problem over Random Rational Primes
Yanbin Pan, Jun Xu, Nick Wadleigh, Qi Cheng
2021/244
Forward Secret Encrypted RAM: Lower Bounds and Applications
Alexander Bienstock, Yevgeniy Dodis, Kevin Yeo
2021/243
Private Set Operations from Oblivious Switching
Gayathri Garimella, Payman Mohassel, Mike Rosulek, Saeed Sadeghian, Jaspal Singh
2021/242
GAP: Born to Break Hiding
Ju-Hwan Kim, Ji-Eun Woo, Soo-Jin Kim, So-Yeon Park, Dong-Guk Han
2021/241
On the Round Complexity of Fully Secure Solitary MPC with Honest Majority
Saikrishna Badrinarayanan, Peihan Miao, Pratyay Mukherjee, Divya Ravi
2021/240
The Relationship Between Idealized Models Under Computationally Bounded Adversaries
Mark Zhandry, Cong Zhang
2021/239
SoK: Auditability and Accountability in Distributed Payment Systems
Panagiotis Chatzigiannis, Foteini Baldimtsi, Konstantinos Chalkias
2021/238
Weak Tweak-Keys for the CRAFT Block Cipher
Gregor Leander, Shahram Rasoolzadeh
2021/237
Post-quantum Security of OAEP Transform
Ehsan Ebrahimi
2021/236
SNOW-Vi: an extreme performance variant of SNOW-V for lower grade CPUs
Patrik Ekdahl, Thomas Johansson, Alexander Maximov, Jing Yang
2021/235
More Efficient Digital Signatures with Tight Multi-User Security
Denis Diemert, Kai Gellert, Tibor Jager, Lin Lyu
2021/234
New Public-Key Crypto-System EHT
Alessandro Budroni, Igor Semaev
2021/233
Public-Coin Statistical Zero-Knowledge Batch Verification against Malicious Verifiers
Inbar Kaslasi, Ron D. Rothblum, Prashant Nalini Vasudevan
2021/232
Fast Factoring Integers by SVP Algorithms
Claus Peter Schnorr
2021/231
LL-ORAM: A Forward and Backward Private Oblivious RAM
Zhiqiang Wu, Xiaoyong Tang, Jin Wang, Tan Deng
2021/230
Subversion-Resilient Public Key Encryption with Practical Watchdogs
Pascal Bemmann, Sebastian Berndt, Rongmao Chen, and Tibor Jager
2021/229
Fast Boolean Queries with Minimized Leakage for Encrypted Databases in Cloud Computing
Zhiqiang Wu, Kenli Li, Keqin Li, Jin Wang
2021/228
On Publicly-Accountable Zero-Knowledge and Small Shuffle Arguments
Nils Fleischhacker, Mark Simkin
2021/227
Rate-1 Key-Dependent Message Security via Reusable Homomorphic Extractor against Correlated-Source Attacks
Qiqi Lai, Feng-Hao Liu, Zhedong Wang
2021/226
Group Encryption: Full Dynamicity, Message Filtering and Code-Based Instantiation
Khoa Nguyen, Reihaneh Safavi-Naini, Willy Susilo, Huaxiong Wang, Yanhong Xu, Neng Zeng
2021/225
Recovering or Testing Extended-Affine Equivalence
Anne Canteaut, Alain Couvreur, Léo Perrin
2021/224
Improved Linear Approximations to ARX Ciphers and Attacks Against ChaCha
Murilo Coutinho, T. C. Souza Neto
2021/223
Escaping from Consensus: Instantly Redactable Blockchain Protocols in Permissionless Setting
Xinyu Li, Jing Xu, Lingyuan Yin, Yuan Lu, Qiang Tang, Zhenfeng Zhang
2021/222
Quantum-safe HIBE: does it cost a Latte?
Raymond K. Zhao, Sarah McCarthy, Ron Steinfeld, Amin Sakzad, and Máire O’Neill
2021/221
The Direction of Updatable Encryption Does Matter
Ryo Nishimaki
2021/220
A New Twofold Cornacchia-Type Algorithm
Bei Wang, Yi Ouyang, Songsong Li, Honggang Hu
2021/219
Snarky Ceremonies
Markulf Kohlweiss, Mary Maller, Janno Siim, Mikhail Volkhov
2021/218
SimS: a Simplification of SiGamal
Tako Boris Fouotsa, Christophe Petit
2021/217
Verifiable Random Functions with Optimal Tightness
David Niehues
2021/216
How to Meet Ternary LWE Keys
Alexander May
2021/215
Limbo: Efficient Zero-knowledge MPCitH-based Arguments
Cyprien Delpech de Saint Guilhem, Emmanuela Orsini, Titouan Tanguy
2021/214
Mesh Messaging in Large-scale Protests: Breaking Bridgefy
Martin R. Albrecht, Jorge Blasco, Rikke Bjerg Jensen, Lenka Mareková
2021/213
Accelerating the Search of Differential and Linear Characteristics with the SAT Method
Ling Sun, Wei Wang, Meiqin Wang
2021/212
Bit-wise Cryptanalysis on AND-RX Permutation Friet-PC
Ryoma Ito, Rentaro Shiba, Kosei Sakamoto, Fukang Liu, Takanori Isobe
2021/211
GearBox: Optimal-size Shard Committees by Leveraging the Safety-Liveness Dichotomy
Bernardo David, Bernardo Magri, Christian Matt, Jesper Buus Nielsen, Daniel Tschudi
2021/210
YOSO: You Only Speak Once / Secure MPC with Stateless Ephemeral Roles
Craig Gentry, Shai Halevi, Hugo Krawczyk, Bernardo Magri, Jesper Buus Nielsen, Tal Rabin, Sophia Yakoubov
2021/209
Sampling methods for cryptographic tests
George Marinakis
2021/208
Secure Poisson Regression
Mahimna Kelkar, Phi Hung Le, Mariana Raykova, Karn Seth
2021/207
Secure Fast Evaluation of Iterative Methods: With an Application to Secure PageRank
Daniele Cozzo, Nigel P. Smart, Younes Talibi Alaoui
2021/206
WabiSabi: Centrally Coordinated CoinJoins with Variable Amounts
Ádám Ficsór, Yuval Kogman, Lucas Ontivero, István András Seres
2021/205
Compact Zero-Knowledge Proofs for Threshold ECDSA with Trustless Setup
Tsz Hon Yuen, Handong Cui, Xiang Xie
2021/204
Revisiting Homomorphic Encryption Schemes for Finite Fields
Andrey Kim, Yuriy Polyakov, Vincent Zucca
2021/203
Anonymous Tokens with Public Metadata and Applications to Private Contact Tracing
Tjerand Silde and Martin Strand
2021/202
Subtractive Sets over Cyclotomic Rings: Limits of Schnorr-like Arguments over Lattices
Martin R. Albrecht, Russell W. F. Lai
2021/201
DAUnTLeSS: Data Augmentation and Uniform Transformation for Learning with Scalability and Security
Hanshen Xiao, Srinivas Devadas
2021/200
Manticore: Efficient Framework for Scalable Secure Multiparty Computation Protocols
Sergiu Carpov, Kevin Deforth, Nicolas Gama, Mariya Georgieva, Dimitar Jetchev, Jonathan Katz, Iraklis Leontiadis, M. Mohammadi, Abson Sae-Tang, Marius Vuille
2021/199
Generic, Efficient and Isochronous Gaussian Sampling over the Integers
Shuo Sun, Yongbin Zhou, Yunfeng Ji, Rui Zhang, Yang Tao
2021/198
Automatic Parallelism Tuning for Module Learning with Errors Based Post-Quantum Key Exchanges on GPUs
Tatsuki Ono, Song Bian, Takashi Sato
2021/197
Gambling for Success: The Lottery Ticket Hypothesis in Deep Learning-based SCA
Guilherme Perin, Lichao Wu, Stjepan Picek
2021/196
QCCA-Secure Generic Key Encapsulation Mechanism with Tighter Security in the Quantum Random Oracle Model
Xu Liu, Mingqiang Wang
2021/195
Compilation of Function Representations for Secure Computing Paradigms
Karim Baghery, Cyprien Delpech de Saint Guilhem, Emmanuela Orsini, Nigel P. Smart, Titouan Tanguy
2021/194
Misuse-Free Key-Recovery and Distinguishing Attacks on 7-Round Ascon
Raghvendra Rohit, Kai Hu, Sumanta Sarkar, Siwei Sun
2021/193
Multitarget decryption failure attacks and their application to Saber and Kyber
Jan-Pieter D'Anvers, Senne Batsleer
2021/192
Quantum Indifferentiability of SHA-3
Jan Czajkowski
2021/191
PT-Symmetric Quantum State Discrimination for Attack on BB84 Quantum Key Distribution
Yaroslav Balytskyi, Manohar Raavi, Anatoliy Pinchuk, Sang-Yoon Chang
2021/190
Decidability of Secure Non-interactive Simulation of Doubly Symmetric Binary Source
Hamidreza Amini Khorasgani, Hemanta K. Maji, Hai H. Nguyen
2021/189
Rotational Cryptanalysis From a Differential-linear Perspective: Practical Distinguishers for Round-reduced FRIET, Xoodoo, and Alzette
Yunwen Liu, Siwei Sun, Chao Li
2021/188
Tight Security Bounds for Micali’s SNARGs
Alessandro Chiesa, Eylon Yogev
2021/187
Weak Keys in Reduced AEGIS and Tiaoxin
Fukang Liu, Takanori Isobe, Willi Meier, Kosei Sakamoto
2021/186
Leakage-resilience of the Shamir Secret-sharing Scheme against Physical-bit Leakages
Hemanta K. Maji, Hai H. Nguyen, Anat Paskin-Cherniavsky, Tom Suad, Mingyuan Wang
2021/185
No Silver Bullet: Optimized Montgomery Multiplication on Various 64-bit ARM Platforms
Hwajeong Seo, Pakize Sanal, Wai-Kong Lee, Reza Azarderakhsh
2021/184
Communication-Efficient BFT Protocols Using Small Trusted Hardware to Tolerate Minority Corruption
Sravya Yandamuri, Ittai Abraham, Kartik Nayak, Michael K. Reiter
2021/183
Efficient State Management in Distributed Ledgers
Dimitris Karakostas, Nikos Karayannidis, Aggelos Kiayias
2021/182
The Legendre Pseudorandom Function as a Multivariate Quadratic Cryptosystem: Security and Applications
István András Seres, Máté Horváth, Péter Burcsi
2021/181
Group Signatures with User-Controlled and Sequential Linkability
Jesus Diaz, Anja Lehmann
2021/180
Unique Chain Rule and its Applications
Adithya Bhat, Akhil Bandarupalli, Saurabh Bagchi, Aniket Kate, Michael Reiter
2021/179
Efficient Framework for Genetic-Algorithm-Based Correlation Power Analysis
An Wang, Yuan Li, Yaoling Ding, Liehuang Zhu, Yongjuan Wang
2021/178
Attribute-Based Access Control for Inner Product Functional Encryption from LWE
Tapas Pal, Ratna Dutta
2021/177
Generic Negation of Pair Encodings
Miguel Ambrona
2021/176
Blitz: Secure Multi-Hop Payments Without Two-Phase Commits
Lukas Aumayr, Pedro Moreno-Sanchez, Aniket Kate, Matteo Maffei
2021/175
On the Relationships between Different Methods for Degree Evaluation (Full Version)
Siwei Chen, Zejun Xiang, Xiangyong Zeng, Shasha Zhang
2021/174
Smart Contracts for Incentivized Outsourcing of Computation
Alptekin Küpçü, Reihaneh Safavi-Naini
2021/173
TensorCrypto
Wai-Kong Lee, Hwajeong Seo, Zhenfei Zhang, Seongoun Hwang
2021/172
Efficient Linear Multiparty PSI and Extensions to Circuit/Quorum PSI
Nishanth Chandran, Nishka Dasgupta, Divya Gupta, Sai Lakshmi Bhavana Obbattu, Sruthi Sekar, Akash Shah
2021/171
Pre-Computation Scheme of Window $\tau$NAF for Koblitz Curves Revisited
Wei Yu, Guangwu Xu
2021/170
Fully Anonymous Group Signature with Verifier-Local Revocation
Ai Kitagawa, Yusuke Sakai, Keita Emura, Goichiro Hanaoka, Keisuke Tanaka
2021/169
Security Analysis on an El-Gamal-like Multivariate Encryption Scheme Based on Isomorphism of Polynomials
Yasuhiko Ikematsu, Shuhei Nakamura, Bagus Santoso, Takanori Yasuda
2021/168
Small Leaks Sink a Great Ship: An Evaluation of Key Reuse Resilience of PQC Third Round Finalist NTRU-HRSS
Xiaohan Zhang, Chi Cheng, Ruoyu Ding
2021/167
Stealing Neural Network Models through the Scan Chain: A New Threat for ML Hardware
Seetal Potluri, Aydin Aysu
2021/166
Cost Fairness for Blockchain-Based Two-Party Exchange Protocols
Matthias Lohr, Benjamin Schlosser, Jan Jürjens, Steffen Staab
2021/165
Composition with Knowledge Assumptions
Thomas Kerber, Aggelos Kiayias, Markulf Kohlweiss
2021/164
Graph-Based Construction for Non-Malleable Codes
Shohei Satake, Yujie Gu, Kouichi Sakurai
2021/163
CNF-FSS and its Applications
Paul Bunn, Eyal Kushilevitz, Rafail Ostrovsky
2021/162
Verifiable Capacity-bound Functions: A New Primitive from Kolmogorov Complexity (Revisiting space-based security in the adaptive setting)
Giuseppe Ateniese, Long Chen, Danilo Francati, Dimitrios Papadopoulos, Qiang Tang
2021/161
Generic Adaptor Signature
Xianrui Qin, Handong Cui, Tsz Hon Yuen
2021/160
Efficient Adaptively-Secure IB-KEMs and VRFs via Near-Collision Resistance
Tibor Jager, Rafael Kurek, David Niehues
2021/159
hbACSS: How to Robustly Share Many Secrets
Thomas Yurek, Licheng Luo, Jaiden Fairoze, Aniket Kate, Andrew Miller
2021/158
Two-Round Perfectly Secure Message Transmission with Optimal Transmission Rate
Nicolas Resch, Chen Yuan
2021/157
Sycon: A New Milestone in Designing ASCON-like Permutations
Kalikinkar Mandal, Dhiman Saha, Sumanta Sarkar, Yosuke Todo
2021/156
Mechanized Proofs of Adversarial Complexity and Application to Universal Composability
Manuel Barbosa, Gilles Barthe, Benjamin Grégoire, Adrien Koutsos, Pierre-Yves Strub
2021/155
Exploring Parallelism to Improve the Performance of FrodoKEM in Hardware
James Howe, Marco Martinoli, Elisabeth Oswald, Francesco Regazzoni
2021/154
Generating cryptographically-strong random lattice bases and recognizing rotations of $\mathbb{Z}^n$
Tamar Lichter Blanks, Stephen D. Miller
2021/153
On the Isogeny Problem with Torsion Point Information
Tako Boris Fouotsa, Péter Kutas, Simon-Philipp Merz, Yan Bo Ti
2021/152
Hybrid Dual Attack on LWE with Arbitrary Secrets
Lei Bi, Xianhui Lu, Junjie Luo, Kunpeng Wang, Zhenfei Zhang
2021/151
On Sufficient Oracles for Secure Computation with Identifiable Abort
Mark Simkin, Luisa Siniscalchi, Sophia Yakoubov
2021/150
Two-Party Adaptor Signatures From Identification Schemes
Andreas Erwig, Sebastian Faust, Kristina Hostáková, Monosij Maitra, Siavash Riahi
2021/149
Quantum Security of the Legendre PRF
Paul Frixons, André Schrottenloher
2021/148
On methods of shortening ElGamal-type signatures
Liliya Akhmetzyanova, Evgeny Alekseev, Alexandra Babueva, Stanislav Smyshlyaev
2021/147
IPDL: A Simple Framework for Formally Verifying Distributed Cryptographic Protocols
Greg Morrisett, Elaine Shi, Kristina Sojakova, Xiong Fan, Joshua Gancher
2021/146
Securely Computing Piecewise Constant Codes
Benjamin E. Diamond
2021/145
A Security Framework for Distributed Ledgers
Mike Graf, Daniel Rausch, Viktoria Ronge, Christoph Egger, Ralf Küsters, and Dominique Schröder
2021/144
\(\chi\)perbp: a Cloud-based Lightweight Mutual Authentication Protocol
Morteza Adeli, Nasour Bagheri, Sadegh Sadeghi, Saru Kumari
2021/143
On Bitcoin Cash’s Target Recalculation Functions
Juan Garay, Yu Shen
2021/142
Federated Learning with Local Differential Privacy: Trade-offs between Privacy, Utility, and Communication
Muah Kim, Onur Gunlu, Rafael F. Schaefer
2021/141
Advanced Lattice Sieving on GPUs, with Tensor Cores
Léo Ducas, Marc Stevens, Wessel van Woerden
2021/140
Practical and Scalable Access Control Mechanism for the Internet of Things using Time-bound Attribute-based Encryption
Clémentine Gritti, Emanuel Regnath, and Sebastian Steinhorst
2021/139
Order-Fair Consensus in the Permissionless Setting
Mahimna Kelkar, Soubhik Deb, Sreeram Kannan
2021/138
Classic McEliece Implementation with Low Memory Footprint
Johannes Roth, Evangelos Karatsiolis, Juliane Krämer
2021/137
Cryptographic Security of the MLS RFC, Draft 11
Chris Brzuska, Eric Cornelissen, Konrad Kohbrok
2021/136
An approach for designing fast public key encryption systems using white-box cryptography techniques
Dmitry Schelkunov
2021/135
Acyclicity Programming for Sigma-Protocols
Masayuki Abe, Miguel Ambrona, Andrej Bogdanov, Miyako Ohkubo, Alon Rosen
2021/134
Cryptanalysis of a code-based signature scheme without trapdoors
Marco Baldi, Jean-Christophe Deneuville, Edoardo Persichetti, Paolo Santini
2021/133
smartFHE: Privacy-Preserving Smart Contracts from Fully Homomorphic Encryption
Ravital Solomon, Rick Weber, Ghada Almashaqbeh
2021/132
Privacy-Preserving Feature Selection with Secure Multiparty Computation
Xiling Li, Rafael Dowsley, Martine De Cock
2021/131
Privacy-Preserving Video Classification with Convolutional Neural Networks
Sikha Pentyala, Rafael Dowsley, Martine De Cock
2021/130
Ready-Made Short Basis for GLV+GLS on High Degree Twisted Curves
Bei Wang, Songsong Li, Yi Ouyang, Honggang Hu
2021/129
Lattice-based weak curve fault attack on ECDSA
Weiqiong Cao, Hongsong Shi, Hua Chen, Wei Wei
2021/128
Designing Tweakable Enciphering Schemes Using Public Permutations
Debrup Chakraborty, Avijit Dutta, Samir Kundu
2021/127
Cuproof: A Novel Range Proof with Constant Size
Cong Deng, Xianghong Tang, Lin You, Gengran Hu, Shuhong Gao
2021/126
Observer Attack on Stream Ciphers
Ramachandran Anantharaman, Virendra Sule
2021/125
Privacy Preserving and Resilient RPKI
Kris Shrishak, Haya Shulman
2021/124
Efficient Number Theoretic Transform Implementation on GPU for Homomorphic Encryption
Ozgun Ozerk, Can Elgezen, Ahmet Can Mert, Erdinc Ozturk, Erkay Savas
2021/123
A Systematic Approach and Analysis of Key Mismatch Attacks on Lattice-Based NIST Candidate KEMs
Yue Qin, Chi Cheng, Xiaohan Zhang, Yanbin Pan, Lei Hu, Jintai Ding
2021/122
PSImple: Practical Multiparty Maliciously-Secure Private Set Intersection
Aner Ben Efraim, Olga Nissenbaum, Eran Omri, Anat Paskin-Cherniavsky
2021/121
BooLigero: Improved Sublinear Zero Knowledge Proofs for Boolean Circuits
Yaron Gvili, Sarah Scheffler, Mayank Varia
2021/120
Large Scale, Actively Secure Computation from LPN and Free-XOR Garbled Circuits
Aner Ben-Efraim, Kelong Cong, Eran Omri, Emmanuela Orsini, Nigel P. Smart, Eduardo Soria-Vazquez
2021/119
Rabbit: Efficient Comparison for Secure Multi-Party Computation
Eleftheria Makri, Dragos Rotaru, Frederik Vercauteren, Sameer Wagh
2021/118
High-Threshold AVSS with Optimal Communication Complexity
Nicolas Alhaddad, Mayank Varia, Haibin Zhang
2021/117
FPPW: A Fair and Privacy Preserving Watchtower For Bitcoin
Arash Mirzaei, Amin Sakzad, Jiangshan Yu, Ron Steinfeld
2021/116
MAKE: a Matrix Action Key Exchange
Nael Rahman, Vladimir Shpilrain
2021/115
Fast Strategies for the Implementation of SIKE Round 3 on ARM Cortex-M4
Mila Anastasova, Reza Azarderakhsh, Mehran Mozaffari Kermani
2021/114
Security Analysis of CPace
Michel Abdalla, Björn Haase, Julia Hesse
2021/113
Improvement of Secure Multi-Party Multiplication of (k,n) Threshold Secret Sharing Using Only N=k Servers (Revised Version)
Ahmad Akmal Aminuddin Mohd Kamal, Keiichi Iwamura
2021/112
Full-Resilient Memory-Optimum Multi-Party Non-Interactive Key Exchange
Majid Salimi, Hamid Mala, Honorio Martin, Pedro Peris-Lopez
2021/111
A note on Post Quantum Onion Routing
Kelesidis Evgnosia-Alexandra
2021/110
Replacing Probability Distributions in Security Games via Hellinger Distance
Kenji Yasunaga
2021/109
Sequential Logic Encryption Against Model Checking Attack
Amin Rezaei, Hai Zhou
2021/108
Implementing CRYSTALS-Dilithium Signature Scheme on FPGAs
Sara Ricci, Lukas Malina, Petr Jedlicka, David Smekal, Jan Hajny, Petr Cibik, Patrik Dobias
2021/107
A Decentralized and Encrypted National Gun Registry
Seny Kamara, Tarik Moataz, Andrew Park, Lucy Qin
2021/106
MERCAT: Mediated, Encrypted, Reversible, SeCure Asset Transfers
Aram Jivanyan, Jesse Lancaster, Arash Afshar, Parnian Alimi
2021/105
A New Efficient Identity-Based Encryption Without Pairing
Majid Salimi
2021/104
Attacking and Defending Masked Polynomial Comparison for Lattice-Based Cryptography
Shivam Bhasin, Jan-Pieter D'Anvers, Daniel Heinz, Thomas Pöppelmann, Michiel Van Beirendonck
2021/103
OAE-RUP: A Strong Online AEAD Security Notion and its Application to SAEF
Amit Singh Bhati, Elena Andreeva, and Damian Vizar
2021/102
A Note on Advanced Encryption Standard with Galois/Counter Mode Algorithm Improvements and S-Box Customization
Madalina Chirita, Alexandru-Mihai Stroie, Andrei-Daniel Safta, Emil Simion
2021/101
Combined Fault and DPA Protection for Lattice-Based Cryptography
Daniel Heinz, Thomas Pöppelmann
2021/100
SPURT: Scalable Distributed Randomness Beacon with Transparent Setup
Sourav Das, Vinith Krishnan, Irene Miriam Isaac, and Ling Ren
2021/099
Property Inference from Poisoning
Melissa Chase, Esha Ghosh, Saeed Mahloujifar
2021/098
Image sets of perfectly nonlinear maps
Lukas Kölsch, Björn Kriepke, Gohar Kyureghyan
2021/097
A New and Improved Reduction Proof of Cascade PRF
Mridul Nandi
2021/096
Gladius: LWR based efficient hybrid public key encryption with distributed decryption
Kelong Cong, Daniele Cozzo, Varun Maram, Nigel P. Smart
2021/095
Collusion-Deterrent Threshold Information Escrow
Easwar Vivek Mangipudi, Donghang Lu, Alexandros Psomas, Aniket Kate
2021/094
Reducing HSM Reliance in Payments through Proxy Re-Encryption
Sivanarayana Gaddam, Atul Luykx, Rohit Sinha, Gaven Watson
2021/093
Response-Hiding Encrypted Ranges: Revisiting Security via Parametrized Leakage-Abuse Attacks
Evgenios M. Kornaropoulos, Charalampos Papamanthou, Roberto Tamassia
2021/092
New Public Key Cryptosystem (First Version)
Dieaa I. Nassr, M. Anwar, Hatem M. Bahig
2021/091
Programmable Bootstrapping Enables Efficient Homomorphic Inference of Deep Neural Networks
Ilaria Chillotti, Marc Joye, Pascal Paillier
2021/090
A New Twofold Cornacchia-Type Algorithm and Its Applications
Bei Wang, Yi Ouyang, Honggang Hu, Songsong Li
2021/089
Fuzzy Message Detection
Gabrielle Beck, Julia Len, Ian Miers, Matthew Green
2021/088
An Overview of the Hybrid Argument
Marc Fischlin, Arno Mittelbach
2021/087
ZEN: An Optimizing Compiler for Verifiable, Zero-Knowledge Neural Network Inferences
Boyuan Feng, Lianke Qin, Zhenfei Zhang, Yufei Ding, Shumo Chu
2021/086
On Elapsed Time Consensus Protocols
Mic Bowman, Debajyoti Das, Avradip Mandal, Hart Montgomery
2021/085
Complete Analysis of Implementing Isogeny-based Cryptography using Huff Form of Elliptic Curves
Suhri Kim
2021/084
Ariadne Thread and Pepper: New Multivariate Cryptographic Schemes with Public Keys in Degree 3
Gilles Macario-Rat, Jacques Patarin
2021/083
The Bluetooth CYBORG: Analysis of the Full Human-Machine Passkey Entry AKE Protocol
Michael Troncoso, Britta Hale
2021/082
Grades of Trust in Multiparty Computation
Jaskaran V. Singh, Nicholas Hopper
2021/081
Private Stream Aggregation from Labeled Secret Sharing Schemes
Hendrik Waldner, Tilen Marc, Miha Stopar, Michel Abdalla
2021/080
Error Term Checking: Towards Chosen Ciphertext Security without Re-encryption
Jan-Pieter D'Anvers, Emmanuela Orsini, Frederik Vercauteren
2021/079
A Side-Channel Attack on a Masked IND-CCA Secure Saber KEM
Kalle Ngo, Elena Dubrova, Qian Guo, Thomas Johansson
2021/078
An Incentive-Compatible Smart Contract for Decentralized Commerce
Nikolaj I. Schwartzbach
2021/077
Magnetic RSA
Rémi Géraud-Stewart, David Naccache
2021/076
QuickSilver: Efficient and Affordable Zero-Knowledge Proofs for Circuits and Polynomials over Any Field
Kang Yang, Pratik Sarkar, Chenkai Weng, Xiao Wang
2021/075
A Generalization of the Subfield Construction
Kamil Otal
2021/074
Cross-Domain Attribute-Based Access Control Encryption
Mahdi Sedaghat, Bart Preneel
2021/073
Application of Velusqrt algorithm to Huff's and general Huff's curves
Michał Wroński
2021/072
Toward Practical Autoencoder-based Side-Channel Analysis Evaluations
Servio Paguada, Lejla Batina, Igor Armendariz
2021/071
Reinforcement Learning for Hyperparameter Tuning in Deep Learning-based Side-channel Analysis
Jorai Rijsdijk, Lichao Wu, Guilherme Perin, Stjepan Picek
2021/070
Secure, Accurate, and Practical Narrow-Band Ranging System
Aysajan Abidin, Mohieddine El Soussi, Jac Romme, Pepijn Boer, Dave Singelée, Christian Bachmann
2021/069
Fast Privacy-Preserving Text Classification based on Secure Multiparty Computation
Amanda Resende, Davis Railsback, Rafael Dowsley, Anderson C. A. Nascimento, Diego F. Aranha
2021/068
Banquet: Short and Fast Signatures from AES
Carsten Baum, Cyprien Delpech de Saint Guilhem, Daniel Kales, Emmanuela Orsini, Peter Scholl, Greg Zaverucha
2021/067
Analysis and Comparison of Table-based Arithmetic to Boolean Masking
Michiel Van Beirendonck, Jan-Pieter D’Anvers, Ingrid Verbauwhede
2021/066
A Deep Learning Approach for Active S-box Prediction of Lightweight Generalized Feistel Block Ciphers
Mohamed Fadl Idris, Je Sen Teh, Jasy Liew Suet Yan, Wei-Zhu Yeoh
2021/065
FPGA Offloading for Diffie-Hellman Key Exchangeusing Elliptic Curves
Dorin-Marian Ionita, Emil Simion
2021/064
Fault Attacks on CCA-secure Lattice KEMs
Peter Pessl, Lukas Prokop
2021/063
CYBERCRYPT: Learn Basic Cryptographic Concepts while Playing
Monir Azraoui, Solenn Brunet, Sébastien Canard, Aïda Diop, Lélia Eveillard, Alicia Filipiak, Adel Hamdi, Flavie Misarsky, Donald Nokam Kuate, Marie Paindavoine, Quentin Santos, Bastien Vialla
2021/062
Compressed Permutation Oracles (And the Collision-Resistance of Sponge/SHA3)
Dominique Unruh
2021/061
A Note on IBE Performance of a Practical Application
Ştefan Maftei, Marius Supuran, Emil Simion
2021/060
UC Non-Interactive, Proactive, Threshold ECDSA with Identifiable Aborts
Ran Canetti, Rosario Gennaro, Steven Goldfeder, Nikolaos Makriyannis, and Udi Peled
2021/059
The Cost of Adaptivity in Security Games on Graphs
Chethan Kamath, Karen Klein, Krzysztof Pietrzak, Michael Walter
2021/058
A Performance Study of Crypto-Hardware in the Low-end IoT
Peter Kietzmann, Lena Boeckmann, Leandro Lanzieri, Thomas C. Schmidt, Matthias Wählisch
2021/057
Correlation Intractability vs. One-wayness
Tamer Mour
2021/056
The Study of Modulo $2^n$
Zhongfeng Niu
2021/055
Tech Report: Inerial HSMs Thwart Advanced Physical Attacks
Jan Sebastian Götte, Björn Scheuermann
2021/054
The Cost of IEEE Arithmetic in Secure Computation
David W. Archer, Shahla Atapoor, Nigel P. Smart
2021/053
On Algebraic Embedding for Unstructured Lattices
Madalina Bolboceanu, Zvika Brakerski, and Devika Sharma
2021/052
Elementary Attestation of Cryptographically Useful Composite Moduli
Rémi Géraud-Stewart, David Naccache
2021/051
How Much can F5 Really Do
Jintai Ding, Zheng Zhang, Joshua Deaton
2021/050
The Distinguishing Attack on HFE
Joshua Deaton, Jintai Ding
2021/049
ASIC Benchmarking of Round 2 Candidates in the NIST Lightweight Cryptography Standardization Process
Mark D. Aagaard, Nusa Zidaric
2021/048
Efficient Lattice Gadget Decomposition Algorithm with Bounded Uniform Distribution
Sohyun Jeon, Hyang-Sook Lee, Jeongeun Park
2021/047
Evolution of Bulletin Board & its application to E-Voting – A Survey
Misni Harjo Suwito, Yoshifumi Ueshige, Kouichi Sakurai
2021/046
Efficient Lattice-Based Inner-Product Functional Encryption
Jose Maria Bermudo Mera, Angshuman Karmakar, Tilen Marc, Azam Soleimanian
2021/045
Banners: Binarized Neural Networks with Replicated Secret Sharing
Alberto Ibarrondo, Hervé Chabanne, Melek Önen
2021/044
Addra: Metadata-private voice communication over fully untrusted infrastructure
Ishtiyaque Ahmad, Yuntian Yang, Divyakant Agrawal, Amr El Abbadi, Trinabh Gupta
2021/043
Combining Montgomery Multiplication with Tag Tracing for the Pollard's Rho Algorithm in Prime Order Fields
Madhurima Mukhopadhyay, Palash Sarkar
2021/042
Correcting Subverted Random Oracles
Alexander Russell, Qiang Tang, Moti Yung, Hong-Sheng Zhou, Jiadong Zhu
2021/041
Post-Quantum LMS and SPHINCS+ Hash-Based Signatures for UEFI Secure Boot
Panos Kampanakis, Peter Panburana, Michael Curcio, Chirag Shroff, Md Mahbub Alam
2021/040
On the tropical discrete logarithm problem and security of a protocol based on tropical semidirect product
Any Muanalifah, Serge˘ı Sergeev
2021/039
Practical FHE parameters against lattice attacks
Jung Hee Cheon, Yongha Son, Donggeon Yhee
2021/038
Streaming Merkle Proofs within Binary Numeral Trees
Luke Champine
2021/037
New First-Order Secure AES Performance Records
Aein Rezaei Shahmirzadi, Dušan Božilov, Amir Moradi
2021/036
The Cryptographic Complexity of Anonymous Coins: A Systematic Exploration
Niluka Amarasinghe, Xavier Boyen, Matthew McKague
2021/035
Sketches for Blockchains
Ori Rottenstreich
2021/034
Circuit-PSI with Linear Complexity via Relaxed Batch OPPRF
Nishanth Chandran, Divya Gupta, Akash Shah
2021/033
Quantum-resistant Anonymous IBE with Traceable Identities
Zi-Yuan Liu, Yi-Fan Tseng, Raylin Tso, Masahiro Mambo, Yu-Chi Chen
2021/032
Experimental relativistic zero-knowledge proofs
Pouriya Alikhani, Nicolas Brunner, Claude Crépeau, Sébastien Designolle, Raphaël Houlmann, Weixu Shi, Hugo Zbinden
2021/031
A Comparative Study of Cryptographic Key Distribution Protocols
Alexandru-Ștefan Gheorghieș, Darius-Marian Lăzăroi, Emil Simion
2021/030
Linear-time and post-quantum zero-knowledge SNARKs for R1CS
Jonathan Lee, Srinath Setty, Justin Thaler, Riad Wahby
2021/029
EPISODE: Efficient Privacy-PreservIng Similar Sequence Queries on Outsourced Genomic DatabasEs
Thomas Schneider, Oleksandr Tkachenko
2021/028
A Side Journey to Titan
Victor LOMNE, Thomas ROCHE
2021/027
E-voting protocols in context of COVID19
Sfirnaciuc Emilia, Vasilescu Miruna-Elena, Simion Emil
2021/026
A Gapless Code-Based Hash Proof System based on RQC and its Applications
Slim Bettaieb, Loïc Bidoux, Olivier Blazy, Yann Connan, Philippe Gaborit
2021/025
FLAME: Taming Backdoors in Federated Learning
Thien Duc Nguyen, Phillip Rieger, Huili Chen, Hossein Yalame, Helen Möllering, Hossein Fereidooni, Samuel Marchal, Markus Miettinen, Azalia Mirhoseini, Shaza Zeitouni, Farinaz Koushanfar, Ahmad-Reza Sadeghi, Thomas Schneider
2021/024
PQC: R-Propping of Burmester-Desmedt Conference Key Distribution System
Pedro Hecht
2021/023
What is Meant by Permissionless Blockchains?
Nicholas Stifter, Aljosha Judmayer, Philipp Schindler, Andreas Kern, Walid Fdhila
2021/022
Increasing Precision of Division Property
Patrick Derbez, Pierre-Alain Fouque
2021/021
Fake Near Collisions Attacks
Patrick Derbez, Pierre-Alain Fouque, Victor Mollimard
2021/020
Catching the Fastest Boomerangs - Application to SKINNY
Stéphanie Delaune, Patrick Derbez, Mathieu Vavrille
2021/019
Kummer versus Montgomery Face-off over Prime Order Fields
Kaushik Nath, Palash Sarkar
2021/018
Comments on ``On the Design of Conditional Privacy Preserving Batch Verification-Based Authentication Scheme for Internet of Vehicles Deployment''
Yuhao Yang, Xiujie Huang
2021/017
Lightweight Techniques for Private Heavy Hitters
Dan Boneh, Elette Boyle, Henry Corrigan-Gibbs, Niv Gilboa, Yuval Ishai
2021/016
Black-Box Uselessness: Composing Separations in Cryptography
Geoffroy Couteau, Pooya Farshim, Mohammad Mahmoody
2021/015
SoK: Remote Power Analysis
Macarena C. Martínez-Rodríguez, Ignacio M. Delgado-Lozano, Billy Bob Brumley
2021/014
Efficient Multilinear Map from Graded Encoding Scheme
Majid Salimi
2021/013
An atlas of the Richelot isogeny graph
Enric Florit, Benjamin Smith
2021/012
Automorphisms and isogeny graphs of abelian varieties, with applications to the superspecial Richelot isogeny graph
Enric Florit, Benjamin Smith
2021/011
Complete solution over $\GF{p^n}$ of the equation $X^{p^k+1}+X+a=0$
Kwang Ho Kim, Jong Hyok Choe, Sihem Mesnager
2021/010
Compcrypt -- Lightweight ANS-based Compression and Encryption
Seyit Camtepe, Jarek Duda, Arash Mahboubi, Pawel Morawiecki, Surya Nepal, Marcin Pawlowski, Josef Pieprzyk
2021/009
Demand-aware Channel Topologies for Off-chain Blockchain Payments
Julia Khamis, Ori Rottenstreich
2021/008
A Family of Nonlinear MDS Diffusion Layers over $\mathbb{F}_{2^{4n}}$
M. R. Mirzaee Shamsabad, S. M. Dehnavi
2021/007
Notes on a lattice-based proxy-oriented identity-based encryption with keyword search
Zi-Yuan Liu, Yi-Fan Tseng, Raylin Tso, Cheng-Yi Lee
2021/006
Privacy-Preserving Privacy Profile Proposal Protocol
Wyatt Howe, Andrei Lapets
2021/005
Aggregatable Distributed Key Generation
Kobi Gurkan, Philipp Jovanovic, Mary Maller, Sarah Meiklejohn, Gilad Stern, Alin Tomescu
2021/004
LLMonPro: Low-Latency Montgomery Modular Multiplication Suitable for Verifiable Delay Functions
Ismail San
2021/003
Ciphertext Policy Attribute Based Encryption for Arithmetic circuits
Mahdi Mahdavi Oliaee, Zahra Ahmadian
2021/002
Can Lattice Signature be as Efficient as Lattice Encryption?
Dingfeng Ye
2021/001
2-Step Multi-Client Quadratic Functional Encryption from Decentralized Function-Hiding Inner-Product
Michel Abdalla, David Pointcheval, Azam Soleimanian
2020/1620
Neural Aided Statistical Attack for Cryptanalysis
Yi Chen, Yantian Shen, Hongbo Yu, Sitong Yuan
2020/1619
Getting Rid of Linear Algebra in Number Theory Problems
Paul Kirchner, Pierre-Alain Fouque
2020/1618
Proof-Carrying Data without Succinct Arguments
Benedikt Bünz, Alessandro Chiesa, William Lin, Pratyush Mishra, Nicholas Spooner
2020/1617
Arguments of Knowledge via hidden order groups
Steve Thakur
2020/1616
Algebraic Geometric Secret Sharing Schemes over Large Fields Are Asymptotically Threshold
Fan Peng, Hao Chen, Chang-An Zhao
2020/1615
An Ideal Compartmented Secret Sharing Scheme Based on Linear Homogeneous Recurrence Relations
Jiangtao Yuan, Guoai Xu, Guosheng Xu
2020/1614
SoK: Algorithmic Incentive Manipulation Attacks on Permissionless PoW Cryptocurrencies
Aljosha Judmayer, Nicholas Stifter, Alexei Zamyatin, Itay Tsabary, Ittay Eyal, Peter Gaži, Sarah Meiklejohn, Edgar Weippl
2020/1613
Lockable Signatures for Blockchains: Scriptless Scripts for All Signatures
Sri Aravinda Krishnan Thyagarajan, Giulio Malavolta
2020/1612
A New Efficient Hierarchical Multi-secret Sharing Scheme Based on Linear Homogeneous Recurrence Relations
Jiangtao Yuan, Jing Yang, Guoai Xu, Xingxing Jia, Fang-wei Fu, Chenyu Wang
2020/1611
SLAP: Simple Lattice-Based Private Stream Aggregation Protocol
Jonathan Takeshita, Ryan Karl, Ting Gong, Taeho Jung
2020/1610
New directions in the ransomware phenomenon
Mihai-Andrei Costandache, Marian-Stefan Mihalache, Emil Simion
2020/1609
A new method for secondary constructions of vectorial bent functions
Amar Bapić, Enes Pasalic
2020/1608
Cryptographic competitions
Daniel J. Bernstein
2020/1607
Manta: Privacy Preserving Decentralized Exchange
Shumo Chu, Qiudong Xia, Zhenfei Zhang
2020/1606
PEGASUS: Bridging Polynomial and Non-polynomial Evaluations in Homomorphic Encryption
Wen-jie Lu, Zhicong Huang, Cheng Hong, Yiping Ma, Hunter Qu
2020/1605
$P_4$-free Partition and Cover Numbers and Application
Alexander R. Block, Simina Branzei, Hemanta K. Maji, Himanshi Mehta, Tamalika Mukherjee, Hai H. Nguyen
2020/1604
An Embedded Domain-Specific Language for Logical Circuit Descriptions with Applications to Garbled Circuits
Andrei Lapets, Wyatt Howe, Ben Getchell, Frederick Jansen
2020/1603
One-Time Delegation of Unlinkable Signing Rights and Its Application
Takashi Nishide
2020/1602
Speeding-up Ideal Lattice-Based Key Exchange Using a RSA/ECC Coprocessor
Aurélien Greuet, Simon Montoya, Guénaël Renault
2020/1601
Adaptive layer-two dispute periods in blockchains
Rami Khalil, Naranker Dulay
2020/1600
Auto-tune POIs: Estimation of distribution algorithms for efficient side-channel analysis
Unai Rioja, Lejla Batina, Jose Luis Flores, Igor Armendariz
2020/1599
Function Secret Sharing for PSI-CA: With Applications to Private Contact Tracing
Samuel Dittmer, Yuval Ishai, Steve Lu, Rafail Ostrovsky, Mohamed Elsabagh, Nikolaos Kiourtis, Brian Schulte, Angelos Stavrou
2020/1598
MILP Based Differential Attack on Round Reduced WARP
Manoj Kumar, Tarun Yadav
2020/1597
A New Improved AES S-box With Enhanced Properties
Abderrahmane Nitaj, Willy Susilo, Joseph Tonien
2020/1596
Batched Differentially Private Information Retrieval
Kinan Dak Albab, Rawane Issa, Mayank Varia, Kalman Graffi
2020/1595
Attacks on Beyond-Birthday-Bound MACs in the Quantum Setting
Tingting Guo, Peng Wang, Lei Hu, Dingfeng Ye
2020/1594
Bootstrapping on SEAL
HyungChul Kang, Joon-Woo Lee, Yongwoo Lee, Young-Sik Kim, Jong-Seon No
2020/1593
Towards Post-Quantum Updatable Public-Key Encryption via Supersingular Isogenies
Edward Eaton, David Jao, Chelsea Komlo, Youcef Mokrani
2020/1592
Puncturable Pseudorandom Sets and Private Information Retrieval with Near-Optimal Online Bandwidth and Time
Elaine Shi, Waqar Aqeel, Balakrishnan Chandrasekaran, Bruce Maggs
2020/1591
Game-Theoretic Fairness Meets Multi-Party Protocols: The Case of Leader Election
Kai-Min Chung, T-H. Hubert Chan, Ting Wen, Elaine Shi
2020/1590
RandPiper -- Reconfiguration-Friendly Random Beacons with Quadratic Communication
Adithya Bhat, Nibesh Shrestha, Aniket Kate, Kartik Nayak
2020/1589
Unifying Presampling via Concentration Bounds
Siyao Guo, Qian Li, Qipeng Liu, Jiapeng Zhang
2020/1588
Deniable Fully Homomorphic Encryption from LWE
Shweta Agrawal, Shafi Goldwasser, Saleet Mossel
2020/1587
On the properties of the Boolean functions associated to the differential spectrum of general APN functions and their consequences
Claude Carlet
2020/1586
CirC: Compiler infrastructure for proof systems, software verification, and more
Alex Ozdemir, Fraser Brown, Riad S. Wahby
2020/1585
Semi-Regularity of Pairs of Boolean Polynomials
Timothy J. Hodges, Hari R. Iyer
2020/1584
Post-Quantum Hash-Based Signatures for Secure Boot
Panos Kampanakis, Peter Panburana, Michael Curcio, Chirag Shroff
2020/1583
HERMES: Scalable, Secure, and Privacy-Enhancing Vehicle Access System
Iraklis Symeonidis, Dragos Rotaru, Mustafa A. Mustafa, Bart Mennink, Bart Preneel, Panos Papadimitratos
2020/1582
A New Method for Designing Lightweight S-boxes with High Differential and Linear Branch Numbers, and Its Application
Hangi Kim, Yongjin Jeon, Giyoon Kim, Jongsung Kim, Bo-Yeon Sim, Dong-Guk Han, Hwajeong Seo, Seonggyeom Kim, Seokhie Hong, Jaechul Sung, Deukjo Hong
2020/1581
Remark on the Security of CKKS Scheme in Practice
Jung Hee Cheon, Seungwan Hong, Duhyeong Kim
2020/1580
Achieving State Machine Replication without Honest Players
Conor McMenamin, Vanesa Daza, Matteo Pontecorvi
2020/1579
Efficient Verifiable Image Redacting based on zk-SNARKs
Hankyung Ko, Ingeun Lee, Seunghwa Lee, Jihye Kim, Hyunok Oh
2020/1578
An IND-CCA2 Attack Against the 1st- and 2nd-round Versions of NTS-KEM
Tung Chou
2020/1577
Multi-Party Replicated Secret Sharing over a Ring with Applications to Privacy-Preserving Machine Learning
Alessandro Baccarini, Marina Blanton, and Chen Yuan
2020/1576
How to Make Private Distributed Cardinality Estimation Practical, and Get Differential Privacy for Free
Changhui Hu, Jin Li, Zheli Liu, Xiaojie Guo, Yu Wei, Xuan Guang, Grigorios Loukides, Changyu Dong
2020/1575
(In)security of the Radio Interface in Sigfox
Loïc Ferreira
2020/1574
Analysing Mining Machine Shutdown Price
Shange Fu, Jiangshan Yu, Rafael Dowsley, Joseph Liu
2020/1573
Halo 0.9: A Halo Protocol with Fully-Succinctness
Lira Wang
2020/1572
Achieve Fully Decentralized End to End encryption meeting via Blockchain
Yang Tan
2020/1571
Hardware Security without Secure Hardware: How to Decrypt with a Password and a Server
Olivier Blazy, Laura Brouilhet, Celine Chevalier, Patrick Towa, Ida Tucker, Damien Vergnaud
2020/1570
Secret Key Agreement with Physical Unclonable Functions: An Optimality Summary
Onur Gunlu, Rafael F. Schaefer
2020/1569
Optimal Communication Complexity of Authenticated Byzantine Agreement
Atsuki Momose, Ling Ren
2020/1568
Compact Certificates of Collective Knowledge
Silvio Micali, Leonid Reyzin, Georgios Vlachos, Riad S. Wahby, Nickolai Zeldovich
2020/1567
Secure Decentralized Access Control Policy for Data Sharing in Smart Grid
Yadi Ye, Leyou Zhang, Yi Mu, Wenting You
2020/1566
An efficient and provably secure authenticated key agreement scheme for mobile edge computing
Mohammad Amin Rakeei, Farokhlagha Moazami
2020/1565
Achieving privacy and accountability in traceable digital currency
Amira Barki, Aline Gouget
2020/1564
Prime Proof Protocol
Anna M. Johnston, Rathna Ramesh
2020/1563
Verifiable Timed Signatures Made Practical
Sri Aravinda KrishnanThyagarajan, Adithya Bhat, Giulio Malavolta, Nico Döttling, Aniket Kate, Dominique Schröder
2020/1562
A complete study of two classes of Boolean functions for homomorphic-friendly stream ciphers
Claude Carlet, Pierrick Méaux
2020/1561
Cryptonite: A Framework for Flexible Time-Series Secure Aggregation with Online Fault Tolerance
Ryan Karl, Jonathan Takeshita, Nirajan Koirla, Taeho Jung
2020/1560
Modified Cache Template Attack on AES
Mahdi Esfahani, Hadi Soleimany, Mohammad Reza Aref
2020/1559
On Exploiting Message Leakage in (few) NIST PQC Candidates for Practical Message Recovery and Key Recovery Attacks
Prasanna Ravi, Shivam Bhasin, Sujoy Sinha Roy, Anupam Chattopadhyay
2020/1558
Double-Odd Elliptic Curves
Thomas Pornin
2020/1557
Efficient Quantum Public-Key Encryption From Learning With Errors
Javad Doliskani
2020/1556
Honest Majority MPC with Abort with Minimal Online Communication
Daniel Escudero, Anders Dalskov
2020/1555
Limits on the Efficiency of (Ring) LWE based Non-Interactive Key Exchange
Siyao Guo, Pritish Kamath, Alon Rosen, Katerina Sotiraki
2020/1554
DNFA: Differential No-Fault Analysis of Bit Permutation Based Ciphers Assisted by Side-Channel
Xiaolu Hou, Jakub Breier, Shivam Bhasin
2020/1553
A Novel Asymmetric Searchable Encryption Scheme with Granting search capability
Arian Arabnouri, Reza Ebrahimi Atani, Shiva Azizzadeh
2020/1552
Threshold Password-Hardened Encryption Services
Julian Brost, Christoph Egger, Russell W. F. Lai, Fritz Schmid, Dominique Schröder, Markus Zoppelt
2020/1551
Multi-Client Oblivious RAM with Poly-Logarithmic Communication
Sherman S. M. Chow, Katharina Fech, Russell W. F. Lai, Giulio Malavolta
2020/1550
Foundations of Ring Sampling
Viktoria Ronge, Christoph Egger, Russell W. F. Lai, Dominique Schröder, Hoover H. F. Yin
2020/1549
High-Precision Bootstrapping for Approximate Homomorphic Encryption by Error Variance Minimization
Yongwoo Lee, Joon-Woo Lee, Young-Sik Kim, Yongjune Kim, Jong-Seon No, HyungChul Kang
2020/1548
CCA-Secure (Puncturable) KEMs from Encryption With Non-Negligible Decryption Errors
Valerio Cini, Sebastian Ramacher, Daniel Slamanig, and Christoph Striecks
2020/1547
Two-server Distributed ORAM with Sublinear Computation and Constant Rounds
Ariel Hamlin, Mayank Varia
2020/1546
Privacy-Preserving Epidemiological Modeling on Mobile Graphs
Daniel Günther, Marco Holz, Benjamin Judkewitz, Helen Möllering, Benny Pinkas, Thomas Schneider, and Ajith Suresh
2020/1545
A Tutorial on the Implementation of Block Ciphers: Software and Hardware Applications
Howard M. Heys
2020/1544
PAS-TA-U: PASsword-based Threshold Authentication with PASsword Update
Rachit Rawat, Mahabir Prasad Jhanwar
2020/1543
CovidBloc: A Blockchain Powered Exposure Database for Contact Tracing
Deepraj Pandey, Nandini Agrawal, Mahabir Prasad Jhanwar
2020/1542
Feeding Three Birds With One Scone: A Generic Duplication Based Countermeasure To Fault Attacks (Extended Version)
Anubhab Baksi, Shivam Bhasin, Jakub Breier, Anupam Chattopadhyay, Vinay B. Y. Kumar
2020/1541
PsiBench: Pragmatic Benchmark of Two-party Private Set Intersection.
Ziyuan Liang, Weiran Liu, Hanwen Feng, Feng Han, Liqiang Peng, Li Peng, Chao Li, Guorui Xu, Lei Zhang, and Fan Zhang
2020/1540
On Bounded Distance Decoding with Predicate: Breaking the "Lattice Barrier" for the Hidden Number Problem
Martin R. Albrecht, Nadia Heninger
2020/1539
Information-Theoretic Security of Cryptographic Channels
Marc Fischlin, Felix Günther, Philipp Muth
2020/1538
Homological Characterization of bounded $F_2$-regularity
Timothy J. Hodges, Sergio Molina
2020/1537
Comments on “ Multi Recipient Aggregate Signcryption Scheme Based on Elliptic Curve”
Nizamud Din, Abdul Waheed, Nasir Saeed
2020/1536
Halo Infinite: Recursive zk-SNARKs from any Additive Polynomial Commitment Scheme
Dan Boneh, Justin Drake, Ben Fisch, Ariel Gabizon
2020/1535
Designer Primes
Anna M. Johnston
2020/1534
Improved Differential Fault Attack on LEA by Algebraic Representation of Modular Addition
SeongHyuck Lim, JongHyeok Lee, Dong-Guk Han
2020/1533
On the Security of Homomorphic Encryption on Approximate Numbers
Baiyu Li, Daniele Micciancio
2020/1532
Oblivious Pseudorandom Functions from Isogenies
Dan Boneh, Dmitry Kogan, Katharine Woo
2020/1531
Reconstructing with Less: Leakage Abuse Attacks in Two-Dimensions
Evangelia Anna Markatou, Francesca Falzon, William Schor, Roberto Tamassia
2020/1530
Security Analysis of Public Key Searchable Encryption Schemes against Injection Attacks
Arian Arabnouri, Reza Ebrahimi Atani, Shiva Azizzadeh
2020/1529
Bounds on the nonlinearity of differentially uniform functions by means of their image set size, and on their distance to affine functions
Claude Carlet
2020/1528
On the Concurrent Composition of Quantum Zero-Knowledge
Prabhanjan Ananth, Kai-Min Chung, Rolando L. La Placa
2020/1527
Zero-Knowledge IOPs with Linear-Time Prover and Polylogarithmic-Time Verifier
Jonathan Bootle, Alessandro Chiesa, Siqi Liu
2020/1526
Flexible and Efficient Verifiable Computation on Encrypted Data
Alexandre Bois, Ignacio Cascudo, Dario Fiore, Dongwoo Kim
2020/1525
BUFFing signature schemes beyond unforgeability and the case of post-quantum signatures
Cas Cremers, Samed Düzlü, Rune Fiedler, Marc Fischlin, and Christian Janson
2020/1524
Nonce-Misuse Security of the SAEF Authenticated Encryption mode
Elena Andreeva, Amit Singh Bhati, Damian Vizar
2020/1523
Revisiting the Security of DbHtS MACs: Beyond-Birthday-Bound in the Multi-User Setting
Yaobin Shen, Lei Wang, Dawu Gu, Jian Weng
2020/1522
Reducing Participation Costs via Incremental Verification for Ledger Systems
Weikeng Chen, Alessandro Chiesa, Emma Dauterman, Nicholas P. Ward
2020/1521
Delegated RingCT: faster anonymous transactions
Rui Morais, Paul Crocker, Simao Melo de Sousa
2020/1520
The SQALE of CSIDH: Sublinear Vélu Quantum-resistant isogeny Action with Low Exponents
Jorge Chávez-Saab, Jesús-Javier Chi-Domínguez, Samuel Jaques, Francisco Rodríguez-Henríquez
2020/1519
Privacy-Preserving Authenticated Key Exchange and the Case of IKEv2
Sven Schäge, Jörg Schwenk, Sebastian Lauer
2020/1518
Botnet IND: About Botnets of Botless IoT Devices
Ben Nassi, Yair Meidan, Dudi Nassi, Asaf Shabtai, Yuval Elovici
2020/1517
Constructing Locally Leakage-resilient Linear Secret-sharing Schemes
Hemanta Maji, Anat Paskin-Cherniavsky, Tom Suad, Mingyuan Wang
2020/1516
How to compute all Pointproofs
Alin Tomescu
2020/1515
The classification of quadratic APN functions in 7 variables
Konstantin Kalgin, Valeriya Idrisova
2020/1514
Improved privacy-preserving training using fixed-Hessian minimisation
Tabitha Ogilvie, Rachel Player, Joe Rowell
2020/1513
Indifferentiable hashing from Elligator 2
Mike Hamburg
2020/1512
Revisiting the Privacy Needs of Real-World Applicable Company Benchmarking
Jan Pennekamp, Patrick Sapel, Ina Berenice Fink, Simon Wagner, Sebastian Reuter, Christian Hopmann, Klaus Wehrle, Martin Henze
2020/1511
Balancing Privacy and Accountability in Blockchain Identity Management
Ivan Damgård, Chaya Ganesh, Hamidreza Khoshakhlagh, Claudio Orlandi, Luisa Siniscalchi
2020/1510
Quantum Computationally Predicate-Binding Commitments with Application in Quantum Zero-Knowledge Arguments for NP
Jun Yan
2020/1509
Single-Message Credential-Hiding Login
Kevin Lewi, Payman Mohassel, Arnab Roy
2020/1508
A Combinatorial Approach to Quantum Random Functions
Nico Döttling, Giulio Malavolta, Sihang Pu
2020/1507
Improvements to RSA key generation and CRT on embedded devices
Mike Hamburg, Mike Tunstall, Qinglai Xiao
2020/1506
Recovering cryptographic keys from partial information, by example
Gabrielle De Micheli, Nadia Heninger
2020/1505
Binary Tree Based Forward Secure Signature Scheme in the Random Oracle Model
Mariusz Jurkiewicz
2020/1504
The Age of Testifying Wearable Devices: The Case of Intoxication Detection
Ben Nassi, Lior Rokach, Yuval Elovici
2020/1503
Recovery Attack on Bob's Secrets in CRYSTALS-KYBER and SABER
Satoshi Okada, Yuntao Wang
2020/1502
Witness Encryption from Garbled Circuit and Multikey Fully Homomorphic Encryption Techniques
Kamil Kluczniak
2020/1501
PANCAKE: Frequency Smoothing for Encrypted Data Stores
Paul Grubbs, Anurag Khandelwal, Marie-Sarah Lacharité, Lloyd Brown, Lucy Li, Rachit Agarwal, Thomas Ristenpart
2020/1500
Oblivious Transfer is in MiniQCrypt
Alex B. Grilo, Huijia Lin, Fang Song, Vinod Vaikuntanathan
2020/1499
Analysing the HPKE Standard
Joël Alwen, Bruno Blanchet, Eduard Hauck, Eike Kiltz, Benjamin Lipp, Doreen Riepel
2020/1498
EPID with Malicious Revocation
Olivier Sanders, Jacques Traoré
2020/1497
A note on the calculation of some functions in finite fields: Tricks of the Trade
Michael Scott
2020/1496
Pseudo-Free Families and Cryptographic Primitives
Mikhail Anokhin
2020/1495
CloudMoles: Surveillance of Power-Wasting Activities by Infiltrating Undercover Sensors
Seyedeh Sharareh Mirzargar, Andrea Guerrieri, Mirjana Stojilović
2020/1494
Nonintrusive and Adaptive Monitoring for Locating Voltage Attacks in Virtualized FPGAs
Seyedeh Sharareh Mirzargar, Gaiëtan Renault, Andrea Guerrieri, Mirjana Stojilović
2020/1493
Verified fast formulas for control bits for permutation networks
Daniel J. Bernstein
2020/1492
Automated ciphertext-only attack on the Wheatstone Cryptograph and related devices
Thomas Kaeding
2020/1491
Partitioning Oracle Attacks
Julia Len, Paul Grubbs, Thomas Ristenpart
2020/1490
Unlinkable and Invisible γ-Sanitizable Signatures
Angèle Bossuat, Xavier Bultel
2020/1489
On the (Ir)Replaceability of Global Setups, or How (Not) to Use a Global Ledger
Christian Badertscher, Julia Hesse, Vassilis Zikas
2020/1488
General Properties of Quantum Bit Commitments
Jun Yan
2020/1487
One-Way Functions Imply Secure Computation in a Quantum World
James Bartusek, Andrea Coladangelo, Dakshita Khurana, Fermi Ma
2020/1486
CommiTEE: An Efficient and Secure Commit-Chain Protocol using TEEs
Andreas Erwig, Sebastian Faust, Siavash Riahi, Tobias Stöckert
2020/1485
Quantum Search for Lightweight Block Ciphers: GIFT, SKINNY, SATURNIN
Subodh Bijwe, Amit Kumar Chauhan, Somitra Kumar Sanadhya
2020/1484
Cryptanalysis of Aggregate $\Gamma$-Signature and Practical Countermeasures in Application to Bitcoin
Goichiro Hanaoka, Kazuo Ohta, Yusuke Sakai, Bagus Santoso, Kaoru Takemure, Yunlei Zhao
2020/1483
A Low-Depth Homomorphic Circuit for Logistic Regression Model Training
Eric Crockett
2020/1482
Optimized Polynomial Multiplier Architectures for Post-Quantum KEM Saber
Andrea Basso, Sujoy Sinha Roy
2020/1481
Design and implementation of HElib: a homomorphic encryption library
Shai Halevi, Victor Shoup
2020/1480
Proofs of non-Supermajority: the missing link for two-phase BFT with responsive view-change and linear complexity
Christophe Levrat, Matthieu Rambaud
2020/1479
Automatic Privacy-Preserving Contact Tracing of Novel Coronavirus Infection by Cloud-Enabled WBAN using Blockchain
Anupam Pattanayak, Subhasish Dhal, Sourav Kanti Addya
2020/1478
Robust Subgroup Multi-Signatures for Consensus
David Galindo, Jia Liu
2020/1477
Machine-checking the universal verifiability of ElectionGuard
Thomas Haines, Rajeev Gore, Jack Stodart
2020/1476
Carbon Trading with Blockchain
Andreas Richardson, Jiahua Xu
2020/1475
Delegate and Verify the Update Keys of Revocable Identity-Based Encryption
Kwangsu Lee
2020/1474
New method of verifying cryptographic protocols based on the process model
A. M. Mironov
2020/1473
Lighthouses: A Warning System for Super-Spreader Events
Leonie Reichert, Samuel Brack, Björn Scheuermann
2020/1472
Enhancing Code Based Zero-knowledge Proofs using Rank Metric
Emanuele Bellini, Philippe Gaborit, Alexandros Hasikos, Victor Mateu
2020/1471
On The Round Complexity of Secure Quantum Computation
James Bartusek, Andrea Coladangelo, Dakshita Khurana, Fermi Ma
2020/1470
TaiJi: Longest Chain Availability with BFT Fast Confirmation
Songze Li, David Tse
2020/1469
Succinct Blind Quantum Computation Using a Random Oracle
Jiayu Zhang
2020/1468
Secure Cloud Auditing with Efficient Ownership Transfer (Full Version)
Jun Shen, Fuchun Guo, Xiaofeng Chen, Willy Susilo
2020/1467
Making the BKW Algorithm Practical for LWE
Alessandro Budroni, Qian Guo, Thomas Johansson, Erik Mårtensson, Paul Stankovski Wagner
2020/1466
Load Balancing for Sharded Blockchains
Naoya Okanami, Ryuya Nakamura, Takashi Nishide
2020/1465
Cryptanalysis of an Anonymous Authentication and Key Agreement Protocol for Secure Wireless Body Area Network
Mohammad Amin Rakeei, Farokhlagha Moazami
2020/1464
Round Efficient Secure Multiparty Quantum Computation with Identifiable Abort
Bar Alon, Hao Chung, Kai-Min Chung, Mi-Ying Huang, Yi Lee, Yu-Ching Shen
2020/1463
Observations on the Tightness of the Security Bounds of GIFT-COFB and HyENA
Mustafa Khairallah
2020/1462
Ovid: Message-based Automatic Contact Tracing
Leonie Reichert, Samuel Brack, Björn Scheuermann
2020/1461
Lower bounds for the depth of modular squaring
Benjamin Wesolowski, Ryan Williams
2020/1460
The MAGIC Mode for Simultaneously Supporting Encryption, Message Authentication and Error Correction
Michael Kounavis, David Durham, Sergej Deutsch, Krystian Matusiewicz, David Wheeler
2020/1459
Preliminary Hardware Benchmarking of a Group of Round 2 NIST Lightweight AEAD Candidates
Mustafa Khairallah, Thomas Peyrin, Anupam Chattopadhyay
2020/1458
Analysis of Ascon, DryGASCON, and Shamash Permutations
Cihangir Tezcan
2020/1457
The Cost to Break SIKE: A Comparative Hardware-Based Analysis with AES and SHA-3
Patrick Longa, Wen Wang, Jakub Szefer
2020/1456
How to Abuse and Fix Authenticated Encryption Without Key Commitment
Ange Albertini, Thai Duong, Shay Gueron, Stefan Kölbl, Atul Luykx, Sophie Schmieg
2020/1455
An Analytic Attack Against ARX Addition Exploiting Standard Side-Channel Leakage
Yan Yan, Elisabeth Oswald, Srinivas Vivek
2020/1454
Rate-1 Quantum Fully Homomorphic Encryption
Orestis Chardouvelis, Nico Doettling, Giulio Malavolta
2020/1453
New (k,l,m)-verifiable multi-secret sharing schemes based on XTR public key system
Jing Yang, Fang-Wei Fu
2020/1452
ASAP: Algorithm Substitution Attacks on Cryptographic Protocols
Sebastian Berndt, Jan Wichelmann, Claudius Pott, Tim-Henrik Traving, Thomas Eisenbarth
2020/1451
Efficient Fully Secure Computation via Distributed Zero-Knowledge Proofs
Elette Boyle, Niv Gilboa, Yuval Ishai, Ariel Nof
2020/1450
Subversion-Resilient Enhanced Privacy ID
Antonio Faonio, Dario Fiore, Luca Nizzardo, Claudio Soriente
2020/1449
More Efficient Amortization of Exact Zero-Knowledge Proofs for LWE
Jonathan Bootle, Vadim Lyubashevsky, Ngoc Khanh Nguyen, Gregor Seiler
2020/1448
Shorter Lattice-Based Zero-Knowledge Proofs via One-Time Commitments
Vadim Lyubashevsky, Ngoc Khanh Nguyen, Gregor Seiler
2020/1447
Compressed $\Sigma$-Protocols for Bilinear Group Arithmetic Circuits and Application to Logarithmic Transparent Threshold Signatures
Thomas Attema, Ronald Cramer, Matthieu Rambaud
2020/1446
Line-Point Zero Knowledge and Its Applications
Samuel Dittmer, Yuval Ishai, Rafail Ostrovsky
2020/1445
Observations on COMET
Daniel J. Bernstein, Henri Gilbert, Meltem Sonmez Turan
2020/1444
On known constructions of APN and AB functions and their relation to each other
Marco Calderini, Lilya Budaghyan, Claude Carlet
2020/1443
DPaSE: Distributed Password-Authenticated Symmetric Encryption
Poulami Das, Julia Hesse, Anja Lehmann
2020/1442
Analysis of Multivariate Encryption Schemes: Application to Dob
Morten Øygarden, Patrick Felke, Håvard Raddum
2020/1441
PayMo: Payment Channels For Monero
Sri AravindaKrishnan Thyagarajan, Giulio Malavolta, Fritz Schmidt, Dominique Schröder
2020/1440
SoK: Cyber-Attack Taxonomy of Distributed Ledger- and Legacy Systems-based Financial Infrastructures
Ralph Ankele, Kai Nahrgang, Branka Stojanovic, Atta Badii
2020/1439
Cryptographic Vulnerabilities and Other Shortcomings of the Nextcloud Server Side Encryption as implemented by the Default Encryption Module
Kevin "Kenny" Niehage
2020/1438
Resource Estimation of Grovers-kind Quantum Cryptanalysis against FSR based Symmetric Ciphers
Ravi Anand, Subhamoy Maitra, Arpita Maitra, Chandra Sekhar Mukherjee, Sourav Mukhopadhyay
2020/1437
Round-Optimal and Communication-Efficient Multiparty Computation
Michele Ciampi, Rafail Ostrovsky, Hendrik Waldner, Vassilis Zikas
2020/1436
Removable Weak Keys for Discrete Logarithm Based Cryptography
Michael John Jacobson Jr., Prabhat Kushwaha
2020/1435
Publicly Verifiable Zero Knowledge from (Collapsing) Blockchains
Alessandra Scafuro, Luisa Siniscalchi, Ivan Visconti
2020/1434
Towards Multiparty Computation Withstanding Coercion of All Parties
Ran Canetti, Oxana Poburinnaya
2020/1433
Interactive Proofs for Social Graphs
Liran Katzir, Clara Shikhelman, Eylon Yogev
2020/1432
CP-ABE for Circuits (and more) in the Symmetric Key Setting
Shweta Agrawal, Shota Yamada
2020/1431
Information-Theoretic 2-Round MPC without Round Collapsing: Adaptive Security, and More
Huijia Lin, Tianren Liu, Hoeteck Wee
2020/1430
Revisiting Fairness in MPC: Polynomial Number of Parties and General Adversarial Structures
Dana Dachman-Soled
2020/1429
On Computational Shortcuts for Information-Theoretic PIR
Matthew M. Hong, Yuval Ishai, Victor I. Kolobov, Russell W. F. Lai
2020/1428
On Statistical Security in Two-Party Computation
Dakshita Khurana, Muhammad Haris Mughees
2020/1427
Barriers for Succinct Arguments in the Random Oracle Model
Alessandro Chiesa, Eylon Yogev
2020/1426
Linear-Time Arguments with Sublinear Verification from Tensor Codes
Jonathan Bootle, Alessandro Chiesa, Jens Groth
2020/1425
Public-Coin Zero-Knowledge Arguments with (almost) Minimal Time and Space Overheads
Alexander R. Block, Justin Holmgren, Alon Rosen, Ron D. Rothblum, and Pratik Soni
2020/1424
Improved Key Recovery of the HFEv- Signature Scheme
Chengdong Tao, Albrecht Petzoldt, Jintai Ding
2020/1423
Quantum encryption with certified deletion
Anne Broadbent, Rabib Islam
2020/1422
Non-interactive classical verification of quantum computation
Gorjan Alagic, Andrew M. Childs, Alex B. Grilo, Shih-Han Hung
2020/1421
Weakly Extractable One-Way Functions
Nir Bitansky, Noa Eizenstadt, Omer Paneth
2020/1420
Functional Encryption for Quadratic Functions from k-Lin, Revisited
Hoeteck Wee
2020/1419
The Resiliency of MPC with Low Interaction: The Benefit of Making Errors
Benny Applebaum, Eliran Kachlon, Arpita Patra
2020/1418
Quantum Period Finding against Symmetric Primitives in Practice
Xavier Bonnetain, Samuel Jaques
2020/1417
Correlated Pseudorandom Functions from Variable-Density LPN
Elette Boyle, Geoffroy Couteau, Niv Gilboa, Yuval Ishai, Lisa Kohl, Peter Scholl
2020/1416
Further on the Construction of Feedback Shift Registers with Maximum Strong Linear Complexity
Congwei Zhou, Bin Hu, Jie Guan
2020/1415
Secure Graph Database Search with Oblivious Filter
Jamie Cui, Chaochao Chen, Alex X. Liu, Li Wang
2020/1414
New Insights On Differential And Linear Bounds Using Mixed Integer Linear Programming (Full Version)
Anubhab Baksi
2020/1413
Simpler Statistically Sender Private Oblivious Transfer from Ideals of Cyclotomic Integers
Daniele Micciancio, Jessica Sorrell
2020/1412
Constant-Overhead Unconditionally Secure Multiparty Computation over Binary Fields
Antigoni Polychroniadou, Yifan Song
2020/1411
Transparent Error Correcting in a Computationally Bounded World
Ofer Grossman, Justin Holmgren, Eylon Yogev
2020/1410
Mac'n'Cheese: Zero-Knowledge Proofs for Boolean and Arithmetic Circuits with Nested Disjunctions
Carsten Baum, Alex J. Malozemoff, Marc B. Rosen, Peter Scholl
2020/1409
The Convergence of Slide-type Reductions
Michael Walter
2020/1408
On Broadcast in Generalized Network and Adversarial Models
Chen-Da Liu-Zhang, Varun Maram, Ueli Maurer
2020/1407
Computing Square Roots Faster than the Tonelli-Shanks/Bernstein Algorithm
Palash Sarkar
2020/1406
How not to VoteAgain: Pitfalls of Scalable Coercion-Resistant E-Voting
Thomas Haines, Johannes Mueller
2020/1405
Grover on GIFT
Kyoungbae Jang, Hyunjun Kim, Siwoo Eum, Hwajeong Seo
2020/1404
A Practical Key-Recovery Attack on 805-Round Trivium
Chen-Dong Ye, Tian Tian
2020/1403
A q-SDH-based Graph Signature Scheme on Full-Domain Messages with Efficient Protocols
Syh-Yuan Tan, Ioannis Sfyrakis, Thomas Gross
2020/1402
SKINNY with Scalpel - Comparing Tools for Differential Analysis
Stéphanie Delaune, Patrick Derbez, Paul Huynh, Marine Minier, Victor Mollimard, Charles Prud'homme
2020/1401
Quantum Garbled Circuits
Zvika Brakerski, Henry Yuen
2020/1400
Transferable E-cash: A Cleaner Model and the First Practical Instantiation
Balthazar Bauer, Georg Fuchsbauer, Chen Qian
2020/1399
A New Generalisation of the Goldwasser-Micali Cryptosystem Based on the Gap $2^k$-Residuosity Assumption
Diana Maimut, George Teseleanu
2020/1398
Minimal binary linear codes - a general framework based on bent concatenation
Fengrong Zhang, Enes Pasalic, René Rodríguez, Yongzhuang Wei
2020/1397
NTT Multiplication for NTT-unfriendly Rings
Chi-Ming Marvin Chung, Vincent Hwang, Matthias J. Kannwischer, Gregor Seiler, Cheng-Jhih Shih, Bo-Yin Yang
2020/1396
Efficient Privacy Preserving Logistic Regression Inference and Training
Kyoohyung Han, Jinhyuck Jeong, Jung Hoon Sohn, Yongha Son
2020/1395
Post-Quantum Multi-Party Computation
Amit Agarwal, James Bartusek, Vipul Goyal, Dakshita Khurana, Giulio Malavolta
2020/1394
Practical and Secure Circular Range Search on Private Spatial Data
Zhihao Zheng, Jiachen Shen, Zhenfu Cao
2020/1393
On the Effectiveness of Time Travel to Inject COVID-19 Alerts
Vincenzo Iovino, Serge Vaudenay, Martin Vuagnoux
2020/1392
Function Secret Sharing for Mixed-Mode and Fixed-Point Secure Computation
Elette Boyle, Nishanth Chandran, Niv Gilboa, Divya Gupta, Yuval Ishai, Nishant Kumar, Mayank Rathee
2020/1391
Interactive Proofs for Quantum Black-Box Computations
Jiang Zhang, Yu Yu, Dengguo Feng, Shuqin Fan, Zhenfeng Zhang, Kang Yang
2020/1390
A Survey of ECDSA Threshold Signing
Jean-Philippe Aumasson, Adrian Hamelink, Omer Shlomovits
2020/1389
Key Mismatch Attack on NewHope Revisited
Jan Vacek, Jan Václavek
2020/1388
Signcryption in a Quantum World
Sanjit Chatterjee, Tapas Pandit, Shravan Kumar Parshuram Puria, Akash Shah
2020/1387
FB-Tree: Highly Efficient Tree-Based Index for Encrypted Boolean Queries in Smart Cities
Zhiqiang Wu, Kenli Li, Jin Wang, Naixue Xiong
2020/1386
Decentralized Multi-Authority ABE for DNFs from LWE
Pratish Datta, Ilan Komargodski, Brent Waters
2020/1385
An Alternative Approach for SIDH Arithmetic
Cyril Bouvier, Laurent Imbert
2020/1384
A Black-Box Approach to Post-Quantum Zero-Knowledge in Constant Rounds
Nai-Hui Chia, Kai-Min Chung, and Takashi Yamakawa
2020/1383
Novel Single-Trace ML Profiling Attacks on NIST 3 Round candidate Dilithium
Il-Ju Kim, Tae-Ho Lee, Jaeseung Han, Bo-Yeon Sim, Dong-Guk Han
2020/1382
Chosen-Ciphertext Secure Multi-Identity and Multi-Attribute Pure FHE
Tapas Pal, Ratna Dutta
2020/1381
PBio: Enabling Cross-organizational Biometric Authentication Service through Secure Sharing of Biometric Templates
Jia-Chng Loh, Geong-Sen Poh, Jason H. M. Ying, Jia Xu, Hoon Wei Lim, Jonathan Pan, Weiyang Wong
2020/1380
Fast Computing of Quadratic Forms of HFE Polynomials over fields of characteristic two
Borja Gómez
2020/1379
Blockchain Driven Access Control Mechanisms, Models and Frameworks: A Systematic Literature Review
Aaqib Bashir Dar, Asif Iqbal Baba, Auqib Hamid Lone, Roohie Naaz, Fan Wu
2020/1378
Correlation-Intractable Hash Functions via Shift-Hiding
Alex Lombardi, Vinod Vaikuntanathan
2020/1377
When to Barrett reduce in the inverse NTT
Bas Westerbaan
2020/1376
Stronger bounds on the cost of computing Groebner bases for HFE systems
Elisa Gorla, Daniela Mueller, Christophe Petit
2020/1375
Semi-regular sequences and other random systems of equations
M. Bigdeli, E. De Negri, M. M. Dizdarevic, E. Gorla, R. Minko, S. Tsakou
2020/1374
ELM : A Low-Latency and Scalable Memory Encryption Scheme
Akiko Inoue, Kazuhiko Minematsu, Maya Oda, Rei Ueno, Naofumi Homma
2020/1373
Transciphering, using FiLIP and TFHE for an efficient delegation of computation
Clément Hoffmann, Pierrick Méaux, Thomas Ricosset
2020/1372
VCKSCF: Efficient Verifiable Conjunctive Keyword Search Based on Cuckoo Filter for Cloud Storage
Chan Fan, Xiaolei Dong, Zhenfu Cao, Jiachen Shen
2020/1371
Privacy Amplification with Tamperable Memory via Non-malleable Two-source Extractors
Divesh Aggarwal, Maciej Obremski, João Ribeiro, Mark Simkin, Luisa Siniscalchi
2020/1370
A discretization attack
Daniel J. Bernstein
2020/1369
Multiplication over Extension Fields for Pairing-based Cryptography: an Hardware Point of View
Arthur Lavice, Nadia El Mrabet, Alexandre Berzati, Jean-Baptiste Rigaud
2020/1368
On the Worst-Case Side-Channel Security of ECC Point Randomization in Embedded Devices
Melissa Azouaoui, François Durvaux, Romain Poussier, François-Xavier Standaert, Kostas Papagiannopoulos, Vincent Verneuil
2020/1367
Costs of an Attack Against Proof-of-Work
Loïc Etienne
2020/1366
LURK: Server-Controlled TLS Delegation
Ioana Boureanu, Daniel Migault, Stere Preda, Hyame Assem Alamedine, Sanjay Mishra, Frederic Fieau, Mohammad Mannan
2020/1365
Evaluation Methods for Chebyshev Polynomials
Zhengjun Cao, Lihua Liu, Leming Hong
2020/1364
Security of Hybrid Key Encapsulation
Matthew Campagna, Adam Petcher
2020/1363
Game-Set-MATCH: Using Mobile Devices for Seamless External-Facing Biometric Matching
Shashank Agrawal, Saikrishna Badrinarayanan, Pratyay Mukherjee, Peter Rindal
2020/1362
Lattice-Based Proof-of-Work for Post-Quantum Blockchains
Rouzbeh Behnia, Eamonn W. Postlethwaite, Muslum Ozgur Ozmen, Attila Altay Yavuz
2020/1361
Tight adaptive reprogramming in the QROM
Alex B. Grilo, Kathrin Hövelmanns, Andreas Hülsing, Christian Majenz
2020/1360
Incremental Cryptography Revisited: PRFs, Nonces and Modular Design
Vivek Arte, Mihir Bellare, Louiza Khati
2020/1359
On two fundamental problems on APN power functions
Lilya Budaghyan, Marco Calderini, Claude Carlet, Diana Davidova, Nikolay Kaleyski
2020/1358
Toward Provable One Way Functions
Hagar Dolev, Shlomi Dolev
2020/1357
Forward and Backward Private Dynamic Searchable Symmetric Encryption for Conjunctive Queries
Cong Zuo, Shi-Feng Sun, Joseph K. Liu, Jun Shao, Josef Pieprzyk, Guiyi Wei
2020/1356
Computing Expected Differential Probability of (Truncated) Differentials and Expected Linear Potential of (Multidimensional) Linear Hulls in SPN Block Ciphers
Maria Eichlseder, Gregor Leander, Shahram Rasoolzadeh
2020/1355
Modular Lagrange Interpolation of the Mod Function for Bootstrapping of Approximate HE
Charanjit S. Jutla, Nathan Manohar
2020/1354
Gadget-Based iNTRU Lattice Trapdoors
Nicholas Genise, Baiyu Li
2020/1353
Adaptive-secure identity-based inner-product functional encryption and its leakage-resilience
Linru Zhang, Xiangning Wang, Yuechen Chen, Siu-Ming Yiu
2020/1352
Reducing Round Complexity of Byzantine Broadcast
Linda Chen, Jun Wan
2020/1351
Tight State-Restoration Soundness in the Algebraic Group Model
Ashrujit Ghoshal, Stefano Tessaro
2020/1350
Senate: A Maliciously-Secure MPC Platform for Collaborative Analytics
Rishabh Poddar, Sukrit Kalra, Avishay Yanai, Ryan Deng, Raluca Ada Popa, Joseph M. Hellerstein
2020/1349
Key Dependency of Differentials: Experiments in the Differential Cryptanalysis of Block Ciphers Using Small S-boxes
Howard M. Heys
2020/1348
Vetted Encryption
Martha Norberg Hovd, Martijn Stam
2020/1347
A Systematic Appraisal of Side Channel Evaluation Strategies
Melissa Azouaoui, Davide Bellizia, Ileana Buhan, Nicolas Debande, Sebastien Duval, Christophe Giraud, Eliane Jaulmes, Francois Koeune, Elisabeth Oswald, Francois-Xavier Standaert, Carolyn Whitnall
2020/1346
SodsMPC: FSM based Anonymous and Private Quantum-safe Smart Contracts
Shlomi Dolev, Ziyu Wang
2020/1345
Post-Quantum Adaptor Signature for Privacy-Preserving Off-Chain Payments
Erkan Tairi, Pedro Moreno-Sanchez, Matteo Maffei
2020/1344
Indifferentiability of SKINNY-HASH Internal Functions
Akinori Hosoyamada, Tetsu Iwata
2020/1343
Improved Cryptanalysis of UOV and Rainbow
Ward Beullens
2020/1342
Forward and Backward Private Conjunctive Searchable Symmetric Encryption
Sikhar Patranabis, Debdeep Mukhopadhyay
2020/1341
Zero-Communication Reductions
Varun Narayanan, Manoj Prabhakaran, Vinod M. Prabhakaran
2020/1340
Homomorphic Evaluation of the SM4
Yu Xue
2020/1339
New Approaches for Quantum Copy-Protection
Scott Aaronson, Jiahui Liu, Qipeng Liu, Mark Zhandry, Ruizhe Zhang
2020/1338
Optimized Architectures for Elliptic Curve Cryptography over Curve448
Mojtaba Bisheh Niasar, Reza Azarderakhsh, Mehran Mozaffari Kermani
2020/1337
Multiplicative Depth Independent & Efficient MPC in the Presence of Mixed Adversary
Achintya Desai, Shubham Raj, Kannan Srinathan
2020/1336
Faster Characteristic Three Polynomial Multiplication and Its Application to NTRU Prime Decapsulation
Esra Yeniaras, Murat Cenk
2020/1335
Transciphering Framework for Approximate Homomorphic Encryption (Full Version)
Jihoon Cho, Jincheol Ha, Seongkwang Kim, Byeonghak Lee, Joohee Lee, Jooyoung Lee, Dukjae Moon, Hyojin Yoon
2020/1334
One-Shot Fiat-Shamir-based NIZK Arguments of Composite Residuosity and Logarithmic-Size Ring Signatures in the Standard Model
Benoît Libert, Khoa Nguyen, Thomas Peters, Moti Yung
2020/1333
Updateable Inner Product Argument with Logarithmic Verifier and Applications
Vanesa Daza, Carla Ràfols, Alexandros Zacharakis
2020/1332
Protecting the Privacy of Voters: New Definitions of Ballot Secrecy for E-Voting
Ashley Fraser, Elizabeth A. Quaglia
2020/1331
Efficient mixing of arbitrary ballots with everlasting privacy: How to verifiably mix the PPATC scheme
Kristian Gjøsteen, Thomas Haines, Morten Rotvold Solberg
2020/1330
Fantastic Four: Honest-Majority Four-Party Secure Computation With Malicious Security
Anders Dalskov, Daniel Escudero, Marcel Keller
2020/1329
Adaptively secure Threshold Symmetric-key Encryption
Pratyay Mukherjee
2020/1328
SWiSSSE: System-Wide Security for Searchable Symmetric Encryption
Zichen Gui, Kenneth G. Paterson, Sikhar Patranabis, and Bogdan Warinschi
2020/1327
On The Insider Security of MLS
Joël Alwen, Daniel Jost, Marta Mularczyk
2020/1326
Towards Fine-Grained One-Way Functions from Strong Average-Case Hardness
Chris Brzuska and Geoffroy Couteau
2020/1325
On Self-Equivalence Encodings in White-Box Implementations
Adrián Ranea, Bart Preneel
2020/1324
Separation Results for Boolean Function Classes
Aniruddha Biswas, Palash Sarkar
2020/1323
CSI-RAShi: Distributed key generation for CSIDH
Ward Beullens, Lucas Disson, Robi Pedersen, Frederik Vercauteren
2020/1322
Towards Post-Quantum Security for Cyber-Physical Systems: Integrating PQC into Industrial M2M Communication
Sebastian Paul, Patrik Scheible
2020/1321
Provably Quantum-Secure Tweakable Block Ciphers
Akinori Hosoyamada, Tetsu Iwata
2020/1320
WARP : Revisiting GFN for Lightweight 128-bit Block Cipher
Subhadeep Banik, Zhenzhen Bao, Takanori Isobe, Hiroyasu Kubo, Fukang Liu, Kazuhiko Minematsu, Kosei Sakamoto, Nao Shibata, Maki Shigeri
2020/1319
On Succinct Arguments and Witness Encryption from Groups
Ohad Barta, Yuval Ishai, Rafail Ostrovsky, David J. Wu
2020/1318
Poppins: A Direct Construction for Asymptotically Optimal zkSNARKs
Abhiram Kothapalli, Elisaweta Masserova, Bryan Parno
2020/1317
Improved Rectangle Attacks on SKINNY and CRAFT
Hosein Hadipour, Nasour Bagheri, and Ling Song
2020/1316
Security of Public Key Encryption against Resetting Attacks
Juliane Krämer, Patrick Struck
2020/1315
On Index Calculus Algorithms for Subfield Curves
Steven D. Galbraith, Robert Granger, Simon-Philipp Merz, Christophe Petit
2020/1314
Secure Software Leasing from Standard Assumptions
Fuyuki Kitagawa, Ryo Nishimaki, Takashi Yamakawa
2020/1313
Payment Trees: Low Collateral Payments for Payment Channel Networks
Maxim Jourenko, Mario Larangeira, Keisuke Tanaka
2020/1312
Individual Simulations
Yi Deng
2020/1311
Cryptanalysis of Feistel-Based Format-Preserving Encryption
Orr Dunkelman, Abhishek Kumar, Eran Lambooij, Somitra Kumar Sanadhya
2020/1310
A note on the low order assumption in class groups of imaginary quadratic number fields
Karim Belabas, Thorsten Kleinjung, Antonio Sanso, and Benjamin Wesolowski
2020/1309
Provable Security Analysis of Decentralized Cryptographic Contact Tracing
Noel Danz, Oliver Derwisch, Anja Lehmann, Wenzel Puenter, Marvin Stolle, Joshua Ziemann
2020/1308
On the Success Probability of Solving Unique SVP via BKZ
Eamonn W. Postlethwaite, Fernando Virdia
2020/1307
Multiparty Cardinality Testing for Threshold Private Set Intersection
Pedro Branco, Nico Döttling, Sihang Pu
2020/1306
Simulation Extractable Versions of Groth’s zk-SNARK Revisited
Oussama Amine, Karim Baghery, Zaira Pindado, Carla Ràfols
2020/1305
On the Compressed-Oracle Technique, and Post-Quantum Security of Proofs of Sequential Work
Kai-Min Chung, Serge Fehr, Yu-Hsuan Huang, Tai-Ning Liao
2020/1304
QCB: Efficient Quantum-secure Authenticated Encryption
Ritam Bhaumik, Xavier Bonnetain, André Chailloux, Gaëtan Leurent, María Naya-Plasencia, André Schrottenloher, Yannick Seurin
2020/1303
Post-Quantum Cryptography with Contemporary Co-Processors: Beyond Kronecker, Schönhage-Strassen & Nussbaumer
Joppe W. Bos, Joost Renes, Christine van Vredendaal
2020/1302
TMVP-based Multiplication for Polynomial Quotient Rings and Application to Saber on ARM Cortex-M4
İrem Keskinkurt Paksoy, Murat Cenk
2020/1301
Robust Property-Preserving Hash Functions for Hamming Distance and More
Nils Fleischhacker, Mark Simkin
2020/1300
Byzantine Ordered Consensus without Byzantine Oligarchy
Yunhao Zhang, Srinath Setty, Qi Chen, Lidong Zhou, Lorenzo Alvisi
2020/1299
Unbounded Key-Policy Attribute-based Encryption with Black-Box Traceability
Yunxiu Ye, Zhenfu Cao, Jiachen Shen
2020/1298
Is Real-time Phishing Eliminated with FIDO? Social Engineering Downgrade Attacks against FIDO Protocols
Enis Ulqinaku, Hala Assal, AbdelRahman Abdou, Sonia Chiasson, Srdjan Čapkun
2020/1297
On the Effect of the (Micro)Architecture on the Development of Side-Channel Resistant Software
Lauren De Meyer, Elke De Mulder, Michael Tunstall
2020/1296
Concrete quantum cryptanalysis of binary elliptic curves
Gustavo Banegas, Daniel J. Bernstein, Iggy van Hoof, Tanja Lange
2020/1295
Optimized Software Implementations for theLightweight Encryption Scheme ForkAE
Arne Deprez, Elena Andreeva, Jose Maria Bermudo Mera, Angshuman Karmakar, Antoon Purnal
2020/1294
Coco: Co-Design and Co-Verification of Masked Software Implementations on CPUs
Barbara Gigerl, Vedad Hadzic, Robert Primas, Stefan Mangard, Roderick Bloem
2020/1293
I Choose You: Automated Hyperparameter Tuning for Deep Learning-based Side-channel Analysis
Lichao Wu, Guilherme Perin, Stjepan Picek
2020/1292
Optimal Oblivious Parallel RAM
Gilad Asharov, Ilan Komargodski, Wei-Kai Lin, Enoch Peserico, and Runting Shi
2020/1291
Efficient Composable Oblivious Transfer from CDH in the Global Random Oracle Model
Bernardo David, Rafael Dowsley
2020/1290
FORTIS: Selfish Mining Mitigation by (FOR)geable (TI)me(S)tamps
Osman Biçer, Alptekin Küpçü
2020/1289
Sword: An Opaque Blockchain Protocol
Farid Elwailly
2020/1288
Improved attacks against key reuse in learning with errors key exchange
Nina Bindel, Douglas Stebila, Shannon Veitch
2020/1287
Multivariate Cryptographic Primitive based on the product of the roots of a polynomial over a field
Borja Gómez
2020/1286
Secure Two-Party Quantum Computation Over Classical Channels
Michele Ciampi, Alexandru Cojocaru, Elham Kashefi, Atul Mantri
2020/1285
Multi-Input Quadratic Functional Encryption from Pairings
Shweta Agrawal, Rishab Goyal, Junichi Tomida
2020/1284
Entropy Estimation of Physically Unclonable Functions with Offset Error
Mitsuru Shiozaki, Yohei Hori, Takeshi Fujino
2020/1283
Sieving for twin smooth integers with solutions to the Prouhet-Tarry-Escott problem
Craig Costello, Michael Meyer, Michael Naehrig
2020/1282
Compact Authenticated Key Exchange in the Quantum Random Oracle Model
Haiyang Xue, Man Ho Au, Rupeng Yang, Bei Liang, Haodong Jiang
2020/1281
Key Agreement for Decentralized Secure Group Messaging with Strong Security Guarantees
Matthew Weidner, Martin Kleppmann, Daniel Hugenroth, Alastair R. Beresford
2020/1280
DORY: An Encrypted Search System with Distributed Trust
Emma Dauterman, Eric Feng, Ellen Luo, Raluca Ada Popa, Ion Stoica
2020/1279
Tightly-Secure Authenticated Key Exchange, Revisited
Tibor Jager, Eike Kiltz, Doreen Riepel, Sven Schäge
2020/1278
Compact Dilithium Implementations on Cortex-M3 and Cortex-M4
Denisa O. C. Greconici, Matthias J. Kannwischer, Amber Sprenkels
2020/1277
A Simple Protocol to Compare EMFI Platforms
J. Toulemont, N. Ouldei-Tebina, J. M. Galliere, P. Nouet, E. Bourbao, P. Maurine
2020/1276
Lattice-based Key Sharing Schemes - A Survey
Prasanna Ravi, James Howe, Anupam Chattopadhyay, Shivam Bhasin
2020/1275
Quarks: Quadruple-efficient transparent zkSNARKs
Srinath Setty, Jonathan Lee
2020/1274
Dory: Efficient, Transparent arguments for Generalised Inner Products and Polynomial Commitments
Jonathan Lee
2020/1273
Classical Verification of Quantum Computations with Efficient Verifier
Nai-Hui Chia, Kai-Min Chung, and Takashi Yamakawa
2020/1272
Bent Functions from Cellular Automata
Maximilien Gadouleau, Luca Mariot, Stjepan Picek
2020/1271
(F)unctional Sifting: A Privacy-Preserving Reputation System Through Multi-Input Functional Encryption (extended version)
Alexandros Bakas, Antonis Michalas
2020/1270
Classical vs Quantum Random Oracles
Takashi Yamakawa, Mark Zhandry
2020/1269
PRINCEv2 - More Security for (Almost) No Overhead
Dušan Božilov, Maria Eichlseder, Miroslav Kneževic, Baptiste Lambin, Gregor Leander, Thorben Moos, Ventzislav Nikov, Shahram Rasoolzadeh, Yosuke Todo, Friedrich Wiemer
2020/1268
A Novel Duplication Based Countermeasure To Statistical Ineffective Fault Analysis
Anubhab Baksi, Vinay B. Y. Kumar, Banashri Karmakar, Shivam Bhasin, Dhiman Saha, Anupam Chattopadhyay
2020/1267
Fault Attacks In Symmetric Key Cryptosystems
Anubhab Baksi, Shivam Bhasin, Jakub Breier, Dirmanto Jap, Dhiman Saha
2020/1266
Multi-Party Functional Encryption
Shweta Agrawal, Rishab Goyal, Junichi Tomida
2020/1265
Revisiting ECM on GPUs
Jonas Wloka, Jan Richter-Brockmann, Colin Stahlke, Thorsten Kleinjung, Christine Priplata, Tim Güneysu
2020/1264
Humanly Computable Passwords as Lattice based OTP generator with LWE
Slawomir Matelski
2020/1263
Improved Fault Analysis on SIMECK Ciphers
Duc-Phong Le, Rongxing Lu, Ali A. Ghorbani
2020/1262
Multi-stage Proof-of-Works: Properties and Vulnerabilities
Paolo D'Arco, Zahra Ebadi Ansaroudi, Francesco Mogavero
2020/1261
MuSig2: Simple Two-Round Schnorr Multi-Signatures
Jonas Nick, Tim Ruffing, and Yannick Seurin
2020/1260
Lattice Reduction with Approximate Enumeration Oracles: Practical Algorithms and Concrete Performance
Martin R. Albrecht, Shi Bai, Jianwei Li, Joe Rowell
2020/1259
Correlated Randomness Teleportation via Semi-trusted Hardware - Enabling Silent Multi-party Computation
Yibiao Lu, Bingsheng Zhang, Hong-Sheng Zhou, Weiran Liu, Lei Zhang, Kui Ren
2020/1258
TranSCA: Cross-Family Profiled Side-Channel Attacks using Transfer Learning on Deep Neural Networks
Dhruv Thapar, Manaar Alam, Debdeep Mukhopadhyay
2020/1257
Improved Reduction Between SIS Problems over Structured Lattices
ZaHyun Koo, Yongwoo Lee, Joon-Woo Lee, Jong-Seon No, Young-Sik Kim
2020/1256
Asymptotically Good Multiplicative LSSS over Galois Rings and Applications to MPC over Z/p^k Z
Mark Abspoel, Ronald Cramer, Ivan Damgård, Daniel Escudero, Matthieu Rambaud, Chaoping Xing, Chen Yuan
2020/1255
Boolean Ring Cryptographic Equation Solving
Sean Murphy, Maura Paterson, Christine Swart
2020/1254
Broadcast-Optimal Two Round MPC with an Honest Majority
Ivan Damgård, Bernardo Magri, Divya Ravi, Luisa Siniscalchi, Sophia Yakoubov
2020/1253
New Representations of the AES Key Schedule
Gaëtan Leurent, Clara Pernot
2020/1252
Adaptive Extractors and their Application to Leakage Resilient Secret Sharing
Nishanth Chandran, Bhavana Kanukurthi, Sai Lakshmi Bhavana Obbattu, Sruthi Sekar
2020/1251
Bit Security Estimation Using Various Information-Theoretic Measures
Dong-Hoon Lee, Young-Sik Kim, Jong-Seon No
2020/1250
A New Code Based Signature Scheme without Trapdoors
Zhe Li, Chaoping Xing, Sze Ling Yeo
2020/1249
Adversarial Level Agreements for Two-Party Protocols
Marilyn George, Seny Kamara
2020/1248
Random-index PIR and Applications
Craig Gentry, Shai Halevi, Bernardo Magri, Jesper Buus Nielsen, Sophia Yakoubov
2020/1247
Doubly Efficient Interactive Proofs for General Arithmetic Circuits with Linear Prover Time
Jiaheng Zhang, Tianyi Liu, Weijie Wang, Yinuo Zhang, Dawn Song, Xiang Xie, Yupeng Zhang
2020/1246
The Mother of All Leakages: How to Simulate Noisy Leakages via Bounded Leakage (Almost) for Free
Gianluca Brian, Antonio Faonio, Maciej Obremski, João Ribeiro, Mark Simkin, Maciej Skórski, Daniele Venturi
2020/1245
Two-round trip Schnorr multi-signatures via delinearized witnesses
Handan Kilinc Alper, Jeffrey Burdges
2020/1244
Taming the many EdDSAs
Konstantinos Chalkias, François Garillot, Valeria Nikolaenko
2020/1243
A New Variant of Unbalanced Oil and Vinegar Using Quotient Ring: QR-UOV
Hiroki Furue, Yasuhiko Ikematsu, Yutaro Kiyomura, Tsuyoshi Takagi
2020/1242
Improved (Related-key) Differential Cryptanalysis on GIFT
Fulei Ji, Wentao Zhang, Chunning Zhou, Tianyou Ding
2020/1241
DAPA: Differential Analysis aided Power Attack on (Non-)Linear Feedback Shift Registers (Extended version)
Siang Meng Sim, Dirmanto Jap, Shivam Bhasin
2020/1240
SQISign: compact post-quantum signatures from quaternions and isogenies
Luca De Feo, David Kohel, Antonin Leroux, Christophe Petit, Benjamin Wesolowski
2020/1239
Authenticated Dictionaries with Cross-Incremental Proof (Dis)aggregation
Alin Tomescu, Yu Xia, Zachary Newman
2020/1238
Hardness of Entropic Module-LWE
Hao Lin, Mingqiang Wang, Jincheng Zhuang, Yang Wang
2020/1237
A Complete Analysis of the BKZ Lattice Reduction Algorithm
Jianwei Li and Phong Q. Nguyen
2020/1236
Round-Efficient Byzantine Broadcast under Strongly Adaptive and Majority Corruptions
Jun Wan, Hanshen Xiao, Srinivas Devadas, Elaine Shi
2020/1235
Assessing Lightweight Block Cipher Security using Linear and Nonlinear Machine Learning Classifiers
Ting Rong Lee, Je Sen Teh, Norziana Jamil, Jasy Liew Suet Yan, Jiageng Chen
2020/1234
Impossibility on the Schnorr Signature from the One-more DL Assumption in the Non-programmable Random Oracle Model
Masayuki Fukumitsu, Shingo Hasegawa
2020/1233
BVOT: Self-Tallying Boardroom Voting with Oblivious Transfer
Farid Javani, Alan T. Sherman
2020/1232
On the Existence of Weak Keys for QC-MDPC Decoding
Nicolas Sendrier, Valentin Vasseur
2020/1231
vault1317/signal-dakez: An authenticated key exchange protocol with a public key concealing and a participation deniability designed for secure messaging
Richard B. Riddick
2020/1230
Certificateless Public-key Authenticate Searchable Encryption with Probabilistic Trapdoor Generation
Leixiao Cheng, Fei Meng
2020/1229
Decentralized Asset Custody Scheme with Security against Rational Adversary
Zhaohua Chen, Guang Yang
2020/1228
Low-Cost Body Biasing Injection (BBI) Attacks on WLCSP Devices
Colin O'Flynn
2020/1227
Integral Cryptanalysis of Reduced-Round Tweakable TWINE
Muhammad ElSheikh, Amr M. Youssef
2020/1226
Synchronous Constructive Cryptography
Chen-Da Liu-Zhang, Ueli Maurer
2020/1225
ABY2.0: Improved Mixed-Protocol Secure Two-Party Computation
Arpita Patra, Thomas Schneider, Ajith Suresh, Hossein Yalame
2020/1224
Multi-Input Functional Encryption: Efficient Applications From Symmetric Primitives (extended version)
Alexandros Bakas, Antonis Michalas
2020/1223
Algorithmic Acceleration of B/FV-like Somewhat Homomorphic Encryption for Compute-Enabled RAM
Jonathan Takeshita, Dayane Reis, Ting Gong, Michael Niemier, X. Sharon Hu, Taeho Jung
2020/1222
Practical Post-Quantum Few-Time Verifiable Random Function with Applications to Algorand
Muhammed F. Esgin, Veronika Kuchta, Amin Sakzad, Ron Steinfeld, Zhenfei Zhang, Shifeng Sun, Shumo Chu
2020/1221
Verifiable Functional Encryption using Intel SGX
Tatsuya Suzuki, Keita Emura, Toshihiro Ohigashi, Kazumasa Omote
2020/1220
The Topographic Signature (TopoSign) Protocol
Hassan Jameel Asghar, Slawomir Matelski, Josef Pieprzyk
2020/1219
Aggregate Signature with Detecting Functionality from Group Testing
Shingo Sato, Junji Shikata, Tsutomu Matsumoto
2020/1218
Interactive Aggregate Message Authentication Equipped with Detecting Functionality from Adaptive Group Testing
Shingo Sato, Junji Shikata
2020/1217
R-Propping of HK17: Upgrade for a Detached Proposal of NIST PQC First Round Survey
Pedro Hecht
2020/1216
Polynomial Multiplication in NTRU Prime: Comparison of Optimization Strategies on Cortex-M4
Erdem Alkim, Dean Yun-Li Cheng, Chi-Ming Marvin Chung, Hülya Evkan, Leo Wei-Lun Huang, Vincent Hwang, Ching-Lin Trista Li, Ruben Niederhagen, Cheng-Jhih Shih, Julian Wälde, Bo-Yin Yang
2020/1215
Differential analysis of the ZUC-256 initialisation
Steve Babbage, Alexander Maximov
2020/1214
Cryptanalysis of RSA: A Special Case of Boneh-Durfee’s Attack
Majid Mumtaz, Ping Luo
2020/1213
Expected-Time Cryptography: Generic Techniques and Applications to Concrete Soundness
Joseph Jaeger, Stefano Tessaro
2020/1212
Triply Adaptive UC NIZK
Ran Canetti, Pratik Sarkar, and Xiao Wang
2020/1211
Public-key Authenticate Searchable Encryption With Probabilistic Trapdoor Generation
Leixiao Cheng, Fei Meng
2020/1210
Non-Committing Encryption with Constant Ciphertext Expansion from Standard Assumptions
Yusuke Yoshida, Fuyuki Kitagawa, Keita Xagawa, Keisuke Tanaka
2020/1209
Universal Composition with Global Subroutines: Capturing Global Setup within plain UC
Christian Badertscher, Ran Canetti, Julia Hesse, Björn Tackmann, Vassilis Zikas
2020/1208
An algorithm for bounding non-minimum weight differentials in 2-round LSX-ciphers
Vitaly Kiryukhin
2020/1207
FPGA Benchmarking of Round 2 Candidates in the NIST Lightweight Cryptography Standardization Process: Methodology, Metrics, Tools, and Results
Kamyar Mohajerani, Richard Haeussler, Rishub Nagpal, Farnoud Farahmand, Abubakr Abdulgadir, Jens-Peter Kaps, Kris Gaj
2020/1206
Frontrunning on Automated Decentralized Exchange in Proof Of Stake Environment
Andrey Sobol
2020/1205
Towards Non-Interactive Witness Hiding
Benjamin Kuykendall, Mark Zhandry
2020/1204
Single-to-Multi-Theorem Transformations for Non-Interactive Statistical Zero-Knowledge
Marc Fischlin, Felix Rohrbach
2020/1203
Efficient Bootstrapping for Approximate Homomorphic Encryption with Non-Sparse Keys
Jean-Philippe Bossuat, Christian Mouchet, Juan Troncoso-Pastoriza, Jean-Pierre Hubaux
2020/1202
Correlation Power Analysis and Higher-order Masking Implementation of WAGE
Yunsi Fei, Guang Gong, Cheng Gongye, Kalikinkar Mandal, Raghvendra Rohit, Tianhong Xu, Yunjie Yi, Nusa Zidaric
2020/1201
Algebraic Key-Recovery Attacks on Reduced-Round Xoofff
Tingting Cui, Lorenzo Grassi
2020/1200
WBCD: White-box Block Cipher Scheme Based on Dynamic Library
Yatao Yang, Ye Zhang, Yuying Zhai, Zheng Yuan, Guangwu Xu
2020/1199
Towards Defeating Backdoored Random Oracles: Indifferentiability with Bounded Adaptivity
Yevgeniy Dodis, Pooya Farshim, Sogol Mazaheri, Stefano Tessaro
2020/1198
Finding EM leakages at design stage: a simulation methodology
Davide Poggi, Philippe Maurine, Thomas Ordas, Alexandre Sarafianos, Jérémy Raoult
2020/1197
Black-Box Non-Interactive Non-Malleable Commitments
Rachit Garg, Dakshita Khurana, George Lu, Brent Waters
2020/1196
TR-31 and AS 2805 (Non)equivalence report
Arthur Van Der Merwe, David Paul, Jelena Schmalz, Timothy M. Schaerf
2020/1195
A Lower Bound for One-Round Oblivious RAM
David Cash, Andrew Drucker, Alexander Hoover
2020/1194
Quantum copy-protection of compute-and-compare programs in the quantum random oracle model
Andrea Coladangelo, Christian Majenz, and Alexander Poremba
2020/1193
Bypassing Isolated Execution on RISC-V with Fault Injection
Shoei Nashimoto, Daisuke Suzuki, Rei Ueno, Naofumi Homma
2020/1192
Architecture Correlation Analysis (ACA): Identifying the Source of Side-channel Leakage at Gate-level
Yuan Yao, Tarun Kathuria, Baris Ege, Patrick Schaumont
2020/1191
Schrödinger's Pirate: How To Trace a Quantum Decoder
Mark Zhandry
2020/1190
Efficient Post-Quantum SNARKs for RSIS and RLWE and their Applications to Privacy
Cecilia Boschini, Jan Camenisch, Max Ovsiankin, Nicholas Spooner
2020/1189
Signatures of Knowledge for Boolean Circuits under Standard Assumptions (Full version)
Karim Baghery, Alonso González, Zaira Pindado, Carla Ràfols
2020/1188
Cryptographic Group Actions and Applications
Navid Alamati, Luca De Feo, Hart Montgomery, Sikhar Patranabis
2020/1187
Coupling of Random Systems
David Lanzenberger, Ueli Maurer
2020/1186
Constant Ciphertext-Rate Non-Committing Encryption from Standard Assumptions
Zvika Brakerski, Pedro Branco, Nico Döttling, Sanjam Garg, Giulio Malavolta
2020/1185
Lossiness and Entropic Hardness for Ring-LWE
Zvika Brakerski, Nico Döttling
2020/1184
Constant-time verification for cut-and-choose-based signatures
Robert Ransom
2020/1183
Practical Lattice-Based Zero-Knowledge Proofs for Integer Relations
Vadim Lyubashevsky, Ngoc Khanh Nguyen, Gregor Seiler
2020/1182
On the Round Complexity of the Shuffle Model
Amos Beimel, Iftach Haitner, Kobbi Nissim, Uri Stemmer
2020/1181
TinyGarble2: Smart, Efficient, and Scalable Yao’s Garble Circuit
Siam Hussain, Baiyu Li, Farinaz Koushanfar, Rosario Cammarota
2020/1180
MultiTLS: Secure communication channels with cipher suite diversity
Ricardo Moura, David R. Matos, Miguel Pardal, Miguel Correia
2020/1179
Optimal Broadcast Encryption from LWE and Pairings in the Standard Model
Shweta Agrawal, Daniel Wichs, Shota Yamada
2020/1178
An Efficient Authenticated Key Exchange from Random Self-Reducibility on CSIDH
Tomoki Kawashima, Katsuyuki Takashima, Yusuke Aikawa, Tsuyoshi Takagi
2020/1177
Differential Attacks on CRAFT Exploiting the Involutory S-boxes and Tweak Additions
Hao Guo, Siwei Sun, Danping Shi, Ling Sun, Yao Sun, Lei Hu, Meiqin Wang
2020/1176
Short Paper: PoSH Proof of Staked Hardware Consensus
Rami Khalil, Naranker Dulay
2020/1175
MOTIF: (Almost) Free Branching in GMW via Vector-Scalar Multiplication
David Heath, Vladimir Kolesnikov, Stanislav Peceny
2020/1174
Multi Random Projection Inner Product Encryption, Applications to Proximity Searchable Encryption for the Iris Biometric
Chloe Cachet, Sohaib Ahmad, Luke Demarest, Serena Riback, Ariel Hamlin, Benjamin Fuller
2020/1173
Equipping Public-Key Cryptographic Primitives with Watermarking (or: A Hole Is to Watermark)
Ryo Nishimaki
2020/1172
Cryptanalysis of a round optimal lattice-based multisignature scheme
Zi-Yuan Liu, Yi-Fan Tseng, Raylin Tso
2020/1171
On the Price of Concurrency in Group Ratcheting Protocols
Alexander Bienstock, Yevgeniy Dodis, Paul Rösler
2020/1170
On the Power of an Honest Majority in Three-Party Computation Without Broadcast
Bar Alon, Ran Cohen, Eran Omri, Tom Suad
2020/1169
Privacy-preserving greater-than integer comparison without binary decomposition in the malicious model
Sigurd Eskeland
2020/1168
FHE-Based Bootstrapping of Designated-Prover NIZK
Zvika Brakerski, Sanjam Garg, Rotem Tsabary
2020/1167
Batch Verification for Statistical Zero Knowledge Proofs
Inbar Kaslasi, Guy N. Rothblum, Ron D. Rothblum, Adam Sealfon, Prashant Nalini Vasudevan
2020/1166
A Differential and Linear Analysis of the Inversion Mapping in Odd-Characteristic Finite Fields
Jorge Nakahara Jr
2020/1165
Practical Isogeny-Based Key-exchange with Optimal Tightness
Bor de Kock, Kristian Gjøsteen, Mattia Veroni
2020/1164
Template Attacks Based on the Multivariate Joint Distribution
Min Yang, Qingshu Meng, An Wang, Xin Liu
2020/1163
Specifying cycles of minimal length for commonly used linear layers in block ciphers
Guoqiang Deng, Yongzhuang Wei, Xuefeng Duan, Enes Pasalic, Samir Hodzic
2020/1162
On Average-Case Hardness in TFNP from One-Way Functions
Pavel Hubáček, Chethan Kamath, Karel Král, Veronika Slívová
2020/1161
KVaC: Key-Value Commitments for Blockchains and Beyond
Shashank Agrawal, Srinivasan Raghuraman
2020/1160
Characterizing Deterministic-Prover Zero Knowledge
Nir Bitansky, Arka Rai Choudhuri
2020/1159
ACE in Chains : How Risky is CBC Encryption of Binary Executable Files ?
Rintaro Fujita, Takanori Isobe, Kazuhiko Minematsu
2020/1158
Don't throw your nonces out with the bathwater: Speeding up Dilithium by reusing the tail of y
Amber Sprenkels, Bas Westerbaan
2020/1157
Secure Massively Parallel Computation for Dishonest Majority
Rex Fernando, Ilan Komargodski, Yanyi Liu, Elaine Shi
2020/1156
Verifiable Hierarchical Key Assignment Schemes
Anna Lisa Ferrara, Chiara Ricciardi
2020/1155
Zilch: A Framework for Deploying Transparent Zero-Knowledge Proofs
Dimitris Mouris, Nektarios Georgios Tsoutsos
2020/1154
Functional Encryption for Set Intersection in the Multi-Client Setting
Kwangsu Lee, Minhye Seo
2020/1153
Key Committing AEADs
Shay Gueron
2020/1152
An Automatic Search Tool for Iterative Trails and its Application to estimation of differentials and linear hulls
Tianyou Ding, Wentao Zhang, Chunning Zhou, Fulei Ji
2020/1151
Raccoon Attack: Finding and Exploiting Most-Significant-Bit-Oracles in TLS-DH(E)
Robert Merget, Marcus Brinkmann, Nimrod Aviram, Juraj Somorovsky, Johannes Mittmann, Jörg Schwenk
2020/1150
Terrorist Attacks for Fake Exposure Notifications in Contact Tracing Systems
Gennaro Avitabile, Daniele Friolo, Ivan Visconti
2020/1149
Deterministic Wallets in a Quantum World
Nabil Alkeilani Alkadri, Poulami Das, Andreas Erwig, Sebastian Faust, Juliane Krämer, Siavash Riahi, Patrick Struck
2020/1148
An Area Aware Accelerator for Elliptic Curve Point Multiplication
Malik Imran, Samuel Pagliarini, Muhammad Rashid
2020/1147
Lic-Sec: an enhanced AppArmor Docker security profile generator
Hui Zhu, Christian Gehrmann
2020/1146
Let's Tessellate: Tiling for Security Against Advanced Probe and Fault Adversaries
Siemen Dhooghe, Svetla Nikova
2020/1145
Improved Security Analysis for Nonce-based Enhanced Hash-then-Mask MACs
Wonseok Choi, Byeonghak Lee, Yeongmin Lee, Jooyoung Lee
2020/1144
Algebraic Distinguishers: From Discrete Logarithms to Decisional Uber Assumptions
Lior Rotem, Gil Segev
2020/1143
Rescue-Prime: a Standard Specification (SoK)
Alan Szepieniec, Tomer Ashur, Siemen Dhooghe
2020/1142
Factoring Algorithm Based on Parameterized Newton Method
Zhengjun Cao, Lihua Liu
2020/1141
A post-quantum signature scheme from the secant variety of the Grassmannian
Daniele Di Tullio, Manoj Gyawali
2020/1140
On the Efficient Estimation of Min-Entropy
Yongjune Kim, Cyril Guyot, Young-Sik Kim
2020/1139
Succinct and Adaptively Secure ABE for ABP from k-Lin
Huijia Lin, Ji Luo
2020/1138
Epochal Signatures for Deniable Group Chats
Andreas Hülsing and Fiona Johanna Weber
2020/1137
MOTION - A Framework for Mixed-Protocol Multi-Party Computation
Lennart Braun, Daniel Demmler, Thomas Schneider, Oleksandr Tkachenko
2020/1136
A Note on Koblitz Curves over Prime Fields
Han Wu, Guangwu Xu
2020/1135
Adaptively Secure Inner Product Encryption from LWE
Shuichi Katsumata, Ryo Nishimaki, Shota Yamada, Takashi Yamakawa
2020/1134
Back To The Basics: Seamless Integration of Side-Channel Pre-processing in Deep Neural Networks
Yoo-Seung Won, Xiaolu Hou, Dirmanto Jap, Jakub Breier, Shivam Bhasin
2020/1133
Security Analysis of Subterranean 2.0
Ling Song, Yi Tu, Danping Shi, Lei Hu
2020/1132
A Logarithmic Lower Bound for Oblivious RAM (for all parameters)
Ilan Komargodski, Wei-Kai Lin
2020/1131
Several classes of minimal binary linear codes violating the Aschikhmin-Barg's bound
Enes Pasalic, René Rodríguez, Fengrong Zhang, Yongzhuang Wei
2020/1130
Secure training of decision trees with continuous attributes
Mark Abspoel, Daniel Escudero, Nikolaj Volgushev
2020/1129
A Secure Software Defined Networking based Framework for IoT Networks
Ambili K N, Jimmy Jose
2020/1128
Searching Cubes in Division Property Based Cube Attack: Applications to Round-Reduced ACORN
Jingchun Yang, Dongdai Lin
2020/1127
SideLine: How Delay-Lines (May) Leak Secrets from your SoC
Joseph Gravellier, Jean-Max Dutertre, Yannick Teglia, Philippe Loubet Moundi
2020/1126
Bitcoin-Monero Cross-chain Atomic Swap
Joël Gugger
2020/1125
High-Speed FPGA Implementation of SIKE Based on An Ultra-Low-Latency Modular Multiplier
Jing Tian, Bo Wu, Zhongfeng Wang
2020/1124
Optimized Voronoi-based algorithms for parallel shortest vector computations
Artur Mariano, Filipe Cabeleira, Gabriel Falcao, Luís Paulo Santos
2020/1123
Fixslicing AES-like Ciphers: New bitsliced AES speed records on ARM-Cortex M and RISC-V
Alexandre Adomnicai, Thomas Peyrin
2020/1122
The Velvet Path to Superlight Blockchain Clients
Aggelos Kiayias, Andrianna Polydouri, Dionysis Zindros
2020/1121
Post-Quantum Linkable Ring Signature Enabling Distributed Authorised Ring Confidential Transactions in Blockchain
Wilson Alberto Torres, Ron Steinfeld, Amin Sakzad, Veronika Kuchta
2020/1120
On the security of Diene-Thabet-Yusuf's cubic multivariate signature scheme
Yasufumi Hashimoto
2020/1119
All the Numbers are US: Large-scale Abuse of Contact Discovery in Mobile Messengers
Christoph Hagen, Christian Weinert, Christoph Sendner, Alexandra Dmitrienko, Thomas Schneider
2020/1118
Approximate Homomorphic Encryption with Reduced Approximation Error
Andrey Kim, Antonis Papadimitriou, Yuriy Polyakov
2020/1117
Economic Proof of Work
Jia Kan
2020/1116
On Multivariate Algorithms of Digital Signatures Based on Maps of Unbounded Degree Acting on Secure El Gamal Type Mode.
V. Ustimenko
2020/1115
SiliconToaster: A Cheap and Programmable EM Injector for Extracting Secrets
Karim M. Abdellatif, Olivier Hériveaux
2020/1114
Did you mix me? Formally Verifying Verifiable Mix Nets in Electronic Voting
Thomas Haines, Rajeev Gore, Bhavesh Sharma
2020/1113
On combinatorial approaches to search for quadratic APN functions
Konstantin Kalgin, Valeriya Idrisova
2020/1112
A cautionary note on the use of Gurobi for cryptanalysis
Muhammad ElSheikh, Amr M. Youssef
2020/1111
Extending the Signed Non-zero Bit and Sign-Aligned Columns Methods to General Bases for Use in Cryptography
Abhraneel Dutta, Aaron Hutchinson, Koray Karabina
2020/1110
Two-round $n$-out-of-$n$ and Multi-Signatures and Trapdoor Commitment from Lattices
Ivan Damgård, Claudio Orlandi, Akira Takahashi, Mehdi Tibouchi
2020/1109
Karatsuba-based square-root Vélu’s formulas applied to two isogeny-based protocols
Gora Adj, Jesús-Javier Chi-Domínguez, Francisco Rodríguez-Henríquez
2020/1108
Radical isogenies
Wouter Castryck, Thomas Decru, Frederik Vercauteren
2020/1107
Scalable Ciphertext Compression Techniques for Post-Quantum KEMs and their Applications
Shuichi Katsumata, Kris Kwiatkowski, Federico Pintore, Thomas Prest
2020/1106
Accumulators in (and Beyond) Generic Groups: Non-Trivial Batch Verification Requires Interaction
Gili Schul-Ganz, Gil Segev
2020/1105
Catalic: Delegated PSI Cardinality with Applications to Contact Tracing
Thai Duong, Duong Hieu Phan, Ni Trieu
2020/1104
High-Assurance Cryptography Software in the Spectre Era
Gilles Barthe, Sunjay Cauligi, Benjamin Gregoire, Adrien Koutsos, Kevin Liao, Tiago Oliveira, Swarn Priya, Tamara Rezk, Peter Schwabe
2020/1103
Packed Multiplication: How to Amortize the Cost of Side-channel Masking ?
Weijia Wang, Chun Guo, François-Xavier Standaert, Yu Yu, Gaëtan Cassiers
2020/1102
PQC: R-Propping of Public-Key Cryptosystems Using Polynomials over Non-commutative Algebraic Extension Rings
Pedro Hecht
2020/1101
NC-Max: Breaking the Security-Performance Tradeoff in Nakamoto Consensus
Ren Zhang, Dingwei Zhang, Quake Wang, Shichen Wu, Jan Xie, Bart Preneel
2020/1100
Towards Efficiency-Preserving Round Compression in MPC: Do fewer rounds mean more computation?
Prabhanjan Ananth, Arka Rai Choudhuri, Aarushi Goel, Abhishek Jain
2020/1099
Unbounded HIBE with Tight Security
Roman Langrehr, Jiaxin Pan
2020/1098
Formalizing Bitcoin Crashes with Universally Composable Security
Junming Ke, Pawel Szalachowski, Jianying Zhou, Qiuliang Xu
2020/1097
How to Build Optimally Secure PRFs Using Block Ciphers
Benoît Cogliati, Ashwin Jha, Mridul Nandi
2020/1096
Far Field EM Side-Channel Attack on AES Using Deep Learning
Ruize Wang, Huanyu Wang, Elena Dubrova
2020/1095
Cycle structure of generalized and closed loop invariants
Yongzhuang Wei, Rene Rodriguez, Enes Pasalic
2020/1094
TN-IDS for Network Layer Attacks in RPL based IoT Systems
Ambili K N, Jimmy Jose
2020/1093
Mind the Propagation of States New Automatic Search Tool for Impossible Differentials and Impossible Polytopic Transitions (Full Version)
Xichao Hu, Yongqiang Li, Lin Jiao, Shizhu Tian, and Mingsheng Wang
2020/1092
The Round Complexity of Secure Computation Against Covert Adversaries
Arka Rai Choudhuri, Vipul Goyal, Abhishek Jain
2020/1091
Ebb-and-Flow Protocols: A Resolution of the Availability-Finality Dilemma
Joachim Neu, Ertem Nusret Tas, David Tse
2020/1090
On the Adaptive Security of MACs and PRFs
Andrew Morgan, Rafael Pass, Elaine Shi
2020/1089
Improved Attacks on sLiSCP Permutation and Tight Bound of Limited Birthday Distinguishers
Akinori Hosoyamada, María Naya-Plasencia, Yu Sasaki
2020/1088
Two-Pass Authenticated Key Exchange with Explicit Authentication and Tight Security
Xiangyu Liu, Shengli Liu, Dawu Gu, Jian Weng
2020/1087
Efficient Identity-Based Encryption with Hierarchical Key-Insulation from HIBE
Keita Emura, Atsushi Takayasu, Yohei Watanabe
2020/1086
Combinatorial Rank Attacks Against the Rectangular Simple Matrix Encryption Scheme
Daniel Apon, Dustin Moody, Ray Perlner, Daniel Smith-Tone, Javier Verbel
2020/1085
Chosen-Ciphertext Secure Attribute-Hiding Non-Zero Inner Product Encryptions and Its Applications
Tapas Pal, Ratna Dutta
2020/1084
Fully Collision-Resistant Chameleon-Hashes from Simpler and Post-Quantum Assumptions
David Derler, Stephan Krenn, Kai Samelin, Daniel Slamanig
2020/1083
A Fast and Compact RISC-V Accelerator for Ascon and Friends
Stefan Steinegger, Robert Primas
2020/1082
Beyond Birthday Bound Secure Fresh Rekeying: Application to Authenticated Encryption
Bart Mennink
2020/1081
Twisted-PHS: Using the Product Formula to Solve Approx-SVP in Ideal Lattices
Olivier Bernard, Adeline Roux-Langlois
2020/1080
Possibility and Impossibility Results for Receiver Selective Opening Secure PKE in the Multi-Challenge Setting
Rupeng Yang, Junzuo Lai, Zhengan Huang, Man Ho Au, Qiuliang Xu, Willy Susilo
2020/1079
Subvert KEM to Break DEM: Practical Algorithm-Substitution Attacks on Public-Key Encryption
Rongmao Chen, Xinyi Huang, Moti Yung
2020/1078
Fair and Sound Secret Sharing from Homomorphic Time-Lock Puzzles
Jodie Knapp, Elizabeth A. Quaglia
2020/1077
Unconditionally secure quantum bit commitment: Revised
Ming-Xing Luo, Xiaojun Wang
2020/1076
Minimizing the Two-Round Tweakable Even-Mansour Cipher
Avijit Dutta
2020/1075
On the Query Complexity of Constructing PRFs from Non-adaptive PRFs
Pratik Soni, Stefano Tessaro
2020/1074
A Scalable Simulation of the BB84 Protocol Involving Eavesdropping
Mihai-Zicu Mina, Emil Simion
2020/1073
Tight Security Analysis of 3-Round Key-Alternating Cipher with A Single Permutation
Yusai Wu, Liqing Yu, Zhenfu Cao, Xiaolei Dong
2020/1072
Cryptanalysis of the permutation based algorithm SpoC
Liliya Kraleva, Raluca Posteuca, Vincent Rijmen
2020/1071
On Pairing-Free Blind Signature Schemes in the Algebraic Group Model
Julia Kastner, Julian Loss, Jiayu Xu
2020/1070
Efficient indifferentiable hashing to elliptic curves $y^2 = x^3 + b$ provided that $b$ is a quadratic residue
Dmitrii Koshelev
2020/1069
Lunar: a Toolbox for More Efficient Universal and Updatable zkSNARKs and Commit-and-Prove Extensions
Matteo Campanelli, Antonio Faonio, Dario Fiore, Anaïs Querol, Hadrián Rodríguez
2020/1068
An Efficient Transformation Capabilities of Single Database Private Block Retrieval
Radhakrishna Bhat, N R Sunitha
2020/1067
A Constant Time Full Hardware Implementation of Streamlined NTRU Prime
Adrian Marotzke
2020/1066
Constant time algorithms for ROLLO-I-128
Carlos Aguilar-Melchor, Nicolas Aragon, Emanuele Bellini, Florian Caullery, Rusydi H. Makarim, Chiara Marcolla
2020/1065
Machine-Learning assisted Side-Channel Attacks on RNS-based Elliptic Curve Implementations using Hybrid Feature Engineering
Naila Mukhtar, Louiza Papachristodoulou, Apostolos P. Fournaris, Lejla Batina, Yinan Kong
2020/1064
Mimblewimble Non-Interactive Transaction Scheme
Gary Yu
2020/1063
Signatures of Knowledge for Boolean Circuits under Standard Assumptions
Karim Baghery, Alonso González, Zaira Pindado, Carla Ràfols
2020/1062
Quantum Search for Scaled Hash Function Preimages
Sergi Ramos-Calderer, Emanuele Bellini, José I. Latorre, Marc Manzano, Victor Mateu
2020/1061
A new idea in response to fast correlation attacks on small-state stream ciphers
Vahid Amin Ghafari, Fujiang Lin
2020/1060
Circular Security Is Complete for KDM Security
Fuyuki Kitagawa, Takahiro Matsuda
2020/1059
Incorrectly Generated RSA Keys: How To Recover Lost Plaintexts
Daniel Shumow
2020/1058
On the Complexity of the Crossbred Algorithm
João Diogo Duarte
2020/1057
MuSig-DN: Schnorr Multi-Signatures with Verifiably Deterministic Nonces
Jonas Nick, Tim Ruffing, Yannick Seurin, Pieter Wuille
2020/1056
Automated enumeration of block cipher differentials: An optimized branch-and-bound GPU framework
Wei-Zhu Yeoh, Je Sen Teh, Jiageng Chen
2020/1055
Synced Hash-Based Signatures: Post-Quantum Authentication in a Blockchain
Santi J. Vives
2020/1054
Mind the Gap: Individual- and universal-verifiability plus cast-as-intended don't yield verifiable voting systems
Ben Smyth
2020/1053
Circuit Amortization Friendly Encodings and their Application to Statistically Secure Multiparty Computation
Anders Dalskov, Eysa Lee, Eduardo Soria-Vazquez
2020/1052
Attacking Threshold Wallets
Jean-Philippe Aumasson, Omer Shlomovits
2020/1051
Lower Bounds on the Degree of Block Ciphers
Phil Hebborn, Baptiste Lambin, Gregor Leander, Yosuke Todo
2020/1050
On the Exact Round Complexity of Best-of-both-Worlds Multi-party Computation
Arpita Patra, Divya Ravi, Swati Singla
2020/1049
Rotational analysis of ChaCha permutation
Stefano Barbero, Emanuele Bellini, Rusydi Makarim
2020/1048
An Algebraic Formulation of the Division Property: Revisiting Degree Evaluations, Cube Attacks, and Key-Independent Sums
Kai Hu, Siwei Sun, Meiqin Wang, Qingju Wang
2020/1047
Side-channel Attacks with Multi-thread Mixed Leakage
Yiwen Gao, Yongbin Zhou
2020/1046
On the Linear Distinguishing Attack against ZUC-256 Stream Cipher
ZUC Design Team
2020/1045
On the Security Margin of TinyJAMBU with Refined Differential and Linear Cryptanalysis
Dhiman Saha, Yu Sasaki, Danping Shi, Ferdinand Sibleyras, Siwei Sun, Yingjie Zhang
2020/1044
A Cryptographic Analysis of the TLS 1.3 Handshake Protocol
Benjamin Dowling, Marc Fischlin, Felix Günther, Douglas Stebila
2020/1043
Minimal Symmetric PAKE and 1-out-of-N OT from Programmable-Once Public Functions
Ian McQuoid, Mike Rosulek, Lawrence Roy
2020/1042
Candidate Obfuscation via Oblivious LWE Sampling
Hoeteck Wee, Daniel Wichs
2020/1041
Sign in finite fields
Abraham Westerbaan, Bas Westerbaan
2020/1040
MoSS: Modular Security Specifications Framework
Amir Herzberg, Hemi Leibowitz, Ewa Syta, Sara Wrotniak
2020/1039
Moderated Redactable Blockchains: A Definitional Framework with an Efficient Construct
Mohammad Sadeq Dousti, Alptekin Küpçü
2020/1038
On Configurable SCA Countermeasures Against Single Trace Attacks for the NTT - A Performance Evaluation Study over Kyber and Dilithium on the ARM Cortex-M4
Prasanna Ravi, Romain Poussier, Shivam Bhasin, Anupam Chattopadhyay
2020/1037
A High-performance Hardware Implementation of Saber Based on Karatsuba Algorithm
Yihong Zhu, Min Zhu, Bohan Yang, Wenping Zhu, Chenchen Deng, Chen Chen, Shaojun Wei, Leibo Liu
2020/1036
Security in banking
Arthur Van Der Merwe, David Paul, Jelena Schmalz, Timothy M. Schaerf
2020/1035
Evolving Secret Sharing with Essential Participants
Jyotirmoy Pramanik, Avishek Adhikari
2020/1034
Cryptanalysis of Full LowMC and LowMC-M with Algebraic Techniques
Fukang Liu, Takanori Isobe, Willi Meier
2020/1033
RandChain: A Scalable and Fair Decentralised Randomness Beacon
Runchao Han, Haoyu Lin, Jiangshan Yu
2020/1032
Cryptanalysis of the MALICIOUS Framework
Tim Beyne, Chaoyun Li
2020/1031
Profiled Deep Learning Side-Channel Attack on a Protected Arbiter PUF Combined with Bitstream Modification
Yang Yu, Michail Moraitis, Elena Dubrova
2020/1030
Quantum Collision Attacks on AES-like Hashing with Low Quantum Random Access Memories
Xiaoyang Dong, Siwei Sun, Danping Shi, Fei Gao, Xiaoyun Wang, Lei Hu
2020/1029
Tighter Proofs for the SIGMA and TLS 1.3 Key Exchange Protocols
Hannah Davis, Felix Günther
2020/1028
Secure Data Hiding for Contact Tracing
Craig Gotsman, Kai Hormann
2020/1027
Certificate-Based Parallel Key-Insulated Aggregate Signature Against Fully Chosen-Key Attacks for Industrial Internet of Things
Hu Xiong, Yingzhe Hou, Xin Huang, Saru Kumari
2020/1026
Simple and Efficient FE for Quadratic Functions
Junqing Gong, Haifeng Qian
2020/1025
A Bit-Vector Differential Model for the Modular Addition by a Constant
Seyyed Arash Azimi, Adrián Ranea, Mahmoud Salmasizadeh, Javad Mohajeri, Mohammad Reza Aref, Vincent Rijmen
2020/1024
Factoring and Pairings are not Necessary for iO: Circular-Secure LWE Suffices
Zvika Brakerski, Nico Döttling, Sanjam Garg, Giulio Malavolta
2020/1023
Post-Quantum Anonymous Veto Networks
Jintai Ding, Doug Emery, Johannes Mueller, Peter Y. A. Ryan, Vonn Kee Wong
2020/1022
Polynomial IOPs for Linear Algebra Relations
Alan Szepieniec, Yuncong Zhang
2020/1021
Consensus Redux: Distributed Ledgers in the Face of Adversarial Supremacy
Christian Badertscher, Peter Gaži, Aggelos Kiayias, Alexander Russell, Vassilis Zikas
2020/1020
Towards Classical Hardness of Module-LWE: The Linear Rank Case
Katharina Boudgoust, Corentin Jeudy, Adeline Roux-Langlois, Weiqiang Wen
2020/1019
Security of Streaming Encryption in Google's Tink Library
Viet Tung Hoang, Yaobin Shen
2020/1018
Small Superset and Big Subset Obfuscation
Steven D. Galbraith, Trey Li
2020/1017
Governance framework for Quipuswap - automated decentralized exchange
Andrey Sobol, Anastasiia Kondaurova
2020/1016
Hardware-Assisted Intellectual Property Protection of Deep Learning Models
Abhishek Chakraborty, Ankit Mondal, Ankur Srivastava
2020/1015
On Multivariate Algorithms of Digital Signatures of Linear Degree and Low Density.
Vasyl Ustimenko
2020/1014
GANRED: GAN-based Reverse Engineering of DNNs via Cache Side-Channel
Yuntao Liu, Ankur Srivastava
2020/1013
A Study on Privacy-Preserving GRU Inference Framework
Shou-Ching Hsiao, Zi-Yuan Liu, Raylin Tso
2020/1012
Compact, Efficient and UC-Secure Isogeny-Based Oblivious Transfer
Yi-Fu Lai, Steven D. Galbraith, Cyprien Delpech de Saint Guilhem
2020/1011
Private Join and Compute from PIR with Default
Tancrède Lepoint, Sarvar Patel, Mariana Raykova, Karn Seth, Ni Trieu
2020/1010
Indistinguishability Obfuscation from Circular Security
Romain Gay, Rafael Pass
2020/1009
Obfuscating Finite Automata
Steven D. Galbraith, Lukas Zobernig
2020/1008
Differential Power Analysis Attacks on Different Implementations of AES with the ChipWhisperer Nano
Leah Lathrop
2020/1007
Attacks on Integer-RLWE
Alessandro Budroni, Benjamin Chetioui, Ermes Franch
2020/1006
An Analysis of Fault Attacks on CSIDH
Jason LeGrow, Aaron Hutchinson
2020/1005
Trouble at the CSIDH: Protecting CSIDH with Dummy-Operations against Fault Injection Attacks
Fabio Campos, Matthias J. Kannwischer, Michael Meyer, Hiroshi Onuki, Marc Stöttinger
2020/1004
Asynchronous Remote Key Generation: An Analysis of Yubico's Proposal for W3C WebAuthn
Nick Frymann, Daniel Gardham, Franziskus Kiefer, Emil Lundberg, Mark Manulis, Dain Nilsson
2020/1003
Indistinguishability Obfuscation from Well-Founded Assumptions
Aayush Jain, Huijia Lin, Amit Sahai
2020/1002
CrypTFlow2: Practical 2-Party Secure Inference
Deevashwer Rathee, Mayank Rathee, Nishant Kumar, Nishanth Chandran, Divya Gupta, Aseem Rastogi, Rahul Sharma
2020/1001
Robust distributed symmetric-key encryption
Xunhua Wang, Ben Huson
2020/1000
Mechanised Models and Proofs for Distance-Bounding
Ioana Boureanu, Constantin Catalin Dragan, François Dupressoir, David Gerault, Pascal Lafourcade
2020/999
Attribute-Based Symmetric Searchable Encryption
Hai-Van Dang, Amjad Ullah, Alexandros Bakas, Antonis Michalas
2020/998
Lightweight Virtual Payment Channels
Maxim Jourenko, Mario Larangeira, Keisuke Tanaka
2020/997
Alibi: A Flaw in Cuckoo-Hashing based Hierarchical ORAM Schemes and a Solution
Brett Hemenway Falk, Daniel Noble, Rafail Ostrovsky
2020/996
Unifying Generic Group Models
Ueli Maurer, Christopher Portmann, Jiamin Zhu
2020/995
Bootstrapping fully homomorphic encryption over the integers in less than one second
Hilder Vitor Lima Pereira
2020/994
SPARKs: Succinct Parallelizable Arguments of Knowledge
Naomi Ephraim, Cody Freitag, Ilan Komargodski, Rafael Pass
2020/993
Cryptanalysis of Masked Ciphers: A not so Random Idea
Tim Beyne, Siemen Dhooghe, Zhenda Zhang
2020/992
Single-Trace Attacks on the Message Encoding of Lattice-Based KEMs
Bo-Yeon Sim, Jihoon Kwon, Joohee Lee, Il-Ju Kim, Taeho Lee, Jaeseung Han, Hyojin Yoon, Jihoon Cho, Dong-Guk Han
2020/991
A Novel Hash Function Design based on Hybrid Cellular Automata and Sponge Functions
Anita John, Alan Reji, Ajay P Manoj, Atul Premachandran, Basil Zachariah, Jimmy Jose
2020/990
Performance Comparisons and Migration Analyses of Lattice-based Cryptosystems on Hardware Security Module
Junting Xiao, Tadahiko Ito
2020/989
Algorithm for SIS and MultiSIS problems
Igor Semaev
2020/988
120.147 Efficient Electromagnetic Side Channel Analysis by Probe Positioning using Multi-Layer Perceptron
Anupam Golder, Baogeng Ma, Debayan Das, Josef Danial, Shreyas Sen, Arijit Raychowdhury
2020/987
Fuzzy Asymmetric Password-Authenticated Key Exchange
Andreas Erwig, Julia Hesse, Maximilian Orlt, Siavash Riahi
2020/986
The MALICIOUS Framework: Embedding Backdoors into Tweakable Block Ciphers
Thomas Peyrin, Haoyang Wang
2020/985
Orienting supersingular isogeny graphs
Leonardo Colò, David Kohel
2020/984
On Multivariate Algorithms of Digital Signatures on Secure El Gamal Type Mode.
Vasyl Ustimenko
2020/983
A Differential Meet-in-the-Middle Attack on the Zip cipher
Michael Stay
2020/982
Election Verifiability Revisited: Automated Security Proofs and Attacks on Helios and Belenios
Sevdenur Baloglu, Sergiu Bursuc, Sjouke Mauw, Jun Pang
2020/981
Deep Learning based analysis of Key Scheduling Algorithm of PRESENT cipher
Manan Pareek, Dr. Girish Mishra, Varun Kohli
2020/980
SNARGs for Bounded Depth Computations and PPAD Hardness from Sub-Exponential LWE
Ruta Jawale, Yael Tauman Kalai, Dakshita Khurana, Rachel Zhang
2020/979
Mercurial Signatures for Variable-Length Messages
Elizabeth C. Crites, Anna Lysyanskaya
2020/978
Linear and Partly-Pseudo-Linear Cryptanalysis of Reduced-Round SPARX Cipher
Sarah Alzakari, Poorvi Vora
2020/977
On the Influence of Optimizers in Deep Learning-based Side-channel Analysis
Guilherme Perin, Stjepan Picek
2020/976
Synchronizable Exchange
Ranjit Kumaresan, Srinivasan Raghuraman, Adam Sealfon
2020/975
Aardvark: An Asynchronous Authenticated Dictionary with Applications to Account-based Cryptocurrencies
Derek Leung, Yossi Gilad, Sergey Gorbunov, Leonid Reyzin, Nickolai Zeldovich
2020/974
Compact-LWE-MQ^{H}: Public Key Encryption without Hardness Assumptions
Dongxi Liu, Surya Nepal
2020/973
Stacked Garbling: Garbled Circuit Proportional to Longest Execution Path
David Heath, Vladimir Kolesnikov
2020/972
Optimized Binary GCD for Modular Inversion
Thomas Pornin
2020/971
QuantumHammer: A Practical Hybrid Attack on the LUOV Signature Scheme
Koksal Mus, Saad Islam, Berk Sunar
2020/970
Efficient Protocols for Oblivious Linear Function Evaluation from Ring-LWE
Carsten Baum, Daniel Escudero, Alberto Pedrouzo-Ulloa, Peter Scholl, Juan Ramón Troncoso-Pastoriza
2020/969
Hashing to elliptic curves of $j=0$ and quadratic imaginary orders of class number $2$
Dmitrii Koshelev
2020/968
Feeding Cryptographic Protocols with Rich and Reliable Supply of Quantum-Grade Randomness
Gideon Samid
2020/967
The Nested Subset Differential Attack: A Practical Direct Attack Against LUOV which Forges a Signature within 210 Minutes
Jintai Ding, Joshua Deaton, Vishakha, Bo-Yin Yang
2020/966
EM-Side-Channel Resistant Symmetric-Key Authentication Mechanism for Small Devices
Rick Boivie, Charanjit S. Jutla, Daniel Friedman, Ghavam Shahidi
2020/965
Computation of a 30750-Bit Binary Field Discrete Logarithm
Robert Granger, Thorsten Kleinjung, Arjen K. Lenstra, Benjamin Wesolowski, Jens Zumbragel
2020/964
Configurable Private Querying: Lookup and Partial Matching under Homomorphic Encryption
Hamish Hunt, Jack Crawford, Oliver Masters, Enrico Steffinlongo, Flavio Bergamaschi
2020/963
From Partial to Global Asynchronous Reliable Broadcast
Diana Ghinea, Martin Hirt, Chen-Da Liu-Zhang
2020/962
Post-Quantum Verification of Fujisaki-Okamoto
Dominique Unruh
2020/961
Enable Dynamic Parameters Combination to Boost Linear Convolutional Neural Network for Sensitive Data Inference
Qizheng Wang, Wenping Ma, Jie Li, Ge Liu
2020/960
Retrofitting Leakage Resilient Authenticated Encryption to Microcontrollers
Florian Unterstein, Marc Schink, Thomas Schamberger, Lars Tebelmann, Manuel Ilg, Johann Heyszl
2020/959
Quantum Cryptanalysis on Contracting Feistel Structures and Observation on Related-key Settings
Carlos Cid, Akinori Hosoyamada, Yunwen Liu, Siang Meng Sim
2020/958
Multi-Threshold Asynchronous Reliable Broadcast and Consensus
Martin Hirt, Ard Kastrati, Chen-Da Liu-Zhang
2020/957
Combining Optimization Objectives: New Machine-Learning Attacks on Strong PUFs
Johannes Tobisch, Anita Aghaie, Georg T. Becker
2020/956
Constant Time Montgomery Ladder
Kaushik Nath, Palash Sarkar
2020/955
Public-key Authenticated Encryption with Keyword Search: A Generic Construction and Its Quantum-resistant Instantiation
Zi-Yuan Liu, Yi-Fan Tseng, Raylin Tso, Masahiro Mambo, Yu-Chi Chen
2020/954
New Techniques for Traitor Tracing: Size $N^{1/3}$ and More from Pairings
Mark Zhandry
2020/953
Performance comparison between deep learning-based and conventional cryptographic distinguishers
Emanuele Bellini, Matteo Rossi
2020/952
On What to Learn: Train or Adapt a Deeply Learned Profile?
Christophe Genevey-Metat, Benoît Gérard, Annelie Heuser
2020/951
Amplifying the Security of Functional Encryption, Unconditionally
Aayush Jain, Alexis Korb, Nathan Manohar, Amit Sahai
2020/950
Self-Processing Private Sensor Data via Garbled Encryption
Nathan Manohar, Abhishek Jain, Amit Sahai
2020/949
HABIT: Hardware-Assisted Bluetooth-based Infection Tracking
Nathan Manohar, Peter Manohar, Rajit Manohar
2020/948
STARK Friendly Hash -- Survey and Recommendation
Eli Ben-Sasson, Lior Goldberg, David Levit
2020/947
Data Oblivious Algorithms for Multicores
Vijaya Ramachandran, Elaine Shi
2020/946
Timing attacks and local timing attacks against Barrett’s modular multiplication algorithm
Johannes Mittmann, Werner Schindler
2020/945
On the (in)security of ROS
Fabrice Benhamouda, Tancrède Lepoint, Julian Loss, Michele Orrù, and Mariana Raykova
2020/944
Secure Conflict-free Replicated Data Types
Manuel Barbosa, Bernardo Ferreira, João Marques, Bernardo Portela, Nuno Preguiça
2020/943
Analysing and Improving Shard Allocation Protocols for Sharded Blockchains
Runchao Han, Jiangshan Yu, Ren Zhang
2020/942
RandRunner: Distributed Randomness from Trapdoor VDFs with Strong Uniqueness
Philipp Schindler, Aljosha Judmayer, Markus Hittmeir, Nicholas Stifter, Edgar Weippl
2020/941
Alternative Tower Field Construction for Quantum Implementation of the AES S-box
Doyoung Chung, Seungkwang Lee, Dooho choi, Jooyoung Lee
2020/940
Directly revocable ciphertext-policy attribute-based encryption from lattices
Fei Meng
2020/939
DLDDO: Deep Learning to Detect Dummy Operations
JongHyeok Lee, Dong-Guk Han
2020/938
Performance Trade-offs in Design of MimbleWimble Proofs of Reserves
Suyash Bagad, Saravanan Vijayakumaran
2020/937
BAM BAM!! On Reliability of EMFI for in-situ Automotive ECU Attacks
Colin O'Flynn
2020/936
Cryptanalysis and Improvement of Anonymous Authentication for Wireless Body Area Networks with Provable Security
Mahender Kumar
2020/935
Privacy-Preserving Multi-Operator Contact Tracing for Early Detection of Covid19 Contagions
Davide Andreoletti, Omran Ayoub, Silvia Giordano, Massimo Tornatore, Giacomo Verticale
2020/934
CanDID: Can-Do Decentralized Identity with Legacy Compatibility, Sybil-Resistance, and Accountability
Deepak Maram, Harjasleen Malvai, Fan Zhang, Nerla Jean-Louis, Alexander Frolov, Tyler Kell, Tyrone Lobban, Christine Moy, Ari Juels, Andrew Miller
2020/933
Instantiation of RO Model Transforms via Extractable Functions
Mohammad Zaheri
2020/932
A Note on Authenticated Group Key Agreement Protocol Based on Twist Conjugacy Problem in Near – Rings
Atul Chaturvedi, Varun Shukla, Manoj K. Misra
2020/931
Homomorphic string search with constant multiplicative depth
Charlotte Bonte, Ilia Iliashenko
2020/930
The design of scalar AES Instruction Set Extensions for RISC-V
Ben Marshall, G. Richard Newell, Dan Page, Markku-Juhani O. Saarinen, Claire Wolf
2020/929
Local XOR Unification: Definitions, Algorithms and Application to Cryptography
Hai Lin, Christopher Lynch
2020/928
Multi-theorem (Malicious) Designated-Verifier NIZK for QMA
Omri Shmueli
2020/927
A Gas-Efficient Superlight Bitcoin Client in Solidity
Stelios Daveas, Kostis Karantias, Aggelos Kiayias, Dionysis Zindros
2020/926
Secure Computation over Lattices and Elliptic Curves
Brett Hemenway Falk, Daniel Noble
2020/925
Wolverine: Fast, Scalable, and Communication-Efficient Zero-Knowledge Proofs for Boolean and Arithmetic Circuits
Chenkai Weng, Kang Yang, Jonathan Katz, Xiao Wang
2020/924
Ferret: Fast Extension for coRRElated oT with small communication
Kang Yang, Chenkai Weng, Xiao Lan, Jiang Zhang, Xiao Wang
2020/923
Another code-based adaptation of Lyubashevsky’s signature cryptanalysed
Nicolas Aragon, Jean-Christophe Deneuville, Philippe Gaborit
2020/922
Security Challenges in Smart Grid and Suitable Countermeasures
Soumyadyuti Ghosh, Urbi Chatterjee, Durba Chatterjee, Rumia Masburah, Debdeep Mukhopadhyay, Soumyajit Dey
2020/921
Practical Dynamic Group Signature with Efficient Concurrent Joins and Batch Verifications
Hyoseung Kim, Youngkyung Lee, Michel Abdalla, Jong Hwan Park
2020/920
Further Cryptographic Properties of the Multiplicative Inverse Function
Deng Tang, Bimal Mandal, Subhamoy Maitra
2020/919
Tight Bounds for Simon's Algorithm
Xavier Bonnetain
2020/918
An Efficient Certificateless Authentication Protocol for the SAE J1939
Basker Palaniswamy
2020/917
Formalizing Nakamoto-Style Proof of Stake
Søren Eller Thomsen and Bas Spitters
2020/916
Black-Box Transformations from Passive to Covert Security with Public Verifiability
Ivan Damgård, Claudio Orlandi, Mark Simkin
2020/915
Does Fiat-Shamir Require a Cryptographic Hash Function?
Yilei Chen, Alex Lombardi, Fermi Ma, Willy Quach
2020/914
Ultra-Short Multivariate Public Key Signatures
Jacques Patarin, Gilles Macario-Rat, Maxime Bros, Eliane Koussa
2020/913
Differential-ML Distinguisher: Machine Learning based Generic Extension for Differential Cryptanalysis
Tarun Yadav, Manoj Kumar
2020/912
Magnifying Side-Channel Leakage of Lattice-Based Cryptosystems with Chosen Ciphertexts: The Case Study of Kyber
Zhuang Xu, Owen Pemberton, Sujoy Sinha Roy, David Oswald, Wang Yao, Zhiming Zheng
2020/911
Lossy Correlation Intractability and PPAD Hardness from Sub-exponential LWE
Ruta Jawale, Dakshita Khurana
2020/910
A Power Side-Channel Attack on the CCA2-Secure HQC KEM
Thomas Schamberger, Julian Renner, Georg Sigl, Antonia Wachter-Zeh
2020/909
When is a test not a proof?
Eleanor McMurtry, Olivier Pereira, Vanessa Teague
2020/908
Analysis on the MinRank Attack using Kipnis-Shamir Method Against Rainbow
Shuhei Nakamura, Yacheng Wang, Yasuhiko Ikematsu
2020/907
Enhanced Flush+Reload Attack on AES
Milad Seddigh, Hadi Soleimany
2020/906
Optimally-resilient Unconditionally-secure Asynchronous Multi-party Computation Revisited
Ashish Choudhury
2020/905
Cryptanalysis of a Code-Based Signature Scheme Based on the Lyubashevsky Framework
Marco Baldi, Karan Khathuria, Edoardo Persichetti, Paolo Santini
2020/904
A Comparison of Weight Initializers in Deep Learning-based Side-channel Analysis
Huimin Li, Marina Krček, Guilherme Perin
2020/903
Optimizing Implementations of Linear Layers
Zejun Xiang, Xiangyong Zeng, Da Lin, Zhenzhen Bao, Shasha Zhang
2020/902
Federated Learning in Side-Channel Analysis
Huanyu Wang, Elena Dubrova
2020/901
A Not-So-Trival Replay Attack Against DH-PSI
Hongrui Cui, Yu Yu
2020/900
Message-recovery Laser Fault Injection Attack on the Classic McEliece Cryptosystem
Pierre-Louis Cayrel, Brice Colombier, Vlad-Florin Dragoi, Alexandre Menu, Lilian Bossuet
2020/899
On the Attack Evaluation and the Generalization Ability in Profiling Side-channel Analysis
Lichao Wu, Léo Weissbart, Marina Krček, Huimin Li, Guilherme Perin, Lejla Batina, Stjepan Picek
2020/898
Rapidly Verifiable XMSS Signatures
Joppe W. Bos, Andreas Hülsing, Joost Renes, Christine van Vredendaal
2020/897
Folding BIKE: Scalable Hardware Implementation for Reconfigurable Devices
Jan Richter-Brockmann, Johannes Mono, Tim Güneysu
2020/896
Fault Injection as an Oscilloscope: Fault Correlation Analysis
Albert Spruyt, Alyssa Milburn, Lukasz Chmielewski
2020/895
Multi-Currency Ledgers
Joachim Zahnentferner
2020/894
Gossiping For Communication-Efficient Broadcast
Georgios Tsimos, Julian Loss, Charalampos Papamanthou
2020/893
Toward an Asymmetric White-Box Proposal
Lucas Barthelemy
2020/892
Divided We Stand, United We Fall: Security Analysis of Some SCA+SIFA Countermeasures Against SCA-Enhanced Fault Template Attacks
Sayandeep Saha, Arnab Bag, Dirmanto Jap, Debdeep Mukhopadhyay, Shivam Bhasin
2020/891
Keep it Unsupervised: Horizontal Attacks Meet Deep Learning
Guilherme Perin, Lukasz Chmielewski, Lejla Batina, Stjepan Picek
2020/890
Re-Consolidating First-Order Masking Schemes - Nullifying Fresh Randomness
Aein Rezaei Shahmirzadi, Amir Moradi
2020/889
Affine Determinant Programs: A Framework for Obfuscation and Witness Encryption
James Bartusek, Yuval Ishai, Aayush Jain, Fermi Ma, Amit Sahai, Mark Zhandry
2020/888
Machine Learning of Physical Unclonable Functions using Helper Data - Revealing a Pitfall in the Fuzzy Commitment Scheme
Emanuele Strieder, Christoph Frisch, Michael Pehl
2020/887
Updatable Blockchains
Michele Ciampi, Nikos Karayannidis, Aggelos Kiayias, Dionysis Zindros
2020/886
Adaptively Secure Revocable Hierarchical IBE from $k$-linear Assumption
Keita Emura, Atsushi Takayasu, Yohei Watanabe
2020/885
Wendy, the Good Little Fairness Widget
Klaus Kursawe
2020/884
Leakage-Resilient Inner-Product Functional Encryption in the Bounded-Retrieval Model
Linru Zhang, Xiangning Wang, Yuechen Chen, Siu-Ming Yiu
2020/883
On The Deployment of Tweak-in-Plaintext Protection Against Differential Fault Analysis
Jeroen Delvaux
2020/882
Puncturable Encryption: A Generic Construction from Delegatable Fully Key-Homomorphic Encryption
Willy Susilo, Dung Hoang Duong, Huy Quoc Le, Josef Pieprzyk
2020/881
Deep Learning Side-Channel Analysis on Large-Scale Traces - A Case Study on a Polymorphic AES
Loïc Masure, Nicolas Belleville, Eleonora Cagli, Marie-Angela Cornelie, Damien Couroussé, Cécile Dumas, Laurent Maingault
2020/880
Classical Reduction of Gap SVP to LWE: A Concrete Security Analysis
Palash Sarkar, Subhadip Singha
2020/879
Second-Order Masked Lookup Table Compression Scheme
Annapurna Valiveti, Srinivas Vivek
2020/878
Bent Boolean functions A better procedure to generate non-crypto 4-bit S-boxes
Sankhanil De, Ranjan Ghosh
2020/877
Unclonable Decryption Keys
Marios Georgiou, Mark Zhandry
2020/876
Direct Sum Masking as a Countermeasure to Side-Channel and Fault Injection Attacks
Claude Carlet, Sylvain Guilley, Sihem Mesnager
2020/875
Efficient Final Exponentiation via Cyclotomic Structure for Pairings over Families of Elliptic Curves
Daiki Hayashida, Kenichiro Hayasaka, Tadanori Teruya
2020/874
New Methods and Abstractions for RSA-Based Forward Secure Signatures
Susan Hohenberger, Brent Waters
2020/873
Post-Quantum Group Key Agreement Scheme
Julia Bobrysheva, Sergey Zapechnikov
2020/872
Ranking Loss: Maximizing the Success Rate in Deep Learning Side-Channel Analysis
Gabriel Zaid, Lilian Bossuet, François Dassance, Amaury Habrard, Alexandre Venelli
2020/871
Quantum Immune One-Time Memories
Qipeng Liu, Amit Sahai, Mark Zhandry
2020/870
Smoothing Out Binary Linear Codes and Worst-case Sub-exponential Hardness for LPN
Yu Yu, Jiang Zhang
2020/869
An Algorithmic Reduction Theory for Binary Codes: LLL and more
Thomas Debris-Alazard, Léo Ducas, Wessel P. J. van Woerden
2020/868
SoK: A Taxonomy of Cryptocurrency Wallets
Kostis Karantias
2020/867
Enhancing the Performance of Practical Profiling Side-Channel Attacks Using Conditional Generative Adversarial Networks
Ping Wang, Ping Chen, Zhimin Luo, Gaofeng Dong, Mengce Zheng, Nenghai Yu, Honggang Hu
2020/866
Development of The RISC-V Entropy Source Interface
Markku-Juhani O. Saarinen, G. Richard Newell, Ben Marshall
2020/865
Agora: A Privacy-Aware Data Marketplace
Vlasis Koutsos, Dimitrios Papadopoulos, Dimitris Chatzopoulos, Sasu Tarkoma, Pan Hui
2020/864
Linear Complexity Private Set Intersection for Secure Two-Party Protocols
Ferhat Karakoç, Alptekin Küpçü
2020/863
Privacy-Preserving Automated Exposure Notification
Ran Canetti, Yael Tauman Kalai, Anna Lysyanskaya, Ronald L. Rivest, Adi Shamir, Emily Shen, Ari Trachtenberg, Mayank Varia, Daniel J. Weitzner
2020/862
Protecting Cryptography Against Compelled Self-Incrimination
Sarah Scheffler, Mayank Varia
2020/861
Faster Homomorphic Encryption over GPGPUs via hierarchical DGT
Pedro Geraldo M. R. Alves, Jheyne N. Ortiz, Diego F. Aranha
2020/860
SNARGs for Bounded Depth Computations from Sub-Exponential LWE
Yael Tauman Kalai, Rachel Zhang
2020/859
A Classification of Computational Assumptions in the Algebraic Group Model
Balthazar Bauer, Georg Fuchsbauer, Julian Loss
2020/858
Client-oblivious OPRAM
Gareth T. Davies, Christian Janson, Daniel P. Martin
2020/857
Where are you Bob? Privacy-Preserving Proximity Testing with a Napping Party
Ivan Oleynikov, Elena Pagnin, Andrei Sabelfeld
2020/856
Improving Revocation for Group Signature with Redactable Signature
Olivier Sanders
2020/855
Fooling primality tests on smartcards
Vladimir Sedlacek, Jan Jancar, Petr Svenda
2020/854
Designing Reverse Firewalls for the Real World
Angèle Bossuat, Xavier Bultel, Pierre-Alain Fouque, Cristina Onete, Thyla van der Merwe
2020/853
Linear-Complexity Private Function Evaluation is Practical
Marco Holz, Ágnes Kiss, Deevashwer Rathee, Thomas Schneider
2020/852
FROST: Flexible Round-Optimized Schnorr Threshold Signatures
Chelsea Komlo, Ian Goldberg
2020/851
Asynchronous Byzantine Agreement with Subquadratic Communication
Erica Blum, Jonathan Katz, Chen-Da Liu-Zhang, Julian Loss
2020/850
On the Guaranteed Number of Activations in XS-circuits
Sergey Agievich
2020/849
Surveying global verifiability
Ben Smyth
2020/848
On Composability of Game-based Password Authenticated Key Exchange
Marjan Škrobot, Jean Lancrenon
2020/847
Encrypt-to-self: Securely Outsourcing Storage
Jeroen Pijnenburg, Bertram Poettering
2020/846
Deep Learning based Differential Distinguisher for Lightweight Cipher PRESENT
Aayush Jain, Varun Kohli, Girish Mishra
2020/845
Post-Quantum Adaptor Signatures and Payment Channel Networks
Muhammed F. Esgin, Oguzhan Ersoy, Zekeriya Erkin
2020/844
Generic Superlight Client for Permissionless Blockchains
Yuan Lu, Qiang Tang, Guiling Wang
2020/843
Dragoon: Private Decentralized HITs Made Practical
Yuan Lu, Qiang Tang, Guiling Wang
2020/842
Dumbo-MVBA: Optimal Multi-valued Validated Asynchronous Byzantine Agreement, Revisited
Yuan Lu, Zhenliang Lu, Qiang Tang, and Guiling Wang
2020/841
Dumbo: Faster Asynchronous BFT Protocols
Bingyong Guo, Zhenliang Lu, Qiang Tang, Jing Xu, Zhenfeng Zhang
2020/840
Proof of Storage-Time: Efficiently Checking Continuous Data Availability
Giuseppe Ateniese, Long Chen, Mohammad Etemad, Qiang Tang
2020/839
Cryptanalysis of a ``Strengthened'' Key Exchange Protocol for IoT, or When SAKE$^+$ Turns Out to Be SAKE$^-$
Loïc Ferreira
2020/838
PudgyTurtle: variable-length, keystream-dependent encoding to resist time-memory tradeoff attacks
David A August, Anne C Smith
2020/837
An Attack on Some Signature Schemes Constructed From Five-Pass Identification Schemes
Daniel Kales, Greg Zaverucha
2020/836
Assembly or Optimized C for Lightweight Cryptography on RISC-V?
Fabio Campos, Lars Jellema, Mauk Lemmen, Lars Müller, Amber Sprenkels, Benoit Viguier
2020/835
On the Maximum Nonlinearity of De Bruijn Sequence Feedback Function
Congwei Zhou, Bin Hu, Jie Guan
2020/834
Minimax Approximation of Sign Function by Composite Polynomial for Homomorphic Comparison
Eunsang Lee, Joon-Woo Lee, Jong-Seon No, Young-Sik Kim
2020/833
Secure Update of FPGA-based Secure Elements using Partial Reconfiguration
Florian Unterstein, Tolga Sel, Thomas Zeschg, Nisha Jacob, Michael Tempelmeier, Michael Pehl, Fabrizio De Santis
2020/832
Round-optimal Black-box Commit-and-prove with Succinct Communication
Susumu Kiyoshima
2020/831
On Adaptive Security of Delayed-Input Sigma Protocols and Fiat-Shamir NIZKs
Michele Ciampi, Roberto Parisella, Daniele Venturi
2020/830
Terakey - An Encryption Method Whose Security Can Be Analyzed from First Principles
Arnold G. Reinhold
2020/829
Refined Analysis of the Asymptotic Complexity of the Number Field Sieve
Aude Le Gluher, Pierre-Jean Spaenlehauer, Emmanuel Thomé
2020/828
Modified Secure Hashing algorithm(MSHA-512)
Ashoka SB, Lakshmikanth D
2020/827
Encrypted Blockchain Databases
Daniel Adkins, Archita Agarwal, Seny Kamara, Tarik Moataz
2020/826
A Concise Bounded Anonymous Broadcast Yielding Combinatorial Trace-and-Revoke Schemes
Xuan Thanh Do, Duong Hieu Phan, Moti Yung
2020/825
Private Set Intersection from TFHE for Cloud Computing Scenarios
Jiayu Qiang, Yi Deng
2020/824
Forward-Secure 0-RTT Goes Live: Implementation and Performance Analysis in QUIC
Fynn Dallmeier, Jan P. Drees, Kai Gellert, Tobias Handirk, Tibor Jager, Jonas Klauke, Simon Nachtigall, Timo Renzelmann, Rudi Wolf
2020/823
The Provable Security of Ed25519: Theory and Practice
Jacqueline Brendel, Cas Cremers, Dennis Jackson, Mang Zhao
2020/822
Efficient Multi-Client Functional Encryption for Conjunctive Equality and Range Queries
Kwangsu Lee
2020/821
Interconnect-Aware Bitstream Modification
Michail Moraitis, Elena Dubrova
2020/820
On the security of the Rescue hash function
Tim Beyne, Anne Canteaut, Gregor Leander, María Naya-Plasencia, Léo Perrin, Friedrich Wiemer
2020/819
UC-Secure OT from LWE, Revisited
Willy Quach
2020/818
Security Limitations of Classical-Client Delegated Quantum Computing
Christian Badertscher, Alexandru Cojocaru, Léo Colisson, Elham Kashefi, Dominik Leichtle, Atul Mantri, Petros Wallden
2020/817
Anonymous, Attribute Based, Decentralized, Secure, and Fair e-Donation
Osman Biçer, Alptekin Küpçü
2020/816
Dispelling Myths on Superposition Attacks: Formal Security Model and Attack Analyses
Luka Music, Céline Chevalier, Elham Kashefi
2020/815
Cryptographic Divergences: New Techniques and New Applications
Marc Abboud, Thomas Prest
2020/814
Incompressible Encodings
Tal Moran, Daniel Wichs
2020/813
Strengthening Sequential Side-Channel Attacks Through Change Detection
Luca Frittoli, Matteo Bocchi, Silvia Mella, Diego Carrera, Beatrice Rossi, Pasqualina Fragneto, Ruggero Susella, Giacomo Boracchi
2020/812
Generically Speeding-Up Repeated Squaring is Equivalent to Factoring: Sharp Thresholds for All Generic-Ring Delay Functions
Lior Rotem, Gil Segev
2020/811
Another Look at Extraction and Randomization of Groth's zk-SNARK
Karim Baghery, Markulf Kohlweiss, Janno Siim, Mikhail Volkhov
2020/810
A Few Explanations for <Fast-to-Finalize Nakamoto-Like Consensus>
Shuyang Tang
2020/809
On (expected polynomial) runtime in cryptography
Michael Klooß
2020/808
Security Analysis of Olvid's SAS-based Trust Establishment Protocol
Michel Abdalla
2020/807
Secure merge with $O(n \log \log n)$ secure operation
Brett Hemenway Falk, Rafail Ostrovsky
2020/806
Toward Comparable Homomorphic Encryption for Crowd-sensing Network
Daxin Huang, Qingqing Gan, Xiaoming Wang, Chengpeng Huang, Yijian Lin
2020/805
Proxy Re-Encryption for Accelerator Confidentiality in FPGA-Accelerated Cloud
Furkan Turan, Ingrid Verbauwhede
2020/804
Lightweight Ciphers on a 65 nm ASIC - A Comparative Study on Energy Consumption
Bastian Richter, Amir Moradi
2020/803
Lattice-based Fault Attacks on Deterministic Signature Schemes of ECDSA and EdDSA
Weiqiong Cao, Hongsong Shi, Hua Chen, Jiazhe Chen, Limin Fan, Wenling Wu
2020/802
Quantum Attacks on HCTR and its Variants
Mostafizar Rahman, Goutam Paul
2020/801
Not enough LESS: An improved algorithm for solving Code Equivalence Problems over $\mathbb{F}_q$
Ward Beullens
2020/800
Reimagining Secret Sharing: Creating a Safer and More Versatile Primitive by Adding Authenticity, Correcting Errors, and Reducing Randomness Requirements
Mihir Bellare, Wei Dai, Phillip Rogaway
2020/799
Secure Generalized Deduplication via Multi-Key Revealing Encryption
Daniel E. Lucani, Lars Nielsen, Claudio Orlandi, Elena Pagnin, Rasmus Vestergaard
2020/798
Superposition Attack on OT Protocols
Ehsan Ebrahimi, Céline Chevalier, Marc Kaplan, Michele Minelli
2020/797
Fast, Small, and Area-Time Efficient Architectures for Key-Exchange on Curve25519
Mojtaba Bisheh Niasar, Rami El Khatib, Reza Azarderakhsh, Mehran Mozaffari-Kermani
2020/796
A Generalization of Paillier's Public-Key System With Fast Decryption
Ying Guo, Zhenfu Cao, Xiaolei Dong
2020/795
Implementation and Benchmarking of Round 2 Candidates in the NIST Post-Quantum Cryptography Standardization Process Using Hardware and Software/Hardware Co-design Approaches
Viet Ba Dang, Farnoud Farahmand, Michal Andrzejczak, Kamyar Mohajerani, Duc Tri Nguyen, Kris Gaj
2020/794
Symbolic and Computational Reasoning About Cryptographic Modes of Operation
Catherine Meadows
2020/793
PHyCT : Privacy preserving Hybrid Contact Tracing
Mahabir Prasad Jhanwar, Sumanta Sarkar
2020/792
Trace-$\Sigma$: a privacy-preserving contact tracing app
Jean-François Biasse, Sriram Chellappan, Sherzod Kariev, Noyem Khan, Lynette Menezes, Efe Seyitoglu, Charurut Somboonwit, Attila Yavuz
2020/791
Virtual ASICs: Generalized Proof-of-Stake Mining in Cryptocurrencies
Chaya Ganesh, Claudio Orlandi, Daniel Tschudi, Aviv Zohar
2020/790
Anonymity and Rewards in Peer Rating Systems
Lydia Garms, Siaw-Lynn Ng, Elizabeth A. Quaglia, Giulia Traverso
2020/789
Double-Authentication-Preventing Signatures in the Standard Model
Dario Catalano, Georg Fuchsbauer, Azam Soleimanian
2020/788
Multi-Client Inner-Product Functional Encryption in the Random-Oracle Model
Michel Abdalla, Florian Bourse, Hugo Marival, David Pointcheval, Azam Soleimanian, Hendrik Waldner
2020/787
A Note on Separating Classical and Quantum Random Oracles
Takashi Yamakawa, Mark Zhandry
2020/786
Random Probing Security: Verification, Composition, Expansion and New Constructions
Sonia Belaïd, Jean-Sébastien Coron, Emmanuel Prouff, Matthieu Rivain, Abdul Rahman Taleb
2020/785
The Memory-Tightness of Authenticated Encryption
Ashrujit Ghoshal, Joseph Jaeger, Stefano Tessaro
2020/784
CRAFT: Composable Randomness Beacons and Output-Independent Abort MPC From Time
Carsten Baum, Bernardo David, Rafael Dowsley, Ravi Kishore, Jesper Buus Nielsen, Sabine Oechsner
2020/783
Adventures in Crypto Dark Matter: Attacks, Fixes for Weak Pseudorandom Functions
Jung Hee Cheon, Wonhee Cho, Jeong Han Kim, Jiseung Kim
2020/782
A Love Affair Between Bias Amplifiers and Broken Noise Sources
George Teseleanu
2020/781
Interpolation Attacks on Round-Reduced Elephant, Kravatte and Xoofff
Haibo Zhou, Rui Zong, Xiaoyang Dong, Keting Jia, Willi Meier
2020/780
The Long and Winding Path to Secure Implementation of GlobalPlatform SCP10
Daniel De Almeida Braga, Pierre-Alain Fouque, Mohamed Sabt
2020/779
Non-Malleable Time-Lock Puzzles and Applications
Cody Freitag, Ilan Komargodski, Rafael Pass, Naomi Sirkin
2020/778
SAKE+: Strengthened Symmetric-Key Authenticated Key Exchange with Perfect Forward Secrecy for IoT
Seyed Farhad Aghili, Amirhossein Adavoudi Jolfaei, Aysajan Abidin
2020/777
Dynamic Universal Accumulator with Batch Update over Bilinear Groups
Giuseppe Vitto, Alex Biryukov
2020/776
Non-Malleable Codes for Bounded Polynomial-Depth Tampering
Dana Dachman-Soled, Ilan Komargodski, Rafael Pass
2020/775
Improved Differential-Linear Attacks with Applications to ARX Ciphers
Christof Beierle, Gregor Leander, Yosuke Todo
2020/774
Timelocked Bribing
Majid Khabbazian, Tejaswi Nadahalli, Roger Wattenhofer
2020/773
An Instruction Set Extension to Support Software-Based Masking
Si Gao, Johann Großschädl, Ben Marshall, Dan Page, Thinh Pham, Francesco Regazzoni
2020/772
Fiat-Shamir for Repeated Squaring with Applications to PPAD-Hardness and VDFs
Alex Lombardi, Vinod Vaikuntanathan
2020/771
Leakage-Resilient Key Exchange and Two-Seed Extractors
Xin Li, Fermi Ma, Willy Quach, Daniel Wichs
2020/770
Time-Space Tradeoffs and Short Collisions in Merkle-Damgård Hash Functions
Akshima, David Cash, Andrew Drucker, Hoeteck Wee
2020/769
Lattice-Based Blind Signatures, Revisited
Eduard Hauck, Eike Kiltz, Julian Loss, Ngoc Khanh Nguyen
2020/768
Perfect Zero Knowledge: New Upperbounds and Relativized Separations
Peter Dixon, Sutanu Gayen, A. Pavan, N. V. Vinodchandran
2020/767
Efficient Constant-Round MPC with Identifiable Abort and Public Verifiability
Carsten Baum, Emmanuela Orsini, Peter Scholl, Eduardo Soria-Vazquez
2020/766
The uncertainty of Side-Channel Analysis: A way to leverage from heuristics
Unai Rioja, Servio Paguada, Lejla Batina, Igor Armendariz
2020/765
Handling Adaptive Compromise for Practical Encryption Schemes
Joseph Jaeger, Nirvan Tyagi
2020/764
Indistinguishability Obfuscation from Simple-to-State Hard Problems: New Assumptions, New Techniques, and Simplification
Romain Gay, Aayush Jain, Huijia Lin, Amit Sahai
2020/763
Practical Quantum-Safe Stateful Hybrid Key Exchange Protocol
Jia Xu, Yiwen Gao, Hoonwei Lim, Hongbing Wang, and Ee-Chien Chang
2020/762
Functional Encryption for Attribute-Weighted Sums from $k$-Lin
Michel Abdalla, Junqing Gong, Hoeteck Wee
2020/761
Decentralized reputation
Tassos Dimitriou
2020/760
Curves with fast computations in the first pairing group
Rémi Clarisse, Sylvain Duquesne, Olivier Sanders
2020/759
Chosen Ciphertext Security from Injective Trapdoor Functions
Susan Hohenberger, Venkata Koppula, Brent Waters
2020/758
Verifiable state machines: Proofs that untrusted services operate correctly
Srinath Setty, Sebastian Angel, Jonathan Lee
2020/757
Understanding Methodology for Efficient CNN Architectures in Profiling Attacks
Gabriel Zaid, Lilian Bossuet, Amaury Habrard, Alexandre Venelli
2020/756
Provable Security Analysis of FIDO2
Manuel Barbosa, Alexandra Boldyreva, Shan Chen, Bogdan Warinschi
2020/755
Time-release Cryptography from Minimal Circuit Assumptions
Samuel Jaques, Hart Montgomery, Arnab Roy
2020/754
Fluid MPC: Secure Multiparty Computation with Dynamic Participants
Arka Rai Choudhuri, Aarushi Goel, Matthew Green, Abhishek Jain, Gabriel Kaptchuk
2020/753
Compressing Proofs of $k$-Out-Of-$n$ Partial Knowledge
Thomas Attema, Ronald Cramer, Serge Fehr
2020/752
Continuous Group Key Agreement with Active Security
Joël Alwen, Sandro Coretti, Daniel Jost, Marta Mularczyk
2020/751
DANA - Universal Dataflow Analysis for Gate-Level Netlist Reverse Engineering
Nils Albartus, Max Hoffmann, Sebastian Temme, Leonid Azriel, Christof Paar
2020/750
Doppelganger Obfuscation - Exploring the Defensive and Offensive Aspects of Hardware Camouflaging
Max Hoffmann, Christof Paar
2020/749
Insecurity of the Public Key Encryption with Filtered Equality Test Proposed by Huang et al.
Hyung Tae Lee, San Ling, Jae Hong Seo, Huaxiong Wang
2020/748
Anonymous probabilistic payment in payment hub
Tatsuo Mitani, Akira Otsuka
2020/747
Communication-Efficient (Proactive) Secure Computation for Dynamic General Adversary Structures and Dynamic Groups
Karim Eldefrawy, Seoyeon Hwang, Rafail Ostrovsky, Moti Yung
2020/746
Comparison of RISC-V and transport triggered architectures for a post-quantum cryptography application
Latif AKÇAY, Berna ÖRS
2020/745
True Random Number Generation Based on DNA molecule Genetic Information (DNA-TRNG)
Siddaramappa V, Ramesh K B
2020/744
Internal Symmetries and Linear Properties: Full-permutation Distinguishers and Improved Collisions on Gimli
Antonio Flórez Gutiérrez, Gaëtan Leurent, María Naya-Plasencia, Léo Perrin, André Schrottenloher, Ferdinand Sibleyras
2020/743
A key-recovery timing attack on post-quantum primitives using the Fujisaki-Okamoto transformation and its application on FrodoKEM
Qian Guo, Thomas Johansson, Alexander Nilsson
2020/742
Improved Side-Channel Resistance by Dynamic Fault-Injection Countermeasures
Jan Richter-Brockmann, Tim Güneysu
2020/741
Fast Privacy-Preserving Punch Cards
Saba Eskandarian
2020/740
Always Have a Backup Plan: Fully Secure Synchronous MPC with Asynchronous Fallback
Erica Blum, Chen-Da Liu-Zhang, Julian Loss
2020/739
Versatile and Sustainable Timed-Release Encryption and Sequential Time-Lock Puzzles
Peter Chvojka, Tibor Jager, Daniel Slamanig, Christoph Striecks
2020/738
GIFT-COFB
Subhadeep Banik, Avik Chakraborti, Akiko Inoue, Tetsu Iwata, Kazuhiko Minematsu, Mridul Nandi, Thomas Peyrin, Yu Sasaki, Siang Meng Sim, Yosuke Todo
2020/737
A non-PCP Approach to Succinct Quantum-Safe Zero-Knowledge
Jonathan Bootle, Vadim Lyubashevsky, Ngoc Khanh Nguyen, Gregor Seiler
2020/736
Forward Security under Leakage Resilience, Revisited
Suvradip Chakraborty, Harish Karthikeyan, Adam O'Neill, and C. Pandu Rangan
2020/735
Bulletproofs+: Shorter Proofs for Privacy-Enhanced Distributed Ledger
Heewon Chung, Kyoohyung Han, Chanyang Ju, Myungsun Kim, Jae Hong Seo
2020/734
Mirror Theory: A simple proof of the Pi+Pj Theorem with xi_max=2
Benoît Cogliati, Jacques Patarin
2020/733
A Side-Channel Resistant Implementation of SABER
Michiel Van Beirendonck, Jan-Pieter D'Anvers, Angshuman Karmakar, Josep Balasch, Ingrid Verbauwhede
2020/732
Security of Multi-Adjustable Join Schemes: Separations and Implications
Mojtaba Rafiee, Shahram Khazaei
2020/731
The Exact Security of PMAC with Three Powering-Up Masks
Yusuke Naito
2020/730
On the Security of Time-Lock Puzzles and Timed Commitments
Jonathan Katz, Julian Loss, Jiayu Xu
2020/729
Private Set Intersection in the Internet Setting From Lightweight Oblivious PRF
Melissa Chase, Peihan Miao
2020/728
Minerva: The curse of ECDSA nonces
Jan Jancar, Vladimir Sedlacek, Petr Svenda, Marek Sys
2020/727
An Easy-to-Use Tool for Rotational-XOR Cryptanalysis of ARX Block Ciphers
Adrian Ranea, Yunwen Liu, Tomer Ashur
2020/726
On the Tight Security of TLS 1.3: Theoretically-Sound Cryptographic Parameters for Real-World Deployments
Denis Diemert, Tibor Jager
2020/725
Non-Malleable Secret Sharing against Bounded Joint-Tampering Attacks in the Plain Model
Gianluca Brian, Antonio Faonio, Maciej Obremski, Mark Simkin, Daniele Venturi
2020/724
Multi-Party Revocation in Sovrin: Performance through Distributed Trust
Lukas Helminger, Daniel Kales, Sebastian Ramacher, Roman Walch
2020/723
On the Confidentiality of Amounts in Grin
Suyash Bagad, Saravanan Vijayakumaran
2020/722
NXNSAttack: Recursive DNS Inefficiencies and Vulnerabilities
Yehuda Afek, Anat Bremler-Barr, Lior Shafir
2020/721
MP2ML: A Mixed-Protocol Machine Learning Framework for Private Inference
Fabian Boemer, Rosario Cammarota, Daniel Demmler, Thomas Schneider, Hossein Yalame
2020/720
Fast algebraic immunity of Boolean functions and LCD codes
Sihem Mesnager, Chunming Tang
2020/719
Hypercube and Cascading-based Algorithms for Secret Sharing Schemes
Shion Samadder Chaudhury, Sabyasachi Dutta, Kouichi Sakurai
2020/718
Robust Channels: Handling Unreliable Networks in the Record Layers of QUIC and DTLS 1.3
Marc Fischlin, Felix Günther, Christian Janson
2020/717
Fault Location Identification By Machine Learning
Anubhab Baksi, Santanu Sarkar, Akhilesh Siddhanti, Ravi Anand, Anupam Chattopadhyay
2020/716
Signal Injection Attack on Time-to-Digital Converter and Its Application to Physically Unclonable Function
Takeshi Sugawara, Tatsuya Onuma, Yang Li
2020/715
On (impracticality of) transfinite symmetric encryption with keys smaller than messages under GCH
Sergij V. Goncharov
2020/714
One-One Constrained Pseudorandom Functions
Naty Peter, Rotem Tsabary, Hoeteck Wee
2020/713
A Generic Construction of Predicate Proxy Key Re-encapsulation Mechanism
Yi-Fan Tseng, Zi-Yuan Liu, Raylin Tso
2020/712
Anonymous IBE From Quadratic Residuosity With Fast Encryption
Xiaopeng Zhao, Zhenfu Cao, Xiaolei Dong, Jinwen Zheng
2020/711
Crowd Verifiable Zero-Knowledge and End-to-end Verifiable Multiparty Computation
Foteini Baldimtsi, Aggelos Kiayias, Thomas Zacharias, Bingsheng Zhang
2020/710
Rational Behavior in Committee-Based Blockchains
Yackolley Amoussou-Guenou, Bruno Biais, Maria Potop-Butucaru, Sara Tucci-Piergiovanni
2020/709
Reputable List Curation from Decentralized Voting
Elizabeth C. Crites, Mary Maller, Sarah Meiklejohn, Rebekah Mercer
2020/708
Lamphone: Real-Time Passive Sound Recovery from Light Bulb Vibrations
Ben Nassi, Yaron Pirutin, Adi Shamir, Yuval Elovici, Boris Zadov
2020/707
Faster Enumeration-based Lattice Reduction: Root Hermite Factor k^(1/(2k)) in Time k^(k/8 + o(k))
Martin R. Albrecht, Shi Bai, Pierre-Alain Fouque, Paul Kirchner, Damien Stehlé, Weiqiang Wen
2020/706
A Logic Synthesis Toolbox for Reducing the Multiplicative Complexity in Logic Networks
Eleonora Testa, Mathias Soeken, Heinz Riener, Luca Amaru, Giovanni De Micheli
2020/705
On the minimal value set size of APN functions
Ingo Czerwinski
2020/704
Secure Single-Server Aggregation with (Poly)Logarithmic Overhead
James Bell, K. A. Bonawitz, Adrià Gascón, Tancrède Lepoint, Mariana Raykova
2020/703
New Complexity Estimation on the Rainbow-Band-Separation Attack
Shuhei Nakamura, Yasuhiko Ikematsu, Yacheng Wang, Jintai Ding, Tsuyoshi Takagi
2020/702
Rainbow Band Separation is Better than we Thought
Ray Perlner, Daniel Smith-Tone
2020/701
MPC with Friends and Foes
Bar Alon, Eran Omri, Anat Paskin-Cherniavsky
2020/700
Personal data exchange protocol: X
Vladimir Belsky, Ilia Gerasimov, Kirill Tsaregorodtsev, Ivan Chizhov
2020/699
Looking at the NIST Lightweight Candidates from a Masking Point-of-View
Lauren De Meyer
2020/698
Forgery attack on the authentication encryption GIFT-COFB
Zhe CEN, Xiutao FENG, Zhangyi Wang, Chunping CAO
2020/697
Comparing the difficulty of factorization and discrete logarithm: a 240-digit experiment
F. Boudot, P. Gaudry, A. Guillevic, N. Heninger, E. Thomé, P. Zimmermann
2020/696
An Efficient CRT-based Bit-parallel Multiplier for Special Pentanomials
Yin Li, Yu Zhang
2020/695
Collusion Resistant Watermarkable PRFs from Standard Assumptions
Rupeng Yang, Man Ho Au, Zuoxia Yu, Qiuliang Xu
2020/694
The nearest-colattice algorithm
Thomas Espitau, Paul Kirchner
2020/693
Tight Quantum Time-Space Tradeoffs for Function Inversion
Kai-Min Chung, Siyao Guo, Qipeng Liu, Luowen Qian
2020/692
Optimizing Inner Product Masking Scheme by A Coding Theory Approach
Wei Cheng, Sylvain Guilley, Claude Carlet, Sihem Mesnager, Jean-Luc Danger
2020/691
Improved Threshold Signatures, Proactive Secret Sharing, and Input Certification from LSS Isomorphisms
Diego Aranha, Anders Dalskov, Daniel Escudero, Claudio Orlandi
2020/690
SAFE: A Secure and Efficient Long-Term Distributed Storage System
Johannes Buchmann, Ghada Dessouky, Tommaso Frassetto, Ágnes Kiss, Ahmad-Reza Sadeghi, Thomas Schneider, Giulia Traverso, Shaza Zeitouni
2020/689
Single Tweakey Cryptanalysis of Reduced-Round SKINNY-64
Orr Dunkelman, Senyang Huang, Eran Lambooij, Stav Perle
2020/688
Lin2-Xor Lemma: an OR-proof that leads to the membership proof and signature
Anton A. Sokolov
2020/687
Lower Bounds on the Time/Memory Tradeoff of Function Inversion
Dror Chawin, Iftach Haitner, Noam Mazor
2020/686
A Level Dependent Authentication for IoT Paradigm
Chintan Patel, Nishant Doshi
2020/685
Fast Vector Oblivious Linear Evaluation from Ring Learning with Errors
Leo de Castro, Chiraag Juvekar, Vinod Vaikuntanathan
2020/684
How to (legally) keep secrets from mobile operators
Ghada Arfaoui, Olivier Blazy, Xavier Bultel, Pierre-Alain Fouque, Thibaut Jacques, Adina Nedelcu, Cristina Onete
2020/683
Logarithmic-Size (Linkable) Threshold Ring Signatures in the Plain Model
Abida Haque, Stephan Krenn, Daniel Slamanig, Christoph Striecks
2020/682
Succinct Diophantine-Satisfiability Arguments
Patrick Towa, Damien Vergnaud
2020/681
An F-algebra for analysing information leaks in the presence of glitches
Vittorio Zaccaria
2020/680
On the Design of Bit Permutation Based Ciphers - The Interplay Among S-box, Bit Permutation and Key-addition
Sumanta Sarkar, Yu Sasaki, Siang Meng Sim
2020/679
BETA: Biometric Enabled Threshold Authentication
Shashank Agrawal, Saikrishna Badrinarayanan, Payman Mohassel, Pratyay Mukherjee, Sikhar Patranabis
2020/678
Stronger Notions and a More Efficient Construction of Threshold Ring Signatures
Alexander Munch-Hansen, Claudio Orlandi, Sophia Yakoubov
2020/677
Blockchain with Varying Number of Players
T-H. Hubert Chan, Naomi Ephraim, Antonio Marcedone, Andrew Morgan, Rafael Pass, Elaine Shi
2020/676
An airdrop that preserves recipient privacy
Riad S. Wahby, Dan Boneh, Christopher Jeffrey, Joseph Poon
2020/675
Ledger Combiners for Fast Settlement
Matthias Fitzi, Peter Gazi, Aggelos Kiayias, Alexander Russell
2020/674
Coercion-Resistant Blockchain-Based E-Voting Protocol
Chiara Spadafora, Riccardo Longo, Massimiliano Sala
2020/673
LotMint: Blockchain Returning to Decentralization with Decentralized Clock
Wenbo MAO, Wenxiang WANG
2020/672
A Survey of Automatic Contact Tracing Approaches Using Bluetooth Low Energy
Leonie Reichert, Samuel Brack, Björn Scheuermann
2020/671
Persistent Fault Analysis With Few Encryptions
Sebastien Carre, Sylvain Guilley, Olivier Rioul
2020/670
Inverse-Sybil Attacks in Automated Contact Tracing
Benedikt Auerbach, Suvradip Chakraborty, Karen Klein, Guillermo Pascual-Perez, Krzysztof Pietrzak, Michael Walter, Michelle Yeo
2020/669
Proof of Mirror Theory for $\xi_{\max}=2$
Avijit Dutta, Mridul Nandi, Abishanka Saha
2020/668
On Subversion-Resistant SNARKs
Behzad Abdolmaleki, Helger Lipmaa, Janno Siim, Michał Zając
2020/667
New Results on the SymSum Distinguisher on Round-Reduced SHA3
Sahiba Suryawanshi, Dhiman Saha, Satyam Sachan
2020/666
Revisiting the Hardness of Binary Error LWE
Chao Sun, Mehdi Tibouchi, Masayuki Abe
2020/665
Montgomery-friendly primes and applications to cryptography
Jean Claude Bajard, Sylvain Duquesne
2020/664
The Share Size of Secret-Sharing Schemes for Almost All Access Structures and Graphs
Amos Beimel, Oriol Farràs
2020/663
Super-Linear Time-Memory Trade-Offs for Symmetric Encryption
Wei Dai, Stefano Tessaro, Xihu Zhang
2020/662
Multi-Party Computation Mechanism for Anonymous Equity Block Trading: A Secure Implementation of Turquoise Plato Uncross
John Cartlidge, Nigel P. Smart, Younes Talibi Alaoui
2020/661
Tight Consistency Bounds for Bitcoin
Peter Gaži, Aggelos Kiayias, Alexander Russell
2020/660
Efficient Software Implementation of the SIKE Protocol Using a New Data Representation
Jing Tian, Piaoyang Wang, Zhe Liu, Jun Lin, Zhongfeng Wang, Johann Großschädl
2020/659
Software Evaluation of Grain-128AEAD for Embedded Platforms
Alexander Maximov, Martin Hell
2020/658
Time-Specific Signatures
Masahito Ishizaka, Shinsaku Kiyomoto
2020/657
Traceable Constant-Size Multi-Authority Credentials
Chloé Hébant, David Pointcheval
2020/656
On Length Independent Security Bounds for the PMAC Family
Bishwajit Chakraborty, Soumya Chattopadhyay, Ashwin Jha, Mridul Nandi
2020/655
Push For More: On Comparison of Data Augmentation and SMOTE With Optimised Deep Learning Architecture For Side-Channel
Yoo-Seung Won, Dirmanto Jap, Shivam Bhasin
2020/654
Proximity Gaps for Reed-Solomon Codes
Eli Ben-Sasson, Dan Carmon, Yuval Ishai, Swastik Kopparty, Shubhangi Saraf
2020/653
MemPoline: Mitigating Memory-based Side-Channel Attacks through Memory Access Obfuscation
Zhen Hang Jiang, Yunsi Fei, Aidong Adam Ding, Thomas Wahl
2020/652
Somewhere Statistically Binding Commitment Schemes with Applications
Prastudy Fauzi, Helger Lipmaa, Zaira Pindado, Janno Siim
2020/651
Cryptanalysis of ``FS-PEKS: Lattice-based Forward Secure Public-key Encryption with Keyword Search for Cloud-assisted Industrial Internet of Things''
Zi-Yuan Liu, Yi-Fan Tseng, Raylin Tso
2020/650
End-to-End Verifiable E-Voting Trial for Polling Station Voting
Feng Hao, Shen Wang, Samiran Bag, Rob Procter, Siamak Shahandashti, Maryam Mehrnezhad, Ehsan Toreini, Roberto Metere, Lana Liu
2020/649
NIZK from SNARG
Fuyuki Kitagawa, Takahiro Matsuda, Takashi Yamakawa
2020/648
Ghostor: Toward a Secure Data-Sharing System from Decentralized Trust
Yuncong Hu, Sam Kumar, Raluca Ada Popa
2020/647
A simple generic construction to build oblivious transfer protocols from homomorphic encryption schemes
Saeid Esmaeilzade, Ziba Eslami, Nasrollah Pakniat
2020/646
Calamari and Falafl: Logarithmic (Linkable) Ring Signatures from Isogenies and Lattices
Ward Beullens, Shuichi Katsumata, Federico Pintore
2020/645
Correlation distribution analysis of a two-round key-alternating block cipher
Liliya Kraleva, Nikolai L. Manev, Vincent Rijmen
2020/644
ALBATROSS: publicly AttestabLe BATched Randomness based On Secret Sharing
Ignacio Cascudo, Bernardo David
2020/643
About Blockchain Interoperability
Pascal Lafourcade, Marius Lombard-Platet
2020/642
The Ritva Blockchain: Enabling Confidential Transactions at Scale
Henri Aare, Peter Vitols
2020/641
Overview of Polkadot and its Design Considerations
Jeff Burdges, Alfonso Cevallos, Peter Czaban, Rob Habermeier, Syed Hosseini, Fabio Lama, Handan Kilinc Alper, Ximin Luo, Fatemeh Shirazi, Alistair Stewart, Gavin Wood
2020/640
Grover on SPECK: Quantum Resource Estimates
Kyungbae Jang, Seungjoo Choi, Hyeokdong Kwon, Hwajeong Seo
2020/639
Constructions for Quantum Indistinguishability Obfuscation
Anne Broadbent, Raza Ali Kazmi
2020/638
Delay Encryption
Jeffrey Burdges, Luca De Feo
2020/637
DABANGG: Time for Fearless Flush based Cache Attacks
Anish Saxena, Biswabandan Panda
2020/636
Mixed-Technique Multi-Party Computations Composed of Two-Party Computations
Erik-Oliver Blass, Florian Kerschbaum
2020/635
Two-Round Oblivious Linear Evaluation from Learning with Errors
Pedro Branco, Nico Döttling, Paulo Mateus
2020/634
SILVER - Statistical Independence and Leakage Verification
David Knichel, Pascal Sasdrich, Amir Moradi
2020/633
Improved torsion-point attacks on SIDH variants
Victoria de Quehen, Péter Kutas, Chris Leonardi, Chloe Martindale, Lorenz Panny, Christophe Petit, Katherine E. Stange
2020/632
Proposing an MILP-based Method for the Experimental Verification of Difference Trails
Sadegh Sadeghi, Vincent Rijmen, Nasour Bagheri
2020/631
Simultaneous Diagonalization of Incomplete Matrices and Applications
Jean-Sébastien Coron, Luca Notarnicola, Gabor Wiese
2020/630
ContactChaser: A Simple yet Effective Contact Tracing Scheme with Strong Privacy
Zhiguo Wan, Xiaotong Liu
2020/629
Dual-Mode NIZKs: Possibility and Impossibility Results for Property Transfer
Vivek Arte, Mihir Bellare
2020/628
A post-quantum key exchange protocol from the intersection of quadric surfaces
Daniele Di Tullio, Manoj Gyawali
2020/627
Attacking Zcash For Fun And Profit
Duke Leto, The Hush Developers
2020/626
Game theoretical framework for analyzing Blockchains Robustness
Paolo Zappalà, Marianna Belotti, Maria Potop-Butucaru, Stefano Secci
2020/625
Probability theory and public-key cryptography
Mariya Bessonov, Dima Grigoriev, Vladimir Shpilrain
2020/624
RSA for poor men: a cryptosystem based on probable primes to base 2 numbers
Marek Wójtowicz
2020/623
PSI-Stats: Private Set Intersection Protocols Supporting Secure Statistical Functions
Jason H. M. Ying, Shuwei Cao, Geong Sen Poh, Jia Xu, Hoon Wei Lim
2020/622
The Direction of Updatable Encryption does not Matter Much
Yao Jiang
2020/621
How to Base Security on the Perfect/Statistical Binding Property of Quantum Bit Commitment?
Junbin Fang, Dominique Unruh, Jun Yan, Dehua Zhou
2020/620
Private Identity Agreement for Private Set Functionalities
Ben Kreuter, Sarvar Patel, Ben Terner
2020/619
Security Analysis of NIST CTR-DRBG
Viet Tung Hoang, Yaobin Shen
2020/618
Broadcast Secret-Sharing, Bounds and Applications
Ivan Damgård, Kasper Green Larsen, Sophia Yakoubov
2020/617
New Techniques in Replica Encodings with Client Setup
Rachit Garg, George Lu, Brent Waters
2020/616
Master-Key KDM-Secure IBE from Pairings
Sanjam Garg, Romain Gay, Mohammad Hajiabadi
2020/615
LadderLeak: Breaking ECDSA With Less Than One Bit Of Nonce Leakage
Diego F. Aranha, Felipe Rodrigues Novaes, Akira Takahashi, Mehdi Tibouchi, Yuval Yarom
2020/614
Lattice-Based E-Cash, Revisited
Amit Deo, Benoit Libert, Khoa Nguyen, Olivier Sanders
2020/613
SiGamal: A supersingular isogeny-based PKE and its application to a PRF
Tomoki Moriya, Hiroshi Onuki, Tsuyoshi Takagi
2020/612
Key Assignment Schemes with Authenticated Encryption, revisited
Jeroen Pijnenburg, Bertram Poettering
2020/611
Efficient and Fast Hardware Architectures for SIKE Round 2 on FPGA
Rami Elkhatib, Reza Azarderakhsh, Mehran Mozaffari-Kermani
2020/610
Stronger Multilinear Maps from Indistinguishability Obfuscation
Navid Alamati, Hart Montgomery, Sikhar Patranabis
2020/609
Efficient Simultaneous Deployment of Multiple Lightweight Authenticated Ciphers
Behnaz Rezvani, Thomas Conroy, Luke Beckwith, Matthew Bozzay, Trevor Laffoon, David McFeeters, Yijia Shi, Minh Vu, William Diehl
2020/608
The Area-Latency Symbiosis: Towards Improved Serial Encryption Circuits
Fatih Balli, Andrea Caforio, Subhadeep Banik
2020/607
Energy Analysis of Lightweight AEAD Circuits
Andrea Caforio, Fatih Balli, Subhadeep Banik
2020/606
Multiparty Noninteractive Key Exchange from Ring Key-Homomorphic Weak PRFs
Navid Alamati, Hart Montgomery, Sikhar Patranabis
2020/605
LUSA: the HPC library for lattice-based cryptanalysis
Artur Mariano
2020/604
Perfectly Oblivious (Parallel) RAM Revisited, and Improved Constructions
T-H. Hubert Chan, Elaine Shi, Wei-Kai Lin, Kartik Nayak
2020/603
Masking in Fine-Grained Leakage Models: Construction, Implementation and Verification
Gilles Barthe, Marc Gourjon, Benjamin Gregoire, Maximilian Orlt, Clara Paglialonga, Lars Porth
2020/602
CENCPP* - Beyond-birthday-secure Encryption from Public Permutations
Arghya Bhattacharjee, Avijit Dutta, Eik List, Mridul Nandi
2020/601
Everything is a Race and Nakamoto Always Wins
Amir Dembo, Sreeram Kannan, Ertem Nusret Tas, David Tse, Pramod Viswanath, Xuechao Wang, Ofer Zeitouni
2020/600
Multi-Party Threshold Private Set Intersection with Sublinear Communication
Saikrishna Badrinarayanan, Peihan Miao, Srinivasan Raghuraman, Peter Rindal
2020/599
Private Matching for Compute
Prasad Buddhavarapu, Andrew Knox, Payman Mohassel, Shubho Sengupta, Erik Taubeneck, Vlad Vlaskin
2020/598
Cryptanalysis of Au et al. Dynamic Universal Accumulator
Alex Biryukov, Aleksei Udovenko, Giuseppe Vitto
2020/597
Bitstream Modification of Trivium
Kalle Ngo, Elena Dubrova, Michail Moraitis
2020/596
Relationships between quantum IND-CPA notions
Tore Vincent Carstens, Ehsan Ebrahimi, Gelo Tabia, Dominique Unruh
2020/595
Time-Specific Encryption with Constant-Size Secret-Keys Secure under Standard Assumption
Masahito Ishizaka, Shinsaku Kiyomoto
2020/594
LESS is More: Code-Based Signatures without Syndromes
Jean-Francois Biasse, Giacomo Micheli, Edoardo Persichetti, Paolo Santini
2020/593
Alt-Coin Traceability
Claire Ye, Chinedu Ojukwu, Anthony Hsu, Ruiqi Hu
2020/592
SWIFT: Super-fast and Robust Privacy-Preserving Machine Learning
Nishat Koti, Mahak Pancholi, Arpita Patra, Ajith Suresh
2020/591
Automatic Verification of Differential Characteristics: Application to Reduced Gimli (Full Version)
Fukang Liu, Takanori Isobe, Willi Meier
2020/590
Expected Constant Round Byzantine Broadcast under Dishonest Majority
Jun Wan, Hanshen Xiao, Elaine Shi, Srinivas Devadas
2020/589
Developing Symmetric Encryption Methods Based On Residue Number System And Investigating Their Cryptosecurity
Mykhailo Kasianchuk, Mikolaj Karpinski, Roman Kochan, Volodymyr Karpinskyi, Grzegorz Litawa, Inna Shylinska, Igor Yakymenko
2020/588
Reduction from Module-SIS to Ring-SIS Under Norm Constraint of Ring-SIS
ZaHyun Koo, Jong-Seon No, Young-Sik Kim
2020/587
MoniPoly---An Expressive $q$-SDH-Based Anonymous Attribute-Based Credential System
Syh-Yuan Tan, Thomas Gross
2020/586
Component-Based Comparison of Privacy-First Exposure Notification Protocols
Ellie Daw
2020/585
Improving Key Mismatch Attack on NewHope with Fewer Queries
Satoshi Okada, Yuntao Wang, Tsuyoshi Takagi
2020/584
vCNN: Verifiable Convolutional Neural Network based on zk-SNARKs
Seunghwa Lee, Hankyung Ko, Jihye Kim, Hyunok Oh
2020/583
A New Targeted Password Guessing Model
Xie Zhijie, Zhang Min, Yin Anqi, Li Zhenhan
2020/582
Risk and Architecture factors in Digital Exposure Notification
Archanaa S. Krishnan, Yaling Yang, Patrick Schaumont
2020/581
The Round Complexity of Perfect MPC with Active Security and Optimal Resiliency
Benny Applebaum, Eliran Kachlon, Arpita Patra
2020/580
TxChain: Efficient Cryptocurrency Light Clients via Contingent Transaction Aggregation
Alexei Zamyatin, Zeta Avarikioti, Daniel Perez, William J. Knottenbelt
2020/579
BitFund: A Benevolent Blockchain Funding Network
Darrow R Hartman
2020/578
HyperService: Interoperability and Programmability Across Heterogeneous Blockchains
Zhuotao Liu, Yangxi Xiang, Jian Shi, Peng Gao, Haoyu Wang, Xusheng Xiao, Bihan Wen, Yih-Chun Hu
2020/577
Inner-Product Functional Encryption with Fine-Grained Access Control
Michel Abdalla, Dario Catalano, Romain Gay, Bogdan Ursu
2020/576
How Low Can We Go?
Yuval Ishai
2020/575
From Rerandomizability to Sequential Aggregation: Efficient Signature Schemes Based on SXDH Assumption
Sanjit Chatterjee, R. Kabaleeshwaran
2020/574
Towards Interpreting Smart Contract against Contract Fraud: A Practical and Automatic Realization
Ming Li, Jian Weng, Anjia Yang, Jiasi Weng, Yue Zhang
2020/573
Quantifying the Security Cost of Migrating Protocols to Practice
Christopher Patton, Thomas Shrimpton
2020/572
HACL×N: Verified Generic SIMD Crypto (for all your favorite platforms)
Marina Polubelova, Karthikeyan Bhargavan, Jonathan Protzenko, Benjamin Beurdouche, Aymeric Fromherz, Natalia Kulatova, Santiago Zanella-Béguelin
2020/571
Machine Learning Assisted Differential Distinguishers For Lightweight Ciphers (Extended Version)
Anubhab Baksi, Jakub Breier, Yi Chen, Xiaoyang Dong
2020/570
On Optimality of d + 1 TI Shared Functions of 8 Bits or Less
Dušan Božilov
2020/569
QA-NIZK Arguments of Same Opening for Bilateral Commitments
Carla Ràfols, Javier Silva
2020/568
Prelude to Marvellous (With the Designers' Commentary, Two Bonus Tracks, and a Foretold Prophecy)
Tomer Ashur, Siemen Dhooghe
2020/567
An Improvement of Multi-Exponentiation with Encrypted Bases Argument: Smaller and Faster
Yi Liu, Qi Wang, Siu-Ming Yiu
2020/566
Reputation Driven Dynamic Access Control Framework for IoT atop PoA Ethereum Blockchain
Auqib Hamid Lone, Roohie Naaz
2020/565
Homomorphic Computation in Reed-Muller Codes
Jinkyu Cho, Young-Sik Kim, Jong-Seon No
2020/564
Hash-based Signatures Revisited: A Dynamic FORS with Adaptive Chosen Message Security
Mahmoud Yehia, Riham AlTawy, T. Aaron Gulliver
2020/563
Secure large-scale genome-wide association studies using homomorphic encryption
Marcelo Blatt, Alexander Gusev, Yuriy Polyakov, Shafi Goldwasser
2020/562
The System That Cried Wolf: Sensor Security Analysis of Wide-area Smoke Detectors for Critical Infrastructure
Hocheol Shin, Juhwan Noh, Dohyun Kim, Yongdae Kim
2020/561
Exploiting Weak Diffusion of Gimli: Improved Distinguishers and Preimage Attacks
Fukang Liu, Takanori Isobe, Willi Meier
2020/560
Zerojoin: Combining Zerocoin and CoinJoin
Alexander Chepurnoy, Amitabh Saxena
2020/559
PIVOT: PrIVate and effective cOntact Tracing
Giuseppe Garofalo, Tim Van hamme, Davy Preuveneers, Wouter Joosen, Aysajan Abidin, Mustafa A. Mustafa
2020/558
BSPL: Balanced Static Power Logic
Bijan Fadaeinia, Thorben Moos, Amir Moradi
2020/557
On the sensitivity of some APN permutations to swapping points
Lilya Budaghyan, Nikolay Kaleyski, Constanza Riera, Pantelimon Stanica
2020/556
Kerckhoffs' Legacy
Jean-Claude Caraco, Rémi Géraud-Stewart, David Naccache
2020/555
Splitting Payments Locally While Routing Interdimensionally
Lisa Eckey, Sebastian Faust, Kristina Hostáková, Stefanie Roos
2020/554
Bitcoin-Compatible Virtual Channels
Lukas Aumayr, Oguzhan Ersoy, Andreas Erwig, Sebastian Faust, Kristina Hostáková, Matteo Maffei, Pedro Moreno-Sanchez, Siavash Riahi
2020/553
Revocable Attribute-based Encryption Scheme with Arithmetic Span Program for Cloud-Assisted IoT
Hu Xiong, Jinhao Chen, Minghao Yang, Xin Huang
2020/552
High-Precision Bootstrapping of RNS-CKKS Homomorphic Encryption Using Optimal Minimax Polynomial Approximation and Inverse Sine Function
Joon-Woo Lee, Eunsang Lee, Yongwoo Lee, Young-Sik Kim, Jong-Seon No
2020/551
Higher Order Differential Attack against Full-Round BIG
Naoki Shibayama, Yasutaka Igarashi, Toshinobu Kaneko
2020/550
Practical MPC+FHE with Applications in Secure Multi-PartyNeural Network Evaluation
Ruiyu Zhu, Changchang Ding, Yan Huang
2020/549
Drop by Drop you break the rock - Exploiting generic vulnerabilities in Lattice-based PKE/KEMs using EM-based Physical Attacks
Prasanna Ravi, Shivam Bhasin, Sujoy Sinha Roy, Anupam Chattopadhyay
2020/548
Blockchain Stealth Address Schemes
Gary Yu
2020/547
Finding Bit-Based Division Property for Ciphers with Complex Linear Layer
Kai Hu, Qingju Wang, Meiqin Wang
2020/546
MixColumns Coefficient Property and Security of the AES with A Secret S-Box
Xin An, Kai Hu, Meiqin Wang
2020/545
Efficient and Round-Optimal Oblivious Transfer and Commitment with Adaptive Security
Ran Canetti, Pratik Sarkar, Xiao Wang
2020/544
SNI-in-the-head: Protecting MPC-in-the-head Protocols against Side-channel Analysis
Okan Seker, Sebastian Berndt, Luca Wilke, Thomas Eisenbarth
2020/543
Kachina - Foundations of Private Smart Contracts
Thomas Kerber, Aggelos Kiayias, Markulf Kohlweiss
2020/542
Lightweight Authenticated Encryption Mode Suitable for Threshold Implementation
Yusuke Naito, Yu Sasaki, Takeshi Sugawara
2020/541
There Can Be No Compromise: The Necessity of Ratcheted Authentication in Secure Messaging
Benjamin Dowling, Britta Hale
2020/540
One Round Threshold ECDSA with Identifiable Abort
Rosario Gennaro, Steven Goldfeder
2020/539
On the Concrete Security of LWE with Small Secret
Hao Chen, Lynn Chua, Kristin Lauter, Yongsoo Song
2020/538
Rotational Cryptanalysis on MAC Algorithm Chaskey
Liliya Kraleva, Tomer Ashur, Vincent Rijmen
2020/537
TARDIS: A Foundation of Time-Lock Puzzles in UC
Carsten Baum, Bernardo David, Rafael Dowsley, Jesper Buus Nielsen, Sabine Oechsner
2020/536
Influence of the Linear Layer on the Algebraic Degree in SP-Networks
Carlos Cid, Lorenzo Grassi, Aldo Gunsing, Reinhard Lüftenegger, Christian Rechberger, Markus Schofnegger
2020/535
Non-Interactive Zero-Knowledge in Pairing-Free Groups from Weaker Assumptions
Geoffroy Couteau, Shuichi Katsumata, Bogdan Ursu
2020/534
Post-quantum TLS without handshake signatures
Peter Schwabe, Douglas Stebila, Thom Wiggers
2020/533
Anonymous Lottery in the Proof-of-Stake Setting
Foteini Baldimtsi, Varun Madathil, Alessandra Scafuro, Linfeng Zhou
2020/532
Promise: Leveraging Future Gains for Collateral Reduction
Dominik Harz, Lewis Gudgeon, Rami Khalil, Alexei Zamyatin
2020/531
Centralized or Decentralized? The Contact Tracing Dilemma
Serge Vaudenay
2020/530
Determining the Multiplicative Complexity of Boolean Functions using SAT
Mathias Soeken
2020/529
CHIP and CRISP: Protecting All Parties Against Compromise through Identity-Binding PAKEs
Cas Cremers, Moni Naor, Shahar Paz, Eyal Ronen
2020/528
Privacy-Preserving COVID-19 Contact Tracing App: A Zero-Knowledge Proof Approach
Joseph K. Liu, Man Ho Au, Tsz Hon Yuen, Cong Zuo, Jiawei Wang, Amin Sakzad, Xiapu Luo, Li Li, Kim-Kwang Raymond Choo
2020/527
Aggregatable Subvector Commitments for Stateless Cryptocurrencies
Alin Tomescu, Ittai Abraham, Vitalik Buterin, Justin Drake, Dankrad Feist, Dmitry Khovratovich
2020/526
Efficient Montgomery-like formulas for general Huff's and Huff's elliptic curves and their applications to the isogeny-based cryptography
Robert Dryło, Tomasz Kijko, Michał Wroński
2020/525
Account Management in Proof of Stake Ledgers
Dimitris Karakostas, Aggelos Kiayias, Mario Larangeira
2020/524
Efficient Signatures on Randomizable Ciphertexts
Balthazar Bauer, Georg Fuchsbauer
2020/523
Generalized Matsui Algorithm 1 with application for the full DES
Tomer Ashur, Raluca Posteuca, Danilo Šijačić, Stef D’haeseleer
2020/522
Privately Connecting Mobility to Infectious Diseases via Applied Cryptography
Alexandros Bampoulidis, Alessandro Bruni, Lukas Helminger, Daniel Kales, Christian Rechberger, Roman Walch
2020/521
MP-SPDZ: A Versatile Framework for Multi-Party Computation
Marcel Keller
2020/520
MMSAT: A Scheme for Multimessage Multiuser Signature Aggregation
Yarkın Doröz, Jeffrey Hoffstein, Joseph H. Silverman, Berk Sunar
2020/519
Optimally-secure Coin-tossing against a Byzantine Adversary
Hamidreza Amini Khorasgani, Hemanta K. Maji, Mingyuan Wang
2020/518
Practical Exact Proofs from Lattices: New Techniques to Exploit Fully-Splitting Rings
Muhammed F. Esgin, Ngoc Khanh Nguyen, Gregor Seiler
2020/517
Practical Product Proofs for Lattice Commitments
Thomas Attema, Vadim Lyubashevsky, Gregor Seiler
2020/516
POWER-SUPPLaY: Leaking Data from Air-Gapped Systems by Turning the Power-Supplies Into Speakers
Mordechai Guri
2020/515
On a hybrid approach to solve small secret LWE
Thomas Espitau, Antoine Joux, Natalia Kharchenko
2020/514
On the Deployment of curve based cryptography for the Internet of Things
Michael Scott
2020/513
E-cclesia: Universally Composable Self-Tallying Elections
Myrto Arapinis, Nikolaos Lamprou, Lenka Mareková, Thomas Zacharias, Léo Ackermann, Pavlos Georgiou
2020/512
Glimpses are Forever in RC4 amidst the Spectre of Biases
Chandratop Chakraborty, Pranab Chakraborty, Subhamoy Maitra
2020/511
JaxNet: Scalable Blockchain Network
Iurii Shyshatsky, Vinod Manoharan, Taras Emelyanenko, Lucas Leger
2020/510
On the Applicability of the Fujisaki-Okamoto Transformation to the BIKE KEM
Nir Drucker, Shay Gueron, Dusan Kostic, Edoardo Persichetti
2020/509
BBB Secure Nonce Based MAC Using Public Permutations
Avijit Dutta, Mridul Nandi
2020/508
Augmenting Leakage Detection using Bootstrapping
Yuan Yao, Michael Tunstall, Elke De Mulder, Anton Kochepasov, Patrick Schaumont
2020/507
Characteristics of Hadamard square of Reed--Muller subcodes of special type (Extended abstract)
Victoria Vysotskaya
2020/506
Tornado: Automatic Generation of Probing-Secure Masked Bitsliced Implementations
Sonia Belaïd, Pierre-Evariste Dagand, Darius Mercadier, Matthieu Rivain, Raphaël Wintersdorff
2020/505
ConTra Corona: Contact Tracing against the Coronavirus by Bridging the Centralized–Decentralized Divide for Stronger Privacy
Wasilij Beskorovajnov, Felix Dörre, Gunnar Hartung, Alexander Koch, Jörn Müller-Quade, Thorsten Strufe
2020/504
Storing and Retrieving Secrets on a Blockchain
Vipul Goyal, Abhiram Kothapalli, Elisaweta Masserova, Bryan Parno, Yifan Song
2020/503
A New Encoding Algorithm for a Multidimensional Version of the Montgomery Ladder
Aaron Hutchinson, Koray Karabina
2020/502
Applying Blockchain Layer2 Technology to Mass E-Commerce
Sijia Zhao, Donal O’Mahony
2020/501
Fast Threshold ECDSA with Honest Majority
Ivan Damgård, Thomas Pelle Jakobsen, Jesper Buus Nielsen, Jakob Illeborg Pagter, Michael Bæksvang Østergård
2020/500
Proving Resistance Against Infinitely Long Subspace Trails: How to Choose the Linear Layer
Lorenzo Grassi, Christian Rechberger, Markus Schofnegger
2020/499
Proof-Carrying Data from Accumulation Schemes
Benedikt Bünz, Alessandro Chiesa, Pratyush Mishra, Nicholas Spooner
2020/498
Threshold ECDSA for Decentralized Asset Custody
Adam Gągol, Jędrzej Kula, Damian Straszak, Michał Świętek
2020/497
Collusion-Preserving Computation without a Mediator
Michele Ciampi, Yun Lu, Vassilis Zikas
2020/496
Linear Generalized ElGamal Encryption Scheme
Demba Sow, Léo Robert, Pascal Lafourcade
2020/495
Disperse rotation operator DRT and use in some stream ciphers
Kim Yong-Jin, Yon Yong-Ho, Jong Yu-Jin, Li Ok-Chol
2020/494
Improved Black-Box Constructions of Composable Secure Computation
Rohit Chatterjee, Xiao Liang, Omkant Pandey
2020/493
Towards Defeating Mass Surveillance and SARS-CoV-2: The Pronto-C2 Fully Decentralized Automatic Contact Tracing System
Gennaro Avitabile, Vincenzo Botta, Vincenzo Iovino, Ivan Visconti
2020/492
UC Non-Interactive, Proactive, Threshold ECDSA
Ran Canetti, Nikolaos Makriyannis, Udi Peled
2020/491
Efficient AGCD-based homomorphic encryption for matrix and vector arithmetic
Hilder Vitor Lima Pereira
2020/490
SoK: Techniques for Verifiable Mix Nets
Thomas Haines, Johannes Mueller
2020/489
Pandemic Contact Tracing Apps: DP-3T, PEPP-PT NTK, and ROBERT from a Privacy Perspective
Fraunhofer AISEC
2020/488
Near-optimal Polynomial for Modulus Reduction Using L2-norm for Approximate Homomorphic Encryption
Yongwoo Lee, Joonwoo Lee, Young-Sik Kim, Jong-Seon No
2020/487
Sieve, Enumerate, Slice, and Lift: Hybrid Lattice Algorithms for SVP via CVPP
Emmanouil Doulgerakis, Thijs Laarhoven, Benne de Weger
2020/486
Rotational-XOR Cryptanalysis of Simon-like Block Ciphers
Jinyu Lu, Yunwen Liu, Tomer Ashur, Bing Sun, Chao Li
2020/485
Edwards curve points counting method and supersingular Edwards and Montgomery curves
Ruslan V. Skuratovskii
2020/484
Applicability of Mobile Contact Tracing in Fighting Pandemic (COVID-19): Issues, Challenges and Solutions
Aaqib Bashir Dar, Auqib Hamid Lone, Saniya Zahoor, Afshan Amin Khan, Roohie Naaz
2020/483
On Ideal and Weakly-Ideal Access Structures
Reza Kaboli, Shahram Khazaei, Maghsoud Parviz
2020/482
A Trace Based $GF(2^n)$ Inversion Algorithm
Haining Fan
2020/481
Using z14 Fused-Multiply-Add Instructions to Accelerate Elliptic Curve Cryptography
James You, Qi Zhang, Curtis D'Alves, Bill O'Farrell, Christopher K. Anand
2020/480
Low-Latency ASIC Algorithms of Modular Squaring of Large Integers for VDF Evaluation
Ahmet Can Mert, Erdinc Ozturk, Erkay Savas
2020/479
Semi-Adaptively Secure Offline Witness Encryption from Puncturable Witness PRF
Tapas Pal, Ratna Dutta
2020/478
Leakage-Resilient Extractors and Secret-Sharing against Bounded Collusion Protocols
Eshan Chattopadhyay, Jesse Goodman, Vipul Goyal, Xin Li
2020/477
Partially Structure-Preserving Signatures: Lower Bounds, Constructions and More
Essam Ghadafi
2020/476
Generalized Channels from Limited Blockchain Scripts and Adaptor Signatures
Lukas Aumayr, Oguzhan Ersoy, Andreas Erwig, Sebastian Faust, Kristina Hostakova, Matteo Maffei, Pedro Moreno-Sanchez, Siavash Riahi
2020/475
Proof of Review (PoR): A New Consensus Protocol for Deriving Trustworthiness of Reputation Through Reviews
Zachary Zaccagni, Ram Dantu
2020/474
Tiramisu: Black-Box Simulation Extractable NIZKs in the Updatable CRS Model
Karim Baghery, Mahdi Sedaghat
2020/473
Bounded Collusion Protocols, Cylinder-Intersection Extractors and Leakage-Resilient Secret Sharing
Ashutosh Kumar, Raghu Meka, David Zuckerman
2020/472
Bracing A Transaction DAG with A Backbone Chain
Shuyang Tang
2020/471
Interpose PUF can be PAC Learned
Durba Chatterjee, Debdeep Mukhopadhyay, Aritra Hazra
2020/470
LMS vs XMSS: Comparison of Stateful Hash-Based Signature Schemes on ARM Cortex-M4
Fabio Campos, Tim Kohlstadt, Steffen Reith, Marc Stoettinger
2020/469
Dedicated Security Chips in the Age of Secure Enclaves
Kari Kostiainen, Aritra Dhar, Srdjan Capkun
2020/468
Distributed Auditing Proofs of Liabilities
Konstantinos Chalkias, Kevin Lewi, Payman Mohassel, Valeria Nikolaenko
2020/467
Automatic Search of Meet-in-the-Middle Preimage Attacks on AES-like Hashing
Zhenzhen Bao, Xiaoyang Dong, Jian Guo, Zheng Li, Danping Shi, Siwei Sun, Xiaoyun Wang
2020/466
Custom Instruction Support for Modular Defense against Side-channel and Fault Attacks
Pantea Kiaei, Darius Mercadier, Pierre-Evariste Dagand, Karine Heydemann, Patrick Schaumont
2020/465
Domain-Oriented Masked Instruction Set Architecture for RISC-V
Pantea Kiaei, Patrick Schaumont
2020/464
Can a Public Blockchain Keep a Secret?
Fabrice Benhamouda, Craig Gentry, Sergey Gorbunov, Shai Halevi, Hugo Krawczyk, Chengyu Lin, Tal Rabin, Leonid Reyzin
2020/463
Leia: A Lightweight Cryptographic Neural Network Inference System at the Edge
Xiaoning Liu, Bang Wu, Xingliang Yuan, Xun Yi
2020/462
An Information-Theoretic Proof of the Streaming Switching Lemma for Symmetric Encryption
Ido Shahaf, Or Ordentlich, Gil Segev
2020/461
A Polynomial-Time Algorithm for Solving the Hidden Subset Sum Problem
Jean-Sébastien Coron, Agnese Gini
2020/460
A Bunch of Broken Schemes: A Simple yet Powerful Linear Approach to Analyzing Security of Attribute-Based Encryption
Marloes Venema, Greg Alpár
2020/459
Improved Fault Templates of Boolean Circuits in Cryptosystems can Break Threshold Implementations
Debdeep Mukhopadhyay
2020/458
On the Optimality of Optimistic Responsiveness
Ittai Abraham, Kartik Nayak, Ling Ren, Nibesh Shrestha
2020/457
Cryptographic Scheme for analyzing protected files on Sandboxes and share them privately
Ahmad Almorabea
2020/456
General Congestion Attack on HTLC-Based Payment Channel Networks
Zhichun Lu, Runchao Han, Jiangshan Yu
2020/455
Cryptanalysis of LEDAcrypt
Daniel Apon, Ray Perlner, Angela Robinson, Paolo Santini
2020/454
Optimized Lattice Basis Reduction In Dimension 2, and Fast Schnorr and EdDSA Signature Verification
Thomas Pornin
2020/453
BioLocker: A Practical Biometric Authentication Mechanism based on 3D Fingervein
F. Betül Durak, Loïs Huguenin-Dumittan, Serge Vaudenay
2020/452
Almost Public Quantum Coins
Amit Behera, Or Sattath
2020/451
Maliciously Secure Matrix Multiplication with Applications to Private Deep Learning
Hao Chen, Miran Kim, Ilya Razenshteyn, Dragos Rotaru, Yongsoo Song, Sameer Wagh
2020/450
The Landscape of Pointcheval-Sanders Signatures: Mapping to Polynomial-Based Signatures and Beyond
Kristian L. McDonald
2020/449
Switched Threshold Signatures from K-Private PolyShamir Secret Sharing
Kristian L. McDonald
2020/448
Partial Secret Sharing Schemes
Amir Jafari, Shahram Khazaei
2020/447
Computing Blindfolded on Data Homomorphically Encrypted under Multiple Keys: An Extended Survey
Asma Aloufi, Peizhao Hu, Yongsoo Song, Kristin Lauter
2020/446
RISQ-V: Tightly Coupled RISC-V Accelerators for Post-Quantum Cryptography
Tim Fritzmann, Georg Sigl, Johanna Sepúlveda
2020/445
On Pseudorandom Encodings
Thomas Agrikola, Geoffroy Couteau, Yuval Ishai, Stanislaw Jarecki, Amit Sahai
2020/444
A modern signature scheme with message recovery: Abe--Okamoto signatures with EdDSA elements
Satō Shinichi
2020/443
A White-Box Masking Scheme Resisting Computational and Algebraic Attacks
Okan Seker, Thomas Eisenbarth, Maciej Liskiewicz
2020/442
Fine-Grained Cryptography: A New Frontier?
Alon Rosen
2020/441
Modeling for Three-Subset Division Property without Unknown Subset
Yonglin Hao, Gregor Leander, Willi Meier, Yosuke Todo, Qingju Wang
2020/440
Sublattice Attack on Poly-LWE with Wide Error Distributions
Hao Chen
2020/439
The Existence of Cycles in the Supersingular Isogeny Graphs Used in SIKE
Hiroshi Onuki, Yusuke Aikawa, Tsuyoshi Takagi
2020/438
Fast hybrid Karatsuba multiplier for Type II pentanomials
Yin Li, Yu Zhang, Wei He
2020/437
Faster Montgomery and double-add ladders for short Weierstrass curves
Mike Hamburg
2020/436
Deep Learning based Side-Channel Attack: a New Profiling Methodology based on Multi-Label Classification
Houssem Maghrebi
2020/435
WAGE: An Authenticated Encryption with a Twist
Riham AlTawy, Guang Gong, Kalikinkar Mandal, Raghvendra Rohit
2020/434
High-speed Instruction-set Coprocessor for Lattice-based Key Encapsulation Mechanism: Saber in Hardware
Sujoy Sinha Roy, Andrea Basso
2020/433
zkRelay: Facilitating Sidechains using zkSNARK-based Chain-Relays
Martin Westerkamp, Jacob Eberhardt
2020/432
From A to Z: Projective coordinates leakage in the wild
Alejandro Cabrera Aldaya, Cesar Pereida García, Billy Bob Brumley
2020/431
x-only point addition formula and faster compressed SIKE
Geovandro Pereira, Javad Doliskani, David Jao
2020/430
Hierarchical One-out-of-Many Proofs With Applications to Blockchain Privacy and Ring Signatures
Aram Jivanyan, Tigran Mamikonyan
2020/429
Mathematics and Cryptography: A Marriage of Convenience?
Alice Silverberg
2020/428
Security Analysis of the COVID-19 Contact Tracing Specifications by Apple Inc. and Google Inc.
Yaron Gvili
2020/427
Improving the Performance of the Picnic Signature Scheme
Daniel Kales, Greg Zaverucha
2020/426
Privacy-Preserving Contact Tracing: current solutions and open questions
Qiang Tang
2020/425
Friet: An Authenticated Encryption Scheme with Built-in Fault Detection
Thierry Simon, Lejla Batina, Joan Daemen, Vincent Grosso, Pedro Maat Costa Massolino, Kostas Papagiannopoulos, Francesco Regazzoni, Niels Samwel
2020/424
Low-gate Quantum Golden Collision Finding
Samuel Jaques, André Schrottenloher
2020/423
On One-way Functions and Kolmogorov Complexity
Yanyi Liu, Rafael Pass
2020/422
Pattern Matching on Encrypted Data
Anis Bkakria, Nora Cuppens, Frédéric Cuppens
2020/421
Multichain-MWPoW: A $p/2$ Adversary Power Resistant Blockchain Sharding Approach to a Decentralised Autonomous Organisation Architecture
Yibin Xu, Yangyu Huang, Jianhua Shao, George Theodorakopoulos
2020/420
Practical Card-Based Protocol for Three-Input Majority
Kenji Yasunaga
2020/419
Pointproofs: Aggregating Proofs for Multiple Vector Commitments
Sergey Gorbunov, Leonid Reyzin, Hoeteck Wee, Zhenfei Zhang
2020/418
Delayed Authentication: Preventing Replay and Relay Attacks in Private Contact Tracing
Krzysztof Pietrzak
2020/417
Optimal strategies for CSIDH
Jesús-Javier Chi-Domínguez, Francisco Rodríguez-Henríquez
2020/416
The Multi-Base Discrete Logarithm Problem: Tight Reductions and Non-Rewinding Proofs for Schnorr Identification and Signatures
Mihir Bellare, Wei Dai
2020/415
Indistinguishability Obfuscation Without Maps: Attacks and Fixes for Noisy Linear FE
Shweta Agrawal, Alice Pellet-Mary
2020/414
Semi-Quantum Money
Roy Radian, Or Sattath
2020/413
Defeating State-of-the-Art White-Box Countermeasures with Advanced Gray-Box Attacks
Louis Goubin, Matthieu Rivain, Junwei Wang
2020/412
Fixslicing: A New GIFT Representation
Alexandre Adomnicai, Zakaria Najm, Thomas Peyrin
2020/411
Secure Two-Party Computation in a Quantum World
Niklas Büscher, Daniel Demmler, Nikolaos P. Karvelas, Stefan Katzenbeisser, Juliane Krämer, Deevashwer Rathee, Thomas Schneider, Patrick Struck
2020/410
Supersingular Isogeny Key Encapsulation (SIKE) Round 2 on ARM Cortex-M4
Hwajeong Seo, Mila Anastasova, Amir Jalali, Reza Azarderakhsh
2020/409
Classical Misuse Attacks on NIST Round 2 PQC: The Power of Rank-Based Schemes
Loïs Huguenin-Dumittan, Serge Vaudenay
2020/408
Speed up over the Rainbow
Nir Drucker, Shay Gueron
2020/407
Feather: Lightweight Multi-party Updatable Delegated Private Set Intersection
Aydin Abadi, Sotirios Terzis, Changyu Dong
2020/406
Hybrid-BFT: Optimistically Responsive Synchronous Consensus with Optimal Latency or Resilience
Atsuki Momose, Jason Paul Cruz, Yuichi Kaji
2020/405
Ordinos: A Verifiable Tally-Hiding E-Voting System
Ralf Kuesters, Julian Liedtke, Johannes Mueller, Daniel Rausch, Andreas Vogt
2020/404
From Zebras to Tigers: Incentivizing participation in Crowd-sensing applications through fair and private Bitcoin rewards
Tassos Dimitriou
2020/403
Bringing Order to Chaos: The Case of Collision-Resistant Chameleon-Hashes
David Derler, Kai Samelin, and Daniel Slamanig
2020/402
A Note on Low Order Assumptions in RSA groups
István András Seres, Péter Burcsi
2020/401
Mining for Privacy: How to Bootstrap a Snarky Blockchain
Thomas Kerber, Aggelos Kiayias, Markulf Kohlweiss
2020/400
Threshold Implementations Are Not Provably Secure Against Fault Sensitivity Analysis
Jeroen Delvaux
2020/399
Analysis of DP3T
Serge Vaudenay
2020/398
CAUDHT: Decentralized Contact Tracing Using a DHT and Blind Signatures
Samuel Brack, Leonie Reichert, Björn Scheuermann
2020/397
Classification of 4-bit S-boxes for BOGI-permutation
Seonggyeom Kim, Deukjo Hong, Jaechul Sung, Seokhie Hong
2020/396
Improving Non-Profiled Side-Channel Attacks using Autoencoder based Preprocessing
Donggeun Kwon, HeeSeok Kim, Seokhie Hong
2020/395
Cryptography from Information Loss
Marshall Ball, Elette Boyle, Akshay Degwekar, Apoorvaa Deshpande, Alon Rosen, Vinod Vaikuntanathan, Prashant Nalini Vasudevan
2020/394
Candidate iO from Homomorphic Encryption Schemes
Zvika Brakerski, Nico Döttling, Sanjam Garg, Giulio Malavolta
2020/393
LevioSA: Lightweight Secure Arithmetic Computation
Carmit Hazay, Yuval Ishai, Antonio Marcedone, Muthuramakrishnan Venkitasubramaniam
2020/392
An argument on the security of LRBC, a recently proposed lightweight block cipher
Sadegh Sadeghi, Nasour Bagheri
2020/391
Optimized CSIDH Implementation Using a 2-torsion Point
Donghoe Heo, Suhri Kim, Kisoon Yoon, Young-Ho Park, Seokhie Hong
2020/390
A French cipher from the late 19th century
Rémi Géraud-Stewart, David Naccache
2020/389
A Unary Cipher with Advantages over the Vernam Cipher
Gideon Samid
2020/388
Fast 4 way vectorized ladder for the complete set of Montgomery curves
Huseyin Hisil, Berkan Egrice, Mert Yassi
2020/387
Low-complexity and Reliable Transforms for Physical Unclonable Functions
Onur Gunlu, Rafael F. Schaefer
2020/386
Accountability in a Permissioned Blockchain: Formal Analysis of Hyperledger Fabric
Ralf Kuesters, Daniel Rausch, Mike Simon
2020/385
Two-Sided Malicious Security for Private Intersection-Sum with Cardinality
Peihan Miao, Sarvar Patel, Mariana Raykova, Karn Seth, Moti Yung
2020/384
A ”Final” Security Bug
Nguyen Thoi Minh Quan
2020/383
Parallel strategies for SIDH: Towards computing SIDH twice as fast
Daniel Cervantes-Vázquez, Eduardo Ochoa-Jiménez, Francisco Rodríguez-Henríquez
2020/382
Privacy-Preserving Incentive Systems with Highly Efficient Point-Collection
Jan Bobolz, Fabian Eidens, Stephan Krenn, Daniel Slamanig, Christoph Striecks
2020/381
Proof-of-Reputation Blockchain with Nakamoto Fallback
Leonard Kleinrock, Rafail Ostrovsky, Vassilis Zikas
2020/380
Rowhammer Induced Intermittent Fault Attack on ECC-hardened memory
Anirban Chakraborty, Sarani Bhattacharya, Sayandeep Saha, Debdeep Mukhopdhyay
2020/379
Post-quantum WireGuard
Andreas Hülsing, Kai-Chun Ning, Peter Schwabe, Fiona Johanna Weber, and Philip R. Zimmermann
2020/378
Efficient 4-way Vectorizations of the Montgomery Ladder
Kaushik Nath, Palash Sarkar
2020/377
Oblivious tight compaction in O(n) time with smaller constant
Samuel Dittmer, Rafail Ostrovsky
2020/376
On the privacy of a code-based single-server computational PIR scheme
Sarah Bordage, Julien Lavauzelle
2020/375
Privacy-Preserving Contact Tracing of COVID-19 Patients
Leonie Reichert, Samuel Brack, Björn Scheuermann
2020/374
Diogenes: Lightweight Scalable RSA Modulus Generation with a Dishonest Majority
Megan Chen, Carmit Hazay, Yuval Ishai, Yuriy Kashnikov, Daniele Micciancio, Tarik Riviere, abhi shelat, Muthu Venkitasubramaniam, Ruihan Wang
2020/373
Tandem Deep Learning Side-Channel Attack Against FPGA Implementation of AES
Huanyu Wang, Elena Dubrova
2020/372
Graph indicators of vectorial functions and bounds on the algebraic degree of composite functions
Claude Carlet
2020/371
Single-Trace Attacks on Keccak
Matthias J. Kannwischer, Peter Pessl, Robert Primas
2020/370
Multiparty Generation of an RSA Modulus
Megan Chen, Ran Cohen, Jack Doerner, Yashvanth Kondi, Eysa Lee, Schuyler Rosefield, abhi shelat
2020/369
The Risk of Outsourcing: Hidden SCA Trojans in Third-Party IP-Cores Threaten Cryptographic ICs
David Knichel, Thorben Moos, Amir Moradi
2020/368
Defeating NewHope with a Single Trace
Dorian Amiet, Andreas Curiger, Lukas Leuenberger, Paul Zbinden
2020/367
Exploiting Decryption Failures in Mersenne Number Cryptosystems
Marcel Tiepelt and Jan-Pieter D'Anvers
2020/366
FICS-PCB: A Multi-Modal Image Dataset for Automated Printed Circuit Board Visual Inspection
Hangwei Lu, Dhwani Mehta, Olivia Paradis, Navid Asadizanjani, Mark Tehranipoor, Damon L. Woodard
2020/365
A New Algorithm to Find Monic Irreducible Polynomials over Extended Galois field GF prime p and extension q using Positional Arithmetic
Sankhanil Dey, Amlan Chakrabarti, Ranjan Ghosh
2020/364
Subversion-Resistant Quasi-Adaptive NIZK and Applications to Modular zk-SNARKs
Behzad Abdolmaleki, Daniel Slamanig
2020/363
On equivalence between known polynomial APN functions and power APN functions
Qianhong Wan, Longjiang Qu, Chao Li
2020/362
Another Look at CBC Casper Consensus Protocol
Yongge Wang
2020/361
How Not to Create an Isogeny-Based PAKE
Reza Azarderakhsh, David Jao, Brian Koziel, Jason T. LeGrow, Vladimir Soukharev, Oleg Taraskin
2020/360
Composite Algorithm The New Algorithm to Search for Monic Irreducible Polynomials over Extended Galois Fields
Sankhanil Dey, Amlan Chakrabarti, Ranjan Ghosh
2020/359
4-bit Boolean functions in generation and cryptanalysis of secure 4-bit crypto S-boxes.
Sankhanil Dey, Amlan Chakrabarti, Ranjan Ghosh
2020/358
Division Algorithm to search for monic irreducible polynomials over extended Galois Field GF(p^q).
Sankhanil Dey, Amlan Chakrabarti, Ranjan Ghosh
2020/357
Quasigroups and Substitution Permutation Networks: A Failed Experiment
George Teseleanu
2020/356
Efficient MPC with a Mixed Adversary
Martin Hirt, Marta Mularczyk
2020/355
Permissionless Consensus in the Resource Model
Benjamin Terner
2020/354
A Generalization of the ElGamal public-key cryptosystem
Rajitha Ranasinghe, Pabasara Athukorala
2020/353
A Probabilistic Public Key Encryption Scheme Based on Quartic Reciprocity (Draft V1.22)
Robert A. Threlfall
2020/352
Coda: Decentralized Cryptocurrency at Scale
Joseph Bonneau, Izaak Meckler, Vanishree Rao, Evan Shapiro
2020/351
Optimized and secure pairing-friendly elliptic curves suitable for one layer proof composition
Youssef El Housni, Aurore Guillevic
2020/350
New Multi-bit Differentials to Improve Attacks Against ChaCha
Murilo Coutinho, T. C. Souza Neto
2020/349
Differential Power Analysis on (Non-)Linear Feedback Shift Registers
Siang Meng Sim
2020/348
Constructing hidden order groups using genus three Jacobians
Steve Thakur
2020/347
Some Low Round Zero Knowledge Protocols
Hongda Li, Peifang Ni, Dongxue Pan
2020/346
Algebraic Attacks on Round-Reduced Keccak/Xoodoo
Fukang Liu, Takanori Isobe, Willi Meier, Zhonghao Yang
2020/345
Bent functions stemming from Maiorana-McFarland class being provably outside its completed version
Fengrong Zhangand, Nastja Cepak, Enes Pasalic, Yongzhuang Wei
2020/344
Anchoring the Value of Cryptocurrency
Yibin Xu, Yangyu Huang, Jianhua Shao
2020/343
BSC: A Bitcoin Smart Contract Implementation
Hiro Midas
2020/342
Security Assessment of White-Box Design Submissions of the CHES 2017 CTF Challenge
Estuardo Alpirez Bock, Alexander Treff
2020/341
Faster computation of isogenies of large prime degree
Daniel J. Bernstein, Luca De Feo, Antonin Leroux, Benjamin Smith
2020/340
Differential Privacy for Eye Tracking with Temporal Correlations
Efe Bozkir, Onur Gunlu, Wolfgang Fuhl, Rafael F. Schaefer, Enkelejda Kasneci
2020/339
Cracking Matrix Modes of Operation with Goodness-of-Fit Statistics
George Teseleanu
2020/338
Improved Primitives for MPC over Mixed Arithmetic-Binary Circuits
Daniel Escudero, Satrajit Ghosh, Marcel Keller, Rahul Rachuri, Peter Scholl
2020/337
Improved Discrete Gaussian and Subgaussian Analysis for Lattice Cryptography
Nicholas Genise, Daniele Micciancio, Chris Peikert, Michael Walter
2020/336
Gimli Encryption in 715.9 psec
Santosh Ghosh, Michael Kounavis, Sergej Deutsch
2020/335
An n/2 byzantine node tolerated blockchain sharding approach
Yibin Xu, Yangyu Huang
2020/334
4-Uniform Permutations with Null Nonlinearity
Christof Beierle, Gregor Leander
2020/333
A Simpler and Modular Construction of Linkable Ring Signature
Wulu Li, Yongcan Wang, Lei Chen, Xin Lai, Xiao Zhang, Jiajun Xin
2020/332
Implementation Study of Two Verifiable Delay Functions
Vidal Attias, Luigi Vigneri, Vassil Dimitrov
2020/331
The CTR mode with encrypted nonces and its extension to AE
Sergey Agievich
2020/330
Hardness vs. (Very Little) Structure in Cryptography: A Multi-Prover Interactive Proofs Perspective
Gil Segev, Ido Shahaf
2020/329
Asymptotic complexities of discrete logarithm algorithms in pairing-relevant finite fields
Gabrielle De Micheli, Pierrick Gaudry, Cécile Pierrot
2020/328
Weight-Based Nakamoto-Style Blockchains
Simon Holmgaard Kamp, Bernardo Magri, Christian Matt, Jesper Buus Nielsen, Søren Eller Thomsen, Daniel Tschudi
2020/327
On the design of stream ciphers with Cellular Automata having radius = 2
Anita John, Rohit Lakra, Jimmy Jose
2020/326
An upper bound on the decryption failure rate of static-key NewHope
John M. Schanck
2020/325
SmartDHX: Diffie-Hellman Key Exchange with Smart Contracts
Robert Muth, Florian Tschorsch
2020/324
Defeating CAS-Unlock
Bicky Shakya, Xiaolin Xu, Mark Tehranipoor, Domenic Forte
2020/323
A Flexible n/2 Adversary Node Resistant and Halting Recoverable Blockchain Sharding Protocol
Yibin Xu, Yangyu Huang, Jianhua Shao, George Theodorakopoulos
2020/322
Optimal and Error-Free Multi-Valued Byzantine Consensus Through Parallel Execution
Andrew Loveless, Ronald Dreslinski, Baris Kasikci
2020/321
Compact domain-specific co-processor for accelerating module lattice-based key encapsulation mechanism
Jose Maria Bermudo Mera, Furkan Turan, Angshuman Karmakar, Sujoy Sinha Roy, Ingrid Verbauwhede
2020/320
Universally Composable Relaxed Password Authenticated Key Exchange
Michel Abdalla, Manuel Barbosa, Tatiana Bradley, Stanislaw Jarecki, Jonathan Katz, Jiayu Xu
2020/319
Secure k-ish nearest neighbors classifier
Hayim Shaul, Dan Feldman, Daniela Rus
2020/318
Compact Adaptively Secure ABE from k-Lin: Beyond NC1 and towards NL
Huijia Lin, Ji Luo
2020/317
Physical Time-Varying Transfer Functions as Generic Low-Overhead Power-SCA Countermeasure
Archisman Ghosh, Debayan Das, Shreyas Sen
2020/316
Beyond Software Watermarking: Traitor-Tracing for Pseudorandom Functions
Rishab Goyal, Sam Kim, Brent Waters, David J. Wu
2020/315
plookup: A simplified polynomial protocol for lookup tables
Ariel Gabizon, Zachary J. Williamson
2020/314
Proposal of Multivariate Public Key Cryptosystem Based on Modulus of Numerous Prime Numbers and CRT with Security of IND-CPA
Shigeo Tsujii, Ryo Fujita, Masahito Gotaishi
2020/313
Security analysis of SPAKE2+
Victor Shoup
2020/312
Arcturus: efficient proofs for confidential transactions
Sarang Noether
2020/311
A Blockchain Traceable Scheme with Oversight Function
Tianjun Ma, Haixia Xu, Peili Li
2020/310
Wavelet Scattering Transform and Ensemble Methods for Side-Channel Analysis
Gabriel Destouet, Cécile Dumas, Anne Frassati, Valérie Perrier
2020/309
Cryptanalysis Results on Spook
Patrick Derbez, Paul Huynh, Virginie Lallemand, María Naya-Plasencia, Léo Perrin, André Schrottenloher
2020/308
Post-Quantum TLS on Embedded Systems
Kevin Bürstinghaus-Steinbach, Christoph Krauß, Ruben Niederhagen, Michael Schneider
2020/307
Handling vectorial functions by means of their graph indicators
Claude Carlet
2020/306
Leakage Assessment in Fault Attacks: A Deep Learning Perspective
Sayandeep Saha, Manaar Alam, Arnab Bag, Debdeep Mukhopadhyay, Pallab Dasgupta
2020/305
3-Layer Public Key Cryptosystem with Short Tandem Repeat DNA
Shigeo Tsujii, Toshiaki Saisho, Masao Yamasawa, Masahito Gotaishi, Kou Shikata, Koji Sasaki, Nobuharu Suzuki, Masaki Hashiyada
2020/304
Multiparty Homomorphic Encryption from Ring-Learning-With-Errors
Christian Mouchet, Juan Troncoso-Pastoriza, Jean-Philippe Bossuat, Jean-Pierre Hubaux
2020/303
A Quantitative Analysis of Security, Anonymity and Scalability for the Lightning Network
Sergei Tikhomirov, Pedro Moreno-Sanchez, Matteo Maffei
2020/302
Slippery hill-climbing technique for ciphertext-only cryptanalysis of periodic polyalphabetic substitution ciphers
Thomas Kaeding
2020/301
MadHatter: A toy cipher that conceals two plaintexts in the same ciphertext
Thomas Kaeding
2020/300
Secure Multiparty Computation (MPC)
Yehuda Lindell
2020/299
Hydra: Fast Isomorphic State Channels
Manuel M. T. Chakravarty, Sandro Coretti, Matthias Fitzi, Peter Gazi, Philipp Kant, Aggelos Kiayias, Alexander Russell
2020/298
Fast polynomial inversion for post quantum QC-MDPC cryptography
Nir Drucker, Shay Gueron, Dusan Kostic
2020/297
Random Self-reducibility of Ideal-SVP via Arakelov Random Walks
Koen de Boer, Léo Ducas, Alice Pellet-Mary, Benjamin Wesolowski
2020/296
Multidimensional Database Reconstruction from Range Query Access Patterns
Akshima, David Cash, Francesca Falzon, Adam Rivkin, Jesse Stern
2020/295
Generalized Isotopic Shift Construction for APN Functions
Lilya Budaghyan, Marco Calderini, Claude Carlet, Robert Coulter, Irene Villa
2020/294
Public-Key Generation with Verifiable Randomness
Olivier Blazy, Patrick Towa, Damien Vergnaud
2020/293
Many-out-of-Many Proofs and Applications to Anonymous Zether
Benjamin E. Diamond
2020/292
LWE with Side Information: Attacks and Concrete Security Estimation
Dana Dachman-Soled, Léo Ducas, Huijing Gong, Mélissa Rossi
2020/291
Unforgeability in the quantum world
Myrto Arapinis, Mahshid Delavar, Mina Doosti, Elham Kashefi
2020/290
Linear Cryptanalysis of Reduced-Round SIMON Using Super Rounds
Reham Almukhlifi, Poorvi Vora
2020/289
The security of Groups of Unknown Order based on Jacobians of Hyperelliptic Curves
Jonathan Lee
2020/288
Secure Key-Alternating Feistel Ciphers Without Key Schedule
Yaobin Shen, Hailun Yan, Lei Wang, Xuejia Lai
2020/287
Private resource allocators and their applications
Sebastian Angel, Sampath Kannan, Zachary Ratliff
2020/286
Shorter Non-Interactive Zero-Knowledge Arguments and ZAPs for Algebraic Languages
Geoffroy Couteau, Dominik Hartmann
2020/285
Improved Security Bounds for Generalized Feistel Networks
Yaobin Shen, Chun Guo, Lei Wang
2020/284
Database Reconstruction Attacks in Two Dimensions
Evangelia Anna Markatou, Roberto Tamassia
2020/283
CryptoWills: How to Bequeath Cryptoassets
István András Seres, Omer Shlomovits, Pratyush Ranjan Tiwari
2020/282
The Measure-and-Reprogram Technique 2.0: Multi-Round Fiat-Shamir and More
Jelle Don, Serge Fehr, Christian Majenz
2020/281
Privacy-friendly Monero transaction signing on a hardware wallet, extended version
Dusan Klinec Vashek Matyas
2020/280
Leakage-Resilient Authenticated Encryption from Leakage-Resilient Pseudorandom Functions
Juliane Krämer, Patrick Struck
2020/279
Impact of System-on-Chip Integration of AEAD Ciphers
Shashank Raghuraman, Leyla Nazhandali
2020/278
MIRAGE: Succinct Arguments for Randomized Algorithms with Applications to Universal zk-SNARKs
Ahmed Kosba, Dimitrios Papadopoulos, Charalampos Papamanthou, Dawn Song
2020/277
How Does Nakamoto Set His Clock? Full Analysis of Nakamoto Consensus in Bounded-Delay Networks
Juan A. Garay, Aggelos Kiayias, Nikos Leonardos
2020/276
CryptoPIM: In-memory Acceleration for Lattice-based Cryptographic Hardware
Hamid Nejatollahi, Saransh Gupta, Mohsen Imani, Tajana Simunic Rosing, Rosario Cammarota, Nikil Dutt
2020/275
Pholkos -- Efficient Large-state Tweakable Block Ciphers from the AES Round Function
Jannis Bossert, Eik List, Stefan Lucks, Sebastian Schmitz
2020/274
An Optimal Relational Database Encryption Scheme
Seny Kamara, Tarik Moataz, Stan Zdonik, Zheguang Zhao
2020/273
On the Fast Algebraic Immunity of Threshold Functions
Pierrick Méaux
2020/272
Privacy-Preserving Fast and Exact Linear Equations Solver with Fully Homomorphic Encryption
Keita Arimitsu, Kazuki Otsuka
2020/271
Signatures from Sequential-OR Proofs
Marc Fischlin, Patrick Harasser, Christian Janson
2020/270
Practical Predicate Encryption for Inner Product
Yi-Fan Tseng, Zi-Yuan Liu, Raylin Tso
2020/269
Order-Fairness for Byzantine Consensus
Mahimna Kelkar, Fan Zhang, Steven Goldfeder, Ari Juels
2020/268
Time-memory trade-off in Toom-Cook multiplication: an application to module-lattice based cryptography
Jose Maria Bermudo Mera, Angshuman Karmakar, Ingrid Verbauwhede
2020/267
Differential Power Analysis of the Picnic Signature Scheme
Tim Gellersen, Okan Seker, Thomas Eisenbarth
2020/266
Quantum Indistinguishability for Public Key Encryption
Tommaso Gagliardoni, Juliane Krämer, Patrick Struck
2020/265
New Constructions of Statistical NIZKs: Dual-Mode DV-NIZKs and More
Benoît Libert, Alain Passelègue, Hoeteck Wee, David J. Wu
2020/264
Plaintext Recovery Attacks against Linearly Decryptable Fully Homomorphic Encryption Schemes
Nicholas Mainardi, Alessandro Barenghi, Gerardo Pelosi
2020/263
FPL: White-Box Secure Block Cipher Using Parallel Table Look-Ups
Jihoon Kwon, Byeonghak Lee, Jooyoung Lee, Dukjae Moon
2020/262
A Note on the Ending Elliptic Curve in SIDH
Christopher Leonardi
2020/261
Foxtail+: A Learning with Errors-based Authentication Protocol for Resource-Constrained Devices
Matthieu Monteiro, Kumara Kahatapitiya, Hassan Jameel Asghar, Kanchana Thilakarathna, Thierry Rakotoarivelo, Dali Kaafar, Shujun Li, Ron Steinfeld, Josef Pieprzyk
2020/260
Lattice-based (Partially) Blind Signature without Restart
Samuel Bouaziz-Ermann, Sébastien Canard, Gautier Eberhart, Guillaume Kaim, Adeline Roux-Langlois, Jacques Traoré
2020/259
Computational and Information-Theoretic Two-Source (Non-Malleable) Extractors
Divesh Aggarwal, Maciej Obremski, João Ribeiro, Mark Simkin, Luisa Siniscalchi
2020/258
NIZK from LPN and Trapdoor Hash via Correlation Intractability for Approximable Relations
Zvika Brakerski, Venkata Koppula, Tamer Mour
2020/257
Biometric and Physical Identifiers with Correlated Noise for Controllable Private Authentication
Onur Gunlu, Rafael F. Schaefer, H. Vincent Poor
2020/256
Statistical ZAPR Arguments from Bilinear Maps
Alex Lombardi, Vinod Vaikuntanathan, Daniel Wichs
2020/255
Novel Deception Techniques for Malware Detection on Industrial Control Systems
Takanori Machida, Dai Yamamoto, Yuki Unno, Hisashi Kojima
2020/254
Formalizing Data Deletion in the Context of the Right to be Forgotten
Sanjam Garg, Shafi Goldwasser, Prashant Nalini Vasudevan
2020/253
Black-box use of One-way Functions is Useless for Optimal Fair Coin-Tossing
Hemanta K. Maji, Mingyuan Wang
2020/252
Secure Non-interactive Simulation: Feasibility & Rate
Hamidreza Amini Khorasgani, Hemanta K. Maji, Hai H. Nguyen
2020/251
Communication Lower Bounds for Perfect Maliciously Secure MPC
Ivan Damgård, Nikolaj I. Schwartzbach
2020/250
On a Side Channel and Fault Attack Concurrent Countermeasure Methodology for MCU-based Byte-sliced Cipher Implementations
Ehsan Aerabi, Athanasios Papadimitriou, David Hely
2020/249
CONFISCA : an SIMD-based CONcurrent FI and SCA countermeasure with switchable performance and security modes
Ehsan Aerabi, Cyril Bresch, David Hély, Athanasios Papadimitriou, Mahdi Fazeli
2020/248
Blinder: MPC Based Scalable and Robust Anonymous Committed Broadcast
Ittai Abraham, Benny Pinkas, Avishay Yanai
2020/247
Crooked Indifferentiability Revisited
Rishiraj Bhattacharyya, Mridul Nandi, Anik Raychaudhuri
2020/246
Ultra-Fast Modular Multiplication Implementation for Isogeny-Based Post-Quantum Cryptography
Jing Tian, Jun Lin, Zhongfeng Wang
2020/245
New Assumptions and Efficient Cryptosystems from the $e$-th Power Residue Symbol
Xiaopeng Zhao, Zhenfu Cao, Xiaolei Dong, Jun Shao, Licheng Wang, Zhusen Liu
2020/244
On Adaptive Attacks against Jao-Urbanik’s Isogeny-Based Protocol
Andrea Basso, Péter Kutas, Simon-Philipp Merz, Christophe Petit, Charlotte Weitkämper
2020/243
An Analysis of Hybrid Public Key Encryption
Benjamin Lipp
2020/242
Practical and Secure Circular Range Search on Private Spatial Data
Zhihao Zheng, Jiachen Shen, Zhenfu Cao
2020/241
Separate Your Domains: NIST PQC KEMs, Oracle Cloning and Read-Only Indifferentiability
Mihir Bellare, Hannah Davis, Felix Günther
2020/240
MPC for MPC: Secure Computation on a Massively Parallel Computing Architecture
T-H. Hubert Chan, Kai-Min Chung, Wei-Kai Lin, Elaine Shi
2020/239
Viktoria: A new Paradigm for Hash Functions
Edimar Veríssimo
2020/238
Efficient ECM factorization in parallel with the Lyness map
Andrew Hone
2020/237
On Security Notions for Encryption in a Quantum World
Céline Chevalier, Ehsan Ebrahimi, Quoc-Huy Vu
2020/236
Mind the Composition: Birthday Bound Attacks on EWCDMD and SoKAC21
Mridul Nandi
2020/235
Statistical Zaps and New Oblivious Transfer Protocols
Vipul Goyal, Abhishek Jain, Zhengzhong Jin, Giulio Malavolta
2020/234
Application of commutator subgroups of Sylow 2-subgroups of alternating group and Miller-Moreno groups to Key Exchange Protocol
Ruslan V. Skuratovskii, Aled Williams
2020/233
Key-Homomorphic Pseudorandom Functions from LWE with a Small Modulus
Sam Kim
2020/232
Combiners for AEAD
Bertram Poettering, Paul Rösler
2020/231
Unbounded Dynamic Predicate Compositions in ABE from Standard Assumptions
Nuttapong Attrapadung, Junichi Tomida
2020/230
Lattice analysis on MiNTRU problem
Changmin Lee, Alexandre Wallet
2020/229
Tight Time-Space Lower Bounds for Finding Multiple Collision Pairs and Their Applications
Itai Dinur
2020/228
Optimal Broadcast Encryption from Pairings and LWE
Shweta Agrawal, Shota Yamada
2020/227
About the Tu-Deng Conjecture for $\w(t)$ Less Than or Equal to 10
Yindong Chen, Limin Lin, Chuliang Wei
2020/226
Multivariate Polynomial and Exponential Mappings based Password Authentication Protocol
Meher Krishna Duggirala, Ravi Duggirala, Krishna Subba Rao Pulugurtha
2020/225
Generic-Group Delay Functions Require Hidden-Order Groups
Lior Rotem, Gil Segev, Ido Shahaf
2020/224
Security under Message-Derived Keys: Signcryption in iMessage
Mihir Bellare, Igors Stepanovs
2020/223
Compact NIZKs from Standard Assumptions on Bilinear Maps
Shuichi Katsumata, Ryo Nishimaki, Shota Yamada, Takashi Yamakawa
2020/222
Improving Speed and Security in Updatable Encryption Schemes
Dan Boneh, Saba Eskandarian, Sam Kim, Maurice Shih
2020/221
Multiparty Reusable Non-Interactive Secure Computation
Fabrice Benhamouda, Huijia Lin
2020/220
Remote Side-Channel Attacks on Anonymous Transactions
Florian Tramèr, Dan Boneh, Kenneth G. Paterson
2020/219
Multi-Client Functional Encryption for Separable Functions
Michele Ciampi, Luisa Siniscalchi, Hendrik Waldner
2020/218
Design Space Exploration for Ultra-Low Energy and Secure IoT MCUs
Ehsan Aerabi, Milad Bohlouli, MohammadHasan Ahmadi Livany, Mahdi Fazeli, Athanasios Papadimitriou, David Hely
2020/217
SynFi: Automatic Synthetic Fingerprint Generation
M. Sadegh Riazi, Seyed M. Chavoshian, Farinaz Koushanfar
2020/216
Black-Box Constructions of Bounded-Concurrent Secure Computation
Sanjam Garg, Xiao Liang, Omkant Pandey, Ivan Visconti
2020/215
Cryptographic Shallots: A Formal Treatment of Repliable Onion Encryption
Megumi Ando, Anna Lysyanskaya
2020/214
Thresholdizing HashEdDSA: MPC to the Rescue
Charlotte Bonte, Nigel P. Smart, Titouan Tanguy
2020/213
Finding Hash Collisions with Quantum Computers by Using Differential Trails with Smaller Probability than Birthday Bound
Akinori Hosoyamada, Yu Sasaki
2020/212
Isogenies of certain abelian varieties over finite fields with p-ranks zero
Steve Thakur
2020/211
Mode-Level vs. Implementation-Level Physical Security in Symmetric Cryptography: A Practical Guide Through the Leakage-Resistance Jungle
Davide Bellizia, Olivier Bronchain, Gaëtan Cassiers, Vincent Grosso, Chun Guo, Charles Momin, Olivier Pereira, Thomas Peters, François-Xavier Standaert
2020/210
SITM: See-In-The-Middle--Side-Channel Assisted Middle Round Differential Cryptanalysis on SPN Block Ciphers
Shivam Bhasin, Jakub Breier, Xiaolu Hou, Dirmanto Jap, Romain Poussier, Siang Meng Sim
2020/209
Adaptive Simulation Security for Inner Product Functional Encryption
Shweta Agrawal, Benoît Libert, Monosij Maitra, Radu Titiu
2020/208
Random Integer Lattice Generation via HNF
Gengran Hu, Lin You, Liqin Hu, Hui Wang
2020/207
(Public) Verifiability For Composable Protocols Without Adaptivity Or Zero-Knowledge
Carsten Baum, Bernardo David, Rafael Dowsley
2020/206
A Post-Quantum Non-Interactive Key-Exchange Protocol from Coding Theory
Jean-Francois Biasse, Giacomo Micheli, Edoardo Persichetti, Paolo Santini
2020/205
SodsBC: A Post-quantum by Design Asynchronous Blockchain Framework
Shlomi Dolev, Bingyong Guo, Jianyu Niu, Ziyu Wang
2020/204
Cryptographic Reverse Firewalls for Interactive Proof Systems
Chaya Ganesh, Bernardo Magri, Daniele Venturi
2020/203
MACAO: A Maliciously-Secure and Client-Efficient Active ORAM Framework
Thang Hoang, Jorge Guajardo, Attila A. Yavuz
2020/202
Strong Anti-SAT: Secure and Effective Logic Locking
Yuntao Liu, Michael Zuzak, Yang Xie, Abhishek Chakraborty, Ankur Srivastava
2020/201
A Survey on Neural Trojans
Yuntao Liu, Ankit Mondal, Abhishek Chakraborty, Michael Zuzak, Nina Jacobsen, Daniel Xing, Ankur Srivastava
2020/200
Leakage and Tamper Resilient Permutation-Based Cryptography
Christoph Dobraunig, Bart Mennink, Robert Primas
2020/199
Improvement on a Masked White-box Cryptographic Implementation
Seungkwang Lee, Myungchul Kim
2020/198
MPSign: A Signature from Small-Secret Middle-Product Learning with Errors
Shi Bai, Dipayan Das, Ryo Hiromasa, Miruna Rosca, Amin Sakzad, Damien Stehlé, Ron Steinfeld, Zhenfei Zhang
2020/197
Dynamic Decentralized Functional Encryption
Jérémy Chotard, Edouard Dufour-Sans, Romain Gay, Duong Hieu Phan, David Pointcheval
2020/196
Trustless unknown-order groups
Samuel Dobson, Steven D. Galbraith, Benjamin Smith
2020/195
Replicated state machines without replicated execution
Jonathan Lee, Kirill Nikitin, Srinath Setty
2020/194
Adaptively Secure ABE for DFA from k-Lin and More
Junqing Gong, Hoeteck Wee
2020/193
PSI from PaXoS: Fast, Malicious Private Set Intersection
Benny Pinkas, Mike Rosulek, Ni Trieu, Avishay Yanai
2020/192
Certificateless Homomorphic Signature Scheme for Network Coding
Jinyong Chang, Bilin Shao, Yanyan Ji, Genqing Bian
2020/191
Lattice-Inspired Broadcast Encryption and Succinct Ciphertext-Policy ABE
Zvika Brakerski, Vinod Vaikuntanathan
2020/190
Proof of Necessary Work: Succinct State Verification with Fairness Guarantees
Assimakis Kattis, Joseph Bonneau
2020/189
Guaranteed Output Delivery Comes Free in Honest Majority MPC
Vipul Goyal, Yifan Song, Chenzhi Zhu
2020/188
Out of Oddity -- New Cryptanalytic Techniques against Symmetric Primitives Optimized for Integrity Proof Systems
Tim Beyne, Anne Canteaut, Itai Dinur, Maria Eichlseder, Gregor Leander, Gaëtan Leurent, María Naya-Plasencia, Léo Perrin, Yu Sasaki, Yosuke Todo, Friedrich Wiemer
2020/187
Committing to Quantum Resistance, Better: A Speed–and–Risk–Configurable Defence for Bitcoin against a Fast Quantum Computing Attack
Dragos Ioan Ilie, William J. Knottenbelt, Iain Stewart
2020/186
Bitcoin Crypto–Bounties for Quantum Capable Adversaries
Dragos Ioan Ilie, Kostis Karantias, William J. Knottenbelt
2020/185
Hardware Private Circuits: From Trivial Composition to Full Verification
Gaëtan Cassiers, Benjamin Grégoire, Itamar Levi, François-Xavier Standaert
2020/184
Fair and Decentralized Exchange of Digital Goods
Ariel Futoransky, Carlos Sarraute, Daniel Fernandez, Matias Travizano, Ariel Waissbein
2020/183
A note on secure multiparty computation via higher residue symbols
Ignacio Cascudo, Reto Schnyder
2020/182
An Algebraic Attack on Ciphers with Low-Degree Round Functions: Application to Full MiMC
Maria Eichlseder, Lorenzo Grassi, Reinhard Lüftenegger, Morten Øygarden, Christian Rechberger, Markus Schofnegger, Qingju Wang
2020/181
$L_1$-Norm Ball for CSIDH: Optimal Strategy for Choosing the Secret Key Space
Kohei Nakagawa, Hiroshi Onuki, Atsushi Takayasu, Tsuyoshi Takagi
2020/180
Multi-key Fully-Homomorphic Encryption in the Plain Model
Prabhanjan Ananth, Abhishek Jain, ZhengZhong Jin, Giulio Malavolta
2020/179
Mind the Middle Layer: The HADES Design Strategy Revisited
Nathan Keller, Asaf Rosemarin
2020/178
A >100 Gbps Inline AES-GCM Hardware Engine and Protected DMA Transfers between SGX Enclave and FPGA Accelerator Device
Santosh Ghosh, Luis S Kida, Soham Jayesh Desai, Reshma Lal
2020/177
Revisiting (R)CCA Security and Replay Protection
Christian Badertscher, Ueli Maurer, Christopher Portmann, Guilherme Rito
2020/176
Do not tell me what I cannot do! (The constrained device shouted under the cover of the fog): Implementing Symmetric Searchable Encryption on Constrained Devices (Extended Version)
Eugene Frimpong, Alexandros Bakas, Hai-Van Dang, Antonis Michalas
2020/175
Lower Bounds for Off-Chain Protocols: Exploring the Limits of Plasma
Stefan Dziembowski, Grzegorz Fabiański, Sebastian Faust, Siavash Riahi
2020/174
On Selective-Opening Security of Deterministic Primitives
Mohammad Zaheri, Adam O'Neill
2020/173
Securing Proof-of-Work Ledgers via Checkpointing
Dimitris Karakostas, Aggelos Kiayias
2020/172
Qubit-based Unclonable Encryption with Key Recycling
Daan Leermakers, Boris Skoric
2020/171
High Performance Logistic Regression for Privacy-Preserving Genome Analysis
Martine De Cock, Rafael Dowsley, Anderson C. A. Nascimento, Davis Railsback, Jianwei Shen, Ariel Todoki
2020/170
Reusable Two-Round MPC from DDH
James Bartusek, Sanjam Garg, Daniel Masny, Pratyay Mukherjee
2020/169
Multiparty Homomorphic Encryption (or: On Removing Setup in Multi-Key FHE)
Prabhanjan Ananth, Abhishek Jain, Zhengzhong Jin
2020/168
Improved Classical and Quantum Algorithms for Subset-Sum
Xavier Bonnetain, Rémi Bricout, André Schrottenloher, Yixin Shen
2020/167
Turbo-Aggregate: Breaking the Quadratic Aggregation Barrier in Secure Federated Learning
Jinhyun So, Basak Guler, A. Salman Avestimehr
2020/166
Non Atomic Payment Splitting in Channel Networks
Stefan Dziembowski, Paweł Kędzior
2020/165
Subsampling and Knowledge Distillation On Adversarial Examples: New Techniques for Deep Learning Based Side Channel Evaluations
Aron Gohr, Sven Jacob, Werner Schindler
2020/164
From discrete-log to lattices: maybe the real lessons were our broken schemes along the way?
Alex Bienstock, Allison Bishop, Eli Goldin, Garrison Grogan, Victor Lecomte
2020/163
Impossibility Results for Lattice-Based Functional Encryption Schemes
Akin Ünal
2020/162
A Secret-Sharing Based MPC Protocol for Boolean Circuits with Good Amortized Complexity
Ignacio Cascudo, Jaron Skovsted Gundersen
2020/161
Pushing the Limits of Valiant's Universal Circuits: Simpler, Tighter and More Compact
Hanlin Liu, Yu Yu, Shuoyao Zhao, Jiang Zhang, Wenling Liu, Zhenkai Hu
2020/160
Solving Some Affine Equations over Finite Fields
Sihem Mesnager, Kwang Ho Kim, Jong Hyok Choe, Dok Nam Lee
2020/159
Privacy-preserving collaborative machine learning on genomic data using TensorFlow
Cheng Hong, Zhicong Huang, Wen-jie Lu, Hunter Qu, Li Ma, Morten Dahl, Jason Mancuso
2020/158
Jump index in T-functions for designing a new basic structure of stream ciphers
Ali Hadipour, Seyed Mahdi Sajadieh, Raheleh Afifi
2020/157
Multi-Source Non-Malleable Extractors and Applications
Vipul Goyal, Akshayaram Srinivasan, Chenzhi Zhu
2020/156
Phantom: An Efficient Privacy Protocol Using zk-SNARKs Based on Smart Contracts
Xing Li, Yi Zheng, Kunxian Xia, Tongcheng Sun, John Beyler
2020/155
Low Latency Privacy-preserving Outsourcing of Deep Neural Network Inference
Yifan Tian, Laurent Njilla, Jiawei Yuan, Shucheng Yu
2020/154
Combiners for Functional Encryption, Unconditionally
Aayush Jain, Nathan Manohar, Amit Sahai
2020/153
Constructing Secure Multi-Party Computation with Identifiable Abort
Nicholas Brandt, Sven Maier, Tobias Müller, and Jörn Müller-Quade
2020/152
Compressed $\Sigma$-Protocol Theory and Practical Application to Plug & Play Secure Algorithmics
Thomas Attema, Ronald Cramer
2020/151
Breaking the decisional Diffie-Hellman problem for class group actions using genus theory -- extended version
Wouter Castryck, Jana Sotáková, Frederik Vercauteren
2020/150
On the Security of NTS-KEM in the Quantum Random Oracle Model
Varun Maram
2020/149
Incrementally Aggregatable Vector Commitments and Applications to Verifiable Decentralized Storage
Matteo Campanelli, Dario Fiore, Nicola Greco, Dimitris Kolonelos, Luca Nizzardo
2020/148
Determining the Core Primitive for Optimally Secure Ratcheting
Fatih Balli, Paul Rösler, Serge Vaudenay
2020/147
Non-Malleability against Polynomial Tampering
Marshall Ball, Eshan Chattopadhyay, Jyun-Jie Liao, Tal Malkin, Li-Yang Tan
2020/146
Hierarchical Identity-Based Encryption with Tight Multi-Challenge Security
Roman Langrehr, Jiaxin Pan
2020/145
Self-Secured PUF: Protecting the Loop PUF by Masking
Lars Tebelmann, Jean-Luc Danger, Michael Pehl
2020/144
Double-Base Chains for Scalar Multiplications on Elliptic Curves
Wei Yu, Saud Al Musa, Bao Li
2020/143
Impersonation Attacks on Lightweight Anonymous Authenticated Key Exchange Scheme for IoT
Hailong Yao, Caifen Wang, Xingbing Fu, Chao Liu, Bin Wu, Fagen Li
2020/142
TARDIGRADE: An Atomic Broadcast Protocol for Arbitrary Network Conditions
Erica Blum, Jonathan Katz, Julian Loss
2020/141
Deterministic-Prover Zero-Knowledge Proofs
Hila Dahari, Yehuda Lindell
2020/140
PAKEs: New Framework, New Techniques and More Efficient Lattice-Based Constructions in the Standard Model
Shaoquan Jiang, Guang Gong, Jingnan He, Khoa Nguyen, Huaxiong Wang
2020/139
Going Beyond Dual Execution: MPC for Functions with Efficient Verification
Carmit Hazay, abhi shelat, Muthuramakrishnan Venkitasubramaniam
2020/138
Smart Contract Derivatives
Kostis Karantias, Aggelos Kiayias, Dionysis Zindros
2020/137
Consistency for Functional Encryption
Christian Badertscher, Aggelos Kiayias, Markulf Kohlweiss, Hendrik Waldner
2020/136
Stacked Garbling for Disjunctive Zero-Knowledge Proofs
David Heath, Vladimir Kolesnikov
2020/135
Threshold Ring Signatures: New Definitions and Post-Quantum Security
Abida Haque, Alessandra Scafuro
2020/134
Malicious Security Comes Free in Honest-Majority MPC
Vipul Goyal, Yifan Song
2020/133
Efficient and Fair Multiparty Protocols using Blockchain and Trusted Hardware
Souradyuti Paul, Ananya Shrivastava
2020/132
Boosting Verifiable Computation on Encrypted Data
Dario Fiore, Anca Nitulescu, David Pointcheval
2020/131
Coin Tossing with Lazy Defense: Hardness of Computation Results
Hamidreza Amini Khorasgani, Hemanta K. Maji, Mingyuan Wang
2020/130
Breaking the $O(\sqrt n)$-Bit Barrier: Byzantine Agreement with Polylog Bits Per Party
Elette Boyle, Ran Cohen, and Aarushi Goel
2020/129
Encryption Schemes using Random Oracles: from Classical to Post-Quantum Security
Juliane Krämer, Patrick Struck
2020/128
LegRoast: Efficient post-quantum signatures from the Legendre PRF
Ward Beullens and Cyprien Delpech de Saint Guilhem
2020/127
Fifty Shades of Ballot Privacy: Privacy against a Malicious Board
Véronique Cortier, Joseph Lallemand, Bogdan Warinschi
2020/126
Public-Key Puncturable Encryption: Modular and Compact Constructions
Shi-Feng Sun, Amin Sakzad, Ron Steinfeld, Joseph Liu, Dawu Gu
2020/125
Oblivious Parallel Tight Compaction
Gilad Asharov, Ilan Komargodski, Wei-Kai Lin, Enoch Peserico, Elaine Shi
2020/124
Lossy CSI-FiSh: Efficient Signature Scheme with Tight Reduction to Decisional CSIDH-512
Ali El Kaafarani, Shuichi Katsumata, Federico Pintore
2020/123
Zendoo: a zk-SNARK Verifiable Cross-Chain Transfer Protocol Enabling Decoupled and Decentralized Sidechains
Alberto Garoffolo, Dmytro Kaidalov, and Roman Oliynykov
2020/122
Verifiable Inner Product Encryption Scheme
Najmeh Soroush, Vincenzo Iovino, Alfredo Rial, Peter B. Roenne, Peter Y. A. Ryan
2020/121
When HEAAN Meets FV: a New Somewhat Homomorphic Encryption with Reduced Memory Overhead
Hao Chen, Ilia Iliashenko, Kim Laine
2020/120
The randomized slicer for CVPP: sharper, faster, smaller, batchier
Léo Ducas, Thijs Laarhoven, Wessel P. J. van Woerden
2020/119
Hardness of LWE on General Entropic Distributions
Zvika Brakerski, Nico Döttling
2020/118
InfoCommit: Information-Theoretic Polynomial Commitment and Verification
Saeid Sahraei, Salman Avestimehr
2020/117
Efficient BIKE Hardware Design with Constant-Time Decoder
Andrew Reinders, Rafael Misoczki, Santosh Ghosh, Manoj Sastry
2020/116
Separating Two-Round Secure Computation from Oblivious Transfer
Benny Applebaum, Zvika Brakerski, Sanjam Garg, Yuval Ishai, Akshayaram Srinivasan
2020/115
A Verifiable and Practical Lattice-Based Decryption Mix Net with External Auditing
Xavier Boyen, Thomas Haines, Johannes Mueller
2020/114
A Security Model and Fully Verified Implementation for the IETF QUIC Record Layer
Antoine Delignat-Lavaud, Cédric Fournet, Bryan Parno, Jonathan Protzenko, Tahina Ramananandro, Jay Bosamiya, Joseph Lallemand, Itsaka Rakotonirina, Yi Zhou
2020/113
New Discrete Logarithm Computation for the Medium Prime Case Using the Function Field Sieve
Madhurima Mukhopadhyay, Palash Sarkar, Shashank Singh, Emmanuel Thome
2020/112
A Detailed Report on the Overhead of Hardware APIs for Lightweight Cryptography
Patrick Karl, Michael Tempelmeier
2020/111
Adaptively Secure Constrained Pseudorandom Functions in the Standard Model
Alex Davidson, Shuichi Katsumata, Ryo Nishimaki, Shota Yamada, Takashi Yamakawa
2020/110
Blazing Fast OT for Three-Round UC OT Extension
Ran Canetti, Pratik Sarkar, Xiao Wang
2020/109
Fixing the Achilles Heel of E-Voting: The Bulletin Board
Lucca Hirschi, Lara Schmid, David Basin
2020/108
Practical Forgeries for ORANGE
Christoph Dobraunig, Florian Mendel, Bart Mennink
2020/107
One-shot Signatures and Applications to Hybrid Quantum/Classical Authentication
Ryan Amos, Marios Georgiou, Aggelos Kiayias, Mark Zhandry
2020/106
Relaxed freshness in component authentication
Frank Schuhmacher
2020/105
MCU intrinsic group features for component authentication
Frank Schuhmacher
2020/104
On the Security Goals of White-Box Cryptography
Estuardo Alpirez Bock, Alessandro Amadori, Chris Brzuska, Wil Michiels
2020/103
Improved Related-Tweakey Rectangle Attacks on Reduced-round Deoxys-BC-384 and Deoxys-I-256-128
Boxin Zhao, Xiaoyang Dong, Keting Jia, Willi Meier
2020/102
New Related-Tweakey Boomerang and Rectangle Attacks on Deoxys-BC Including BDT Effect
Boxin Zhao, Xiaoyang Dong, Keting Jia
2020/101
A Survey of Subscription Privacy on the 5G Radio Interface - The Past, Present and Future
Haibat Khan, Keith M. Martin
2020/100
A direct proof of APN-ness of the Kasami functions
Claude Carlet, Kwang Ho Kim, Sihem Mesnager
2020/099
Many a Mickle Makes a Muckle: A Framework for Provably Quantum-Secure Hybrid Key Exchange
Benjamin Dowling, Torben Brandt Hansen, Kenneth G. Paterson
2020/098
Improved key recovery on the Legendre PRF
Novak Kaluđerović, Thorsten Kleinjung, Dusan Kostic
2020/097
Research on OpenSSL Elliptic Curves for Compliance with the Russian National Digital Signature Standard
Stanislav S. Malakhov
2020/096
Fully Distributed Verifiable Random Functions and their Application to Decentralised Random Beacons
David Galindo, Jia Liu, Mihai Ordean, Jin-Mann Wong
2020/095
SCloud: Public Key Encryption and Key Encapsulation Mechanism Based on Learning with Errors
Zhongxiang Zheng, Anyu Wang, Haining Fan, Chunhuan Zhao, Chao Liu, Xue Zhang
2020/094
On the Profitability of Selfish Mining Against Multiple Difficulty Adjustment Algorithms
Michael Davidson, Tyler Diamond
2020/093
A New Paradigm for Public-Key Functional Encryption for Degree-2 Polynomials
Romain Gay
2020/092
Overcoming Impossibility Results in Composable Security using Interval-Wise Guarantees
Daniel Jost, Ueli Maurer
2020/091
Enabling Faster Operations for Deeper Circuits in Full RNS Variants of FV-like Somewhat Homomorphic Encryption
Jonathan Takeshita, Matthew Schoenbauer, Ryan Karl, Taeho Jung
2020/090
Witness Maps and Applications
Suvradip Chakraborty, Manoj Prabhakaran, Daniel Wichs
2020/089
The MILP-Aided Conditional Differential Attack and Its Application to Trivium
Chen-Dong Ye, Tian Tian, Fan-Yang Zeng
2020/088
Streamlet: Textbook Streamlined Blockchains
Benjamin Y Chan, Elaine Shi
2020/087
Streamlined Blockchains: A Simple and Elegant Approach (A Tutorial and Survey)
Elaine Shi
2020/086
Bootstrapping in FHEW-like Cryptosystems
Daniele Micciancio and Yuriy Polyakov
2020/085
Phantom of the ADAS: Phantom Attacks on Driver-Assistance Systems
Ben Nassi, Dudi Nassi, Raz Ben-Netanel, Yisroel Mirsky, Oleg Drokin, Yuval Elovici
2020/084
Bandwidth-efficient threshold EC-DSA
Guilhem Castagnos, Dario Catalano, Fabien Laguillaumie, Federico Savasta, Ida Tucker
2020/083
Metal: A Metadata-Hiding File-Sharing System
Weikeng Chen, Raluca Ada Popa
2020/082
Random Walks and Concurrent Zero-Knowledge
Anand Aiyer, Xiao Liang, Nilu Nalini, Omkant Pandey
2020/081
Efficient polynomial commitment schemes for multiple points and polynomials
Dan Boneh, Justin Drake, Ben Fisch, Ariel Gabizon
2020/080
Better Secret-Sharing via Robust Conditional Disclosure of Secrets
Benny Applebaum, Amos Beimel, Oded Nir, and Naty Peter
2020/079
Exploring HTTPS Security Inconsistencies: A Cross-Regional Perspective
Eman Salem Alashwali, Pawel Szalachowski, Andrew Martin
2020/078
Quantum Random Number Generation with the Superconducting Quantum Computer IBM 20Q Tokyo
Kentaro Tamura, Yutaka Shikano
2020/077
Improved Quantum Circuits for Elliptic Curve Discrete Logarithms
Thomas Häner, Samuel Jaques, Michael Naehrig, Martin Roetteler, Mathias Soeken
2020/076
Wyner-Ziv reconciliation for key exchange based on Ring-LWE
Charbel Saliba, Laura Luzzi, Cong Ling
2020/075
Memory-Tight Reductions for Practical Key Encapsulation Mechanisms
Rishiraj Bhattacharyya
2020/074
Rolling up sleeves when subversion's in a field?
Daniel R. L. Brown
2020/073
Anonymous Symmetric-Key Communication
Fabio Banfi, Ueli Maurer
2020/072
Anonymous Tokens with Private Metadata Bit
Ben Kreuter, Tancrède Lepoint, Michele Orrù, Mariana Raykova
2020/071
Post-Quantum Authentication in TLS 1.3: A Performance Study
Dimitrios Sikeridis, Panos Kampanakis, Michael Devetsikiotis
2020/070
On Instantiating the Algebraic Group Model from Falsifiable Assumptions
Thomas Agrikola, Dennis Hofheinz, Julia Kastner
2020/069
RSA and redactable blockchains
Dima Grigoriev, Vladimir Shpilrain
2020/068
Further Clarification on Mantin's Digraph Repetition Bias in RC4
Pranab Chakraborty, Subhamoy Maitra
2020/067
Daence: Salsa20 and ChaCha in Deterministic Authenticated Encryption with no noNCEnse
Taylor R Campbell
2020/066
Talek: Private Group Messaging with Hidden Access Patterns
Raymond Cheng, William Scott, Elisaweta Masserova, Irene Zhang, Vipul Goyal, Thomas Anderson, Arvind Krishnamurthy, Bryan Parno
2020/065
A Performant, Misuse-Resistant API for Primality Testing
Jake Massimo, Kenneth G. Paterson
2020/064
Dual System in Lattice: Fully Secure ABE from LWE Assumption
Geng Wang, Ming Wan, Zhen Liu, Dawu Gu
2020/063
Attack on LAC Key Exchange in Misuse Situation
Aurelien Greuet, Simon Montoya, Guenael Renault
2020/062
Lift-and-Shift: Obtaining Simulation Extractable Subversion and Updatable SNARKs Generically
Behzad Abdolmaleki, Sebastian Ramacher, Daniel Slamanig
2020/061
Simple Schnorr Signature with Pedersen Commitment as Key
Gary Yu
2020/060
Auditable Asymmetric Password Authenticated Public Key Establishment
Antonio Faonio, Maria Isabel Gonzalez Vasco, Claudio Soriente, Hien Thi Thu Truong
2020/059
ARX-KW, a family of key wrapping constructions using SipHash and ChaCha
Satō Shinichi
2020/058
Learning when to stop: a mutual information approach to fight overfitting in profiled side-channel analysis
Guilherme Perin, Ileana Buhan, Stjepan Picek
2020/057
On the smoothing parameter and last minimum of random orthogonal lattices
Elena Kirshanova, Huyen Nguyen, Damien Stehlé, Alexandre Wallet
2020/056
AKCN-E8: Compact and Flexible KEM from Ideal Lattice
Zhengzhong JIn, Yunlei Zhao
2020/055
When one vulnerable primitive turns viral: Novel single-trace attacks on ECDSA and RSA
Alejandro Cabrera Aldaya, Billy Bob Brumley
2020/054
Parameterized Hardware Accelerators for Lattice-Based Cryptography and Their Application to the HW/SW Co-Design of qTESLA
Wen Wang, Shanquan Tian, Bernhard Jungk, Nina Bindel, Patrick Longa, Jakub Szefer
2020/053
Security Analysis Against "A New Encryption Scheme for Multivariate Quadratic Systems"
Yasuhiko Ikematsu, Shuhei Nakamura
2020/052
Impossible Differential Cryptanalysis of Reduced-Round Tweakable TWINE
Mohamed Tolba, Muhammad ElSheikh, Amr M. Youssef
2020/051
Low-Latency Hardware Masking with Application to AES
Pascal Sasdrich, Begül Bilgin, Michael Hutter, Mark Marson
2020/050
Delphi: A Cryptographic Inference Service for Neural Networks
Pratyush Mishra, Ryan Lehmkuhl, Akshayaram Srinivasan, Wenting Zheng, Raluca Ada Popa
2020/049
ISA Extensions for Finite Field Arithmetic - Accelerating Kyber and NewHope on RISC-V
Erdem Alkim, Hülya Evkan, Norman Lahr, Ruben Niederhagen, Richard Petri
2020/048
Practical Searchable Symmetric Encryption Supporting Conjunctive Queries without Keyword Pair Result Pattern Leakage
Changshe Ma, Yiping Gu, Hongfei Li
2020/047
New Subquadratic Algorithms for Constructing Lightweight Hadamard MDS Matrices (Full Version)
Tianshuo Cong, Ximing Fu, Xuting Zhou, Yuli Zou, Haining Fan
2020/046
On Analysis of Lightweight Stream Ciphers with Keyed Update
Orhun Kara, Muhammed F. Esgin
2020/045
Pragmatic Authenticated Key Agreement for IEEE Std 802.15.6
Haibat Khan, Benjamin Dowling, Keith M. Martin
2020/044
Bypassing Non-Outsourceable Proof-of-Work Schemes Using Collateralized Smart Contracts
Alexander Chepurnoy, Amitabh Saxena
2020/043
Zone Encryption with Anonymous Authentication for V2V Communication
Jan Camenisch, Manu Drijvers, Anja Lehmann, Gregory Neven, Patrick Towa
2020/042
BLAZE: Blazing Fast Privacy-Preserving Machine Learning
Arpita Patra, Ajith Suresh
2020/041
Consistency of Proof-of-Stake Blockchains with Concurrent Honest Slot Leaders
Aggelos Kiayias, Saad Quader, Alexander Russell
2020/040
A Compact and Scalable Hardware/Software Co-design of SIKE
Pedro Maat C. Massolino, Patrick Longa, Joost Renes, Lejla Batina
2020/039
Online Performance Evaluation of Deep Learning Networks for Side-Channel Analysis
Damien Robissout, Gabriel Zaid, Brice Colombier, Lilian Bossuet, Amaury Habrard
2020/038
Bitstream Modification Attack on SNOW 3G
Michail Moraitis, Elena Dubrova
2020/037
Proof-of-Stake Blockchain Protocols with Near-Optimal Throughput
Matthias Fitzi, Peter Gaži, Aggelos Kiayias, Alexander Russell
2020/036
Analysis on Aigis-Enc: asymmetrical and symmetrical
Yupu Hu, Siyue Dong, Xingting Dong
2020/035
Constant-round Dynamic Group Key Exchange from RLWE Assumption
Rakyong Choi, Dongyeon Hong, Kwangjo Kim
2020/034
SkyEye: A Traceable Scheme for Blockchain
Tianjun Ma, Haixia Xu, Peili Li
2020/033
Scalable Open-Vote Network on Ethereum
Mohamed Seifelnasr, Hisham S. Galal, Amr M. Youssef
2020/032
A New Approach for the Implementation of Binary Matrices Using SLP Applications
Mahdi Sajadieh, Mohsen Mousavi
2020/031
Locally Decodable Codes with Randomized Encoding
Kuan Cheng, Xin Li, Yu Zheng
2020/030
K-Cipher: A Low Latency, Bit Length Parameterizable Cipher
Michael Kounavis, Sergej Deutsch, Santosh Ghosh, David Durham
2020/029
Differentially-Private Multi-Party Sketching for Large-Scale Statistics
Seung Geol Choi, Dana Dachman-Soled, Mukul Kulkarni, Arkady Yerukhimovich
2020/028
Verified Security of BLT Signature Scheme
Denis Firsov, Ahto Buldas, Ahto Truu, Risto Laanoja
2020/027
On Roots Factorization for PQC Algorithms
Alexander Maximov
2020/026
Post-Quantum Secure Architectures for Automotive Hardware Secure Modules
Wen Wang, Marc Stöttinger
2020/025
Single Secret Leader Election
Dan Boneh, Saba Eskandarian, Lucjan Hanzlik, Nicola Greco
2020/024
The Arwen Trading Protocols (Full Version)
Ethan Heilman, Sebastien Lipmann, Sharon Goldberg
2020/023
Threshold Multi-Signature with an Offline Recovery Party
Riccardo Longo, Alessio Meneghetti, Massimiliano Sala
2020/022
Differential Random Fault Attacks on certain CAESAR Stream Ciphers (Supplementary Material)
Kenneth Koon-Ho Wong, Harry Bartlett, Leonie Simpson, Ed Dawson
2020/021
eSIDH: the revenge of the SIDH
Daniel Cervantes-Vázquez, Eduardo Ochoa-Jiménez, Francisco Rodríguez-Henríquez
2020/020
Practical Encrypted Network Traffic Pattern Matching for Secure Middleboxes
Shangqi Lai, Xingliang Yuan, Shi-Feng Sun, Joseph K. Liu, Ron Steinfeld, Amin Sakzad, Dongxi Liu
2020/019
Short Selling Attack: A Self-Destructive But Profitable 51% Attack On PoS Blockchains
Suhyeon Lee, Seungjoo Kim
2020/018
Triptych: logarithmic-sized linkable ring signatures with applications
Sarang Noether, Brandon Goodell
2020/017
Biometric-Authenticated Searchable Encryption
Daniel Gardham, Mark Manulis, Constantin Cătălin Drăgan
2020/016
Short Threshold Dynamic Group Signatures
Jan Camenisch, Manu Drijvers, Anja Lehmann, Gregory Neven, Patrick Towa
2020/015
Efficient Homomorphic Conversion Between (Ring) LWE Ciphertexts
Hao Chen, Wei Dai, Miran Kim, Yongsoo Song
2020/014
SHA-1 is a Shambles - First Chosen-Prefix Collision on SHA-1 and Application to the PGP Web of Trust
Gaëtan Leurent, Thomas Peyrin
2020/013
On the Cryptographic Hardness of Local Search
Nir Bitansky, Idan Gerichter
2020/012
Cortex-M4 Optimizations for \{R,M\}LWE Schemes
Erdem Alkim, Yusuf Alper Bilgin, Murat Cenk, François Gérard
2020/011
Towards Vehicular Digital Forensics from Decentralized Trust: An Accountable, Privacy-preservation, and Secure Realization
Ming Li, Jian Weng, Jia-Nan Liu, Xiaodong Lin, Charlie Obimbo
2020/010
Faster point compression for elliptic curves of $j$-invariant $0$
Dmitrii Koshelev
2020/009
Efficient Elliptic Curve Operations On Microcontrollers With Finite Field Extensions
Thomas Pornin
2020/008
Secret Sharing Schemes for Ports of Matroids of Rank 3
Oriol Farràs
2020/007
On Lattice-Based Interactive Protocols: An Approach with Less or No Aborts
Nabil Alkeilani Alkadri, Rachid El Bansarkhani, Johannes Buchmann
2020/006
Tight and Optimal Reductions for Signatures based on Average Trapdoor Preimage Sampleable Functions and Applications to Code-Based Signatures
André Chailloux, Thomas Debris-Alazard
2020/005
Lai-Massey Scheme Revisited
M. R. Mirzaee Shamsabad, S. M. Dehnavi
2020/004
BPCEX: Towards Blockchain-based Privacy-preserving Currency Exchange
Wulu Li, Lei Chen, Xin Lai, Xiao Zhang, Jiajun Xin
2020/003
New Constructions of Traceable Range Proofs: Towards Multiple Regulation and Joint Regulation
Wulu Li, Lei Chen, Xin Lai, Xiao Zhang
2020/002
On a Conjecture of O'Donnell
Qichun Wang
2020/001
Elliptic Curves of Nearly Prime Order
Manoj Gyawali, Daniele Di Tullio
2019/1499
Authenticated Key Distribution: When the Coupon Collector is Your Enemy
Marc Beunardeau, Fatima-Ezzahra El Orche, Diana Maimut, David Naccache, Peter B. Roenne, Peter Y. A. Ryan
2019/1498
Supersingular Isogeny-Based Designated Verifier Blind Signature
Rajeev Anand Sahu, Agnese Gini, Ankan Pal
2019/1497
Analysis of Modified Shell Sort for Fully Homomorphic Encryption
Joon-Woo Lee, Young-Sik Kim, Jong-Seon No
2019/1496
Improved on Identity-based quantum signature based on Bell states
Chang-Bin Wang, Shu-Mei Hsu, Hsiang Chang, Jue-Sam Chou
2019/1495
Tight Security of Cascaded LRW2
Ashwin Jha, Mridul Nandi
2019/1494
Scaling Verifiable Computation Using Efficient Set Accumulators
Alex Ozdemir, Riad S. Wahby, Barry Whitehat, Dan Boneh
2019/1493
Solving $X^{q+1}+X+a=0$ over Finite Fields
Kwang Ho Kim, Junyop Choe, Sihem Mesnager
2019/1492
Too Much Crypto
Jean-Philippe Aumasson
2019/1491
Classification of quadratic APN functions with coefficients in GF(2) for dimensions up to 9
Yuyin Yu, Nikolay Kaleyski, Lilya Budaghyan, Yongqiang Li
2019/1490
Cryptanalysis of The Lifted Unbalanced Oil Vinegar Signature Scheme
Jintai Ding, Joshua Deaton, Kurt Schmidt, Vishakha, Zheng Zhang
2019/1489
Keep the Dirt: Tainted TreeKEM, Adaptively and Actively Secure Continuous Group Key Agreement
Joël Alwen, Margarita Capretto, Miguel Cueto, Chethan Kamath, Karen Klein, Ilia Markov, Guillermo Pascual-Perez, Krzysztof Pietrzak, Michael Walter, Michelle Yeo
2019/1488
Fine-Grained Cryptography Revisited
Shohei Egashira, Yuyu Wang, Keisuke Tanaka
2019/1487
SNR-Centric Power Trace Extractors for Side-Channel Attacks
Changhai Ou, Degang Sun, Siew-Kei Lam, Xinping Zhou, Kexin Qiao, Qu Wang
2019/1486
RLWE-based Zero-Knowledge Proofs for linear and multiplicative relations
Ramiro Martínez, Paz Morillo
2019/1485
Implementation of a Strongly Robust Identity-Based Encryption Scheme over Type-3 Pairings
Hiroshi Okano, Keita Emura, Takuya Ishibashi, Toshihiro Ohigashi, Tatsuya Suzuki
2019/1484
Force-Locking Attack on Sync Hotstuff
Atsuki Momose, Jason Paul Cruz
2019/1483
Communication--Computation Trade-offs in PIR
Asra Ali, Tancrède Lepoint, Sarvar Patel, Mariana Raykova, Phillipp Schoppmann, Karn Seth, Kevin Yeo
2019/1482
Transparent Polynomial Delegation and Its Applications to Zero Knowledge Proof
Jiaheng Zhang, Tiancheng Xie, Yupeng Zhang, Dawn Song
2019/1481
On metric regularity of Reed-Muller codes
Alexey Oblaukhov
2019/1480
Analogue of Vélu's Formulas for Computing Isogenies over Hessian Model of Elliptic Curves
Fouazou Lontouo Perez Broon, Emmanuel Fouotsa
2019/1479
A New Encoding Framework for Predicate Encryption with Non-Linear Structures in Prime Order Groups
Jongkil Kim, Willy Susilo, Fuchun Guo, Joonsang Baek, Nan Li
2019/1478
Leakage Detection with Kolmogorov-Smirnov Test
Xinping Zhou, Kexin Qiao, Changhai Ou
2019/1477
Kilroy was here: The First Step Towards Explainability of Neural Networks in Profiled Side-channel Analysis
Daan van der Valk, Stjepan Picek, Shivam Bhasin
2019/1476
On the Performance of Multilayer Perceptron in Profiling Side-channel Analysis
Leo Weissbart
2019/1475
On the Security of Sponge-type Authenticated Encryption Modes
Bishwajit Chakraborty, Ashwin Jha, Mridul Nandi
2019/1474
Remove Some Noise: On Pre-processing of Side-channel Measurements with Autoencoders
Lichao Wu, Stjepan Picek
2019/1473
Splitting the Interpose PUF: A Novel Modeling Attack Strategy
Nils Wisiol, Christopher Mühl, Niklas Pirnay, Phuong Ha Nguyen, Marian Margraf, Jean-Pierre Seifert, Marten van Dijk, Ulrich Rührmair
2019/1472
Efficient Fully Secure Leakage-Deterring Encryption
Jan Camenisch, Maria Dubovitskaya, Patrick Towa
2019/1471
A Privacy-Enhancing Framework for Internet of Things Services
Lukas Malina, Gautam Srivastava, Petr Dzurenda, Jan Hajny, Sara Ricci
2019/1470
PESTO: Proactively Secure Distributed Single Sign-On, or How to Trust a Hacked Server
Carsten Baum, Tore K. Frederiksen, Julia Hesse, Anja Lehmann, Avishay Yanai
2019/1469
The Influence of LWE/RLWE Parameters on the Stochastic Dependence of Decryption Failures
Georg Maringer, Tim Fritzmann, Johanna Sepúlveda
2019/1468
A New Trapdoor over Module-NTRU Lattice and its Application to ID-based Encryption
Jung Hee Cheon, Duhyeong Kim, Taechan Kim, Yongha Son
2019/1467
Distributed Web Systems Leading to Hardware Oriented Cryptography and Post-Quantum Cryptologic Methodologies
Andrew M. K. Nassief
2019/1466
A Note on the Instantiability of the Quantum Random Oracle
Edward Eaton, Fang Song
2019/1465
An optimist's Poisson model of cryptanalysis
Daniel R. L. Brown
2019/1464
New Techniques for Zero-Knowledge: Leveraging Inefficient Provers to Reduce Assumptions and Interaction
Marshall Ball, Dana Dachman-Soled, Mukul Kulkarni
2019/1463
Rescuing Logic Encryption in Post-SAT Era by Locking & Obfuscation
Amin Rezaei, Yuanqi Shen, Hai Zhou
2019/1462
Privacy-preserving greater-than integer comparison without binary decomposition
Sigurd Eskeland
2019/1461
Cryptanalysis of two recently proposed PUF based authentication protocols for IoT: PHEMAP and Salted PHEMAP
Morteza Adeli, Nasour Bagheri
2019/1460
Byzantine Fault Tolerance in Partially Synchronous Networks
Yongge Wang
2019/1459
Side Channel Information Set Decoding using Iterative Chunking
Norman Lahr, Ruben Niederhagen, Richard Petri, Simona Samardjiska
2019/1458
Out-of-Band Authenticated Group Key Exchange: From Strong Authentication to Immediate Key Delivery
Moni Naor, Lior Rotem, Gil Segev
2019/1457
Fast and Secure Updatable Encryption
Colin Boyd, Gareth T. Davies, Kristian Gjøsteen, Yao Jiang
2019/1456
ModFalcon: compact signatures based on module NTRU lattices
Chitchanok Chuengsatiansup, Thomas Prest, Damien Stehlé, Alexandre Wallet, and Keita Xagawa
2019/1455
Generic Construction of Server-Aided Revocable Hierarchical Identity-Based Encryption with Decryption Key Exposure Resistance
Yanyan Liu, Yiru Sun
2019/1454
Practical Relativistic Zero-Knowledge for NP
Claude Crépeau, Arnaud Massenet, Louis Salvail, Lucas Stinchcombe, Nan Yang
2019/1453
Saber on ESP32
Bin Wang, Xiaozhuo Gu, Yingshan Yang
2019/1452
Leakage-Resilient Lattice-Based Partially Blind Signatures
D. Papachristoudis, D. Hristu-Varsakelis, F. Baldimtsi, G. Stephanides
2019/1451
Tight bound on NewHope failure probability
Thomas Plantard, Arnaud Sipasseuth, Willy Susilo, Vincent Zucca
2019/1450
Extractors for Adversarial Sources via Extremal Hypergraphs
Eshan Chattopadhyay, Jesse Goodman, Vipul Goyal, Xin Li
2019/1449
Formalising Oblivious Transfer in the Semi-Honest and Malicious Model in CryptHOL
David Butler, David Aspinall, Adria Gascon
2019/1448
Investigating Profiled Side-Channel Attacks Against the DES Key Schedule
Johann Heyszl, Katja Miller, Florian Unterstein, Marc Schink, Alexander Wagner, Horst Gieser, Sven Freud, Tobias Damm, Dominik Klein, Dennis Kügler
2019/1447
Benchmarking Post-Quantum Cryptography in TLS
Christian Paquin, Douglas Stebila, Goutam Tamvada
2019/1446
Boolean functions for homomorphic-friendly stream ciphers
Claude Carlet, Pierrick Méaux
2019/1445
Rosita: Towards Automatic Elimination of Power-Analysis Leakage in Ciphers
Madura A Shelton, Niels Samwel, Lejla Batina, Francesco Regazzoni, Markus Wagner, Yuval Yarom
2019/1444
Compact Storage of Superblocks for NIPoPoW Applications
Kostis Karantias, Aggelos Kiayias, Nikos Leonardos, Dionysis Zindros
2019/1443
CAS-Unlock: Unlocking CAS-Lock without Access to a Reverse-Engineered Netlist
Abhrajit Sengupta, Ozgur Sinanoglu
2019/1442
Server-Aided Revocable Identity-Based Encryption Revisited
Fei Meng
2019/1441
A Code-specific Conservative Model for the Failure Rate of Bit-flipping Decoding of LDPC Codes with Cryptographic Applications
Paolo Santini, Alessandro Barenghi, Gerardo Pelosi, Marco Baldi, Franco Chiaraluce
2019/1440
Winkle: Foiling Long-Range Attacks in Proof-of-Stake Systems
Sarah Azouvi, George Danezis, Valeria Nikolaenko
2019/1439
Cryptanalysis of a pairing-free certificate-based proxy re-encryption scheme for secure data sharing in public clouds
S. Sharmila Deva Selvi, Irene Miriam Isaac, C. Pandu Rangan
2019/1438
A new method for Searching Optimal Differential and Linear Trails in ARX Ciphers
Zhengbin Liu, Yongqiang Li, Lin Jiao, Mingsheng Wang
2019/1437
Reverse Outsourcing: Reduce the Cloud's Workload in Outsourced Attribute-Based Encryption Scheme
Fei Meng, Mingqiang Wang
2019/1436
Algebraic and Euclidean Lattices: Optimal Lattice Reduction and Beyond
Paul Kirchner, Thomas Espitau, Pierre-Alain Fouque
2019/1435
Confidential Assets on MimbleWimble
Yi Zheng, Howard Ye, Patrick Dai, Tongcheng Sun, Vladislav Gelfer
2019/1434
About Low DFR for QC-MDPC Decoding
Nicolas Sendrier, Valentin Vasseur
2019/1433
T0RTT: Non-Interactive Immediate Forward-Secret Single-Pass Circuit Construction
Sebastian Lauer, Kai Gellert, Robert Merget, Tobias Handirk, Jörg Schwenk
2019/1432
A Generic View on the Unified Zero-Knowledge Protocol and its Applications
Diana Maimut, George Teseleanu
2019/1431
Cross-Chain Communication Using Receipts
Arasu Arun, C. Pandu Rangan
2019/1430
On the Impossibility of Probabilistic Proofs in Relativized Worlds
Alessandro Chiesa, Siqi Liu
2019/1429
Secret Sharing Schemes : A Fine Grained Analysis
Shion Samadder Chaudhury, Sabyasachi Dutta, Kouichi Sakurai
2019/1428
$AC^0$ Constructions for Evolving Secret Sharing Schemes and Redistribution of Secret Shares
Shion Samadder Chaudhury, Sabyasachi Dutta, Kouichi Sakurai
2019/1427
On the Relationship between Resilient Boolean Functions and Linear Branch Number of S-boxes
Sumanta Sarkar, Kalikinkar Mandal, Dhiman Saha
2019/1426
On asymptotically optimal tests for random number generators
Boris Ryabko
2019/1425
HIBEChain: A Hierarchical Identity-based Blockchain System for Large-Scale IoT
Zhiguo Wan, Wei Liu, Hui Cui
2019/1424
Efficient Side-Channel Secure Message Authentication with Better Bounds
Chun Guo, François-Xavier Standaert, Weijia Wang, Yu Yu
2019/1423
QC-MDPC decoders with several shades of gray
Nir Drucker, Shay Gueron, Dusan Kostic
2019/1422
IPDL: A Probabilistic Dataflow Logic for Cryptography
Xiong Fan, Joshua Gancher, Greg Morrisett, Elaine Shi, Kristina Sojakova
2019/1421
Extending NIST's CAVP Testing of Cryptographic Hash Function Implementations
Nicky Mouha, Christopher Celi
2019/1420
A Non-Interactive Shuffle Argument With Low Trust Assumptions
Antonis Aggelakis, Prastudy Fauzi, Georgios Korfiatis, Panos Louridas, Foteinos Mergoupis-Anagnou, Janno Siim, Michal Zajac
2019/1419
Image PUF: A Physical Unclonable Function for Printed Electronics based on Optical Variation of Printed Inks
Ahmet Turan Erozan, Michael Hefenbrock, Michael Beigl, Jasmin Aghassi-Hagmann, Mehdi B. Tahoori
2019/1418
Designated-ciphertext Searchable Encryption
Zi-Yuan Liu, Yi-Fan Tseng, Raylin Tso, Masahiro Mambo
2019/1417
CSIDH on Other Form of Elliptic Curves
Xuejun Fan, Song Tian, Bao Li, Xiu Xu
2019/1416
The Signal Private Group System and Anonymous Credentials Supporting Efficient Verifiable Encryption
Melissa Chase, Trevor Perrin, Greg Zaverucha
2019/1415
Toward A More Efficient Gröbner-based Algebraic Cryptanalysis
Hossein Arabnezhad-Khanoki, Babak Sadeghiyan
2019/1414
A New Encryption Scheme Based On Subset Identifying Problem
Muhammad Rezal Kamel Ariffin
2019/1413
Strong Authenticity with Leakage under Weak and Falsifiable Physical Assumptions
Francesco Berti, Chun Guo, Olivier Pereira, Thomas Peters, François-Xavier Standaert
2019/1412
Cryptanalysis and Improvement of Smart-ID's Clone Detection Mechanism
Augustin P. Sarr
2019/1411
Isochronous Gaussian Sampling: From Inception to Implementation
James Howe, Thomas Prest, Thomas Ricosset, Mélissa Rossi
2019/1410
Withdrawn
Withdrawn
2019/1409
Cloud-assisted Asynchronous Key Transport with Post-Quantum Security
Gareth T. Davies, Herman Galteland, Kristian Gjøsteen, Yao Jiang
2019/1408
The group of automorphisms of the set of self-dual bent functions
Aleksandr Kutsenko
2019/1407
Incrementally Verifiable Computation via Incremental PCPs
Moni Naor, Omer Paneth, Guy N. Rothblum
2019/1406
Efficient, Coercion-free and Universally Verifiable Blockchain-based Voting
Tassos Dimtiriou
2019/1405
Revisiting Higher-Order Computational Attacks against White-Box Implementations
Houssem Maghrebi, Davide Alessio
2019/1404
CSIDH on the surface
Wouter Castryck, Thomas Decru
2019/1403
No RISC, no Fun: Comparison of Hardware Accelerated Hash Functions for XMSS
Ingo Braun, Fabio Campos, Steffen Reith, Marc Stöttinger
2019/1402
Automatize parameter tuning in Ring-Learning-With-Errors-based leveled homomorphic cryptosystem implementations
Vincent HERBERT
2019/1401
SMChain: A Scalable Blockchain Protocol for Secure Metering Systems in Distributed Industrial Plants
Gang Wang, Zhijie Jerry Shi, Mark Nixon, Song Han
2019/1400
RedShift: Transparent SNARKs from List Polynomial Commitments
Assimakis Kattis, Konstantin Panarin, Alexander Vlasov
2019/1399
(One) failure is not an option: Bootstrapping the search for failures in lattice-based encryption schemes
Jan-Pieter D'Anvers, Mélissa Rossi, Fernando Virdia
2019/1398
How to Construct Rational Protocols with Nash Equilibrium Consistency in the UC framework
Xiaoxia Jiang, Youliang Tian
2019/1397
How to compartment secrets
Gaëlle Candel, Rémi Géraud-Stewart, David Naccache
2019/1396
A note on the multivariate cryptosystem based on a linear code
Yasufumi Hashimoto
2019/1395
McTiny: fast high-confidence post-quantum key erasure for tiny network servers
Daniel J. Bernstein, Tanja Lange
2019/1394
Voltage-based Covert Channels using FPGAs
Dennis R. E. Gnad, Cong Dang Khoa Nguyen, Syed Hashim Gillani, Mehdi B. Tahoori
2019/1393
SoK: Computer-Aided Cryptography
Manuel Barbosa, Gilles Barthe, Karthik Bhargavan, Bruno Blanchet, Cas Cremers, Kevin Liao, Bryan Parno
2019/1392
Decryption failure is more likely after success
Nina Bindel, John M. Schanck
2019/1391
Are These Pairing Elements Correct? Automated Verification and Applications
Susan Hohenberger, Satyanarayana Vusirikala
2019/1390
Practical Fully Secure Three-Party Computation via Sublinear Distributed Zero-Knowledge Proofs
Elette Boyle, Niv Gilboa, Yuval Ishai, Ariel Nof
2019/1389
Generic Attack on Iterated Tweakable FX Constructions
Ferdinand Sibleyras
2019/1388
Secure Key Encapsulation Mechanism with Compact Ciphertext and Public Key from Generalized Srivastava code
Jayashree Dey, Ratna Dutta
2019/1387
The supersingular isogeny problem in genus 2 and beyond
Craig Costello, Benjamin Smith
2019/1386
Provably Secure Three-party Password-based Authenticated Key Exchange from RLWE (Full Version)
Chao Liu, Zhongxiang Zheng, Keting Jia, Qidi You
2019/1385
Improvements of the Balance Discovery Attack on Lightning Network Payment Channels
Gijs van Dam, Rabiah Abdul Kadir, Puteri N. E. Nohuddin, Halimah Badioze Zaman
2019/1384
Identity-Based Encryption with Security against the KGC: A Formal Model and Its Instantiations
Keita Emura, Shuichi Katsumata, Yohei Watanabe
2019/1383
Communication-Efficient Proactive Secret Sharing for Dynamic Groups with Dishonest Majorities
Karim Eldefrawy, Tancrède Lepoint, Antonin Leroux
2019/1382
On the Power of Multiple Anonymous Messages
Badih Ghazi, Noah Golowich, Ravi Kumar, Rasmus Pagh, Ameya Velingker
2019/1381
The Extended Autocorrelation and Boomerang Tables and Links Between Nonlinearity Properties of Vectorial Boolean Functions
Kaisa Nyberg
2019/1380
Efficient Utilization of DSPs and BRAMs Revisited: New AES-GCM Recipes on FPGAs
Elif Bilge Kavun, Nele Mentens, Jo Vliegen, Tolga Yalcin
2019/1379
Systematic and Random Searches for Compact 4-Bit and 8-Bit Cryptographic S-Boxes
Christophe Clavier, Léo Reynaud
2019/1378
Alzette: a 64-bit ARX-box (feat. CRAX and TRAX)
Christof Beierle, Alex Biryukov, Luan Cardoso dos Santos, Johann Großschädl, Léo Perrin, Aleksei Udovenko, Vesselin Velichkov, Qingju Wang
2019/1377
A Scalable Post-quantum Hash-Based Group Signature
Masoumeh Shafieinejad, Navid Nasr Esfahani
2019/1376
Generic Constructions of RIBE via Subset Difference Method
Xuecheng Ma, Dongdai Lin
2019/1375
New ideas to build noise-free homomorphic cryptosystems
Gérald Gavin, Sandrine Tainturier
2019/1374
Challenges of Post-Quantum Digital Signing in Real-world Applications: A Survey
Teik Guan Tan, Pawel Szalachowski, Jianying Zhou
2019/1373
A note on the cost of computing odd degree isogenies
Daniel Cervantes-Vázquez, Francisco Rodríguez-Henríquez
2019/1372
Analyzing the Linear Keystream Biases in AEGIS
Maria Eichlseder, Marcel Nageler, and Robert Primas
2019/1371
A short-list of pairing-friendly curves resistant to Special TNFS at the 128-bit security level
Aurore Guillevic
2019/1370
A Subset Fault Analysis of ASCON
Priyanka Joshi, Bodhisatwa Mazumdar
2019/1369
Impeccable Circuits II
Aein Rezaei Shahmirzadi, Shahram Rasoolzadeh, Amir Moradi
2019/1368
Efficient FPGA Implementations of LowMC and Picnic
Daniel Kales, Sebastian Ramacher, Christian Rechberger, Roman Walch, Mario Werner
2019/1367
Tight reduction for generic construction of certificateless signature and its instantiation from DDH assumption
Keitaro Hashimoto, Wakaha Ogata, Toi Tomita
2019/1366
A Lattice-based Enhanced Privacy ID
Nada EL Kassem, Luis Fiolhais, Paulo Martins, Liqun Chen, Leonel Sousa
2019/1365
FLASH: Fast and Robust Framework for Privacy-preserving Machine Learning
Megha Byali, Harsh Chaudhari, Arpita Patra, Ajith Suresh
2019/1364
Boolean Functions with Multiplicative Complexity 3 and 4
Cagdas Calik, Meltem Sonmez Turan, Rene Peralta
2019/1363
Multi-Device for Signal
Sébastien Campion, Julien Devigne, Céline Duguey, Pierre-Alain Fouque
2019/1362
A Modern View on Forward Security
Colin Boyd, Kai Gellert
2019/1361
Efficient Elliptic Curve Diffie-Hellman Computation at the 256-bit Security Level
Kaushik Nath, Palash Sarkar
2019/1360
Sashimi: Cutting up CSI-FiSh secret keys to produce an actively secure distributed signing protocol
Daniele Cozzo, Nigel P. smart
2019/1359
Universal Forgery Attack against GCM-RUP
Yanbin Li, Gaëtan Leurent, Meiqin Wang, Wei Wang, Guoyan Zhang, Yu Liu
2019/1358
Traceable Inner Product Functional Encryption
Xuan Thanh Do, Duong Hieu Phan, David Pointcheval
2019/1357
Cryptanalysis of the Legendre PRF and generalizations
Ward Beullens, Tim Beyne, Aleksei Udovenko, Giuseppe Vitto
2019/1356
Towards Post-Quantum Security for Signal's X3DH Handshake
Jacqueline Brendel, Marc Fischlin, Felix Günther, Christian Janson, Douglas Stebila
2019/1355
A Nonlinear Multivariate Cryptosystem Based on a Random Linear Code
Daniel Smith-Tone, Cristina Tone
2019/1354
BlockMaze: An Efficient Privacy-Preserving Account-Model Blockchain Based on zk-SNARKs
Zhangshuang Guan, Zhiguo Wan, Yang Yang, Yan Zhou, Butian Huang
2019/1353
Laconic Conditional Disclosure of Secrets and Applications
Nico Döttling, Sanjam Garg, Vipul Goyal, Giulio Malavolta
2019/1352
Spectral analysis of ZUC-256
Jing Yang, Thomas Johansson, Alexander Maximov
2019/1351
Speeding Up OMD Instantiations in Hardware
Diana Maimut, Alexandru Stefan Mega
2019/1350
Message Time of Arrival Codes: A Fundamental Primitive for Secure Distance Measurement
Patrick Leu, Mridula Singh, Marc Roeschlin, Kenneth G. Paterson, Srdjan Capkun
2019/1349
UWB-ED: Distance Enlargement Attack Detection in Ultra-Wideband
Mridula Singh, Patrick Leu, AbdelRahman Abdou, Srdjan Capkun
2019/1348
Network Time with a Consensus on Clock
Handan Kilinc Alper
2019/1347
Variants of Wegman-Carter Message Authentication Code Supporting Variable Tag Lengths
Sebati Ghosh, Palash Sarkar
2019/1346
Privacy-Preserving Decentralised Singular Value Decomposition
Bowen Liu, Qiang Tang
2019/1345
Audita: A Blockchain-based Auditing Framework for Off-chain Storage
Danilo Francati, Giuseppe Ateniese, Abdoulaye Faye, Andrea Maria Milazzo, Angelo Massimo Perillo, Luca Schiatti, Giuseppe Giordano
2019/1344
From Fairness to Full Security in Multiparty Computation
Ran Cohen, Iftach Haitner, Eran Omri, Lior Rotem
2019/1343
An Efficient Key Mismatch Attack on the NIST Second Round Candidate Kyber
Yue Qin, Chi Cheng, Jintai Ding
2019/1342
Scalable Wildcarded Identity-Based Encryption
Jihye Kim, Seunghwa Lee, Jiwon Lee, Hyunok Oh
2019/1341
Succinct Non-Interactive Secure Computation
Andrew Morgan, Rafael Pass, Antigoni Polychroniadou
2019/1340
Secret Shared Shuffle
Melissa Chase, Esha Ghosh, Oxana Poburinnaya
2019/1339
Extracting Randomness from Extractor-Dependent Sources
Yevgeniy Dodis, Vinod Vaikuntanathan, Daniel Wichs
2019/1338
Two-party Private Set Intersection with an Untrusted Third Party
Phi Hung Le, Samuel Ranellucci, S. Dov Gordon
2019/1337
Offline Witness Encryption with Semi-Adaptive Security
Peter Chvojka, Tibor Jager, Saqib A. Kakvi
2019/1336
Critical Perspectives on Provable Security: Fifteen Years of "Another Look" Papers
Neal Koblitz and Alfred Menezes
2019/1335
On the Real-World Instantiability of Admissible Hash Functions and Efficient Verifiable Random Functions
Tibor Jager, David Niehues
2019/1334
Privacy-Preserving Distributed Machine Learning based on Secret Sharing
Ye Dong, Xiaojun Chen, Liyan Shen
2019/1333
The Dark SIDH of Isogenies
Paul Bottinelli, Victoria de Quehen, Chris Leonardi, Anton Mosunov, Filip Pawlega, Milap Sheth
2019/1332
SEAL: Sealed-Bid Auction Without Auctioneers
Samiran Bag, Feng Hao, Siamak F. Shahandashti, Indranil G. Ray
2019/1331
Key Enumeration from the Adversarial Viewpoint: When to Stop Measuring and Start Enumerating?
Melissa Azouaoui, Romain Poussier, François-Xavier Standaert, Vincent Verneuil
2019/1330
OptiSwap: Fast Optimistic Fair Exchange
Lisa Eckey, Sebastian Faust, Benjamin Schlosser
2019/1329
Drinfeld modules may not be for isogeny based cryptography
Antoine Joux, Anand Kumar Narayanan
2019/1328
Refresh When You Wake Up: Proactive Threshold Wallets with Offline Devices
Yashvanth Kondi, Bernardo Magri, Claudio Orlandi, Omer Shlomovits
2019/1327
Spy Based Analysis of Selfish Mining Attack on Multi-Stage Blockchain
Donghoon Chang, Munawar Hasan, Pranav Jain
2019/1326
Release of Unverified Plaintext: Tight Unified Model and Application to ANYDAE
Donghoon Chang, Nilanjan Datta, Avijit Dutta, Bart Mennink, Mridul Nandi, Somitra Sanadhya, Ferdinand Sibleyras
2019/1325
Efficient Attribute-based Proxy Re-Encryption with Constant Size Ciphertexts
Arinjita Paul, S. Sharmila Deva Selvi, C. Pandu Rangan
2019/1324
Tweakable HCTR: A BBB Secure Tweakable Enciphering Scheme
Avijit Dutta, Mridul Nandi
2019/1323
Secure Quantum Extraction Protocols
Prabhanjan Ananth, Rolando L. La Placa
2019/1322
An Efficient Micropayment Channel on Ethereum
Hisham S. Galal, Muhammad ElSheikh, Amr M. Youssef
2019/1321
Supersingular isogeny key exchange for beginners
Craig Costello
2019/1320
Homomorphic Encryption Random Beacon
Alisa Cherniaeva, Ilia Shirobokov, Omer Shlomovits
2019/1319
Automatic Search for the Linear (hull) Characteristics of ARX Ciphers: Applied to SPECK, SPARX, Chaskey and CHAM-64 (Full Version)
Mingjiang Huang, Liming Wang
2019/1318
Automatic Tool for Searching for Differential Characteristics in ARX Ciphers and Applications (Full Version)
Mingjiang Huang, Liming Wang
2019/1317
Reverse Firewalls for Actively Secure MPCs
Suvradip Chakraborty, Stefan Dziembowski, Jesper Buus Nielsen
2019/1316
Binary Kummer Line
Sabyasachi Karati
2019/1315
Trident: Efficient 4PC Framework for Privacy Preserving Machine Learning
Harsh Chaudhari, Rahul Rachuri, Ajith Suresh
2019/1314
Towards Privacy-Preserving and Efficient Attribute-Based Multi-Keyword Search
Zhidan Li, Wenmin Li, Fei Gao, Wei Yin, Hua Zhang, Qiaoyan Wen, Kaitai Liang
2019/1313
On Oblivious Amplification of Coin-Tossing Protocols
Nir Bitansky, Nathan Geier
2019/1312
Cryptographic Fault Diagnosis using VerFI
Victor Arribas, Felix Wegener, Amir Moradi, Svetla Nikova
2019/1311
BESTIE: Broadcast Encryption Scheme for Tiny IoT Equipments
Jiwon Lee, Jihye Kim, Hyunok Oh
2019/1310
Lightweight Iterative MDS Matrices: How Small Can We Go?
Shun Li, Siwei Sun, Danping Shi, Chaoyun Li, Lei Hu
2019/1309
SaberX4: High-throughput Software Implementationof Saber Key Encapsulation Mechanism
Sujoy Sinha Roy
2019/1308
A Novel CCA Attack using Decryption Errors against LAC
Qian Guo, Thomas Johansson, Jing Yang
2019/1307
ABERand: Effective Distributed Randomness on Ciphertext-Policy Attribute-Based Encryption
Liang Zhang, Haibin Kan, Zening Chen, Ziqi Mao, Jinjie Gao
2019/1306
A Valid Blockchain-based Data Trading Ecosystem
Taotao li, Dequan li
2019/1305
Privacy-Preserving Computation over Genetic Data: HLA Matching and so on
Jinming Cui, Huaping Li, Meng Yang
2019/1304
Reduction Modulo $2^{448}-2^{224}-1$
Kaushik Nath, Palash Sarkar
2019/1303
A simpler construction of traceable and linkable ring signature scheme
Wulu Li
2019/1302
There Is Always an Exception: Controlling Partial Information Leakage in Secure Computation
Máté Horváth, Levente Buttyán, Gábor Székely, Dóra Neubrandt
2019/1301
Modular lattice signatures, revisited
Dipayan Das, Jeffrey Hoffstein, Jill Pipher, William Whyte, Zhenfei Zhang
2019/1300
Actively Secure Setup for SPDZ
Dragos Rotaru, Nigel P. Smart, Titouan Tanguy, Frederik Vercauteren, Tim Wood
2019/1299
A constant-rate non-malleable code in the split-state model.
Divesh Aggarwal, Maciej Obremski
2019/1298
An Efficient Passive-to-Active Compiler for Honest-Majority MPC over Rings
Mark Abspoel, Anders Dalskov, Daniel Escudero, Ariel Nof
2019/1297
Exploring Energy Efficient Quantum-resistant Signal Processing Using Array Processors
Hamid Nejatollahi, Sina Shahhosseini, Rosario Cammarota, Nikil Dutt
2019/1296
FastSwap: Concretely Efficient Contingent Payments for Complex Predicates
Mathias Hall-Andersen
2019/1295
A trip between creation and destruction of non-commutative public key exchange protocols
Borja Gómez
2019/1294
Hashing to elliptic curves of $j$-invariant $1728$
Dmitrii Koshelev
2019/1293
LizarMong: Excellent Key Encapsulation Mechanism based on RLWE and RLWR
Chi-Gon Jung, JongHyeok Lee, Youngjin Ju, Yong-Been Kwon, Seong-Woo Kim, Yunheung Paek
2019/1292
Mitigating Leakage in Secure Cloud-Hosted Data Structures: Volume-Hiding for Multi-Maps via Hashing
Sarvar Patel, Giuseppe Persiano, Kevin Yeo, Moti Yung
2019/1291
SÉTA: Supersingular Encryption from Torsion Attacks
Luca De Feo, Cyprien Delpech de Saint Guilhem, Tako Boris Fouotsa, Péter Kutas, Antonin Leroux, Christophe Petit, Javier Silva, Benjamin Wesolowski
2019/1290
Trapdoor DDH groups from pairings and isogenies
Péter Kutas, Christophe Petit, Javier Silva
2019/1289
On constant-time QC-MDPC decoding with negligible failure rate
Nir Drucker, Shay Gueron, Dusan Kostic
2019/1288
Threshold Schemes from Isogeny Assumptions
Luca De Feo, Michael Meyer
2019/1287
MatRiCT: Efficient, Scalable and Post-Quantum Blockchain Confidential Transactions Protocol
Muhammed F. Esgin, Raymond K. Zhao, Ron Steinfeld, Joseph K. Liu, Dongxi Liu
2019/1286
Comparison of proof-of-work based blockchains against federated consensus and proof-of-validation based blockchains
Ambili K N, Jimmy Jose
2019/1285
Full-Round Differential Attack on DoT Block Cipher
Manoj Kumar
2019/1284
Shorter QA-NIZK and SPS with Tighter Security
Masayuki Abe, Charanjit S. Jutla, Miyako Ohkubo, Jiaxin Pan, Arnab Roy, Yuyu Wang
2019/1283
Breaking the Hidden Irreducible Polynomials Scheme
Christian Eder
2019/1282
Privacy-Preserving Decision Tree Training and Prediction against Malicious Server
Adi Akavia, Max Leibovich, Yehezkel S. Resheff, Roey Ron, Moni Shahar, Margarita Vald
2019/1281
Partially-Fair Computation from Timed-Release Encryption and Oblivious Transfer
Geoffroy Couteau, Bill Roscoe, Peter Ryan
2019/1280
Fast Secrecy Computation with Multiplication Under the Setting of $k\le N<2k-1$ using Secret Sharing Scheme
Keiichi Iwamura, Ahmad Akmal Aminuddin Mohd Kamal
2019/1279
Post-quantum Zero Knowledge in Constant Rounds
Nir Bitansky, Omri Shmueli
2019/1278
An IND-CCA-Secure Code-Based EncryptionScheme Using Rank Metric
Hamad Al Shehhi, Emanuele Bellini, Filipe Borba, Florian Caullery, Marc Manzano, Victor Mateu
2019/1277
Towards Quantum-Safe VPNs and Internet
Maran van Heesch, Niels van Adrichem, Thomas Attema, Thijs Veugen
2019/1276
Two PQ Signature Use-cases: Non-issues, challenges and potential solutions.
Panos Kampanakis, Dimitrios Sikeridis
2019/1275
Updatable Oblivious Key Management for Storage Systems
Stanislaw Jarecki, Hugo Krawczyk, Jason Resch
2019/1274
Rank-metric Encryption on Arm-Cortex M0
Ameirah al Abdouli, Emanuele Bellini, Florian Caullery, Marc Manzano, Victor Mateu
2019/1273
A Comprehensive Framework for Fair and Efficient Benchmarking of Hardware Implementations of Lightweight Cryptography
Jens-Peter Kaps, William Diehl, Michael Tempelmeier, Farnoud Farahmand, Ekawat Homsirikamol, Kris Gaj
2019/1272
The Niederreiter cryptosystem and Quasi-Cyclic codes
Upendra Kapshikar, Ayan Mahalanobis
2019/1271
Round-optimal Verifiable Oblivious Pseudorandom Functions From Ideal Lattices
Martin R. Albrecht, Alex Davidson, Amit Deo, Nigel P. Smart
2019/1270
SAVER: SNARK-friendly, Additively-homomorphic, and Verifiable Encryption and decryption with Rerandomization
Jiwon Lee, Jaekyoung Choi, Jihye Kim, Hyunok Oh
2019/1269
Repudiable Ring Signature: Stronger Security and Logarithmic-Size
Hao Lin, Mingqiang Wang
2019/1268
On the Security of RSA-PSS in the Wild
Saqib A. Kakvi
2019/1267
Repudiable Ring Signatures: Stronger Definitions and Logarithmic-Size
Hao Lin, Mingqiang Wang
2019/1266
Note on the noise growth of the RNS variants of the BFV scheme
Jean Claude Bajard, Julien Eynard, Paulo Martins, Leonel Sousa, Vincent Zucca
2019/1265
WaterCarver: Anonymous Confidential Blockchain System based on Account Model
Jiajun Xin, Pei Huang, Lei Chen, Xin Lai, Xiao Zhang, Wulu Li, Yongcan Wang
2019/1264
Resource-Restricted Cryptography: Revisiting MPC Bounds in the Proof-of-Work Era
Juan Garay, Aggelos Kiayias, Rafail Ostrovsky, Giorgos Panagiotakos, Vassilis Zikas
2019/1263
Comments on Cryptographic Entropy Measurement
Anna Johnston
2019/1262
A Practical Model for Collaborative Databases: Securely Mixing, Searching and Computing
Shweta Agrawal, Rachit Garg, Nishant Kumar, Manoj Prabhakaran
2019/1261
On Round-By-Round Soundness and State Restoration Attacks
Justin Holmgren
2019/1260
TI-PUF: Toward Side-Channel Resistant Physical Unclonable Functions
Anita Aghaie, Amir Moradi
2019/1259
Security and Efficiency Trade-offs for Elliptic Curve Diffie-Hellman at the 128-bit and 224-bit Security Levels
Kaushik Nath, Palash Sarkar
2019/1258
Secure Pairwise Key Sharing using Geometric Group Key Sharing Method (Full Paper)
Shogo Ochiai, Keiichi Iwamura, Ahmad Akmal Aminuddin Mohd Kamal
2019/1257
Expressive CP-ABE Scheme Satisfying Constant-Size Keys and Ciphertexts
Dhaval Khandla, Het Shahy, Manish Kumar Bz, Alwyn Roshan Pais, Nishant Raj
2019/1256
Permuted Puzzles and Cryptographic Hardness
Elette Boyle, Justin Holmgren, Mor Weiss
2019/1255
Zero-Knowledge Proofs for Set Membership: Efficient, Succinct, Modular
Daniel Benarroch, Matteo Campanelli, Dario Fiore, Kobi Gurkan, and Dimitris Kolonelos
2019/1254
Cryptanalysis of FRS Obfuscation based on the CLT13 Multilinear Map
Jiseung Kim, Changmin Lee
2019/1253
Probabilistic Properties of Modular Addition \\ (Extended abstract)
Victoria Vysotskaya
2019/1252
Simplifying Constructions and Assumptions for $i\mathcal{O}$
Aayush Jain, Huijia Lin, Amit Sahai
2019/1251
Lattice-based Zero-knowledge SNARGs for Arithmetic Circuits
Anca Nitulescu
2019/1250
The Price of Active Security in Cryptographic Protocols
Carmit Hazay, Muthuramakrishnan Venkitasubramaniam, and Mor Weiss
2019/1249
Related-key Attack on 5-Round Kuznyechik
Vitaly Kiryukhin
2019/1248
A Comparison of Chi^2-Test and Mutual Information as Distinguisher for Side-Channel Analysis
Bastian Richter, David Knichel, Amir Moradi
2019/1247
A Note on Masking Generic Boolean Functions
Lauren De Meyer, Felix Wegener, Amir Moradi
2019/1246
A Note on Our Submission to Track 4 of iDASH 2019
Marcel Keller, Ke Sun
2019/1245
Observations on the Quantum Circuit of the SBox of AES
Jian Zou, Yongyang Liu, Chen Dong, Wenling Wu, Le Dong
2019/1244
A Note on a Static SIDH Protocol
Samuel Dobson, Trey Li, Lukas Zobernig
2019/1243
On The Distinguishability of Ideal Ciphers
Roberto Avanzi, Yvo Desmedt
2019/1242
Non-Profiled Side Channel Attack based on Deep Learning using Picture Trace
Jong-Yoen Park, Dong-Guk Han, Dirmanto Jap, Shivam Bhasin, Yoo-Seung Won
2019/1241
SIMS : Self Sovereign Identity Management System with Preserving Privacy in Blockchain
Jeonghyuk Lee, Jungyeon Hwang, Jaekyung Choi, Hyunok Oh, Jihye Kim
2019/1240
Forward and Backward Private DSSE for Range Queries
Cong Zuo, Shi-Feng Sun, Joseph K. Liu, Jun Shao, Josef Pieprzyk, Lei Xu
2019/1239
Computationally Modeling User-Mediated Authentication Protocols
Britta Hale
2019/1238
Linear-Regression on Packed Encrypted Data in the Two-Server Model
Adi Akavia, Hayim Shaul, Mor Weiss, Zohar Yakhini
2019/1237
QFactory: classically-instructed remote secret qubits preparation
Alexandru Cojocaru, Léo Colisson, Elham Kashefi, Petros Wallden
2019/1236
Single-Trace Vulnerability of Countermeasures against Instruction-related Timing Attack
Bo-Yeon Sim, Dong-Guk Han
2019/1235
Physical Cryptography
Mariana Costiuc, Diana Maimut, George Teseleanu
2019/1234
Efficient Homomorphic Comparison Methods with Optimal Complexity
Jung Hee Cheon, Dongwoo Kim, Duhyeong Kim
2019/1233
Arbitrary Univariate Function Evaluation and Re-Encryption Protocols over Lifted-ElGamal Type Ciphertexts
Koji Nuida, Satsuya Ohata, Shigeo Mitsunari, Nuttapong Attrapadung
2019/1232
Efficient Construction of Nominative Signature Secure under Symmetric Key Primitives and Standard Assumptions on Lattice
Meenakshi Kansal, Ratna Dutta, Sourav Mukhopadhyay
2019/1231
Distinguishing LWE Instances Using Fourier Transform: A Refined Framework and its Applications
Zhao Chunhuan, Zheng Zhongxiang, Wang Xiaoyun, Xu Guangwu
2019/1230
Linear-Size Constant-Query IOPs for Delegating Computation
Eli Ben-Sasson, Alessandro Chiesa, Lior Goldberg, Tom Gur, Michael Riabzev, Nicholas Spooner
2019/1229
Transparent SNARKs from DARK Compilers
Benedikt Bünz, Ben Fisch, Alan Szepieniec
2019/1228
Guess what?! On the impossibility of unconditionally secure public-key encryption
Lorenz Panny
2019/1227
Dynamic Searchable Encryption with Small Client Storage
Ioannis Demertzis, Javad Ghareh Chamani, Dimitrios Papadopoulos, Charalampos Papamanthou
2019/1226
Cube Cryptanalysis of Round-Reduced ACORN
Jingchun Yang, Meicheng Liu, Dongdai Lin
2019/1225
Analysis of Nakamoto Consensus, Revisited
Jianyu Niu, Chen Feng, Hoang Dau, Yu-Chih Huang, Jingge Zhu
2019/1224
Practical Volume-Based Attacks on Encrypted Databases
Rishabh Poddar, Stephanie Wang, Jianan Lu, Raluca Ada Popa
2019/1223
Integrita: Protecting View-Consistency in Online Social Network with Federated Servers
Sanaz Taheri Boshrooyeh, Alptekin Küpçü, Öznur Özkasap
2019/1222
Sub-Linear Privacy-Preserving Near-Neighbor Search
M. Sadegh Riazi, Beidi Chen, Anshumali Shrivastava, Dan Wallach, Farinaz Koushanfar
2019/1221
Probabilistic Data Structures in Adversarial Environments
David Clayton, Christopher Patton, Thomas Shrimpton
2019/1220
Side-channel Attacks on Blinded Scalar Multiplications Revisited
Thomas Roche, Laurent Imbert, Victor Lomné
2019/1219
Multi-Locking and Perfect Argument Order: Two Major Improvements of Attribute-Based Encryption~(Long Paper)
Nugier Cyrius, Adelin Remi, Migliore Vincent, Alata Eric
2019/1218
On the Efficiency of Software Implementations of Lightweight Block Ciphers from the Perspective of Programming Languages
Abdur Rehman Raza, Khawir Mahmood, Muhammad Faisal Amjad, Haider Abbas, Mehreen Afzal
2019/1217
A Scalable Blockchain Based Digital Rights Management System
Ashutosh Dhar Dwivedi
2019/1216
Automated Search for Block Cipher Differentials: A GPU-Accelerated Branch-and-Bound Algorithm
Wei-Zhu Yeoh, Je Sen Teh, Jiageng Chen
2019/1215
Anonyma: Anonymous Invitation-Only Registration in Malicious Adversarial Model
Sanaz Taheri Boshrooyeh, Alptekin Küpçü, and Öznur Özkasap
2019/1214
A New Secure and Efficient Ownership Transfer Protocol based on Quadric Residue and Homomorphic Encryption
Farokhlagha Moazami, Masoumeh Safkhani
2019/1213
Exploring Lightweight Efficiency of ForkAES
Fatih Balli, Subhadeep Banik
2019/1212
Swap and Rotate: Lightweight linear layers for SPN-based blockciphers
Subhadeep Banik, Fatih Balli, Francesco Regazzoni, Serge Vaudenay
2019/1211
Topology-Hiding Computation for Networks with Unknown Delays
Rio LaVigne, Chen-Da Liu-Zhang, Ueli Maurer, Tal Moran, Marta Mularczyk, Daniel Tschudi
2019/1210
Adaptive Security of Practical Garbling Schemes
Zahra Jafargholi, Sabine Oechsner
2019/1209
On collisions related to an ideal class of order 3 in CSIDH
Hiroshi Onuki, Tsuyoshi Takagi
2019/1208
Towards Post-Quantum Secure Symmetric Cryptography: A Mathematical Perspective
Xenia Bogomolec, John Gregory Underhill, Stiepan Aurélien Kovac
2019/1207
Behind multiple trapdoors: A cryptographic commitment scheme for establishing secure communications
Borja Gómez
2019/1206
High-Speed Modular Multipliers for Isogeny-Based Post-Quantum Cryptography
Jing Tian, Zhe Liu, Jun Lin, Zhongfeng Wang, Binjing Li
2019/1205
Secure Multi-party Quantum Computation with a Dishonest Majority
Yfke Dulek, Alex Grilo, Stacey Jeffery, Christian Majenz, Christian Schaffner
2019/1204
Efficient simulation of random states and random unitaries
Gorjan Alagic, Christian Majenz, Alexander Russell
2019/1203
Authentication in Key-Exchange: Definitions, Relations and Composition
Cyprien Delpech de Saint Guilhem, Marc Fischlin, Bogdan Warinschi
2019/1202
Rational isogenies from irrational endomorphisms
Wouter Castryck, Lorenz Panny, Frederik Vercauteren
2019/1201
Efficient Redactable Signature and Application to Anonymous Credentials
Olivier Sanders
2019/1200
A note on short invertible ring elements and applications to cyclotomic and trinomials number fields
Thomas Attema, Ronald Cramer, Chaoping Xing
2019/1199
Black-Box Wallets: Fast Anonymous Two-Way Payments for Constrained Devices
Max Hoffmann, Michael Klooß, Markus Raiber, Andy Rupp
2019/1198
Encrypted Databases: New Volume Attacks against Range Queries
Zichen Gui, Oliver Johnson, Bogdan Warinschi
2019/1197
Secret sharing and duality
Laszlo Csirmaz
2019/1196
Evaluating Octic Residue Symbols
Marc Joye
2019/1195
Non-Malleable Commitments Using Goldreich-Levin List Decoding
Vipul Goyal, Silas Richelson
2019/1194
Perfect Forward Security of SPAKE2
Michel Abdalla, Manuel Barbosa
2019/1193
Security models for everlasting privacy
Panagiotis Grontas, Aris Pagourtzis, Alexandros Zacharakis
2019/1192
Polynomials Whose Secret Shares Multiplication Preserves Degree for 2-CNF Circuits Over a Dynamic Set of Secrets
Daniel Berend, Dor Bitan, Shlomi Dolev
2019/1191
On the equivalence of authentication codes and robust (2,2)-threshold schemes
Maura B. Paterson, Douglas R. Stinson
2019/1190
Improving Matsui's Search Algorithm for the Best Differential/Linear Trails and its Applications for DES, DESL and GIFT
Fulei Ji, Wentao Zhang, Tianyou Ding
2019/1189
Security Analysis and Improvements for the IETF MLS Standard for Group Messaging
Joël Alwen, Sandro Coretti, Yevgeniy Dodis, Yiannis Tselekounis
2019/1188
Improving Password Guessing via Representation Learning
Dario Pasquini, Ankit Gangwal, Giuseppe Ateniese, Massimo Bernaschi, Mauro Conti
2019/1187
Adapting Rigidity to Symmetric Cryptography: Towards "Unswerving" Designs
Orr Dunkelman, Léo Perrin
2019/1186
Trading Accumulation Size for Witness Size: A Merkle Tree Based Universal Accumulator Via Subset Differences
Mahabir Prasad Jhanwar, Pratyush Ranjan Tiwari
2019/1185
Formalising $\Sigma$-Protocols and Commitment Schemes using CryptHOL
David Butler, Andreas Lochbihler, David Aspinall, Adria Gascon
2019/1184
A concrete instantiation of Bulletproof zero-knowledge proof
Andrey Jivsov
2019/1183
Broadcast-Optimal Two-Round MPC
Ran Cohen, Juan Garay, Vassilis Zikas
2019/1182
Robust Secret Sharing with Almost Optimal Share Size and Security Against Rushing Adversaries
Serge Fehr, Chen Yuan
2019/1181
Quantum Physical Unclonable Functions: Possibilities and Impossibilities
Myrto Arapinis, Mahshid Delavar, Mina Doosti, Elham Kashefi
2019/1180
Key Recovery from Gram-Schmidt Norm Leakage in Hash-and-Sign Signatures over NTRU Lattices
Pierre-Alain Fouque, Paul Kirchner, Mehdi Tibouchi, Alexandre Wallet, Yang Yu
2019/1179
Practical MP-LWE-based encryption balancing security-risk vs. efficiency
Ron Steinfeld, Amin Sakzad, Raymond K. Zhao
2019/1178
SoK: Sharding on Blockchain
Gang Wang, Zhijie Jerry Shi, Mark Nixon, Song Han
2019/1177
Proofs for Inner Pairing Products and Applications
Benedikt Bünz, Mary Maller, Pratyush Mishra, Nirvan Tyagi, Psi Vesely
2019/1176
The Thirteenth Power Residue Symbol
Eric Brier, David Naccache
2019/1175
Revisiting Leakage Abuse Attacks
Laura Blackstone, Seny Kamara, Tarik Moataz
2019/1174
Hidden Irreducible Polynomials : A cryptosystem based on Multivariate Public Key Cryptography
Borja Gómez
2019/1173
Immunization against Complete Subversion without Random Oracles
Giuseppe Ateniese, Danilo Francati, Bernardo Magri, Daniele Venturi
2019/1172
Lever: Breaking the Shackles of Scalable On-chain Validation
Mingming Wang, Qianhong Wu
2019/1171
Almost universal codes for MIMO wiretap channels
Laura Luzzi, Roope Vehkalahti, Cong Ling
2019/1170
Space-efficient quantum multiplication of polynomials for binary finite fields with sub-quadratic Toffoli gate count
Iggy van Hoof
2019/1169
Semantically Secure Lattice Codes for Compound MIMO Channels
Antonio Campello, Cong Ling, Jean-Claude Belfiore
2019/1168
Better Concrete Security for Half-Gates Garbling (in the Multi-Instance Setting)
Chun Guo, Jonathan Katz, Xiao Wang, Chenkai Weng, Yu Yu
2019/1167
BLAZE: Practical Lattice-Based Blind Signatures for Privacy-Preserving Applications
Nabil Alkeilani Alkadri, Rachid El Bansarkhani, Johannes Buchmann
2019/1166
The complete cost of cofactor h=1
Peter Schwabe, Amber Sprenkels
2019/1165
Fast verification of masking schemes in characteristic two
Nicolas Bordes, Pierre Karpman
2019/1164
Identity-Concealed Authenticated Encryption from Ring Learning With Errors (Full version)
Chao Liu, Zhongxiang Zheng, Keting Jia, Limin Tao
2019/1163
On the Difficulty of FSM-based Hardware Obfuscation
Marc Fyrbiak, Sebastian Wallat, Jonathan Déchelotte, Nils Albartus, Sinan Böcker, Russell Tessier, Christof Paar
2019/1162
Subversion-Resistant Simulation (Knowledge) Sound NIZKs
Karim Baghery
2019/1161
Estimating quantum speedups for lattice sieves
Martin R. Albrecht, Vlad Gheorghiu, Eamonn W. Postlethwaite, John M. Schanck
2019/1160
Cryptanalysis of the Multivariate Encryption Scheme EFLASH
Morten Øygarden, Patrick Felke, Håvard Raddum, Carlos Cid
2019/1159
Efficient Two-Round OT Extension and Silent Non-Interactive Secure Computation
Elette Boyle, Geoffroy Couteau, Niv Gilboa, Yuval Ishai, Lisa Kohl, Peter Rindal, Peter Scholl
2019/1158
Practical Privacy-Preserving K-means Clustering
Payman Mohassel, Mike Rosulek, Ni Trieu
2019/1157
A Note on the Chi-square Method : A Tool for Proving Cryptographic Security
Srimanta Bhattacharya, Mridul Nandi
2019/1156
How to Extract Useful Randomness from Unreliable Sources
Divesh Aggarwal, Maciej Obremski, João Ribeiro, Luisa Siniscalchi, Ivan Visconti
2019/1155
Machine-Checked Proofs for Cryptographic Standards
José Bacelar Almeida, Cécile Baritel-Ruet, Manuel Barbosa, Gilles Barthe, François Dupressoir, Benjamin Grégoire, Vincent Laporte, Tiago Oliveira, Alley Stoughton, Pierre-Yves Strub
2019/1154
The Retracing Boomerang Attack
Orr Dunkelman, Nathan Keller, Eyal Ronen, Adi Shamir
2019/1153
Stronger Security and Constructions of Multi-Designated Verifier Signatures
Ivan Damgård, Helene Haagh, Rebekah Mercer, Anca Nițulescu, Claudio Orlandi, Sophia Yakoubov
2019/1152
Active Fences against Voltage-based Side Channels in Multi-Tenant FPGAs
Jonas Krautter, Dennis R. E. Gnad, Falk Schellenberg, Amir Moradi, Mehdi B. Tahoori
2019/1151
Non-Committing Encryption with Quasi-Optimal Ciphertext-Rate Based on the DDH Problem
Yusuke Yoshida, Fuyuki Kitagawa, Keisuke Tanaka
2019/1150
The Bitcoin Backbone Protocol Against Quantum Adversaries
Alexandru Cojocaru, Juan Garay, Aggelos Kiayias, Fang Song, Petros Wallden
2019/1149
LockDown: Balance Availability Attack against Lightning Network Channels
Cristina Pérez-Solà, Alejandro Ranchal-Pedrosa, Jordi Herrera-Joancomartí, Guillermo Navarro-Arribas, Joaquin Garcia-Alfaro
2019/1148
On the Feasibility and Impact of Standardising Sparse-secret LWE Parameter Sets for Homomorphic Encryption
Benjamin R. Curtis, Rachel Player
2019/1147
Batching non-membership proofs with bilinear accumulators
Steve Thakur
2019/1146
Implementing Grover oracles for quantum key search on AES and LowMC
Samuel Jaques, Michael Naehrig, Martin Roetteler, Fernando Virdia
2019/1145
B-SIDH: supersingular isogeny Diffie-Hellman using twisted torsion
Craig Costello
2019/1144
Rerandomizable Signatures under Standard Assumption
Sanjit Chatterjee, R. Kabaleeshwaran
2019/1143
Auditable Compressed Storage
Iraklis Leontiadis, Reza Curtmola
2019/1142
Lattice Reduction for Modules, or How to Reduce ModuleSVP to ModuleSVP
Tamalika Mukherjee, Noah Stephens-Davidowitz
2019/1141
KORGAN: An Efficient PKI Architecture Based on PBFT Through Dynamic Threshold Signatures
Murat Yasin Kubilay, Mehmet Sabir Kiraz, Haci Ali Mantar
2019/1140
Sapphire: A Configurable Crypto-Processor for Post-Quantum Lattice-based Protocols (Extended Version)
Utsav Banerjee, Tenzin S. Ukyab, Anantha P. Chandrakasan
2019/1139
Coded Merkle Tree: Solving Data Availability Attacks in Blockchains
Mingchao Yu, Saeid Sahraei, Songze Li, Salman Avestimehr, Sreeram Kannan, Pramod Viswanath
2019/1138
ChainSplitter: Towards Blockchain-based Industrial IoT Architecture for Supporting Hierarchical Storage
Gang Wang, Zhijie Jerry Shi, Mark Nixon, Song Han
2019/1137
On the Complexity of Arithmetic Secret Sharing
Ronald Cramer, Chaoping Xing, Chen Yuan
2019/1136
An implementation of the Paillier crypto system with threshold decryption without a trusted dealer
Thijs Veugen, Thomas Attema, Gabriele Spini
2019/1135
A Provably Secure Conditional Proxy Re-Encryption Scheme without Pairing
Arinjita Paul, S. Sharmila Deva Selvi, C. Pandu Rangan
2019/1134
Blackbox Secret Sharing Revisited: A Coding-Theoretic Approach with Application to Expansionless Near-Threshold Schemes
Ronald Cramer, Chaoping Xing
2019/1133
Threat Models and Security of Phase-Change Memory
Gang Wang
2019/1132
Lower Bounds for Encrypted Multi-Maps and Searchable Encryption in the Leakage Cell Probe Model
Sarvar Patel, Giuseppe Persiano, Kevin Yeo
2019/1131
Nearly Optimal Robust Secret Sharing against Rushing Adversaries
Pasin Manurangsi, Akshayaram Srinivasan, Prashant Nalini Vasudevan
2019/1130
On affine Cremona semigroups, corresponding protocols of Non-commutative Cryptography and encryption with several nonlinear multivariate transformations on secure Eulerian mode.
V. Ustimenko
2019/1129
Privacy-Enhanced Machine Learning with Functional Encryption
Tilen Marc, Miha Stopar, Jan Hartman, Manca Bizjak, Jolanda Modic
2019/1128
SoK: Communication Across Distributed Ledgers
Alexei Zamyatin, Mustafa Al-Bassam, Dionysis Zindros, Eleftherios Kokoris-Kogias, Pedro Moreno-Sanchez, Aggelos Kiayias, William J. Knottenbelt
2019/1127
Symmetric-key Corruption Detection : When XOR-MACs Meet Combinatorial Group Testing
Kazuhiko Minematsu, Norifumi Kamiya
2019/1126
Encrypted Distributed Dictionaries
Archita Agarwal, Seny Kamara
2019/1125
Breaking Anonymity of Some Recent Lightweight RFID Authentication Protocols
Karim Baghery, Behzad Abdolmaleki, Shahram Khazaei, Mohammad Reza Aref
2019/1124
Evolving Ramp Secret Sharing with a Small Gap
Amos Beimel, Hussien Othman
2019/1123
FSPVDsse: A Forward Secure Publicly Verifiable Dynamic SSE scheme
Laltu Sardar, Sushmita Ruj
2019/1122
Exploring Trade-offs in Batch Bounded Distance Decoding
Martin R. Albrecht, Benjamin R. Curtis, Thomas Wunderer
2019/1121
Further Optimizations of CSIDH: A Systematic Approach to Efficient Strategies, Permutations, and Bound Vectors
Aaron Hutchinson, Jason LeGrow, Brian Koziel, Reza Azarderakhsh
2019/1120
Structure-Preserving Signatures on Equivalence Classes From Standard Assumptions
Mojtaba Khalili, Daniel Slamanig, Mohammad Dakhilalian
2019/1119
MicroSCOPE: Enabling Access Control in Searchable Encryption with the use of Attribute-based Encryption and SGX (Extended Version)
Antonis Michalas, Alexandros Bakas, Hai-Van Dang, Alexandr Zalitko
2019/1118
A Diffie-Hellman quantum session key establishment protocol without entanglement
Yalin Chen, Chang Hsiang, Liang-Chun Wang, Yu-Yuan Chou, Jue-Sam Chou
2019/1117
NP-completeness Reduction for Semiprimes Factorization Problem
Yen-Lung Lai
2019/1116
Computational Extractors with Negligible Error in the CRS Model
Ankit Garg, Yael Tauman Kalai, Dakshita Khurana
2019/1115
Collision Attacks on Round-Reduced Gimli-Hash/Ascon-Xof/Ascon-Hash
Rui Zong, Xiaoyang Dong, Xiaoyun Wang
2019/1114
A Hybrid of Dual and Meet-in-the-Middle Attack on Sparse and Ternary Secret LWE
Jung Hee Cheon, Minki Hhan, Seungwan Hong, Yongha Son
2019/1113
Towards a Homomorphic Machine Learning Big Data Pipeline for the Financial Services Sector
Oliver Masters, Hamish Hunt, Enrico Steffinlongo, Jack Crawford, Flavio Bergamaschi, Maria E. Dela Rosa, Caio C. Quini, Camila T. Alves, Feranda de Souza, Deise G. Ferreira
2019/1112
Subliminal Hash Channels
George Teseleanu
2019/1111
Short Paper: Towards Characterizing Sybil Attacks in Cryptocurrency Mixers
Mikerah Quintyne-Collins
2019/1110
Redactable Proof-of-Stake Blockchain with Fast Confirmation
Jing Xu, Xinyu Li, Lingyuan Yin, Bingyong Guo, Han Feng, Zhenfeng Zhang
2019/1109
Revisiting Multivariate Ring Learning with Errors and its Applications on Lattice-based Cryptography
Alberto Pedrouzo-Ulloa, Juan Ramón Troncoso-Pastoriza, Nicolas Gama, Mariya Georgieva, Fernando Pérez-González
2019/1108
Lower Bounds for Multi-Server Oblivious RAMs
Kasper Green Larsen, Mark Simkin, Kevin Yeo
2019/1107
On a Generalization of Substitution-Permutation Networks: The HADES Design Strategy
Lorenzo Grassi, Reinhard Lüftenegger, Christian Rechberger, Dragos Rotaru, Markus Schofnegger
2019/1106
Side-channel Masking with Pseudo-Random Generator
Jean-Sébastien Coron, Aurélien Greuet, Rina Zeitoun
2019/1105
On the Multi-User Security of Short Schnorr Signatures with Preprocessing
Jeremiah Blocki, Seunghoon Lee
2019/1104
More Efficient MPC from Improved Triple Generation and Authenticated Garbling
Kang Yang, Xiao Wang, Jiang Zhang
2019/1103
Multisketches: Practical Secure Sketches Using Off-the-Shelf Biometric Matching Algorithms
Rahul Chatterjee, M. Sadegh Riazi, Tanmoy Chowdhury, Emanuela Marasco, Farinaz Koushanfar, Ari Juels
2019/1102
Applications on traceable range proofs from fully regulatable privacy-preserving blockchains
Wulu Li, Lei Chen, Xin Lai, Xiao Zhang, Jiajun Xin
2019/1101
On the (Quantum) Random Oracle Methodology: New Separations and More
Jiang Zhang, Yu Yu, Dengguo Feng, Shuqin Fan, Zhenfeng Zhang
2019/1100
Efficient Explicit Constructions of Multipartite Secret Sharing Schemes
Qi Chen, Chunming Tang, Zhiqiang Lin
2019/1099
On the Feasibility of Fine-Grained TLS Security Configurations in Web Browsers Based on the Requested Domain Name
Eman Salem Alashwali, Kasper Rasmussen
2019/1098
Full-Threshold Actively-Secure Multiparty Arithmetic Circuit Garbling
Eleftheria Makri, Tim Wood
2019/1097
Anonymous Transactions with Revocation and Auditing in Hyperledger Fabric
Dmytro Bogatov, Angelo De Caro, Kaoutar Elkhiyaoui, Björn Tackmann
2019/1096
Proof-of-Burn
Kostis Karantias, Aggelos Kiayias, Dionysis Zindros
2019/1095
Secure Computation with Preprocessing via Function Secret Sharing
Elette Boyle, Niv Gilboa, Yuval Ishai
2019/1094
Is Information-Theoretic Topology-Hiding Computation Possible?
Marshall Ball, Elette Boyle, Ran Cohen, Tal Malkin, Tal Moran
2019/1093
Quantum Random Oracle Model with Auxiliary Input
Minki Hhan, Keita Xagawa, Takashi Yamakawa
2019/1092
Cerberus Channels: Incentivizing Watchtowers for Bitcoin
Georgia Avarikioti, Orfeas Stefanos Thyfronitis Litos, Roger Wattenhofer
2019/1091
Short Paper: XOR Arbiter PUFs have Systematic Response Bias
Nils Wisiol, Niklas Pirnay
2019/1090
Low Complexity MDS Matrices Using $GF(2^n)$ SPB or GPB
Xinggu Chen, Haining Fan
2019/1089
Lattice-Face Key Infrastructure (LFKI) for Quantum Resistant Computing
Josiah Johnson Umezurike
2019/1088
KRNC: New Foundations for Permissionless Byzantine Consensus and Global Monetary Stability
Clinton Ehrlich, Anna Guzova
2019/1087
Cryptanalysis of a Protocol for Efficient Sorting on SHE Encrypted Data
Shyam Murthy, Srinivas Vivek
2019/1086
The SPHINCS+ Signature Framework
Daniel J. Bernstein, Andreas Hülsing, Stefan Kölbl, Ruben Niederhagen, Joost Rijneveld, Peter Schwabe
2019/1085
Matrix PRFs: Constructions, Attacks, and Applications to Obfuscation
Yilei Chen, Minki Hhan, Vinod Vaikuntanathan, Hoeteck Wee
2019/1084
Distributed Vector-OLE: Improved Constructions and Implementation
Phillipp Schoppmann, Adrià Gascón, Leonie Reichert, Mariana Raykova
2019/1083
What's in a Downgrade? A Taxonomy of Downgrade Attacks in the TLS Protocol and Application Protocols Using TLS
Eman Salem Alashwali, Kasper Rasmussen
2019/1082
On the Security of Multikey Homomorphic Encryption
Hyang-Sook Lee, Jeongeun Park
2019/1081
OCEAN: A Built-In Replacement for Mining Pools
Raymond Chee, Kartik Chitturi, Edouard Dufour-Sans, Kyle Soska
2019/1080
Preimages and Collisions for Up to 5-Round Gimli-Hash Using Divide-and-Conquer Methods
Fukang Liu, Takanori Isobe, Willi Meier
2019/1079
When NTT Meets Karatsuba: Preprocess-then-NTT Technique Revisited
Yiming Zhu, Zhen Liu, Yanbin Pan
2019/1078
Puncturable Proxy Re-Encryption supporting to Group Messaging Service
Tran Viet Xuan Phuong, Willy Susilo, Jongkil Kim, Guomin Yang, Dongxi Liu
2019/1077
Adaptively Secure Garbling Schemes for Parallel Computations
Kai-Min Chung, Luowen Qian
2019/1076
Fractal: Post-Quantum and Transparent Recursive Proofs from Holography
Alessandro Chiesa, Dev Ojha, Nicholas Spooner
2019/1075
Private Information Retrieval with Sublinear Online Time
Henry Corrigan-Gibbs, Dmitry Kogan
2019/1074
Non-monotonic Practical ABE with Direct Revocation, Blackbox Traceability, and a Large Attribute Universe
Dirk Thatmann
2019/1073
iUC: Flexible Universal Composability Made Simple
Jan Camenisch, Stephan Krenn, Ralf Kuesters, Daniel Rausch
2019/1072
Rate-1 Trapdoor Functions from the Diffie-Hellman Problem
Nico Döttling, Sanjam Garg, Mohammad Hajiabadi, Kevin Liu, Giulio Malavolta
2019/1071
DLSCA: a Tool for Deep Learning Side Channel Analysis
Martin Brisfors, Sebastian Forsmark
2019/1070
Secure Delegation of Isogeny Computations and Cryptographic Applications
Robi Pedersen, Osmanbey Uzunkol
2019/1069
Efficient Private PEZ Protocols for Symmetric Functions
Yoshiki Abe, Mitsugu Iwamoto, Kazuo Ohta
2019/1068
Not a Free Lunch but a Cheap Lunch: Experimental Results for Training Many Neural Nets Efficiently
Joey Green, Tilo Burghardt, Elisabeth Oswald
2019/1067
Lattice Trapdoors and IBE from Middle-Product LWE
Alex Lombardi, Vinod Vaikuntanathan, Thuy Duong Vuong
2019/1066
HEAX: An Architecture for Computing on Encrypted Data
M. Sadegh Riazi, Kim Laine, Blake Pelton, Wei Dai
2019/1065
Subversion-Resistant Commitment Schemes: Definitions and Constructions
Karim Baghery
2019/1064
Separating Symmetric and Asymmetric Password-Authenticated Key Exchange
Julia Hesse
2019/1063
A Framework for UC-Secure Commitments from Publicly Computable Smooth Projective Hashing
Behzad Abdolmaleki, Hamidreza Khoshakhlagh, Daniel Slamanig
2019/1062
Local Proofs Approaching the Witness Length
Noga Ron-Zewi, Ron D. Rothblum
2019/1061
Breaking and Fixing Anonymous Credentials for the Cloud
Ulrich Haböck, Stephan Krenn
2019/1060
Sharing the LUOV: Threshold Post-Quantum Signatures
Daniele Cozzo, Nigel P. smart
2019/1059
A New Method for Geometric Interpretation of Elliptic Curve Discrete Logarithm Problem
Daniele Di Tullio, Ankan Pal
2019/1058
Privacy-preserving auditable token payments in a permissioned blockchain system
Elli Androulaki, Jan Camenisch, Angelo De Caro, Maria Dubovitskaya, Kaoutar Elkhiyaoui, Björn Tackmann
2019/1057
A Study of Persistent Fault Analysis
Andrea Caforio, Subhadeep Banik
2019/1056
Adventures in Supersingularland
Sarah Arpin, Catalina Camacho-Navarro, Kristin Lauter, Joelle Lim, Kristina Nelson, Travis Scholl, Jana Sotáková
2019/1055
Dynamic Searchable Symmetric Encryption with Forward and Stronger Backward Privacy
Cong Zuo, Shi-Feng Sun, Joseph K. Liu, Jun Shao, Josef Pieprzyk
2019/1054
Truthful and Faithful Monetary Policy for a Stablecoin Conducted by a Decentralised, Encrypted Artificial Intelligence
David Cerezo Sánchez
2019/1053
Modeling Memory Faults in Signature and Authenticated Encryption Schemes
Marc Fischlin, Felix Günther
2019/1052
Improved Cryptanalysis of the KMOV Elliptic Curve Cryptosystem
Abderrahmane Nitaj, Willy Susilo, Joseph Tonien
2019/1051
A New Public Key Cryptosystem Based on Edwards Curves
Maher Boudabra, Abderrahmane Nitaj
2019/1050
A New Attack on RSA and Demytko's Elliptic Curve Cryptosystem
Abderrahmane Nitaj, Emmanuel Fouotsa
2019/1049
CrypTFlow: Secure TensorFlow Inference
Nishant Kumar, Mayank Rathee, Nishanth Chandran, Divya Gupta, Aseem Rastogi, Rahul Sharma
2019/1048
New point compression method for elliptic $\mathbb{F}_{\!q^2}$-curves of $j$-invariant $0$
Dmitrii Koshelev
2019/1047
Marlin: Preprocessing zkSNARKs with Universal and Updatable SRS
Alessandro Chiesa, Yuncong Hu, Mary Maller, Pratyush Mishra, Psi Vesely, Nicholas Ward
2019/1046
The Function-Inversion Problem: Barriers and Opportunities
Henry Corrigan-Gibbs, Dmitry Kogan
2019/1045
Predicate Encryption from Bilinear Maps and One-Sided Probabilistic Rank
Josh Alman, Robin Hui
2019/1044
Verifiable Registration-Based Encryption
Rishab Goyal, Satyanarayana Vusirikala
2019/1043
Breaking the Bluetooth Pairing – The Fixed Coordinate Invalid Curve Attack
Eli Biham, Lior Neumann
2019/1042
A Machine-Checked Proof of Security for AWS Key Management Service
José Bacelar Almeida, Manuel Barbosa, Gilles Barthe, Matthew Campagna, Ernie Cohen, Benjamin Gregoire, Vitor Pereira, Bernardo Portela, Pierre-Yves Strub, Serdar Tasiran
2019/1041
A Conditional Privacy Preserving Authentication and Multi Party Group Key Establishment Scheme for Real-Time Application in VANETs
Swapnil Paliwal, Anvita Chandrakar
2019/1040
Hardware-Software Co-Design Based Obfuscation of Hardware Accelerators
Abhishek Chakraborty, Ankur Srivastava
2019/1039
Accelerated V2X provisioning with Extensible Processor Platform
Henrique S. Ogawa, Thomas E. Luther, Jefferson E. Ricardini, Helmiton Cunha, Marcos Simplicio Jr., Diego F. Aranha, Ruud Derwig, Harsh Kupwade-Patil
2019/1038
Dynamic Searchable Encryption with Access Control
Johannes Blömer, Nils Löken
2019/1037
Card-based Cryptography Meets Formal Verification
Alexander Koch, Michael Schrempp, Michael Kirsten
2019/1036
Post-Quantum Variants of ISO/IEC Standards: Compact Chosen Ciphertext Secure Key Encapsulation Mechanism from Isogenies
Kazuki Yoneyama
2019/1035
An LLL Algorithm for Module Lattices
Changmin Lee, Alice Pellet-Mary, Damien Stehlé, Alexandre Wallet
2019/1034
Sponges Resist Leakage: The Case of Authenticated Encryption
Jean Paul Degabriele, Christian Janson, Patrick Struck
2019/1033
Anonymous AE
John Chan, Phillip Rogaway
2019/1032
On Fully Secure MPC with Solitary Output
Shai Halevi, Yuval Ishai, Eyal Kushilevitz, Nikolaos Makriyannis, Tal Rabin
2019/1031
An efficient and secure ID-based multi-proxy multi-signature scheme based on lattice
Rahim Toluee, Taraneh Eghlidos
2019/1030
How to leverage hardness of constant degree expanding polynomials over R to build iO
Aayush Jain, Huijia Lin, Christian Matt, Amit Sahai
2019/1029
Approximate Trapdoors for Lattices and Smaller Hash-and-Sign Signatures
Yilei Chen, Nicholas Genise, Pratyay Mukherjee
2019/1028
Faster Sieving Algorithm for Approximate SVP with Constant Approximation Factors
Divesh Aggarwal, Bogdan Ursu, Serge Vaudenay
2019/1027
Quantum LLL with an Application to Mersenne Number Cryptosystems
Marcel Tiepelt, Alan Szepieniec
2019/1026
Efficient Tightly-Secure Structure-Preserving Signatures and Unbounded Simulation-Sound QA-NIZK Proofs
Mojtaba Khalili, Daniel Slamanig
2019/1025
On Perfect Correctness without Derandomization
Gilad Asharov, Naomi Ephraim, Ilan Komargodski, Rafael Pass
2019/1024
Optimal-Round Preprocessing-MPC via Polynomial Representation and Distributed Random Matrix
Dor Bitan, Shlomi Dolev
2019/1023
Randomly Choose an Angle from Immense Number of Angles to Rotate Qubits, Compute and Reverse
Dor Bitan, Shlomi Dolev
2019/1022
A Simple and Efficient Key Reuse Attack on NTRU Cryptosystem
Jintai Ding, Joshua Deaton, Kurt Schmidt, Vishakha, Zheng Zhang
2019/1021
Recursive Proof Composition without a Trusted Setup
Sean Bowe, Jack Grigg, Daira Hopwood
2019/1020
Transparent Polynomial Commitment Scheme with Polylogarithmic Communication Complexity
Alexander Vlasov, Konstantin Panarin
2019/1019
Revisiting the Hybrid attack on sparse and ternary secret LWE
Yongha Son, Jung Hee Cheon
2019/1018
Towards Instantiating the Algebraic Group Model
Julia Kastner, Jiaxin Pan
2019/1017
The Local Forking Lemma and its Application to Deterministic Encryption
Mihir Bellare, Wei Dai, Lucy Li
2019/1016
Quantum Algorithms for the Approximate $k$-List Problem and their Application to Lattice Sieving
Elena Kirshanova, Erik Mårtensson, Eamonn W. Postlethwaite, Subhayan Roy Moulik
2019/1015
Asynchronous Distributed Key Generation for Computationally-Secure Randomness, Consensus, and Threshold Signatures.
Eleftherios Kokoris-Kogias, Dahlia Malkhi, Alexander Spiegelman
2019/1014
Security Reductions for White-Box Key-Storage in Mobile Payments
Estuardo Alpirez Bock, Chris Brzuska, Marc Fischlin, Christian Janson, Wil Michiels
2019/1013
A Critical Analysis of ISO 17825 (`Testing methods for the mitigation of non-invasive attack classes against cryptographic modules')
Carolyn Whitnall, Elisabeth Oswald
2019/1012
Simple and Efficient KDM-CCA Secure Public Key Encryption
Fuyuki Kitagawa, Takahiro Matsuda, Keisuke Tanaka
2019/1011
COSAC: COmpact and Scalable Arbitrary-Centered Discrete Gaussian Sampling over Integers
Raymond K. Zhao, Ron Steinfeld, Amin Sakzad
2019/1010
On Perfect Correctness in (Lockable) Obfuscation
Rishab Goyal, Venkata Koppula, Satyanarayana Vusirikala, Brent Waters
2019/1009
LLL and stochastic sandpile models
Jintai Ding, Seungki Kim, Tsuyoshi Takagi, Yuntao Wang
2019/1008
Side-Channel Countermeasures' Dissection and the Limits of Closed Source Security Evaluations
Olivier Bronchain, François-Xavier Standaert
2019/1007
SPAE a mode of operation for AES on low-cost hardware
Philippe Elbaz-Vincent, Cyril Hugounenq, Sébastien Riou
2019/1006
Lucente Stabile Atkins (LSA) Cryptosystem (Unbreakable)
Francesco Lucente Stabile, Carey Patrick Atkins
2019/1005
Threshold Implementations in the Robust Probing Model
Siemen Dhooghe, Svetla Nikova, Vincent Rijmen
2019/1004
Forkcipher: a New Primitive for Authenticated Encryption of Very Short Messages
Elena Andreeva, Virginie Lallemand, Antoon Purnal, Reza Reyhanitabar, Arnab Roy, Damian Vizar
2019/1003
Twisted Hessian Isogenies
Thinh Dang, Dustin Moody
2019/1002
Boomerang Uniformity of Popular S-box Constructions
Shizhu Tian, Christina Boura, Léo Perrin
2019/1001
Middle-Product Learning with Rounding Problem and its Applications
Shi Bai, Katharina Boudgoust, Dipayan Das, Adeline Roux-Langlois, Weiqiang Wen, Zhenfei Zhang
2019/1000
Security of Symmetric Primitives against Key-Correlated Attacks
Aisling Connolly, Pooya Farshim, Georg Fuchsbauer
2019/999
On the Fast Algebraic Immunity of Majority Functions
Pierrick Méaux
2019/998
Beyond Honest Majority: The Round Complexity of Fair and Robust Multi-party Computation
Arpita Patra, Divya Ravi
2019/997
On the (In)security of Kilian-Based SNARGs
James Bartusek, Liron Bronfman, Justin Holmgren, Fermi Ma, Ron Rothblum
2019/996
Pseudorandom Black Swans: Cache Attacks on CTR_DRBG
Shaanan Cohney, Andrew Kwong, Shachar Paz, Daniel Genkin, Nadia Heninger, Eyal Ronen, Yuval Yarom
2019/995
Blackbox Constructions from Mix-Nets
Douglas Wikström
2019/994
A new family of APN quadrinomials
Lilya Budaghyan, Tor Helleseth, Nikolay Kaleyski
2019/993
Private Set Relations with Bloom Filters for Outsourced SLA Validation
Louis Tajan, Dirk Westhoff, Frederik Armknecht
2019/992
Duel of the Titans: The Romulus and Remus Families of Lightweight AEAD Algorithms
Tetsu Iwata, Mustafa Khairallah, Kazuhiko Minematsu, Thomas Peyrin
2019/991
Vectorized linear approximations for attacks on SNOW 3G
Jing Yang, Thomas Johansson, Alexander Maximov
2019/990
Efficient Range-Trapdoor Functions and Applications: Rate-1 OT and More
Sanjam Garg, Mohammad Hajiabadi, Rafail Ostrovsky
2019/989
Substitution Attacks against Message Authentication
Marcel Armour, Bertram Poettering
2019/988
RAMPARTS: A Programmer-Friendly System for Building Homomorphic Encryption Applications
David W. Archer, Jose Manuel Calderon Trilla, Jason Dagit, Alex J. Malozemoff, Yuriy Polyakov, Kurt Rohloff, Gerard Ryan
2019/987
Subverting Decryption in AEAD
Marcel Armour, Bertram Poettering
2019/986
Outpost: A Responsive Lightweight Watchtower
Majid Khabbazian, Tejaswi Nadahalli, Roger Wattenhofer
2019/985
EthDKG: Distributed Key Generation with Ethereum Smart Contracts
Philipp Schindler, Aljosha Judmayer, Nicholas Stifter, Edgar Weippl
2019/984
Collusion Resistant Trace-and-Revoke for Arbitrary Identities from Standard Assumptions
Sam Kim, David J. Wu
2019/983
Graph Similarity and Its Applications to Hardware Security
Marc Fyrbiak, Sebastian Wallat, Sascha Reinhard, Nicolai Bissantz, Christof Paar
2019/982
CCA-Secure Leakage-Resilient Identity-Based Key-Encapsulation from Simple (not $\mathtt{q}$-type) Assumptions
Toi Tomita, Wakaha Ogata, Kaoru Kurosawa, Ryo Kuwayama
2019/981
Traceback for End-to-End Encrypted Messaging
Nirvan Tyagi, Ian Miers, Thomas Ristenpart
2019/980
New Approaches to Traitor Tracing with Embedded Identities
Rishab Goyal, Venkata Koppula, Brent Waters
2019/979
PrivFL: Practical Privacy-preserving Federated Regressions on High-dimensional Data over Mobile Networks
Kalikinkar Mandal, Guang Gong
2019/978
Strength in Numbers: Improving Generalization with Ensembles in Profiled Side-channel Analysis
Guilherme Perin, Lukasz Chmielewski, Stjepan Picek
2019/977
Non-malleable Zero-Knowledge Arguments with Lower Round Complexity
Zhenbin Yan, Yi Deng
2019/976
Towards real-time hidden speaker recognition by means of fully homomorphic encryption
Martin Zuber, Sergiu Carpov, Renaud Sirdey
2019/975
Ci-Lock: Cipher Induced Logic Locking Resistant Against SAT Attacks
Akashdeep Saha, Sayandeep Saha, Debdeep Mukhopadhyay, Bhargab Bikram Bhattacharya
2019/974
Zaphod: Efficiently Combining LSSS and Garbled Circuits in SCALE
Abdelrahaman Aly, Emmanuela Orsini, Dragos Rotaru, Nigel P. Smart, Tim Wood
2019/973
On the Non-Existence of Short Vectors in Random Module Lattices
Ngoc Khanh Nguyen
2019/972
Noninteractive Zero Knowledge Proof System for NP from Ring LWE
Wenping MA
2019/971
Verifpal: Cryptographic Protocol Analysis for the Real World
Nadim Kobeissi, Georgio Nicolas, Mukesh Tiwari
2019/970
Puncturable Signatures and Applications in Proof-of-Stake Blockchain Protocol
Xinyu Li, Jing Xu, Xiong Fan, Yuchen Wang, Zhenfeng Zhang
2019/969
Succinct Arguments for Bilinear Group Arithmetic: Practical Structure-Preserving Cryptography
Russell W. F. Lai, Giulio Malavolta, Viktoria Ronge
2019/968
There Are 10 Types of Vectors (and Polynomials): Efficient Zero-Knowledge Proofs of "One-Hotness" via Polynomials with One Zero
William Black, Ryan Henry
2019/967
On NIST's Compression Estimate Test
Prasanna Raghaw Mishra, Bhartendu Nandan, Navneet Gaba
2019/966
Fast, Compact, and Expressive Attribute-Based Encryption
Junichi Tomida, Yuto Kawahara, Ryo Nishimaki
2019/965
Beyond Security and Efficiency: On-Demand Ratcheting with Security Awareness
Andrea Caforio, F Betül Durak, Serge Vaudenay
2019/964
WI Is Not Enough: Zero-Knowledge Contingent (Service) Payments Revisited
Georg Fuchsbauer
2019/963
Faster homomorphic encryption is not enough: improved heuristic for multiplicative depth minimization of Boolean circuits
Pascal Aubry, Sergiu Carpov, Renaud Sirdey
2019/962
New Constructions of Hinting PRGs, OWFs with Encryption, and more
Rishab Goyal, Satyanarayana Vusirikala, Brent Waters
2019/961
Computing across Trust Boundaries using Distributed Homomorphic Cryptography
Christian Mouchet, Juan Troncoso-Pastoriza, Jean-Pierre Hubaux
2019/960
Another Look at Key Randomisation Hypotheses
Subhabrata Samajder, Palash Sarkar
2019/959
Table Redundancy Method for Protecting against Fault Attacks
Seungkwang Lee, Nam-su Jho, Myungchul Kim
2019/958
Using SMT Solvers to Automate Chosen Ciphertext Attacks
Gabrielle Beck, Maximilian Zinkus, Matthew Green
2019/957
TaaS: Commodity MPC via Triples-as-a-Service
Nigel P. Smart, Titouan Tanguy
2019/956
Security of Hedged Fiat-Shamir Signatures under Fault Attacks
Diego F. Aranha, Claudio Orlandi, Akira Takahashi, Greg Zaverucha
2019/955
Structure-Preserving and Re-randomizable RCCA-secure Public Key Encryption and its Applications
Antonio Faonio, Dario Fiore, Javier Herranz, Carla Ràfols
2019/954
CPA on Hardware Implementation of COLM Authenticated Cipher and Protect it with DOM Masking Scheme
Mohsen Jahanbani, Zeinolabedin Norouzi, Nasour Bagheri
2019/953
PLONK: Permutations over Lagrange-bases for Oecumenical Noninteractive arguments of Knowledge
Ariel Gabizon, Zachary J. Williamson, and Oana Ciobotaru
2019/952
Non-Interactive Zero Knowledge Proofs in the Random Oracle Model
Vincenzo Iovino, Ivan Visconti
2019/951
Collisions on Feistel-MiMC and univariate GMiMC
Xavier Bonnetain
2019/950
Another look at some isogeny hardness assumptions
Simon-Philipp Merz, Romy Minko, Christophe Petit
2019/949
A Note on Parameter Choices of Round5
Yongha Son
2019/948
Generic Side-channel attacks on CCA-secure lattice-based PKE and KEM schemes
Prasanna Ravi, Sujoy Sinha Roy, Anupam Chattopadhyay, Shivam Bhasin
2019/947
nGraph-HE2: A High-Throughput Framework for Neural Network Inference on Encrypted Data
Fabian Boemer, Anamaria Costache, Rosario Cammarota, Casimir Wierzynski
2019/946
Dynamically Obfuscated Scan Chain To Resist Oracle-Guided Attacks On Logic Locked Design
M Sazadur Rahman, Adib Nahiyan, Sarah Amir, Fahim Rahman, Farimah Farahmandi, Domenic Forte, Mark Tehranipoor
2019/945
A Key-Independent Distinguisher for 6-round AES in an Adaptive Setting
Navid Ghaedi Bardeh
2019/944
Efficient zero-knowledge arguments in the discrete log setting, revisited
Max Hoffmann, Michael Klooß, Andy Rupp
2019/943
Analysis of Nakamoto Consensus
Ling Ren
2019/942
Ouroboros Clepsydra: Ouroboros Praos in the Universally Composable Relative Time Model
Handan Kılınç Alper
2019/941
Does "www." Mean Better Transport Layer Security?
Eman Salem Alashwali, Pawel Szalachowski, Andrew Martin
2019/940
Security analysis of two lightweight certificateless signature schemes
Nasrollah Pakniat
2019/939
Homomorphic Encryption Standard
Martin Albrecht, Melissa Chase, Hao Chen, Jintai Ding, Shafi Goldwasser, Sergey Gorbunov, Shai Halevi, Jeffrey Hoffstein, Kim Laine, Kristin Lauter, Satya Lokam, Daniele Micciancio, Dustin Moody, Travis Morrison, Amit Sahai, Vinod Vaikuntanathan
2019/938
Low-Memory Attacks against Two-Round Even-Mansour using the 3-XOR Problem
Gaëtan Leurent, Ferdinand Sibleyras
2019/937
Fault Template Attacks on Block Ciphers Exploiting Fault Propagation
Sayandeep Saha, Arnab Bag, Debapriya Basu Roy, Sikhar Patranabis, Debdeep Mukhopadhyay
2019/936
SNEIK on Microcontrollers: AVR, ARMv7-M, and RISC-V with Custom Instructions
Markku-Juhani O. Saarinen
2019/935
Interpretable Encrypted Searchable Neural Networks
Kai Chen, Zhongrui Lin, Jian Wan, Chungen Xu
2019/934
Linear Approximations of Random Functions and Permutations
Mohsin Khan, Kaisa Nyberg
2019/933
Low Entropy Key Negotiation Attacks on Bluetooth and Bluetooth Low Energy
Daniele Antonioli, Nils Ole Tippenhauer, Kasper Rasmussen
2019/932
Related-key Differential Cryptanalysis of Full Round CRAFT
Muhammad ElSheikh, Amr M. Youssef
2019/931
Low Weight Discrete Logarithms and Subset Sum in $2^{0.65n}$ with Polynomial Memory
Andre Esser, Alexander May
2019/930
Module-LWE versus Ring-LWE, Revisited
Yang Wang, Mingqiang Wang
2019/929
On the Degree-Insensitive SI-GDH problem and assumption
Samuel Dobson, Steven D. Galbraith
2019/928
Blockchain-enabled Cryptographically-secure Hardware Obfuscation
Fatemeh Ganji, Shahin Tajik, Jean-Pierre Seifert, Domenic Forte
2019/927
Isogeny-based hashing despite known endomorphisms
Lorenz Panny
2019/926
Formal Verification of a Constant-Time Preserving C Compiler
Gilles Barthe, Sandrine Blazy, Benjamin Grégoire, Rémi Hutin, Vincent Laporte, David Pichardie, Alix Trieu
2019/925
Fully Auditable Privacy-preserving Cryptocurrency Against Malicious Auditors
Wulu Li, Yongcan Wang, Lei Chen, Xin Lai, Xiao Zhang, Jiajun Xin
2019/924
Your Money or Your Life---Modeling and Analyzing the Security of Electronic Payment in the UC Framework
Dirk Achenbach, Roland Gröll, Timon Hackenjos, Alexander Koch, Bernhard Löwe, Jeremias Mechler, Jörn Müller-Quade, Jochen Rill
2019/923
Automated Probe Repositioning for On-Die EM Measurements
Bastian Richter, Alexander Wild, Amir Moradi
2019/922
A High-Assurance Evaluator for Machine-Checked Secure Multiparty Computation
Karim Eldefrawy, Vitor Pereira
2019/921
Tree authenticated ephemeral keys
Pavol Zajac
2019/920
Related-Key Differential Slide Attack Against Fountain V1
Raluca Posteuca
2019/919
Detecting Faults in Inner Product Masking Scheme - IPM-FD: IPM with Fault Detection (extended version∗)
Wei Cheng, Claude Carlet, Kouassi Goli, Sylvain Guilley, Jean-Luc Danger
2019/918
Resolving the Trilemma in Logic Encryption
Hai Zhou, Amin Rezaei, Yuanqi Shen
2019/917
Simplified Revocable Hierarchical Identity-Based Encryption from Lattices
Shixiong Wang, Juanyang Zhang, Jingnan He, Huaxiong Wang, Chao Li
2019/916
Multi-owner Secure Encrypted Search Using Searching Adversarial Networks
Kai Chen, Zhongrui Lin, Jian Wan, Lei Xu, Chungen Xu.
2019/915
Unique Rabin-Williams Signature Scheme Decryption
Lynn Margaret Batten, Hugh Cowie Williams
2019/914
Composable and Finite Computational Security of Quantum Message Transmission
Fabio Banfi, Ueli Maurer, Christopher Portmann, Jiamin Zhu
2019/913
Information Conservational Security with “Black Hole” Keypad Compression and Scalable One-Time Pad — An Analytical Quantum Intelligence Approach to Pre- and Post-Quantum Cryptography
Wen-Ran Zhang
2019/912
Fine-Grained Forward Secrecy: Allow-List/Deny-List Encryption and Applications
David Derler, Sebastian Ramacher, Daniel Slamanig, Christoph Striecks
2019/911
IoT-Friendly AKE: Forward Secrecy and Session Resumption Meet Symmetric-Key Cryptography
Gildas Avoine, Sébastien Canard, Loïc Ferreira
2019/910
Efficiently Masking Binomial Sampling at Arbitrary Orders for Lattice-Based Crypto
Tobias Schneider, Clara Paglialonga, Tobias Oder, Tim Güneysu
2019/909
A Practicable Timing Attack Against HQC and its Countermeasure
Guillaume Wafo-Tapa, Slim Bettaieb, Loic Bidoux, Philippe Gaborit, Etienne Marcatel
2019/908
Simulation-Sound Arguments for LWE and Applications to KDM-CCA2 Security
Benoît Libert, Khoa Nguyen, Alain Passelègue, Radu Titiu
2019/907
Practical Forgery Attacks on Limdolen and HERN
Raghvendra Rohit, Guang Gong
2019/906
Efficient and secure software implementations of Fantomas
Rafael J. Cruz, Antonio Guimarães, Diego F. Aranha
2019/905
The Power of NIST Cryptographic Tests Suite
Paul Burciu, Emil Simion
2019/904
Timed-Release Encryption With Master Time Bound Key (Full Version)
Gwangbae Choi, Serge Vaudenay
2019/903
Probabilistic analysis on Macaulay matrices over finite fields and complexity of constructing Gröbner bases
Igor Semaev, Andrea Tenti
2019/902
Fractional LWE: a nonlinear variant of LWE
Gérald Gavin, Stéphane Bonnevay
2019/901
Improvements in Everlasting Privacy: Efficient and Secure Zero Knowledge Proofs
Thomas Haines, Clementine Gritti
2019/900
Multi-client Secure Encrypted Search Using Searching Adversarial Networks
Kai Chen, Zhongrui Lin, Jian Wan, Lei Xu, Chungen Xu.
2019/899
A Comparison of Single-Bit and Multi-Bit DPA for Attacking AES128 on an ATmega328P
Michael Yonli
2019/898
One Bit is All It Takes: A Devastating Timing Attack on BLISS’s Non-Constant Time Sign Flips
Mehdi Tibouchi, Alexandre Wallet
2019/897
On inverse protocols of Post Quantum Cryptography based on pairs of noncommutative multivariate platforms used in tandem
Vasyl Ustimenko
2019/896
On the optionality and fairness of Atomic Swaps
Runchao Han, Haoyu Lin, Jiangshan Yu
2019/895
The Singularity Attack to the Multivariate Signature Scheme Himq-3
Jintai Ding, Zheng Zhang, Joshua Deaton, Vishakha
2019/894
BioID: a Privacy-Friendly Identity Document
Fatih Balli, F. Betül Durak, Serge Vaudenay
2019/893
New Efficient, Constant-Time Implementations of Falcon
Thomas Pornin
2019/892
CCM-SIV: Single-PRF Nonce-Misuse-Resistant Authenticated Encryption
Patrick Kresmer, Alexander Zeh
2019/891
Shielded Computations in Smart Contracts Overcoming Forks
Vincenzo Botta, Daniele Friolo, Daniele Venturi, Ivan Visconti
2019/890
An Adaptive Attack on 2-SIDH
Samuel Dobson, Steven D. Galbraith, Jason LeGrow, Yan Bo Ti, Lukas Zobernig
2019/889
Securing DNSSEC Keys via Threshold ECDSA From Generic MPC
Anders Dalskov, Marcel Keller, Claudio Orlandi, Kris Shrishak, Haya Shulman
2019/888
Weak Keys in the Rekeying Paradigm: Application to COMET and mixFeed
Mustafa Khairallah
2019/887
Accelerating V2X Cryptography through Batch Operations
Paul Bottinelli, Robert Lambert
2019/886
Round Complexity of Byzantine Agreement, Revisited
T-H. Hubert Chan, Rafael Pass, Elaine Shi
2019/885
On the alpha value of polynomials in the tower number field sieve algorithm
Aurore Guillevic, Shashank Singh
2019/884
Cryptanalysis of Round-Reduced KECCAK using Non-Linear Structures
Mahesh Sreekumar Rajasree
2019/883
HoneyBadgerMPC and AsynchroMix: Practical AsynchronousMPC and its Application to Anonymous Communication
Donghang Lu, Thomas Yurek, Samarth Kulshreshtha, Rahul Govind, Rahul Mahadev, Aniket Kate, Andrew Miller
2019/882
Modifying The Tropical Version of Stickel’s Key Exchange Protocol
Any Muanalifah, Serge˘ı Sergeev
2019/881
On the Boomerang Uniformity of some Permutation Polynomials
Marco Calderini, Irene Villa
2019/880
A Blockchain-Based Access Control Scheme for Smart Grids
Yuyang Zhou, Yuanfeng Guan, Zhiwei Zhang, Fagen Li
2019/879
Cube-Based Cryptanalysis of Subterranean-SAE
Fukang Liu, Takanori Isobe, Willi Meier
2019/878
Algebraically Structured LWE, Revisited
Chris Peikert and Zachary Pepin
2019/877
Blind Schnorr Signatures and Signed ElGamal Encryption in the Algebraic Group Model
Georg Fuchsbauer, Antoine Plouviez, Yannick Seurin
2019/876
Kadcast: A Structured Approach to Broadcast in Blockchain Networks
Elias Rohrer, Florian Tschorsch
2019/875
Quantum Alice and Silent Bob: Qubit-based Quantum Key Recycling with almost no classical communication
Daan Leermakers, Boris Skoric
2019/874
ABDKS Attribute-Based Encryption with Dynamic Keyword Search in Fog Computing
Fei Meng, Mingqiang Wang
2019/873
Count of rotational symmetric bent Boolean functions
Shashi Kant Pandey, P. R. Mishra
2019/872
Efficient Information-Theoretic Secure Multiparty Computation over $\mathbb{Z}/p^k \mathbb{Z}$ via Galois Rings
Mark Abspoel, Ronald Cramer, Ivan Damgård, Daniel Escudero, Chen Yuan
2019/871
Non-Locality and Zero-Knowledge MIPs
Claude Crépeau, Nan Yang
2019/870
The Eleventh Power Residue Symbol
Marc Joye, Oleksandra Lapiha, Ky Nguyen, David Naccache
2019/869
ProtectIOn: Root-of-Trust for IO in Compromised Platforms
Aritra Dhar, Enis Ulqinaku, Kari Kostiainen, Srdjan Capkun
2019/868
On the Round Complexity of Randomized Byzantine Agreement
Ran Cohen, Iftach Haitner, Nikolaos Makriyannis, Matan Orland, Alex Samorodnitsky
2019/867
A Practical Forgery Attack on Lilliput-AE
Orr Dunkelman, Nathan Keller, Eran Lambooij, Yu Sasaki
2019/866
A Fast Characterization Method for Semi-invasive Fault Injection Attacks
Lichao Wu, Gerard Ribera, Noemie Beringuier-Boher, Stjepan Picek
2019/865
Cryptanalysis of Reduced-Round SipHash
Le He, Hongbo Yu
2019/864
Another Look at Byzantine Fault Tolerance
Yongge Wang
2019/863
Fast Actively Secure Five-Party Computation with Security Beyond Abort
Megha Byali, Carmit Hazay, Arpita Patra, Swati Singla
2019/862
Key recovery attacks on the Legendre PRFs within the birthday bound
Dmitry Khovratovich
2019/861
A Tale of Three Signatures: practical attack of ECDSA with wNAF
Gabrielle De Micheli, Rémi Piau, Cécile Pierrot
2019/860
Machine learning and side channel analysis in a CTF competition
Yongbo Hu, Yeyang Zheng, Pengwei Feng, Lirui Liu, Chen Zhang, Aron Gohr, Sven Jacob, Werner Schindler, Ileana Buhan, Karim Tobich
2019/859
A Coin-Free Oracle-Based Augmented Black Box Framework
Kyosuke Yamashita, Mehdi Tibouchi, Masayuki Abe
2019/858
Prototyping post-quantum and hybrid key exchange and authentication in TLS and SSH
Eric Crockett, Christian Paquin, Douglas Stebila
2019/857
Bitcontracts: Supporting Smart Contracts in Legacy Blockchains
Karl Wüst, Loris Diana, Kari Kostiainen, Ghassan Karame, Sinisa Matetic, Srdjan Capkun
2019/856
More results on Shortest Linear Programs
Subhadeep Banik, Yuki Funabiki, Takanori Isobe
2019/855
WIDESEAS: A lattice-based PIR scheme implemented in EncryptedQuery
Dominic Dams, Jeff Lataille, Rino Sanchez, John Wade
2019/854
Reducing the Cost of Implementing AES as a Quantum Circuit
Brandon Langenberg, Hai Pham, Rainer Steinwandt
2019/853
A critique of game-based definitions of receipt-freeness for voting
Ashley Fraser, Elizabeth A. Quaglia, Ben Smyth
2019/852
Weak-Key Distinguishers for AES
Lorenzo Grassi, Gregor Leander, Christian Rechberger, Cihangir Tezcan, Friedrich Wiemer
2019/851
On Designing Lightweight RFID Security Protocols for Medical IoT
Masoumeh Safkhani, Ygal Bendavid, Samad Rostampour, Nasour Bagheri
2019/850
Cryptanalysis of an Ultra lightweight Authentication Scheme based on Permutation Matrix Encryption for Internet of Vehicles
Morteza Adeli, Nasour Bagheri
2019/849
Trust Based Intrusion Detection System to Detect Insider Attacks in IoT Systems
Ambili K N, Jimmy Jose
2019/848
Observations on the DLCT and Absolute Indicators
Anne Canteaut, Lukas Kölsch, Friedrich Wiemer
2019/847
Improved Heuristics for Short Linear Programs
Quan Quan Tan, Thomas Peyrin
2019/846
Practical Attribute Based Inner Product Functional Encryption from Simple Assumptions
Yuechen Chen, Linru Zhang, Siu-Ming Yiu
2019/845
A Reaction Attack against Cryptosystems based on LRPC Codes
Simona Samardjiska, Paolo Santini, Edoardo Persichetti, Gustavo Banegas
2019/844
pqm4: Testing and Benchmarking NIST PQC on ARM Cortex-M4
Matthias J. Kannwischer, Joost Rijneveld, Peter Schwabe, Ko Stoffelen
2019/843
How to Construct CSIDH on Edwards Curves
Tomoki Moriya, Hiroshi Onuki, Tsuyoshi Takagi
2019/842
Improved SIMD Implementation of Poly1305
Sreyosi Bhattacharyya, Palash Sarkar
2019/841
Practical Cryptanalysis of k-ary C*
Daniel Smith-Tone
2019/840
A Study on the Applicability of the Lesamnta-LW Lightweight Hash Function to TPMS
Yuhei Watanabe, Hideki Yamamoto, Hirotaka Yoshida
2019/839
Statistical Zap Arguments from Quasi-Polynomial LWE
Abhishek Jain, Zhengzhong Jin
2019/838
Ouroboros Chronos: Permissionless Clock Synchronization via Proof-of-Stake
Christian Badertscher, Peter Gaži, Aggelos Kiayias, Alexander Russell, Vassilis Zikas
2019/837
Stronger and Faster Side-Channel Protections for CSIDH
Daniel Cervantes-Vázquez, Mathilde Chenu, Jesús-Javier Chi-Domínguez, Luca De Feo, Francisco Rodríguez-Henríquez, Benjamin Smith
2019/836
Optimal Transport Layer for Secure Computation
Markus Brandt, Claudio Orlandi, Kris Shrishak, Haya Shulman
2019/835
ACE: Asynchronous and Concurrent Execution of Complex Smart Contracts
Karl Wüst, Sinisa Matetic, Silvan Egli, Kari Kostiainen, Srdjan Capkun
2019/834
Succinct Arguments in the Quantum Random Oracle Model
Alessandro Chiesa, Peter Manohar, Nicholas Spooner
2019/833
AES MixColumn with 92 XOR gates
Alexander Maximov
2019/832
Asymptotically-Good Arithmetic Secret Sharing over Z/(p^\ell Z) with Strong Multiplication and Its Applications to Efficient MPC
Ronald Cramer, Matthieu Rambaud, Chaoping Xing
2019/831
Privacy of Stateful RFID Systems with Constant Tag Identifiers
Cristian Hristea, Ferucio Laurentiu Tiplea
2019/830
The Simplest Multi-key Linearly Homomorphic Signature Scheme
Diego F. Aranha, Elena Pagnin
2019/829
Batch Binary Weierstrass
Billy Bob Brumley, Sohaib ul Hassan, Alex Shaindlin, Nicola Tuveri, Kide Vuojärvi
2019/828
Optimal Collision Side-Channel Attacks
Cezary Glowacz, Vincent Grosso
2019/827
k-root-n: An efficient algorithm for avoiding short term double-spending alongside distributed ledger technologies such as blockchain
Zvi Schreiber
2019/826
Modular Multiplication Algorithm Suitable For Low-Latency Circuit Implementations
Erdinç Öztürk
2019/825
Plaintext Recovery Attacks against XTS Beyond Collisions
Takanori Isobe, Kazuhiko Minematsu
2019/824
Hardware Implementations of NIST Lightweight Cryptographic Candidates: A First Look
Behnaz Rezvani, Flora Coleman, Sachin Sachin, William Diehl
2019/823
Securely Sampling Biased Coins with Applications to Differential Privacy
Jeffrey Champion, abhi shelat, Jonathan Ullman
2019/822
Surveying definitions of coercion resistance
Thomas Haines, Ben Smyth
2019/821
Towards Forward Secure Internet Traffic
Eman Salem Alashwali, Pawel Szalachowski, Andrew Martin
2019/820
Universal Location Referencing and Homomorphic Evaluation of Geospatial Query
Asma Aloufi, Peizhao Hu, Hang Liu, Sherman S. M. Chow
2019/819
Blindfolded Evaluation of Random Forests with Multi-Key Homomorphic Encryption
Asma Aloufi, Peizhao Hu, Harry W. H. Wong, Sherman S. M. Chow
2019/818
X-DeepSCA: Cross-Device Deep Learning Side Channel Attack
Debayan Das, Anupam Golder, Josef Danial, Santosh Ghosh, Arijit Raychowdhury, Shreyas Sen
2019/817
Non-zero Inner Product Encryptions: Strong Security under Standard Assumptions
Tapas Pal, Ratna Dutta
2019/816
Crisis: Probabilistically Self Organizing Total Order in Unstructured P2P Networks
Mirco Richter
2019/815
A Note on the Static-Static Key Agreement Protocol from Supersingular Isogenies
Selçuk Kayacan
2019/814
Faster Subgroup Checks for BLS12-381
Sean Bowe
2019/813
Multi-Client Symmetric Searchable Encryption with Forward Privacy
Alexandros Bakas, Antonis Michalas
2019/812
Improved Interpolation Attacks on Cryptographic Primitives of Low Algebraic Degree
Chaoyun Li, Bart Preneel
2019/811
SEAL: Attack Mitigation for Encrypted Databases via Adjustable Leakage
Ioannis Demertzis, Dimitrios Papadopoulos, Charalampos Papamanthou, Saurabh Shintre
2019/810
Refutation and Redesign of a Physical Model of TERO-based TRNGs and PUFs
Jeroen Delvaux
2019/809
On the Data Limitation of Small-State Stream Ciphers: Correlation Attacks on Fruit-80 and Plantlet
Yosuke Todo, Willi Meier, Kazumaro Aoki
2019/808
2-Message Publicly Verifiable WI from (Subexponential) LWE
Alex Lombardi, Vinod Vaikuntanathan, Daniel Wichs
2019/807
Provable Security for PKI Schemes
Sara Wrótniak, Hemi Leibowitz, Ewa Syta, and Amir Herzberg
2019/806
Proxy-Mediated Searchable Encryption in SQL Databases Using Blind Indexes
Eugene Pilyankevich, Dmytro Kornieiev, Artem Storozhuk
2019/805
RRTxFM: Probabilistic Counting for Differentially Private Statistics
Saskia Nuñez von Voigt, Florian Tschorsch
2019/804
Improved Low-Memory Subset Sum and LPN Algorithms via Multiple Collisions
Claire Delaplace, Andre Esser, Alexander May
2019/803
Methodology for Efficient CNN Architectures in Profiling Attacks -- Extended Version
Gabriel Zaid, Lilian Bossuet, Amaury Habrard, Alexandre Venelli
2019/802
New Circuit Minimization Techniques for Smaller and Faster AES SBoxes
Alexander Maximov, Patrik Ekdahl
2019/801
A Chosen Random Value Attack on WPA3 SAE authentication protocol
Sheng Sun
2019/800
Can we Beat the Square Root Bound for ECDLP over $\mathbb{F}_{p^2}$ via Representations?
Claire Delaplace, Alexander May
2019/799
Breaking the Lightweight Secure PUF: Understanding the Relation of Input Transformations and Machine Learning Resistance
Nils Wisiol, Georg T. Becker, Marian Margraf, Tudor A. A. Soroceanu, Johannes Tobisch, Benjamin Zengin
2019/798
A Generic Construction for Revocable Identity-Based Encryption with Subset Difference Methods
Kwangsu Lee
2019/797
Don't forget your roots: constant-time root finding over $\mathbb{F}_{2^m}$
Douglas Martins, Gustavo Banegas, Ricardo Custodio
2019/796
The End of Logic Locking? A Critical View on the Security of Logic Locking
Susanne Engels, Max Hoffmann, Christof Paar
2019/795
More Practical Single-Trace Attacks on the Number Theoretic Transform
Peter Pessl, Robert Primas
2019/794
Efficient Cryptography on the RISC-V Architecture
Ko Stoffelen
2019/793
On equivalence between known families of quadratic APN functions
Lylia Budaghyan, Marco Calderini, Irene Villa
2019/792
TICK: Tiny Client for Blockchains
Wei Zhang, Jiangshan Yu, Qingqiang He, Nan Zhang, Nan Guan
2019/791
Sublattice Attacks on LWE over Arbitrary Number Field Lattices
Hao Chen
2019/790
Simple and Efficient Approach for Achieving End-to-End Anonymous Communication
Wei Jiang, Adam Bowers, Dan Lin
2019/789
Relation between o-equivalence and EA-equivalence for Niho bent functions
Diana Davidova, Lilya Budaghyan, Claude Carlet, Tor Helleseth, Ferdinand Ihringer, Tim Penttila
2019/788
The Impact of Time on DNS Security
Aanchal Malhotra, Willem Toorop, Benno Overeinder, Ralph Dolmans, Sharon Goldberg
2019/787
Optimized implementation of the NIST PQC submission ROLLO on microcontroller
Jérôme Lablanche, Lina Mortajine, Othman Benchaalal, Pierre-Louis Cayrel, Nadia El Mrabet
2019/786
P6V2G: A Privacy-Preserving V2G Scheme for Two-Way Payments and Reputation
Rebecca Schwerdt, Matthias Nagel, Valerie Fetzer, Tobias Gräf, Andy Rupp
2019/785
A publicly verifiable quantum blind signature scheme without entanglement based on asymmetric cryptography
Yalin Chen, Jue-Sam Chou, Liang-Chun Wang, Yu-Yuan Chou
2019/784
Towards a Hybrid Public Key Infrastructure (PKI): A Review
Priyadarshi Singh, Abdul Basit, N Chaitanya Kumar, V. Ch. Venkaiah
2019/783
Dissecting the CHES 2018 AES Challenge
Tobias Damm, Sven Freud, Dominik Klein
2019/782
Algorithmic aspects of elliptic bases in finite field discrete logarithm algorithms
Antoine Joux, Cecile Pierrot
2019/781
BBQ: Using AES in Picnic Signatures
Cyprien Delpech de Saint Guilhem, Lauren De Meyer, Emmanuela Orsini, Nigel P. Smart
2019/780
Statistical ZAP Arguments
Saikrishna Badrinarayan, Rex Fernando, Aayush Jain, Dakshita Khurana, Amit Sahai
2019/779
Seems Legit: Automated Analysis of Subtle Attacks on Protocols that Use Signatures
Dennis Jackson, Cas Cremers, Katriel Cohn-Gordon, Ralf Sasse
2019/778
A Composable Security Treatment of the Lightning Network
Aggelos Kiayias, Orfeas Stefanos Thyfronitis Litos
2019/777
A Reduction-Based Proof for Authentication and Session Key Security in 3-Party Kerberos
Jörg Schwenk, Douglas Stebila
2019/776
Scalable Private Set Union from Symmetric-Key Techniques
Vladimir Kolesnikov, Mike Rosulek, Ni Trieu, Xiao Wang
2019/775
Pay To Win: Cheap, Crowdfundable, Cross-chain Algorithmic Incentive Manipulation Attacks on PoW Cryptocurrencies
Aljosha Judmayer, Nicholas Stifter, Alexei Zamyatin, Itay Tsabary, Ittay Eyal, Peter Gazi, Sarah Meiklejohn, Edgar Weippl
2019/774
Estimating Gaps in Martingales and Applications to Coin-Tossing: Constructions and Hardness
Hamidreza Amini Khorasgani, Hemanta Maji, Tamalika Mukherjee
2019/773
Efficient Secure Ridge Regression from Randomized Gaussian Elimination
Frank Blom, Niek J. Bouman, Berry Schoenmakers, Niels de Vreede
2019/772
Mixture Integral Attacks on Reduced-Round AES with a Known/Secret S-Box
Lorenzo Grassi, Markus Schofnegger
2019/771
DDH-based Multisignatures with Public Key Aggregation
Duc-Phong Le, Guomin Yang, Ali Ghorbani
2019/770
Practical Attacks on Reduced-Round AES
Navid Ghaedi Bardeh, Sondre Rønjom
2019/769
Exploiting Determinism in Lattice-based Signatures - Practical Fault Attacks on pqm4 Implementations of NIST candidates
Prasanna Ravi, Mahabir Prasad Jhanwar, James Howe, Anupam Chattopadhyay, Shivam Bhasin
2019/768
Distributing any Elliptic Curve Based Protocol
Nigel P. Smart, Younes Talibi Alaoui
2019/767
On cryptographic parameters of permutation polynomials of the form $x^rh(x^{(q-1)/d})$
Jaeseong Jeong, Chang Heon Kim, Namhun Koo, Soonhak Kwon, Sumin Lee
2019/766
Complexity of Estimating Renyi Entropy of Markov Chains
Maciej Obremski, Maciej Skorski
2019/765
SPQCop: Side-channel protected Post-Quantum Cryptoprocessor
Arpan Jati, Naina Gupta, Anupam Chattopadhyay, Somitra Kumar Sanadhya
2019/764
The Adversarial Robustness of Sampling
Omri Ben-Eliezer, Eylon Yogev
2019/763
Fast Correlation Attacks on Grain-like Small State Stream Ciphers and Cryptanalysis of Plantlet, Fruit-v2 and Fruit-80
Shichang Wang, Meicheng Liu, Dongdai Lin, Li Ma
2019/762
Verifiable Computing for Approximate Computation
Shuo Chen, Jung Hee Cheon, Dongwoo Kim, Daejun Park
2019/761
Athena: A verifiable, coercion-resistant voting system with linear complexity
Ben Smyth
2019/760
Differential Fault Analysis of NORX
Amit Jana, Dhiman Saha, Goutam Paul
2019/759
Code Constructions for Physical Unclonable Functions and Biometric Secrecy Systems
Onur Günlü, Onurcan Iscan, Vladimir Sidorenko, Gerhard Kramer
2019/758
Genus 2 Supersingular Isogeny Oblivious Transfer
Ramsès Fernàndez-València
2019/757
EverCrypt: A Fast, Verified, Cross-Platform Cryptographic Provider
Jonathan Protzenko, Bryan Parno, Aymeric Fromherz, Chris Hawblitzel, Marina Polubelova, Karthikeyan Bhargavan, Benjamin Beurdouche, Joonwon Choi, Antoine Delignat-Lavaud, Cedric Fournet, Natalia Kulatova, Tahina Ramananandro, Aseem Rastogi, Nikhil Swamy, Christoph Wintersteiger, Santiago Zanella-Beguelin
2019/756
SKIVA: Flexible and Modular Side-channel and Fault Countermeasures
Pantea Kiaei, Darius Mercadier, Pierre-Evariste Dagand, Karine Heydemann, Patrick Schaumont
2019/755
Generic Attacks on Hash Combiners
Zhenzhen Bao, Itai Dinur, Jian Guo, Gaëtan Leurent, Lei Wang
2019/754
Is it Easier to Prove Theorems that are Guaranteed to be True?
Rafael Pass, Muthuramakrishnan Venkitasubramaniam
2019/753
Design of Anonymous Endorsement System in Hyperledger Fabric
Subhra Mazumdar, Sushmita Ruj
2019/752
Fact and Fiction: Challenging the Honest Majority Assumption of Permissionless Blockchains
Runchao Han, Zhimei Sui, Jiangshan Yu, Joseph Liu, Shiping Chen
2019/751
Discrete logarithms in quasi-polynomial time in finite fields of fixed characteristic
Thorsten Kleinjung, Benjamin Wesolowski
2019/750
A Short Note on a Weight Probability Distribution Related to SPNs
Sondre Rønjom
2019/749
The privacy of the TLS 1.3 protocol
Ghada Arfaoui, Xavier Bultel, Pierre-Alain Fouque, Adina Nedelcu, Cristina Onete
2019/748
Temporary Censorship Attacks in the Presence of Rational Miners
Fredrik Winzer, Benjamin Herd, Sebastian Faust
2019/747
Efficient Lattice-Based Zero-Knowledge Arguments with Standard Soundness: Construction and Applications
Rupeng Yang, Man Ho Au, Zhenfei Zhang, Qiuliang Xu, Zuoxia Yu, William Whyte
2019/746
Public-Key Function-Private Hidden Vector Encryption (and More)
James Bartusek, Brent Carmer, Abhishek Jain, Zhengzhong Jin, Tancrède Lepoint, Fermi Ma, Tal Malkin, Alex J. Malozemoff, Mariana Raykova
2019/745
Efficient Perfectly Sound One-message Zero-Knowledge Proofs via Oracle-aided Simulation
Vincenzo Iovino
2019/744
Privacy-Preserving Classification of Personal Text Messages with Secure Multi-Party Computation: An Application to Hate-Speech Detection
Devin Reich, Ariel Todoki, Rafael Dowsley, Martine De Cock, Anderson C. A. Nascimento
2019/743
Lattice-Based Remote User Authentication from Reusable Fuzzy Signature
Yangguang Tian, Yingjiu Li, Robert. H Deng, Binanda Sengupta, Guomin Yang
2019/742
Vulnerability Analysis of a Soft Core Processor through Fine-grain Power Profiling
William Diehl, Abubakr Abdulgadir, Jens-Peter Kaps
2019/741
Comprehensive Security Analysis of CRAFT
Hosein Hadipour, Sadegh Sadeghi, Majid M. Niknam, and Nasour Bagheri
2019/740
A Secure Publish/Subscribe Protocol for Internet of Things
Lukas Malina, Gautam Srivastava, Petr Dzurenda, Jan Hajny, Radek Fujdiak
2019/739
A Survey on Authenticated Encryption -- ASIC Designer's Perspective
Elif Bilge Kavun, Hristina Mihajloska, Tolga Yalcin
2019/738
Scrutinizing the Tower Field Implementation of the $\mathbb{F}_{2^8}$ Inverter -- with Applications to AES, Camellia, and SM4
Zihao Wei, Siwei Sun, Lei Hu, Man Wei, Joan Boyar, Rene Peralta
2019/737
Highly Efficient Key Exchange Protocols with Optimal Tightness -- Enabling real-world deployments with theoretically sound parameters
Katriel Cohn-Gordon, Cas Cremers, Kristian Gjøsteen, Håkon Jacobsen, Tibor Jager
2019/736
Onion Ring ORAM: Efficient Constant Bandwidth Oblivious RAM from (Leveled) TFHE
Hao Chen, Ilaria Chillotti, Ling Ren
2019/735
SoK of Used Cryptography in Blockchain
Mayank Raikwar, Danilo Gligoroski, Katina Kralevska
2019/734
From Usability to Secure Computing and Back Again
Lucy Qin, Andrei Lapets, Frederick Jansen, Peter Flockhart, Kinan Dak Albab, Ira Globus-Harris, Shannon Roberts, Mayank Varia
2019/733
Compressible FHE with Applications to PIR
Craig Gentry, Shai Halevi
2019/732
Fully Homomorphic NIZK and NIWI Proofs
Prabhanjan Ananth, Apoorvaa Deshpande, Yael Tauman Kalai, Anna Lysyanskaya
2019/731
On the Complexity of ``Superdetermined'' Minrank Instances
Javier Verbel, John Baena, Daniel Cabarcas, Ray Perlner, Daniel Smith-Tone
2019/730
PQDH: A Quantum-Safe Replacement for Diffie-Hellman based on SIDH
Vladimir Soukharev, Basil Hess
2019/729
Linear Complexity of A Family of Binary pq2 -periodic Sequences From Euler Quotients
Jingwei Zhang, Shuhong Gao, Chang-An Zhao
2019/728
Verifying Solutions to LWE with Implications for Concrete Security
Palash Sarkar, Subhadip Singha
2019/727
Iterative Differential Characteristic of TRIFLE-BC
Fukang Liu, Takanori Isobe
2019/726
A Framework for Universally Composable Oblivious Transfer from One-Round Key-Exchange
Pedro Branco, Jintai Ding, Manuel Goulão, Paulo Mateus
2019/725
He Gives C-Sieves on the CSIDH
Chris Peikert
2019/724
Breaking Tweakable Enciphering Schemes using Simon's Algorithm
Sebati Ghosh, Palash Sarkar
2019/723
On Deploying Secure Computing: Private Intersection-Sum-with-Cardinality
Mihaela Ion, Ben Kreuter, Ahmet Erhan Nergiz, Sarvar Patel, Mariana Raykova, Shobhit Saxena, Karn Seth, David Shanahan, Moti Yung
2019/722
Neural Network Model Assessment for Side-Channel Analysis
Guilherme Perin, Baris Ege, Lukasz Chmielewski
2019/721
Optimized SIKE Round 2 on 64-bit ARM
Hwajeong Seo, Amir Jalali, Reza Azarderakhsh
2019/720
Leveraging Linear Decryption: Rate-1 Fully-Homomorphic Encryption and Time-Lock Puzzles
Zvika Brakerski, Nico Döttling, Sanjam Garg, Giulio Malavolta
2019/719
The Key is Left under the Mat: On the Inappropriate Security Assumption of Logic Locking Schemes
Mir Tanjidur Rahman, Shahin Tajik, M. Sazadur Rahman, Mark Tehranipoor, Navid Asadizanjani
2019/718
Improved Building Blocks for Secure Multi-Party Computation based on Secret Sharing with Honest Majority
Marina Blanton, Ahreum Kang, Chen Yuan
2019/717
Homomorphism learning problems and its applications to public-key cryptography
Christopher Leonardi, Luis Ruiz-Lopez
2019/716
On the Quantum Complexity of the Continuous Hidden Subgroup Problem
Koen de Boer, Léo Ducas, Serge Fehr
2019/715
On the Security of Lattice-based Fiat-Shamir Signatures in the Presence of Randomness Leakage
Yuejun Liu, Yongbin Zhou, Shuo Sun, Tianyu Wang, Rui Zhang, Jingdian Ming
2019/714
Generalized Related-Key Rectangle Attacks on Block Ciphers with Linear Key Schedule: Applications to SKINNY and GIFT
Boxin Zhao, Xiaoyang Dong, Willi Meier, Keting Jia, Gaoli Wang
2019/713
Public Ledger for Sensitive Data
Riccardo Longo, Massimiliano Sala
2019/712
SimpleENC and SimpleENCsmall -- an Authenticated Encryption Mode for the Lightweight Setting
Shay Gueron, Yehuda Lindell
2019/711
SIKE'd Up: Fast and Secure Hardware Architectures for Supersingular Isogeny Key Encapsulation
Brian Koziel, A-Bon Ackie, Rami El Khatib, Reza Azarderakhsh, Mehran Mozaffari-Kermani
2019/710
A Comprehensive Formal Security Analysis and Revision of the Two-phase Key Exchange Primitive of TPM 2.0
Qianying Zhang, Shijun Zhao, Zhiping Shi, Yong Guan, Guohui Wang
2019/709
Secure Computation for Cloud data Storage
Davood Rezaeipour
2019/708
Upper Bounds on the Multiplicative Complexity of Symmetric Boolean Functions
Luís T. A. N. Brandão, Çağdaş Çalık, Meltem Sönmez Turan, René Peralta
2019/707
Post-Quantum UC-Secure Oblivious Transfer in the Standard Model with Adaptive Corruptions
Olivier Blazy, Céline Chevalier, Quoc Huy Vu
2019/706
Endemic Oblivious Transfer
Daniel Masny, Peter Rindal
2019/705
Commodity-Based 2PC for Arithmetic Circuits
Ivan Damgård, Helene Haagh, Michael Nielsen, Claudio Orlandi
2019/704
Arcula: A Secure Hierarchical Deterministic Wallet for Multi-asset Blockchains
Adriano Di Luzio, Danilo Francati, Giuseppe Ateniese
2019/703
A Cautionary Note Regarding the Usage of Leakage Detection Tests in Security Evaluation
Carolyn Whitnall, Elisabeth Oswald
2019/702
Cryptanalysis of Plantlet
Subhadeep Banik, Khashayar Barooti, Takanori Isobe
2019/701
Decentralized Multi-authority Anonymous Authentication for Global Identities with Non-interactive Proofs
Hiroaki Anada
2019/700
SAEB: A Lightweight Blockcipher-Based AEAD Mode of Operation
Yusuke Naito, Mitsuru Matsui, Takeshi Sugawara, Daisuke Suzuki
2019/699
Tight quantum security of the Fiat-Shamir transform for commit-and-open identification schemes with applications to post-quantum signature schemes
André Chailloux
2019/698
A Formal Treatment of Deterministic Wallets
Poulami Das, Sebastian Faust, Julian Loss
2019/697
Breaking ACORN with a Single Fault
Elena Dubrova
2019/696
Black-Box Language Extension of Non-Interactive Zero-Knowledge Arguments
Masayuki Abe, Miguel Ambrona, Miyako Ohkubo
2019/695
An Efficient Secure Three-Party Sorting Protocol with an Honest Majority
Koji Chida, Koki Hamada, Dai Ikarashi, Ryo Kikuchi, Naoto Kiribuchi, Benny Pinkas
2019/694
A Unified and Composable Take on Ratcheting
Daniel Jost, Ueli Maurer, Marta Mularczyk
2019/693
Security-Efficiency Tradeoffs in Searchable Encryption -- Lower Bounds and Optimal Constructions
Raphael Bost, Pierre-Alain Fouque
2019/692
Synchronous Consensus with Optimal Asynchronous Fallback Guarantees
Erica Blum, Jonathan Katz, Julian Loss
2019/691
Comparing proofs of security for lattice-based encryption
Daniel J. Bernstein
2019/690
Multiple-Differential Mechanism for Collision-Optimized Divide-and-Conquer Attacks
Changhai Ou, Siew-Kei Lam, Guiyuan Jiang
2019/689
On-Device Power Analysis Across Hardware Security Domains
Colin O'Flynn, Alex Dewar
2019/688
Better Bootstrapping for Approximate Homomorphic Encryption
Kyoohyung Han, Dohyeong Ki
2019/687
General Linear Group Action on Tensors: A Candidate for Post-Quantum Cryptography
Zhengfeng Ji, Youming Qiao, Fang Song, Aaram Yun
2019/686
On the Complexity of Collision Resistant Hash Functions: New and Old Black-Box Separations
Nir Bitansky, Akshay Degwekar
2019/685
Exploring NIST LWC/PQC Synergy with R5Sneik: How SNEIK 1.1 Algorithms were Designed to Support Round5
Markku-Juhani O. Saarinen
2019/684
Revelio: A MimbleWimble Proof of Reserves Protocol
Arijit Dutta, Saravanan Vijayakumaran
2019/683
The Notion of Transparency Order, Revisited
Huizhong Li, Yongbin Zhou, Jingdian Ming, Guang Yang, Chengbin Jin
2019/682
Modern Family: A Revocable Hybrid Encryption Scheme Based on Attribute-Based Encryption, Symmetric Searchable Encryption and SGX
Alexandros Bakas, Antonis Michalas
2019/681
Lattice-based Cryptography for IoT in A Quantum World: Are We Ready?
Ayesha Khalid, Sarah McCarthy, Weiqiang Liu, Maire O’Neill
2019/680
Non-Commutative Ring Learning With Errors From Cyclic Algebras
Charles Grover, Andrew Mendelsohn, Cong Ling, Roope Vehkalahti
2019/679
Forgery Attacks on FlexAE and FlexAEAD
Maria Eichlseder, Daniel Kales, and Markus Schofnegger
2019/678
A Modified pqsigRM: RM Code-Based Signature Scheme
Yongwoo Lee, Wijik Lee, Young-Sik Kim, Jong-Seon No
2019/677
A Note on Lower Digits Extraction Polynomial for Bootstrapping
Mingjia Huo, Kewen Wu, Qi Ye
2019/676
Robust and Scalable Consensus for Sharded Distributed Ledgers
Eleftherios Kokoris-Kogias
2019/675
Balance: Dynamic Adjustment of Cryptocurrency Deposits
Dominik Harz, Lewis Gudgeon, Arthur Gervais, William J. Knottenbelt
2019/674
Polar Sampler: A Novel Bernoulli Sampler Using Polar Codes with Application to Integer Gaussian Sampling
Jiabo Wang, Cong Ling
2019/673
A New Approach to Constructing Digital Signature Schemes (Extended Paper)
Ahto Buldas, Denis Firsov, Risto Laanoja, Henri Lakk, Ahto Truu
2019/672
A Blockchain-Assisted Hash-Based Signature Scheme
Ahto Buldas, Risto Laanoja, Ahto Truu
2019/671
A Server-Assisted Hash-Based Signature Scheme
Ahto Buldas, Risto Laanoja, Ahto Truu
2019/670
On designing secure small-state stream ciphers against time-memory-data tradeoff attacks
Vahid Amin Ghafari, Honggang Hu, Fujiang Lin
2019/669
Related-Key Boomerang Attacks on GIFT with Automated Trail Search Including BCT Effect
Yunwen Liu, Yu Sasaki
2019/668
New Semi-Free-Start Collision Attack Framework for Reduced RIPEMD-160
Fukang Liu, Christoph Dobraunig, Florian Mendel, Takanori Isobe, Gaoli Wang, Zhenfu Cao
2019/667
PPAD-Hardness via Iterated Squaring Modulo a Composite
Arka Rai Choudhuri, Pavel Hubacek, Chethan Kamath, Krzysztof Pietrzak, Alon Rosen, Guy N. Rothblum
2019/666
On the Geometric Ergodicity of Metropolis-Hastings Algorithms for Lattice Gaussian Sampling
Zheng Wang, Cong Ling
2019/665
Key Exchange and Authenticated Key Exchange with Reusable Keys Based on RLWE Assumption
Jintai Ding, Pedro Branco, Kevin Schmitt
2019/664
How Diversity Affects Deep-Learning Side-Channel Attacks
Huanyu Wang, Martin Brisfors, Sebastian Forsmark, Elena Dubrova
2019/663
Can Verifiable Delay Functions be Based on Random Oracles?
Mohammad Mahmoody, Caleb Smith, David J. Wu
2019/662
Generalized Proofs of Knowledge with Fully Dynamic Setup
Christian Badertscher, Daniel Jost, Ueli Maurer
2019/661
Mind the Portability: A Warriors Guide through Realistic Profiled Side-channel Analysis
Shivam Bhasin, Anupam Chattopadhyay, Annelie Heuser, Dirmanto Jap, Stjepan Picek, Ritu Ranjan Shrivastwa
2019/660
Lattice Gaussian Sampling by Markov Chain Monte Carlo: Bounded Distance Decoding and Trapdoor Sampling
Zheng Wang, Cong Ling
2019/659
Tight Verifiable Delay Functions
Nico Döttling, Sanjam Garg, Giulio Malavolta, Prashant Nalini Vasudevan
2019/658
Two-Thirds Honest-Majority MPC for Malicious Adversaries at Almost the Cost of Semi-Honest
Jun Furukawa, Yehuda Lindell
2019/657
Multi-Party PSM, Revisited: Improved Communication and Unbalanced Communication
Leonard Assouline, Tianren Liu
2019/656
SeqL: Secure Scan-Locking for IP Protection
Seetal Potluri, Aydin Aysu, Akash Kumar
2019/655
Visualizing size-security tradeoffs for lattice-based encryption
Daniel J. Bernstein
2019/654
Concise Linkable Ring Signatures and Forgery Against Adversarial Keys
Brandon Goodell, Sarang Noether, Arthur Blue
2019/653
On the Local Leakage Resilience of Linear Secret Sharing Schemes
Fabrice Benhamouda, Akshay Degwekar, Yuval Ishai, Tal Rabin
2019/652
The Exchange Attack: How to Distinguish Six Rounds of AES with $2^{88.2}$ chosen plaintexts
Navid Ghaedi Bardeh, Sondre Rønjom
2019/651
Efficient MPC via Program Analysis: A Framework for Efficient Optimal Mixing
Muhammad Ishaq, Ana Milanova, Vassilis Zikas
2019/650
Incremental Proofs of Sequential Work
Nico Döttling, Russell W. F. Lai, Giulio Malavolta
2019/649
Txilm: Lossy Block Compression with Salted Short Hashing
Donghui Ding, Xin Jiang, Jiaping Wang, Hao Wang, Xiaobing Zhang, Yi Sun
2019/648
Efficient Invisible and Unlinkable Sanitizable Signatures
Xavier Bultel, Pascal Lafourcade, Russell W. F. Lai, Giulio Malavolta, Dominique Schröder, Sri Aravinda Krishnan Thyagarajan
2019/647
Strong Asymmetric PAKE based on Trapdoor CKEM
Tatiana Bradley, Stanislaw Jarecki, Jiayu Xu
2019/646
Communication-Efficient Unconditional MPC with Guaranteed Output Delivery
Vipul Goyal, Yanyi Liu, Yifan Song
2019/645
Attribute Based Encryption for Deterministic Finite Automata from DLIN
Shweta Agrawal, Monosij Maitra, Shota Yamada
2019/644
Timed Signatures and Zero-Knowledge Proofs -Timestamping in the Blockchain Era-
Aydin Abadi, Michele Ciampi, Aggelos Kiayias, Vassilis Zikas
2019/643
Indistinguishability Obfuscation Without Multilinear Maps: New Paradigms via Low Degree Weak Pseudorandomness and Security Amplification
Prabhanjan Ananth, Aayush Jain, Huijia Lin, Christian Matt, Amit Sahai
2019/642
Algebraic Techniques for Short(er) Exact Lattice-Based Zero-Knowledge Proofs
Jonathan Bootle, Vadim Lyubashevsky, Gregor Seiler
2019/641
Simulation Extractability in Groth's zk-SNARK
Shahla Atapoor, Karim Baghery
2019/640
On Round Optimal Statistical Zero Knowledge Arguments
Nir Bitansky, Omer Paneth
2019/639
Trapdoor Hash Functions and Their Applications
Nico Döttling, Sanjam Garg, Yuval Ishai, Giulio Malavolta, Tamer Mour, Rafail Ostrovsky
2019/638
On the Distribution of Quadratic Residues and Non-residues Modulo Composite Integers and Applications to Cryptography
Ferucio Laurentiu Tiplea, Sorin Iftene, George Teseleanu, Anca-Maria Nica
2019/637
Cryptographic Sensing
Yuval Ishai, Eyal Kushilevitz, Rafail Ostrovsky, Amit Sahai
2019/636
Broadcast and Trace with N^epsilon Ciphertext Size from Standard Assumptions
Rishab Goyal, Willy Quach, Brent Waters, Daniel Wichs
2019/635
Homomorphic Time-Lock Puzzles and Applications
Giulio Malavolta, Sri Aravinda Krishnan Thyagarajan
2019/634
SpOT-Light: Lightweight Private Set Intersection from Sparse OT Extension
Benny Pinkas, Mike Rosulek, Ni Trieu, Avishay Yanai
2019/633
New non-linearity parameters of Boolean functions
Igor Semaev
2019/632
Fully Homomorphic Encryption for RAMs
Ariel Hamlin, Justin Holmgren, Mor Weiss, Daniel Wichs
2019/631
Non-Uniformly Sound Certificates with Applications to Concurrent Zero-Knowledge
Cody Freitag, Ilan Komargodski, Rafael Pass
2019/630
ABE for DFA from k-Lin
Junqing Gong, Brent Waters, Hoeteck Wee
2019/629
Attribute Based Encryption (and more) for Nondeterministic Finite Automata from LWE
Shweta Agrawal, Monosij Maitra, Shota Yamada
2019/628
Watermarking Public-Key Cryptographic Primitives
Rishab Goyal, Sam Kim, Nathan Manohar, Brent Waters, David J. Wu
2019/627
Unconditionally Secure Computation Against Low-Complexity Leakage
Andrej Bogdanov, Yuval Ishai, Akshayaram Srinivasan
2019/626
Simultaneous Amplification: The Case of Non-Interactive Zero-Knowledge
Vipul Goyal, Aayush Jain, Amit Sahai
2019/625
Public-Key Cryptography in the Fine-Grained Setting
Rio Lavigne, Andrea Lincoln, Virginia Vassilevska Williams
2019/624
Nonces are Noticed: AEAD Revisited
Mihir Bellare, Ruth Ng, Björn Tackmann
2019/623
Exploring Constructions of Compact NIZKs from Various Assumptions
Shuichi Katsumata, Ryo Nishimaki, Shota Yamada, Takashi Yamakawa
2019/622
Extended Truncated-differential Distinguishers on Round-reduced AES
Zhenzhen Bao, Jian Guo, Eik List
2019/621
A Modified Simple Substitution Cipher With Unbounded Unicity Distance
Bruce Kallick
2019/620
Obfuscated Fuzzy Hamming Distance and Conjunctions from Subset Product Problems
Steven D. Galbraith, Lukas Zobernig
2019/619
Continuous Verifiable Delay Functions
Naomi Ephraim, Cody Freitag, Ilan Komargodski, Rafael Pass
2019/618
Preimage Attacks on Reduced Troika with Divide-and-Conquer Methods
Fukang Liu, Takanori Isobe
2019/617
Trustless, Censorship-Resilient and Scalable Votings in the Permission-based Blockchain Model
Sebastian Gajek, Marco Lewandowsky
2019/616
Channels of Small Log-Ratio Leakage and Characterization of Two-Party Differentially Private Computation
Iftach Haitner, Noam Mazor, Ronen Shaltiel, Jad Silbak
2019/615
My Gadget Just Cares For Me - How NINA Can Prove Security Against Combined Attacks
Siemen Dhooghe, Svetla Nikova
2019/614
Quantum Attacks without Superposition Queries: the Offline Simon's Algorithm
Xavier Bonnetain, Akinori Hosoyamada, María Naya-Plasencia, Yu Sasaki, André Schrottenloher
2019/613
MeltdownDetector: A Runtime Approach for Detecting Meltdown Attacks
Taha Atahan Akyildiz, Can Berk Guzgeren, Cemal Yilmaz, Erkay Savas
2019/612
Simulation-Extractable SNARKs Revisited
Helger Lipmaa
2019/611
Utreexo: A dynamic hash-based accumulator optimized for the Bitcoin UTXO set
Thaddeus Dryja
2019/610
Improved Cryptanalysis of the AJPS Mersenne Based Cryptosystem
Jean-Sebastien Coron, Agnese Gini
2019/609
CPA-to-CCA Transformation for KDM Security
Fuyuki Kitagawa, Takahiro Matsuda
2019/608
Symmetric Primitives with Structured Secrets
Navid Alamati, Hart Montgomery, Sikhar Patranabis
2019/607
Improved Meet-in-the-Middle Preimage Attacks against AES Hashing Modes
Zhenzhen Bao, Lin Ding, Jian Guo, Haoyang Wang, Wenying Zhang
2019/606
An Efficient and Provable Masked Implementation of qTESLA
François Gérard, Mélissa Rossi
2019/605
A note on different types of ransomware attacks
Mihail Anghel, Andrei Racautanu
2019/604
New Results on Modular Inversion Hidden Number Problem and Inversive Congruential Generator
Jun Xu, Santanu Sarkar, Lei Hu, Huaxiong Wang, Yanbin Pan
2019/603
How to Delegate Computations Publicly
Yael Kalai, Omer Paneth, Lisa Yang
2019/602
Continuously Non-Malleable Secret Sharing for General Access Structures
Gianluca Brian, Antonio Faonio, Daniele Venturi
2019/601
AuroraLight: Improved prover efficiency and SRS size in a Sonic-like system
Ariel Gabizon
2019/600
ZOCB and ZOTR: Tweakable Blockcipher Modes for Authenticated Encryption with Full Absorption
Zhenzhen Bao, Jian Guo, Tetsu Iwata, Kazuhiko Minematsu
2019/599
New Primitives for Actively-Secure MPC over Rings with Applications to Private Machine Learning
Ivan Damgård, Daniel Escudero, Tore Frederiksen, Marcel Keller, Peter Scholl, Nikolaj Volgushev
2019/598
Partial Secret Sharing
Amir Jafari, Reza Kaboli, Shahram Khazaei
2019/597
A Candidate Access Structure for Super-polynomial Lower Bound on Information Ratio
Shahram Khazaei
2019/596
Discretisation and Product Distributions in Ring-LWE
Sean Murphy, Rachel Player
2019/595
DLSAG: Non-Interactive Refund Transactions For Interoperable Payment Channels in Monero
Pedro Moreno-Sanchez, Arthur Blue, Duc V. Le, Sarang Noether, Brandon Goodell, Aniket Kate
2019/594
Computing Primitive Idempotents in Finite Commutative Rings and Applications
Mugurel Barcau, Vicentiu Pasol
2019/593
On Noncommutative Cryptography and homomorphism of stable cubical multivariate transformation groups of infinite dimensional affine spaces
V. Ustimenko, M. Klisowski
2019/592
Statistical Analysis and Anonymity of TOR's Path Selection
Andrei Mogage, Emil Simion
2019/591
Simulating Homomorphic Evaluation of Deep Learning Predictions
Christina Boura, Nicolas Gama, Mariya Georgieva, Dimitar Jetchev
2019/590
Tighter proofs of CCA security in the quantum random oracle model
Nina Bindel, Mike Hamburg, Kathrin Hövelmanns, Andreas Hülsing, Edoardo Persichetti
2019/589
A${^2}$L: Anonymous Atomic Locks for Scalability in Payment Channel Hubs
Erkan Tairi, Pedro Moreno-Sanchez, Matteo Maffei
2019/588
Formal Notions of Security for Verifiable Homomorphic Encryption
Jakub Klemsa, Ivana Trummová
2019/587
Polygraph: Accountable Byzantine Agreement
Pierre Civit, Seth Gilbert, Vincent Gramoli
2019/586
Simulation-Extractable zk-SNARK with a Single Verification
Jihye Kim, Jiwon Lee, Hyunok Oh
2019/585
On Misuse of Nonce-Misuse Resistance: Adapting Differential Fault Attacks on (few) CAESAR Winners
Mustafa Khairallah, Shivam Bhasin, Anupam Chattopadhyay
2019/584
2-threshold Ideal Secret Sharing Schemes Can Be Uniquely Modeled by Latin Squares
Lintao Liu, Xuehu Yan, Yuliang Lu, Huaixi Wang
2019/583
Atomic Multi-Channel Updates with Constant Collateral in Bitcoin-Compatible Payment-Channel Networks
Christoph Egger, Pedro Moreno-Sanchez, Matteo Maffei
2019/582
EasyUC: Using EasyCrypt to Mechanize Proofs of Universally Composable Security
Ran Canetti, Alley Stoughton, Mayank Varia
2019/581
--Withdrawn--
---
2019/580
Omniring: Scaling Up Private Payments Without Trusted Setup - Formal Foundations and Constructions of Ring Confidential Transactions with Log-size Proofs
Russell W. F. Lai, Viktoria Ronge, Tim Ruffing, Dominique Schröder, Sri Aravinda Krishnan Thyagarajan, Jiafan Wang
2019/579
BlockQuick: Super-Light Client Protocol for Blockchain Validation on Constrained Devices
Dominic Letz
2019/578
Deep Learning based Side Channel Attacks in Practice
Houssem Maghrebi
2019/577
Improved Multiplication Triple Generation over Rings via RLWE-based AHE
Deevashwer Rathee, Thomas Schneider, K. K. Shukla
2019/576
On Group-Characterizability of Homomorphic Secret Sharing Schemes
Reza Kaboli, Shahram Khazaei, Maghsoud Parviz
2019/575
On Abelian and Homomorphic Secret Sharing Schemes
Amir Jafari, Shahram Khazaei
2019/574
Subliminal channels in post-quantum digital signature schemes
Herman Galteland, Kristian Gjøsteen
2019/573
Security of the Suffix Keyed Sponge
Christoph Dobraunig, Bart Mennink
2019/572
On the Commitment Capacity of Unfair Noisy Channels
Claude Crépeau, Rafael Dowsley, Anderson C. A. Nascimento
2019/571
Multi-Party Virtual State Channels
Stefan Dziembowski, Lisa Eckey, Sebastian Faust, Julia Hesse, Kristina Hostáková
2019/570
Bias-variance Decomposition in Machine Learning-based Side-channel Analysis
Daan van der Valk, Stjepan Picek
2019/569
Lattice RingCT v2.0 with Multiple Input and Output Wallets
Wilson Alberto Torres, Veronika Kuchta, Ron Steinfeld, Amin Sakzad, Joseph K. Liu, Jacob Cheng
2019/568
Post Quantum ECC on FPGA Platform
Debapriya Basu Roy, Debdeep Mukhopadhyay
2019/567
(Linkable) Ring Signature from Hash-Then-One-Way Signature
Xingye Lu, Man Ho Au, Zhenfei Zhang
2019/566
Deep Learning based Model Building Attacks on Arbiter PUF Compositions
Pranesh Santikellur, Aritra Bhattacharyay, Rajat Subhra Chakraborty
2019/565
Asymmetric Message Franking: Content Moderation for Metadata-Private End-to-End Encryption
Nirvan Tyagi, Paul Grubbs, Julia Len, Ian Miers, Thomas Ristenpart
2019/564
Verification of Authenticated Firmware Load
Sujit Kumar Muduli, Pramod Subramanyan, Sayak Ray
2019/563
ShareLock: Mixing for Cryptocurrencies from Multiparty ECDSA
Omer Shlomovits, István András Seres
2019/562
Towards More Secure Constructions of Adjustable Join Schemes
Shahram Khazaei, Mojtaba Rafiee
2019/561
Faster Bootstrapping of FHE over the integers with large prime message space
Zhizhu Lian, Yupu Hu, Hu Chen, Baocang Wang
2019/560
Solutions of $x^{q^k}+\cdots+x^{q}+x=a$ in $GF(2^n)$
Kwang Ho Kim, Jong Hyok Choe, Dok Nam Lee, Dae Song Go, Sihem Mesnager
2019/559
Weights on affine subspaces and some other cryptographic characteristics of Boolean functions of 5 variables
Evgeny K. Alekseev, Lyudmila A. Kushchinskaya
2019/558
How to not break SIDH
Chloe Martindale, Lorenz Panny
2019/557
Extended Galbraith's Test on the Anonymity of IBEs from Higher Residuosity
Xiaopeng Zhao, Zhenfu Cao, Xiaolei Dong, Jun Shao
2019/556
When Encryption is Not Enough -- Effective Concealment of Communication Pattern, even Existence (BitGrey, BitLoop)
Gideon Samid
2019/555
Optimal TNFS-secure pairings on elliptic curves with composite embedding degree
Georgios Fotiadis, Chloe Martindale
2019/554
How to Build Pseudorandom Functions From Public Random Permutations
Yu Long Chen, Eran Lambooij, Bart Mennink
2019/553
Towards post-quantum symmetric cryptography
John Gregory Underhill, Stiepan Aurélien Kovac, Xenia Bogomolec
2019/552
Continuous Space-Bounded Non-Malleable Codes from Stronger Proofs-of-Space
Binyi Chen, Yilei Chen, Kristina Hostáková, Pratyay Mukherjee
2019/551
A note on the correlations between NIST cryptographic statistical tests suite
Emil Simion, Paul Burciu
2019/550
Spartan: Efficient and general-purpose zkSNARKs without trusted setup
Srinath Setty
2019/549
Finding a Nash Equilibrium Is No Easier Than Breaking Fiat-Shamir
Arka Rai Choudhuri, Pavel Hubacek, Chethan Kamath, Krzysztof Pietrzak, Alon Rosen, Guy N. Rothblum
2019/548
About Wave Implementation and its Leakage Immunity
Thomas Debris-Alazard, Nicolas Sendrier, Jean-Pierre Tillich
2019/547
Linearly-Homomorphic Signatures and Scalable Mix-Nets
Chloé Hébant, Duong Hieu Phan, David Pointcheval
2019/546
Zero-Knowledge Proof-of-Identity: Sybil-Resistant, Anonymous Authentication on Permissionless Blockchains and Incentive Compatible, Strictly Dominant Cryptocurrencies
David Cerezo Sánchez
2019/545
Transform-and-Encode: A Countermeasure Framework for Statistical Ineffective Fault Attacks on Block Ciphers
Sayandeep Saha, Dirmanto Jap, Debapriya Basu Roy, Avik Chakraborti, Shivam Bhasin, Debdeep Mukhopadhyay
2019/544
Evaluation of Code-based Signature Schemes
Partha Sarathi Roy, Kirill Morozov, Kazuhide Fukushima, Shinsaku Kiyomoto
2019/543
TMPS: Ticket-Mediated Password Strengthening
John Kelsey, Dana Dachman-Soled, Sweta Mishra, Meltem Sonmez Turan
2019/542
Formally Verified Cryptographic Web Applications in WebAssembly
Jonathan Protzenko, Benjamin Beurdouche, Denis Merigoux, Karthikeyan Bhargavan
2019/541
A Smart Contract Refereed Data Retrieval Protocol with a Provably Low Collateral Requirement
James Shook, Scott Simon, Peter Mell
2019/540
A chosen key attack against the secret S-boxes of GOST
Markku-Juhani O. Saarinen
2019/539
Cryptanalysis of FlexAEAD
Mostafizar Rahman, Dhiman Saha, Goutam Paul
2019/538
On Perfect Endomorphic Ciphers
Nikolay Shenets
2019/537
Efficient Search for Optimal Diffusion Layers of Generalized Feistel Networks
Patrick Derbez, Pierre-Alain Fouque, Baptiste Lambin, Victor Mollimard
2019/536
Protecting against Statistical Ineffective Fault Attacks
Joan Daemen, Christoph Dobraunig, Maria Eichlseder, Hannes Gross, Florian Mendel, and Robert Primas
2019/535
SIKE Round 2 Speed Record on ARM Cortex-M4
Hwajeong soe, Amir Jalali, Reza Azarderakhsh
2019/534
Theoretical and Practical Approaches for Hardness Amplification of PUFs
Fatemeh Ganji, Shahin Tajik, Pascal Stauss, Jean-Pierre Seifert, Domenic Forte, Mark Tehranipoor
2019/533
Stopping time signatures for some algorithms in cryptography
Percy Deift, Stephen D. Miller, Thomas Trogdon
2019/532
Concretely-Efficient Zero-Knowledge Arguments for Arithmetic Circuits and Their Application to Lattice-Based Cryptography
Carsten Baum, Ariel Nof
2019/531
How to Correct Errors in Multi-Server PIR
Kaoru Kurosawa
2019/530
Speed-up of SCA attacks on 32-bit multiplications
Robert Nguyen, Adrien Facon, Sylvain Guilley, Guillaume Gautier, Safwan El Assad
2019/529
UC-Commitment Schemes with Phase-Adaptive Security from Trapdoor Functions
Pedro Branco, Manuel Goulão, Paulo Mateus
2019/528
Anomalies and Vector Space Search: Tools for S-Box Analysis (Full Version)
Xavier Bonnetain, Léo Perrin, Shizhu Tian
2019/527
Revisiting Privacy-aware Blockchain Public Key Infrastructure
Olamide Omolola, Paul Plessing
2019/526
Prime, Order Please! Revisiting Small Subgroup and Invalid Curve Attacks on Protocols using Diffie-Hellman
Cas Cremers, Dennis Jackson
2019/525
Misuse Attacks on Post-Quantum Cryptosystems
Ciprian Băetu, F. Betül Durak, Loïs Huguenin-Dumittan, Abdullah Talayhan, Serge Vaudenay
2019/524
Efficient Multi-Key Homomorphic Encryption with Packed Ciphertexts with Application to Oblivious Neural Network Inference
Hao Chen, Wei Dai, Miran Kim, Yongsoo Song
2019/523
Threshold ECDSA from ECDSA Assumptions: The Multiparty Case
Jack Doerner, Yashvanth Kondi, Eysa Lee, abhi shelat
2019/522
Secret-Sharing from Robust Conditional Disclosure of Secrets
Amos Beimel, Naty Peter
2019/521
Fully Homomorphic Encryption with k-bit Arithmetic Operations
Benjamin M. Case, Shuhong Gao, Gengran Hu, Qiuxia Xu
2019/520
A Note on Sub-Gaussian Random Variables
Benjamin M. Case, Colin Gallagher, Shuhong Gao
2019/519
Security in the Presence of Key Reuse: Context-Separable Interfaces and their Applications
Christopher Patton, Thomas Shrimpton
2019/518
Fast Database Joins and PSI for Secret Shared Data
Payman Mohassel, Peter Rindal, Mike Rosulek
2019/517
Mobile Private Contact Discovery at Scale
Daniel Kales, Christian Rechberger, Thomas Schneider, Matthias Senker, Christian Weinert
2019/516
CellTree: A New Paradigm for Distributed Data Repositories
Anasuya Acharya, Manoj Prabhakaran, Akash Trehan
2019/515
A Countermeasure Against Statistical Ineffective Fault Analysis
Jakub Breier, Mustafa Khairallah, Xiaolu Hou, Yang Liu
2019/514
Pixel: Multi-signatures for Consensus
Manu Drijvers, Sergey Gorbunov, Gregory Neven, Hoeteck Wee
2019/513
New Code-Based Privacy-Preserving Cryptographic Constructions
Khoa Nguyen, Hanh Tang, Huaxiong Wang, Neng Zeng
2019/512
Tight Leakage-Resilient CCA-Security from Quasi-Adaptive Hash Proof System
Shuai Han, Shengli Liu, Lin Lyu, Dawu Gu
2019/511
GALACTICS: Gaussian Sampling for Lattice-Based Constant-Time Implementation of Cryptographic Signatures, Revisited
Gilles Barthe, Sonia Belaïd, Thomas Espitau, Pierre-Alain Fouque, Mélissa Rossi, Mehdi Tibouchi
2019/510
Tweaking the Asymmetry of Asymmetric-Key Cryptography on Lattices: KEMs and Signatures of Smaller Sizes
Jiang Zhang, Yu Yu, Shuqin Fan, Zhenfeng Zhang, Kang Yang
2019/509
New Slide Attacks on Almost Self-Similar Ciphers
Orr Dunkelman, Nathan Keller, Noam Lasry, Adi Shamir
2019/508
RingCT 3.0 for Blockchain Confidential Transaction: Shorter Size and Stronger Security
Tsz Hon Yuen, Shi-feng Sun, Joseph K. Liu, Man Ho Au, Muhammed F. Esgin, Qingzhao Zhang, Dawu Gu
2019/507
Simple Schemes in the Bounded Storage Model
Jiaxin Guan, Mark Zhandry
2019/506
Forward Security with Crash Recovery for Secure Logs
Erik-Oliver Blass and Guevara Noubir
2019/505
DL-LA: Deep Learning Leakage Assessment: A modern roadmap for SCA evaluations
Thorben Moos, Felix Wegener, Amir Moradi
2019/504
Afgjort: A Partially Synchronous Finality Layer for Blockchains
Thomas Dinsdale-Young, Bernardo Magri, Christian Matt, Jesper Buus Nielsen, Daniel Tschudi
2019/503
Two-Party ECDSA from Hash Proof Systems and Efficient Instantiations
Guilhem Castagnos, Dario Catalano, Fabien Laguillaumie, Federico Savasta, Ida Tucker
2019/502
A refined analysis of the cost for solving LWE via uSVP
Shi Bai, Shaun Miller, Weiqiang Wen
2019/501
Optimal Merging in Quantum k-xor and k-sum Algorithms
María Naya-Plasencia, André Schrottenloher
2019/500
An HPR variant of the FV scheme: Computationally Cheaper, Asymptotically Faster
Jean-Claude Bajard, Julien Eynard, Paulo Martins, Leonel Sousa, Vincent Zucca
2019/499
Dual Isogenies and Their Application to Public-key Compression for Isogeny-based Cryptography
Michael Naehrig, Joost Renes
2019/498
CSI-FiSh: Efficient Isogeny based Signatures through Class Group Computations
Ward Beullens, Thorsten Kleinjung, Frederik Vercauteren
2019/497
Forward and Backward-Secure Range-Searchable Symmetric Encryption
Jiafan Wang, Sherman S. M. Chow
2019/496
Non-malleability for quantum public-key encryption
Christian Majenz, Christian Schaffner, Jeroen van Wier
2019/495
Protecting ECC Against Fault Attacks: The Ring Extension Method Revisited
Marc Joye
2019/494
On the non-tightness of measurement-based reductions for key encapsulation mechanism in the quantum random oracle model
Haodong Jiang, Zhenfeng Zhang, Zhi Ma
2019/493
Evaluating the effectiveness of heuristic worst-case noise analysis in FHE
Anamaria Costache, Kim Laine, Rachel Player
2019/492
Decisional second-preimage resistance: When does SPR imply PRE?
Daniel J. Bernstein, Andreas Hülsing
2019/491
Best Information is Most Successful
Eloi de Cherisey, Sylvain Guilley, Olivier Rioul, Pablo Piantanida
2019/490
Sigma protocols for MQ, PKP and SIS, and fishy signature schemes
Ward Beullens
2019/489
Memory-Efficient High-Speed Implementation of Kyber on Cortex-M4
Leon Botros, Matthias J. Kannwischer, Peter Schwabe
2019/488
Enigma 2000: An Authenticated Encryption Algorithm For Human-to-Human Communication
Alan Kaminsky
2019/487
From Single-Input to Multi-Client Inner-Product Functional Encryption
Michel Abdalla, Fabrice Benhamouda, Romain Gay
2019/486
Detective Mining: Selfish Mining Becomes Unrealistic under Mining Pool Environment
Suhyeon Lee, Seungjoo Kim
2019/485
A taxonomy of pairings, their security, their complexity
Razvan Barbulescu, Nadia El Mrabet, Loubna Ghammam
2019/484
New Number-Theoretic Cryptographic Primitives
Eric Brier, Houda Ferradi, Marc Joye, David Naccache
2019/483
Improved Filter Permutators: Combining Symmetric Encryption Design, Boolean Functions, Low Complexity Cryptography, and Homomorphic Encryption, for Private Delegation of Computations
Pierrick Méaux, Claude Carlet, Anthony Journault, François-Xavier Standaert
2019/482
Tiny WireGuard Tweak
Jacob Appelbaum, Chloe Martindale, Peter Wu
2019/481
An Efficient and Compact Reformulation of NIST Collision Estimate Test
Prasanna Raghaw Mishra, Bhartendu Nandan, Navneet Gaba
2019/480
On the Efficiency of Privacy-Preserving Smart Contract Systems
Karim Baghery
2019/479
Extended 3-Party ACCE and Application to LoRaWAN 1.1
Sébastien Canard, Loïc Ferreira
2019/478
BEARZ Attack FALCON: Implementation Attacks with Countermeasures on the FALCON signature scheme
Sarah McCarthy, James Howe, Neil Smyth, Seamus Brannigan, Máire O’Neill
2019/477
The Complexities of Healing in Secure Group Messaging: Why Cross-Group Effects Matter
Cas Cremers, Britta Hale, Konrad Kohbrok
2019/476
On MILP-Based Automatic Search for Differential Trails Through Modular Additions with Application to Bel-T
Muhammad ElSheikh, Ahmed Abdelkhalek, Amr M. Youssef
2019/475
Dual-Mode NIZKs from Obfuscation
Dennis Hofheinz, Bogdan Ursu
2019/473
A Method to Reduce the Key Size of UOV Signature Scheme
Chengdong Tao
2019/472
Defeating the Hart et al, Beullens-Blackburn, Kotov-Menshov-Ushakov, and Merz-Petit Attacks on WalnutDSA(TM)
Iris Anshel, Derek Atkins, Dorian Goldfeld, Paul E Gunnells
2019/471
UC-Secure CRS Generation for SNARKs
Behzad Abdolmaleki, Karim Baghery, Helger Lipmaa, Janno Siim, Michal Zajac
2019/470
A Practical Approach to the Secure Computation of the Moore-Penrose Pseudoinverse over the Rationals
Niek J. Bouman, Niels de Vreede
2019/469
Security Analysis of Efficient Anonymous Authentication With Conditional Privacy Preserving Scheme for Vehicular Ad Hoc Networks
Rui Qiao, Qinglong Wang, Zongtao Duan, Na Fan
2019/468
The Mersenne Low Hamming Combination Search Problem can be reduced to an ILP Problem
Alessandro Budroni, Andrea Tenti
2019/467
Revisiting Location Privacy from a Side-Channel Analysis Viewpoint (Extended Version)
Clément Massart, François-Xavier Standaert
2019/466
Privacy-Preserving K-means Clustering with Multiple Data Owners
Jung Hee Cheon, Jinhyuck Jeong, Dohyeong Ki, Jiseung Kim, Joohee Lee, Seok Won Lee
2019/465
Towards a Practical Cluster Analysis over Encrypted Data
Jung Hee Cheon, Duhyeong Kim, Jai Hyun Park
2019/464
The complexity of MinRank
Alessio Caminata, Elisa Gorla
2019/463
In Pursuit of Clarity In Obfuscation
Allison Bishop, Lucas Kowalczyk, Tal Malkin, Valerio Pastro, Mariana Raykova, Kevin Shi
2019/462
How to wrap it up - A formally verified proposal for the use of authenticated wrapping in PKCS\#11
Alexander Dax, Robert Künnemann, Sven Tangermann, Michael Backes
2019/461
Physical Security of Deep Learning on Edge Devices: Comprehensive Evaluation of Fault Injection Attack Vectors
Xiaolu Hou, Jakub Breier, Dirmanto Jap, Lei Ma, Shivam Bhasin, Yang Liu
2019/460
Fast Keyed-Verification Anonymous Credentials on Standard Smart Cards
Jan Camenisch, Manu Drijvers, Petr Dzurenda, Jan Hajny
2019/459
From Collisions to Chosen-Prefix Collisions - Application to Full SHA-1
Gaëtan Leurent, Thomas Peyrin
2019/458
Poseidon: A New Hash Function for Zero-Knowledge Proof Systems
Lorenzo Grassi, Dmitry Khovratovich, Christian Rechberger, Arnab Roy, Markus Schofnegger
2019/457
Forgery Attack on mixFeed in the Nonce-Misuse Scenario
Mustafa Khairallah
2019/456
UniqueChain: A Fast, Provably Secure Proof-of-Stake Based Blockchain Protocol in the Open Setting
Peifang Ni, Hongda Li, Xianning Meng, Dongxue Pan
2019/455
FloodXMR: Low-cost transaction flooding attack with Monero’s bulletproof protocol
João Otávio Massari Chervinski, Diego Kreutz, Jiangshan Yu
2019/454
Non-Interactive MPC with Trusted Hardware Secure Against Residual Function Attacks
Ryan Karl, Timothy Burchfield, Jonathan Takeshita, Taeho Jung
2019/453
A New Approach to Modelling Centralised Reputation Systems
Lydia Garms, Elizabeth A. Quaglia
2019/452
A Central Limit Framework for Ring-LWE Noise Analysis
Sean Murphy and Rachel Player
2019/451
Reducing the Cost of Authenticity with Leakages: a CIML2-Secure AE Scheme with One Call to a Strongly Protected Tweakable Block Cipher
Francesco Berti, Olivier Pereira, François-Xavier Standaert
2019/450
HMAKE: Legacy-Compliant Multi-factor Authenticated Key Exchange from Historical Data
Chenglu Jin, Zheng Yang, Sridhar Adepu, Jianying Zhou
2019/449
Limits to Non-Malleability
Marshall Ball, Dana Dachman-Soled, Mukul Kulkarni, Tal Malkin
2019/448
Efficient Pseudorandom Correlation Generators: Silent OT Extension and More
Elette Boyle, Geoffroy Couteau, Niv Gilboa, Yuval Ishai, Lisa Kohl, Peter Scholl
2019/447
Practical Key-recovery Attacks on Round-Reduced Ketje Jr, Xoodoo-AE and Xoodyak
Haibo Zhou, Zheng Li, Xiaoyang Dong, Keting Jia, Willi Meier
2019/446
Backward Private DSSE: Alternative Formulations of Information Leakage and Efficient Constructions
Sanjit Chatterjee, Shravan Kumar Parshuram Puria, Akash Shah
2019/445
Lattice-based Zero-Knowledge Proofs: New Techniques for Shorter and Faster Constructions and Applications
Muhammed F. Esgin, Ron Steinfeld, Joseph K. Liu, Dongxi Liu
2019/444
Symmetric-key Authenticated Key Exchange (SAKE) with Perfect Forward Secrecy
Gildas Avoine, Sébastien Canard, Loïc Ferreira
2019/443
Contingent payments on a public ledger: models and reductions for automated verification
Sergiu Bursuc, Steve Kremer
2019/442
K2SN-MSS: An Efficient Post-Quantum Signature (Full Version)
Sabyasachi Karati, Reihaneh Safavi-Naini
2019/441
The State of the Uniform: Attacks on Encrypted Databases Beyond the Uniform Query Distribution
Evgenios M. Kornaropoulos, Charalampos Papamanthou, Roberto Tamassia
2019/440
Elastic-Tweak: A Framework for Short Tweak Tweakable Block Cipher
Avik Chakraborti, Nilanjan Datta, Ashwin Jha, Cuauhtemoc Mancillas Lopez, Mridul Nandi, Yu Sasaki
2019/439
A Comprehensive Study of Deep Learning for Side-Channel Analysis
Loïc Masure, Cécile Dumas, Emmanuel Prouff
2019/438
Oblivious PRF on Committed Vector Inputs and Application to Deduplication of Encrypted Data
Jan Camenisch, Angelo De Caro, Esha Ghosh, Alessandro Sorniotti
2019/437
Efficient coding for secure computing with additively-homomorphic encrypted data
Thijs Veugen
2019/436
Flexible Authenticated and Confidential Channel Establishment (fACCE): Analyzing the Noise Protocol Framework
Benjamin Dowling, Paul Rösler, Jörg Schwenk
2019/435
A Complete and Optimized Key Mismatch Attack on NIST Candidate NewHope
Yue Qin, Chi Cheng, Jintai Ding
2019/434
Masking Fuzzy-Searchable Public Databases
Alexandra Boldyreva, Tianxin Tang, Bogdan Warinschi
2019/433
Secure Communication Channel Establishment: TLS 1.3 (over TCP Fast Open) versus QUIC
Shan Chen, Samuel Jero, Matthew Jagielski, Alexandra Boldyreva, Cristina Nita-Rotaru
2019/432
Cryptanalysis of a System Based on Twisted Reed-Solomon Codes
Julien Lavauzelle, Julian Renner
2019/431
Cocks-Pinch curves of embedding degrees five to eight and optimal ate pairing computation
Aurore Guillevic, Simon Masson, Emmanuel Thomé
2019/430
Composition of Boolean Functions: An Application to the Secondary Constructions of Bent Functions
Guangpu Gao, Dongdai Lin, Wenfen Liu, Yongjuan Wang
2019/429
ASTRA: High Throughput 3PC over Rings with Application to Secure Prediction
Harsh Chaudhari, Ashish Choudhury, Arpita Patra, Ajith Suresh
2019/428
Quantum Lazy Sampling and Game-Playing Proofs for Quantum Indifferentiability
Jan Czajkowski, Christian Majenz, Christian Schaffner, Sebastian Zur
2019/427
Improved Secure Integer Comparison via Homomorphic Encryption
Florian Bourse, Olivier Sanders, Jacques Traoré
2019/426
Design of Symmetric-Key Primitives for Advanced Cryptographic Protocols
Abdelrahaman Aly, Tomer Ashur, Eli Ben-Sasson, Siemen Dhooghe, Alan Szepieniec
2019/425
Homomorphic Training of 30,000 Logistic Regression Models
Flavio Bergamaschi, Shai Halevi, Tzipora T. Halevi, Hamish Hunt
2019/424
Preimage Security of KNOT-Hash
Raghvendra Rohit
2019/423
Chaotic Compilation for Encrypted Computing: Obfuscation but Not in Name
Peter T. Breuer
2019/422
Parallelizable MACs Based on the Sum of PRPs with Security Beyond the Birthday Bound
Alexander Moch, Eik List
2019/421
Continuing to reflect on TLS 1.3 with external PSK
Liliya Akhmetzyanova, Evgeny Alekseev, Ekaterina Smyshlyaeva, Alexandr Sokolov
2019/420
Improving Speed of Dilithium’s Signing Procedure
Prasanna Ravi, Sourav Sen Gupta, Anupam Chattopadhyay, Shivam Bhasin
2019/419
Algebraic Cryptanalysis of STARK-Friendly Designs: Application to MARVELlous and MiMC
Martin R. Albrecht, Carlos Cid, Lorenzo Grassi, Dmitry Khovratovich, Reinhard Lüftenegger, Christian Rechberger, Markus Schofnegger
2019/418
Sharing of Encrypted files in Blockchain Made Simpler
S. Sharmila Deva Selvi, Arinjita Paul, Siva Dirisala, Saswata Basu, C. Pandu Rangan
2019/417
Numerical Method for Comparison on Homomorphically Encrypted Numbers
Jung Hee Cheon, Dongwoo Kim, Duhyeong Kim, Hun Hee Lee, Keewoo Lee
2019/416
How many transactions per second can bitcoin really handle ? Theoretically.
Evangelos Georgiadis
2019/415
Refinement and Verification of CBC Casper
Ryuya Nakamura, Takayuki Jimba, Dominik Harz
2019/414
Two-Round Oblivious Transfer from CDH or LPN
Nico Döttling, Sanjam Garg, Mohammad Hajiabadi, Daniel Masny, Daniel Wichs
2019/413
On the Streaming Indistinguishability of a Random Permutation and a Random Function
Itai Dinur
2019/412
On the complexity of the Permuted Kernel Problem
Eliane KOUSSA, Gilles MACARIO-RAT, Jacques PATARIN
2019/411
Exploring the Monero Peer-to-Peer Network
Tong Cao, Jiangshan Yu, Jérémie Decouchant, Xiapu Luo, Paulo Verissimo
2019/410
Policy-Based Sanitizable Signatures
Kai Samelin, Daniel Slamanig
2019/409
Post-Quantum Provably-Secure Authentication and MAC from Mersenne Primes
Houda Ferradi, Keita Xagawa
2019/408
Forgery Attack on SNEIKEN
Mustafa Khairallah
2019/407
Privacy-Preserving Network Path Validation
Binanda Sengupta, Yingjiu Li, Kai Bu, Robert H. Deng
2019/406
Fine-Grained and Controlled Rewriting in Blockchains: Chameleon-Hashing Gone Attribute-Based
David Derler, Kai Samelin, Daniel Slamanig, Christoph Striecks
2019/405
A Novel FPGA Architecture and Protocol for the Self-attestation of Configurable Hardware
Jo Vliegen, Md Masoom Rabbani, Mauro Conti, Nele Mentens
2019/404
Efficient Message Authentication Codes with Combinatorial Group Testing
Kazuhiko Minematsu
2019/403
Fast and simple constant-time hashing to the BLS12-381 elliptic curve
Riad S. Wahby, Dan Boneh
2019/402
ILC: A Calculus for Composable, Computational Cryptography
Kevin Liao, Matthew A. Hammer, Andrew Miller
2019/401
Side-Channel assessment of Open Source Hardware Wallets
Manuel San Pedro, Victor Servant, Charles Guillemet
2019/400
Degenerate Fault Attacks on Elliptic Curve Parameters in OpenSSL
Akira Takahashi, Mehdi Tibouchi
2019/399
Inception makes non-malleable codes shorter as well!
Divesh Aggarwal, Maciej Obremski
2019/398
Constant-Round Group Key Exchange from the Ring-LWE Assumption
Daniel Apon, Dana Dachman-Soled, Huijing Gong, Jonathan Katz
2019/397
Feistel Structures for MPC, and More
Martin R. Albrecht, Lorenzo Grassi, Leo Perrin, Sebastian Ramacher, Christian Rechberger, Dragos Rotaru, Arnab Roy, Markus Schofnegger
2019/396
Mitigation Techniques for Attacks on 1-Dimensional Databases that Support Range Queries
Evangelia Anna Markatou, Roberto Tamassia
2019/395
Full Database Reconstruction with Access and Search Pattern Leakage
Evangelia Anna Markatou, Roberto Tamassia
2019/394
Masking Dilithium: Efficient Implementation and Side-Channel Evaluation
Vincent Migliore, Benoit Gérard, Mehdi Tibouchi, Pierre-Alain Fouque
2019/393
A Tight Parallel Repetition Theorem for Partially Simulatable Interactive Arguments via Smooth KL-Divergence
Itay Berman, Iftach Haitner, Eliad Tsfadia
2019/392
New Conditional Cube Attack on Keccak Keyed Modes
Zheng Li, Xiaoyang Dong, Wenquan Bi, Keting Jia, Xiaoyun Wang, Willi Meier
2019/391
Fooling the Sense of Cross-core Last-level Cache Eviction based Attacker by Prefetching Common Sense
Biswabandan Panda
2019/390
KeyForge: Mitigating Email Breaches with Forward-Forgeable Signatures
Michael Specter, Sunoo Park, Matthew Green
2019/389
Achieving secure and efficient lattice-based public-key encryption: the impact of the secret-key distribution
Sauvik Bhattacharya, Oscar Garcia-Morchon, Rachel Player, Ludo Tolhuizen
2019/388
Towards Secret-Free Security
Ulrich Rührmair
2019/387
SoK : On DFA Vulnerabilities of Substitution-Permutation Networks
Mustafa Khairallah, Xiaolu Hou, Zakaria Najm, Jakub Breier, Shivam Bhasin, Thomas Peyrin
2019/386
Field Extension in Secret-Shared Form and Its Applications to Efficient Secure Computation
Ryo Kikuchi, Nuttapong Attrapadung, Koki Hamada, Dai Ikarashi, Ai Ishida, Takahiro Matsuda, Yusuke Sakai, Jacob C. N. Schuldt
2019/385
Miller Inversion is Easy for the Reduced Tate Pairing on Supersingular Curves of Embedding Degree Two and Three
Takakazu Satoh
2019/384
What Storage Access Privacy is Achievable with Small Overhead?
Sarvar Patel, Giuseppe Persiano, Kevin Yeo
2019/383
Dragonblood: Analyzing the Dragonfly Handshake of WPA3 and EAP-pwd
Mathy Vanhoef, Eyal Ronen
2019/382
Hierarchical Attribute-based Signatures: Short Keys and Optimal Signature Length
Daniel Gardham, Mark Manulis
2019/381
Revisit Division Property Based Cube Attacks: Key-Recovery or Distinguishing Attacks?
Chen-Dong Ye, Tian Tian
2019/380
A Single Shuffle Is Enough for Secure Card-Based Computation of Any Circuit
Kazumasa Shinagawa, Koji Nuida
2019/379
Non-Malleable Codes for Decision Trees
Marshall Ball, Siyao Guo, Daniel Wichs
2019/378
pRate: Anonymous Star Rating with Rating Secrecy
Jia Liu, Mark Manulis
2019/377
Lower Bounds for Oblivious Near-Neighbor Search
Kasper Green Larsen, Tal Malkin, Omri Weinstein, Kevin Yeo
2019/376
SELL v1.0: Searchable Encrypted Logging Library
Amir Jalali, Neil Davenport
2019/375
Secure Trick-Taking Game Protocols: How to Play Online Spades with Cheaters
Xavier Bultel, Pascal Lafourcade
2019/374
Probability 1 Iterated Differential in the SNEIK Permutation
Léo Perrin
2019/373
Lelantus: A New Design for Anonymous and Confidential Cryptocurrencies
Aram Jivanyan
2019/372
Privado: Privacy-Preserving Group-based Advertising using Multiple Independent Social Network Providers
Sanaz Taheri Boshrooyeh, Alptekin Küpçü, Öznur Özkasap
2019/371
Adding Linkability to Ring Signatures with One-Time Signatures
Xueli Wang, Yu Chen, Xuecheng Ma
2019/370
Indifferentiability for Public Key Cryptosystems
Mark Zhandry, Cong Zhang
2019/369
On the EA-classes of known APN functions in small dimensions
Marco Calderini
2019/368
Strong Post-Compromise Secure Proxy Re-Encryption
Alex Davidson, Amit Deo, Ela Lee, Keith Martin
2019/367
SAID: Reshaping Signal into an Identity-Based Asynchronous Messaging Protocol with Authenticated Ratcheting
Olivier Blazy, Angèle Bossuat, Xavier Bultel, Pierre-Alain Fouque, Cristina Onete, Elena Pagnin
2019/366
Triggerflow: Regression Testing by Advanced Execution Path Inspection
Iaroslav Gridin, Cesar Pereida García, Nicola Tuveri, Billy Bob Brumley
2019/365
Fully Secure Attribute-Based Encryption for $t$-CNF from LWE
Rotem Tsabary
2019/364
Everybody's a Target: Scalability in Public-Key Encryption
Benedikt Auerbach, Federico Giacon, Eike Kiltz
2019/363
Efficient Attribute-Based Signatures for Unbounded Arithmetic Branching Programs
Pratish Datta, Tatsuaki Okamoto, Katsuyuki Takashima
2019/362
Game Channels: State Channels for the Gambling Industry with Built-In PRNG
Alisa Cherniaeva, Ilia Shirobokov, Alexander Davydov
2019/361
On polynomial secret sharing schemes
Anat Paskin-Chernivasky, Artiom Radune
2019/360
SoK: Layer-Two Blockchain Protocols
Lewis Gudgeon, Pedro Moreno-Sanchez, Stefanie Roos, Patrick McCorry, Arthur Gervais
2019/359
SANNS: Scaling Up Secure Approximate k-Nearest Neighbors Search
Hao Chen, Ilaria Chillotti, Yihe Dong, Oxana Poburinnaya, Ilya Razenshteyn, M. Sadegh Riazi
2019/358
One trace is all it takes: Machine Learning-based Side-channel Attack on EdDSA
Leo Weissbart, Stjepan Picek, Lejla Batina
2019/357
Lattice-based proof of a shuffle
Núria Costa, Ramiro Martínez, Paz Morillo
2019/356
Ad Hoc Multi-Input Functional Encryption
Shweta Agrawal, Michael Clear, Ophir Frieder, Sanjam Garg, Adam O’Neill, Justin Thaler
2019/355
To Infect Or Not To Infect: A Critical Analysis Of Infective Countermeasures In Fault Attacks
Anubhab Baksi, Dhiman Saha, Sumanta Sarkar
2019/354
Benchmarking Privacy Preserving Scientific Operations
Abdelrahaman Aly, Nigel P. Smart
2019/353
A Faster Constant-time Algorithm of CSIDH keeping Two Points
Hiroshi Onuki, Yusuke Aikawa, Tsutomu Yamazaki, Tsuyoshi Takagi
2019/352
SoK: A Taxonomy for Layer-2 Scalability Related Protocols for Cryptocurrencies
Maxim Jourenko, Kanta Kurazumi, Mario Larangeira, Keisuke Tanaka
2019/351
Forward Secrecy of SPAKE2
Jose Becerra, Dimiter Ostrev, Marjan Skrobot
2019/350
nGraph-HE: A Graph Compiler for Deep Learning on Homomorphically Encrypted Data
Fabian Boemer, Yixing Lao, Rosario Cammarota, Casimir Wierzynski
2019/349
Spin Me Right Round: Rotational Symmetry for FPGA-specific AES
Felix Wegener, Lauren De Meyer, Amir Moradi
2019/348
Efficient and Scalable Universal Circuits
Masaud Y. Alhassan, Daniel Günther, Ágnes Kiss, Thomas Schneider
2019/347
Selfie: reflections on TLS 1.3 with PSK
Nir Drucker, Shay Gueron
2019/346
Yet Another Side Channel Cryptanalysis on SM3 Hash Algorithm
Christophe Clavier, Leo Reynaud, Antoine Wurcker
2019/345
Second-order Scatter Attack
Hugues Thiebeauld, Aurélien Vasselle, Antoine Wurcker
2019/344
Cryptanalysis of Curl-P and Other Attacks on the IOTA Cryptocurrency
Ethan Heilman, Neha Narula, Garrett Tanzer, James Lovejoy, Michael Colavita, Madars Virza, Tadge Dryja
2019/343
Optimizations of Side-Channel Attack on AES MixColumns Using Chosen Input
Aurelien Vasselle, Antoine Wurcker
2019/342
LightChain: A DHT-based Blockchain for Resource Constrained Environments
Yahya Hassanzadeh-Nazarabadi, Alptekin Küpçü, Öznur Özkasap
2019/341
MixEth: efficient, trustless coin mixing service for Ethereum
István András Seres, Dániel A. Nagy, Chris Buckland, Péter Burcsi
2019/340
Ease of Side-Channel Attacks on AES-192/256 by Targeting Extreme Keys
Antoine Wurcker
2019/339
Lightweight Authenticated Encryption Mode of Operation for Tweakable Block Ciphers
Yusuke Naito, Takeshi Sugawara
2019/338
Garbled Neural Networks are Practical
Marshall Ball, Brent Carmer, Tal Malkin, Mike Rosulek, Nichole Schimanski
2019/337
Anonymous Deniable Identification in Ephemeral Setup & Leakage Scenarios
Łukasz Krzywiecki, Mirosław Kutyłowski, Jakub Pezda, Marcin Słowik
2019/336
DEEP-FRI: Sampling Outside the Box Improves Soundness
Eli Ben-Sasson, Lior Goldberg, Swastik Kopparty, Shubhangi Saraf
2019/335
Examining the Practical Side Channel Resilience of ARX-boxes
Yan Yan and Elisabeth Oswald
2019/334
Practically Efficient Secure Distributed Exponentiation without Bit-Decomposition
Abdelrahaman Aly, Aysajan Abidin, Svetla Nikova
2019/333
Key-and-Argument-Updatable QA-NIZKs
Helger Lipmaa
2019/332
Efficient Private Comparison Queries over Encrypted Databases using Fully Homomorphic Encryption with Finite Fields
Benjamin Hong Meng Tan, Hyung Tae Lee, Huaxiong Wang, Shu Qin Ren, Khin Mi Mi Aung
2019/331
Optimized Supersingular Isogeny Key Encapsulation on ARMv8 Processors
Amir Jalali, Reza Azarderakhsh, Mehran Mozaffari Kermani, Matthew Campagna, David Jao
2019/330
Practical Supersingular Isogeny Group Key Agreement
Reza Azarderakhsh, Amir Jalali, David Jao, Vladimir Soukharev
2019/329
Doubly half-injective PRGs for incompressible white-box cryptography
Estuardo Alpirez Bock, Alessandro Amadori, Joppe W. Bos, Chris Brzuska, Wil Michiels
2019/328
On the Difficulty of Hiding the Balance of Lightning Network Channels
Jordi Herrera-Joancomartí, Guillermo Navarro-Arribas, Alejandro Ranchal-Pedrosa, Cristina Pérez-Solà, Joaquin Garcia-Alfaro
2019/327
Quantum Distinguishing Attacks against Type-1 Generalized Feistel Ciphers
Gembu Ito, Tetsu Iwata
2019/326
Shorter Pairing-based Arguments under Standard Assumptions
Alonso Gonzalez, Carla Rafols
2019/325
An Efficient Private Evaluation of a Decision Graph
Hiroki Sudo, Koji Nuida, Kana Shimizu
2019/324
A Traceable Ring Signature Scheme based on Coding Theory
Pedro Branco, Paulo Mateus
2019/323
Theory and application of computationally independent one-way functions: Interactive proof of ability - Revisited
Sabyasachi Dutta, Kouichi Sakurai
2019/322
A High-Speed Constant-Time Hardware Implementation of NTRUEncrypt SVES
Farnoud Farahmand, Malik Umar Sharif, Kevin Briggs, Kris Gaj
2019/321
Horizontal Collision Correlation Attack on Elliptic Curves
Aurélie Bauer, Eliane Jaulmes, Emmanuel Prouff, Jean-René Reinhard, Justine Wild
2019/320
Integral Matrix Gram Root and Lattice Gaussian Sampling without Floats
Léo Ducas, Steven Galbraith, Thomas Prest, Yang Yu
2019/319
PGC: Pretty Good Decentralized Confidential Payment System with Auditability
Yu Chen, Xuecheng Ma, Cong Tang, Man Ho Au
2019/318
Improved quantum attack on Type-1 Generalized Feistel Schemes and Its application to CAST-256
Boyu Ni, Xiaoyang Dong
2019/317
Libra: Succinct Zero-Knowledge Proofs with Optimal Prover Computation
Tiancheng Xie, Jiaheng Zhang, Yupeng Zhang, Charalampos Papamanthou, Dawn Song
2019/316
Extended Affine and CCZ Equivalence up to Dimension 4
Marcus Brinkmann
2019/315
Blockchains from Non-Idealized Hash Functions
Juan A. Garay, Aggelos Kiayias, Giorgos Panagiotakos
2019/314
Optimal Bounded-Collusion Secure Functional Encryption
Prabhanjan Ananth, Vinod Vaikuntanathan
2019/313
A SAT-based approach for index calculus on binary elliptic curves
Monika Trimoska, Sorina Ionica, Gilles Dequen
2019/312
Side-Channel Analysis of the TERO PUF
Lars Tebelmann, Michael Pehl, Vincent Immler
2019/311
Cryptanalysis of OCB2: Attacks on Authenticity and Confidentiality
Akiko Inoue, Tetsu Iwata, Kazuhiko Minematsu, Bertram Poettering
2019/310
A Formal Approach to Secure Speculation
Kevin Cheang, Cameron Rasmussen, Sanjit Seshia, Pramod Subramanyan
2019/309
Cryptanalysis of CLT13 Multilinear Maps with Independent Slots
Jean-Sebastien Coron, Luca Notarnicola
2019/308
Obfuscation from Polynomial Hardness: Beyond Decomposable Obfuscation
Yuan Kang, Chengyu Lin, Tal Malkin, Mariana Raykova
2019/307
Solving $x^{2^k+1}+x+a=0$ in $\mathbb{F}_{2^n}$ with $\gcd(n,k)=1$
Kwang Ho Kim, Sihem Mesnager
2019/306
Faster Initial Splitting for Small Characteristic Composite Extension Degree Fields
Madhurima Mukhopadhyay, Palash Sarkar
2019/305
Practical Algebraic Side-Channel Attacks Against ACORN
Alexandre Adomnicai, Laurent Masson, Jacques J. A. Fournier
2019/304
Ternary Syndrome Decoding with Large Weight
Rémi Bricout, André Chailloux, Thomas Debris-Alazard, Matthieu Lequesne
2019/303
Analysis of TPL Signature Scheme
Terry Shue Chien Lau, Chik How Tan, Theo Fanuela Prabowo
2019/302
A Survey of Leakage-Resilient Cryptography
Yael Tauman Kalai, Leonid Reyzin
2019/301
Safe Compilation for Encrypted Computing
Peter T. Breuer, Simon Pickin
2019/300
Transient Effect Ring Oscillators Leak Too
Ugo Mureddu, Brice Colombier, Nathalie Bochard, Lilian Bossuet, Viktor Fischer
2019/299
A Generic Construction of Revocable Identity-Based Encryption
Xuecheng Ma, Dongdai Lin
2019/298
Improved Classical Cryptanalysis of SIKE in Practice
Craig Costello, Patrick Longa, Michael Naehrig, Joost Renes, Fernando Virdia
2019/297
Towards Optimized and Constant-Time CSIDH on Embedded Devices
Amir Jalali, Reza Azarderakhsh, Mehran Mozaffari Kermani, David Jao
2019/296
Hash functions from superspecial genus-2 curves using Richelot isogenies
Wouter Castryck, Thomas Decru, Benjamin Smith
2019/295
Balancing Image Privacy and Usability with Thumbnail-Preserving Encryption
Kimia Tajik, Akshith Gunasekaran, Rhea Dutta, Brandon Ellis, Rakesh B. Bobba, Mike Rosulek, Charles V. Wright, Wu-chi Feng
2019/294
Semi-parallel Logistic Regression for GWAS on Encrypted Data
Miran Kim, Yongsoo Song, Baiyu Li, Daniele Micciancio
2019/293
Impossibility of Strong KDM Security with Auxiliary Input
Cody Freitag, Ilan Komargodski, Rafael Pass
2019/292
Timing attacks on Error Correcting Codes in Post-Quantum Schemes
Jan-Pieter D'Anvers, Marcel Tiepelt, Frederik Vercauteren, Ingrid Verbauwhede
2019/291
CCA Security and Trapdoor Functions via Key-Dependent-Message Security
Fuyuki Kitagawa, Takahiro Matsuda, Keisuke Tanaka
2019/290
Cost effective techniques for chip delayering and in-situ depackaging
Philippe Loubet Moundi
2019/289
Cryptanalysis of ForkAES
Subhadeep Banik, Jannis Bossert, Amit Jana, Eik List, Stefan Lucks, Willi Meier, Mostafizar Rahman, Dhiman Saha, Yu Sasaki
2019/288
On the construction of S-boxes using the leaders and followers metaheuristic
Alejandro Freyre-Echevarría, Ismel Martínez-Díaz
2019/287
Security Evaluation for Snow 2.0-like Stream Ciphers Against Correlation Attacks over Extension Fields
A. N. Alekseychuk, S. M. Koniushok, M. V. Poremskyi
2019/286
Fast Algebraic Immunity of $2^m+2$ & $2^m+3$ variables Majority Function
Yindong Chen, Fei Guo, Liu Zhang
2019/285
SpaceFlip : Unbound Geometry Cryptography
Gideon Samid
2019/284
Proper Usage of the Group Signature Scheme in ISO/IEC 20008-2
Ai Ishida, Yusuke Sakai, Keita Emura, Goichiro Hanaoka, Keisuke Tanaka
2019/283
An Attack on Small Private Keys of RSA Based on Euclidean Algorithm
Dimitrios Poulakis
2019/282
A Framework for Cryptographic Problems from Linear Algebra
Carl Bootland, Wouter Castryck, Alan Szepieniec, Frederik Vercauteren
2019/281
Make Some ROOM for the Zeros: Data Sparsity in Secure Distributed Machine Learning
Phillipp Schoppmann, Adria Gascon, Mariana Raykova, Benny Pinkas
2019/280
Multi-Authority Attribute-Based Encryption from LWE in the OT Model
Sam Kim
2019/279
A Note on Key Agreement and Non-Interactive Commitments
Alex Lombardi, Luke Schaeffer
2019/278
Uncovering Algebraic Structures in the MPC Landscape
Navneet Agarwal, Sanat Anand, Manoj Prabhakaran
2019/277
On the boomerang uniformity of quadratic permutations
Sihem Mesnager, Chunming Tang, Maosheng Xiong
2019/276
BOREALIS: Building Block for Sealed Bid Auctions on Blockchains
Erik-Oliver Blass, Florian Kerschbaum
2019/275
MPCircuits: Optimized Circuit Generation for Secure Multi-Party Computation
M. Sadegh Riazi, Mojan Javaheripi, Siam U. Hussain, Farinaz Koushanfar
2019/274
Path Oblivious Heap: Optimal and Practical Oblivious Priority Queue
Elaine Shi
2019/273
Compressing Vector OLE
Elette Boyle, Geoffroy Couteau, Niv Gilboa, Yuval Ishai
2019/272
Quantum Security Analysis of AES
Xavier Bonnetain, María Naya-Plasencia, André Schrottenloher
2019/271
A Simple Key Reuse Attack on LWE and Ring LWE Encryption Schemes as Key Encapsulation Mechanisms (KEMs)
Jintai Ding, Chi Cheng, Yue Qin
2019/270
Sync HotStuff: Simple and Practical Synchronous State Machine Replication
Ittai Abraham, Dahlia Malkhi, Kartik Nayak, Ling Ren, Maofan Yin
2019/269
Digital Signatures for Consensus
Sergey Gorbunov, Hoeteck Wee
2019/268
Lightweight Authentication for Low-End Control Units with Hardware Based Individual Keys*
Sergei Bauer, Martin Brunner, Peter Schartner
2019/267
Pushing the speed limit of constant-time discrete Gaussian sampling. A case study on Falcon.
Angshuman Karmakar, Sujoy Sinha Roy, Frederik Vercauteren, Ingrid Verbauwhede
2019/266
Fast constant-time gcd computation and modular inversion
Daniel J. Bernstein, Bo-Yin Yang
2019/265
TEX - A Securely Scalable Trustless Exchange
Rami Khalil, Arthur Gervais, Guillaume Felley
2019/264
Unifying computational entropies via Kullback-Leibler divergence
Rohit Agrawal, Yi-Hsiu Chen, Thibaut Horel, Salil Vadhan
2019/263
Monoxide: Scale Out Blockchain with Asynchronous Consensus Zones
Jiaping Wang, Hao Wang
2019/262
Revisiting Post-Quantum Fiat-Shamir
Qipeng Liu, Mark Zhandry
2019/261
Forward-Secure Multi-Signatures
Manu Drijvers, Gregory Neven
2019/260
A Modular Treatment of Blind Signatures from Identification Schemes
Eduard Hauck, Eike Kiltz, and Julian Loss
2019/259
A Practical Method to Recover Exact Superpoly in Cube Attack
SenPeng Wang, Bin Hu, Jie Guan, Kai Zhang, TaiRong Shi
2019/258
Tight Time-Memory Trade-offs for Symmetric Encryption
Joseph Jaeger, Stefano Tessaro
2019/257
Uncloneable Quantum Encryption via Oracles
Anne Broadbent, Sébastien Lord
2019/256
DLCT: A New Tool for Differential-Linear Cryptanalysis
Achiya Bar-On, Orr Dunkelman, Nathan Keller, Ariel Weizman
2019/255
Designated Verifier/Prover and Preprocessing NIZKs from Diffie-Hellman Assumptions
Shuichi Katsumata, Ryo Nishimaki, Shota Yamada, Takashi Yamakawa
2019/254
A Quantum-Proof Non-Malleable Extractor With Application to Privacy Amplification against Active Quantum Adversaries
Divesh Aggarwal, Kai-Min Chung, Han-Hsuan Lin, Thomas Vidick
2019/253
Founding Secure Computation on Blockchains
Arka Rai Choudhuri, Vipul Goyal, Abhishek Jain
2019/252
Reversible Proofs of Sequential Work
Hamza Abusalah, Chethan Kamath, Karen Klein, Krzysztof Pietrzak, Michael Walter
2019/251
Consensus through Herding
T-H. Hubert Chan, Rafael Pass, Elaine Shi
2019/250
Function-Dependent Commitments from Homomorphic Authenticators
Lucas Schabhüser, Denis Butin, Johannes Buchmann
2019/249
Revisiting Variable Output Length XOR Pseudorandom Function
Srimanta Bhattacharya, Mridul Nandi
2019/248
Preimage Attacks on Round-reduced Keccak-224/256 via an Allocating Approach
Ting Li, Yao Sun
2019/247
Verifier-on-a-Leash: new schemes for verifiable delegated quantum computation, with quasilinear resources
Andrea Coladangelo, Alex B. Grilo, Stacey Jeffery, Thomas Vidick
2019/246
Towards optimal robust secret sharing with security against a rushing adversary
Serge Fehr, Chen Yuan
2019/245
Distributed Differential Privacy via Shuffling
Albert Cheu, Adam Smith, Jonathan Ullman, David Zeber, Maxim Zhilyaev
2019/244
Attacks Only Get Better: How to Break FF3 on Large Domains
Viet Tung Hoang, David Miller, Ni Trieu
2019/243
4-Round Luby-Rackoff Construction is a qPRP: Tight Quantum Security Bound
Akinori Hosoyamada, Tetsu Iwata
2019/242
New Constructions of Reusable Designated-Verifier NIZKs
Alex Lombardi, Willy Quach, Ron D. Rothblum, Daniel Wichs, David J. Wu
2019/241
Efficient Circuit-based PSI with Linear Communication
Benny Pinkas, Thomas Schneider, Oleksandr Tkachenko, Avishay Yanai
2019/240
Correlated-Source Extractors and Cryptography with Correlated-Random Tapes
Vipul Goyal, Yifan Song
2019/239
Cheaper Private Set Intersection via Differentially Private Leakage
Adam Groce, Peter Rindal, Mike Rosulek
2019/238
Robust Encryption, Extended
Rémi Géraud, David Naccache, Răzvan Roşie
2019/237
Optimal Oblivious Priority Queues
Zahra Jafargholi, Kasper Green Larsen, Mark Simkin
2019/236
Designated-verifier pseudorandom generators, and their applications
Geoffroy Couteau, Dennis Hofheinz
2019/235
Reusable Designated-Verifier NIZKs for all NP from CDH
Willy Quach, Ron D. Rothblum, Daniel Wichs
2019/234
On the Shortness of Vectors to be found by the Ideal-SVP Quantum Algorithm
Léo Ducas, Maxime Plançon, Benjamin Wesolowski
2019/233
Unbounded Dynamic Predicate Compositions in Attribute-Based Encryption
Nuttapong Attrapadung
2019/232
On Quantum Advantage in Information Theoretic Single-Server PIR
Dorit Aharonov, Zvika Brakerski, Kai-Min Chung, Ayal Green, Ching-Yi Lai, Or Sattath
2019/231
Secret-Sharing Schemes for General and Uniform Access Structures
Benny Applebaum, Amos Beimel, Oriol Farràs, Oded Nir, and Naty Peter
2019/230
Location, location, location: Revisiting modeling and exploitation for location-based side channel leakages
Christos Andrikos, Lejla Batina, Lukasz Chmielewski, Liran Lerman, Vasilios Mavroudis, Kostas Papagiannopoulos, Guilherme Perin, Giorgos Rassias, Alberto Sonnino
2019/229
XOR-counts and lightweight multiplication with fixed elements in binary finite fields
Lukas Kölsch
2019/228
Session Resumption Protocols and Efficient Forward Security for TLS 1.3 0-RTT
Nimrod Aviram, Kai Gellert, Tibor Jager
2019/227
Securing Update Propagation with Homomorphic Hashing
Kevin Lewi, Wonho Kim, Ilya Maykov, Stephen Weis
2019/226
Flyclient: Super-Light Clients for Cryptocurrencies
Benedikt Bünz, Lucianna Kiffer, Loi Luu, Mahdi Zamani
2019/225
Leakage Resilience of the Duplex Construction
Christoph Dobraunig, Bart Mennink
2019/224
Compact Adaptively Secure ABE for NC1 from k-Lin
Lucas Kowalczyk, Hoeteck Wee
2019/223
Optimized Homomorphic Encryption Solution for Secure Genome-Wide Association Studies
Marcelo Blatt, Alexander Gusev, Yuriy Polyakov, Kurt Rohloff, Vinod Vaikuntanathan
2019/222
(R)CCA Secure Updatable Encryption with Integrity Protection
Michael Klooß, Anja Lehmann, Andy Rupp
2019/221
Group Signatures without NIZK: From Lattices in the Standard Model
Shuichi Katsumata, Shota Yamada
2019/220
Communication Lower Bounds for Statistically Secure MPC, with or without Preprocessing
Ivan Damgård, Kasper Green Larsen, Jesper Buus Nielsen
2019/219
Nitro Protocol
Tom Close
2019/218
Computational Limitations in Robust Classification and Win-Win Results
Akshay Degwekar, Vinod Vaikuntanathan
2019/217
A family of boolean functions with good cryptographic properties
Guillermo Sosa Gómez, Octavio Paez Osuna
2019/216
Round Optimal Secure Multiparty Computation from Minimal Assumptions
Arka Rai Choudhuri, Michele Ciampi, Vipul Goyal, Abhishek Jain, Rafail Ostrovsky
2019/215
Approx-SVP in Ideal Lattices with Pre-processing
Alice Pellet-Mary, Guillaume Hanrot, Damien Stehlé
2019/214
Four-Round Secure Multiparty Computation from General Assumptions
Michele Ciampi, Rafail Ostrovsky
2019/213
On ELFs, Deterministic Encryption, and Correlated-Input Security
Mark Zhandry
2019/212
A New Variant of the Winternitz One Time Signature Scheme Based on Graded Encoding Schemes
Hossein Oraei, Massoud Hadian Dehkordi
2019/211
MonZa: Fast Maliciously Secure Two Party Computation on Z_{2^k}
Dario Catalano, Mario Di Raimondo, Dario Fiore, Irene Giacomelli
2019/210
CRAFT: Lightweight Tweakable Block Cipher with Efficient Protection Against DFA Attacks
Christof Beierle, Gregor Leander, Amir Moradi, Shahram Rasoolzadeh
2019/209
SoK: Peigen -- a Platform for Evaluation, Implementation, and Generation of S-boxes
Zhenzhen Bao, Jian Guo, San Ling, Yu Sasaki
2019/208
Related-Tweak Statistical Saturation Cryptanalysis and Its Application on QARMA
Muzhou Li, Kai Hu, Meiqin Wang
2019/207
MArBled Circuits: Mixing Arithmetic and Boolean Circuits with Active Security
Dragos Rotaru, Tim Wood
2019/206
Fault Attack Countermeasures for Error Samplers in Lattice-Based Cryptography
James Howe, Ayesha Khalid, Marco Martinoli, Francesco Regazzoni, Elisabeth Oswald
2019/205
A note on isogeny-based hybrid verifiable delay functions
Barak Shani
2019/204
The Security of All Private-key Bits in Isogeny-based Schemes
Barak Shani
2019/203
Versatile ABS: Usage Limited, Revocable, Threshold Traceable, Authority Hiding, Decentralized Attribute Based Signatures
Osman Bicer, Alptekin Kupcu
2019/202
The Distinction Between Fixed and Random Generators in Group-Based Assumptions
James Bartusek, Fermi Ma, Mark Zhandry
2019/201
DL-Extractable UC-Commitment Schemes
Behzad Abdolmaleki, Karim Baghery, Helger Lipmaa, Janno Siim, Michał Zając
2019/200
Degree 2 is Complete for the Round-Complexity of Malicious MPC
Benny Applebaum, Zvika Brakerski, Rotem Tsabary
2019/199
Password-Authenticated Public-Key Encryption
Tatiana Bradley, Jan Camenisch, Stanislaw Jarecki, Anja Lehmann, Gregory Neven, Jiayu Xu
2019/198
Seedless Fruit is the Sweetest: Random Number Generation, Revisited
Sandro Coretti, Yevgeniy Dodis, Harish Karthikeyan, Stefano Tessaro
2019/197
Non-interactive Cryptographic Timestamping based on Verifiable Delay Functions
Esteban Landerreche, Marc Stevens, Christian Schaffner
2019/196
Ring Signatures: Logarithmic-Size, No Setup --- from Standard Assumptions
Michael Backes, Nico Döttling, Lucjan Hanzlik, Kamil Kluczniak, Jonas Schneider
2019/195
Algorithms for CRT-variant of Approximate Greatest Common Divisor Problem
Jung Hee Cheon, Wonhee Cho, Minki Hhan, Minsik Kang, Jiseung Kim, Changmin Lee
2019/194
Classical zero-knowledge arguments for quantum computations
Thomas Vidick, Tina Zhang
2019/193
Towards Low-Energy Leakage-Resistant Authenticated Encryption from the Duplex Sponge Construction
Chun Guo, Olivier Pereira, Thomas Peters, François-Xavier Standaert
2019/192
An Omission-Tolerant Cryptographic Checksum
Francisco Corella, Karen Lewison
2019/191
Zether: Towards Privacy in a Smart Contract World
Benedikt Bünz, Shashank Agrawal, Mahdi Zamani, Dan Boneh
2019/190
Security of the Fiat-Shamir Transformation in the Quantum Random-Oracle Model
Jelle Don, Serge Fehr, Christian Majenz, Christian Schaffner
2019/189
An Intelligent Multiple Sieve Method Based on Genetic Algorithm and Correlation Power Analysis
Yaoling Ding, An Wang, Siu Ming YIU
2019/188
Zero-Knowledge Proofs on Secret-Shared Data via Fully Linear PCPs
Dan Boneh, Elette Boyle, Henry Corrigan-Gibbs, Niv Gilboa, Yuval Ishai
2019/187
Fully homomorphic encryption modulo Fermat numbers
Antoine Joux
2019/186
Re-thinking untraceability in the CryptoNote-style blockchain
Jiangshan Yu, Man Ho Allen Au, Paulo Esteves-Verissimo
2019/185
Zero-Correlation Attacks on Tweakable Block Ciphers with Linear Tweakey Expansion
Ralph Ankele, Christoph Dobraunig, Jian Guo, Eran Lambooij, Gregor Leander, Yosuke Todo
2019/184
Face-off between the CAESAR Lightweight Finalists: ACORN vs. Ascon
William Diehl, Farnoud Farahmand, Abubakr Abdulgadir, Jens-Peter Kaps, Kris Gaj
2019/183
Algebraic aspects of solving Ring-LWE, including ring-based improvements in the Blum-Kalai-Wasserman algorithm
Katherine E. Stange
2019/182
Security is an Architectural Design Constraint
Prasanna Ravi, Sourav Sen Gupta, Anupam Chattopadhyay, Mustafa Khairallah, Zakaria Najm, Shivam Bhasin
2019/181
Lower Bounds for Leakage-Resilient Secret Sharing
Jesper Buus Nielsen, Mark Simkin
2019/180
Disco: Modern Session Encryption
David Wong
2019/179
Synchronous, with a Chance of Partition Tolerance
Yue Guo, Rafael Pass, Elaine Shi
2019/178
LucidiTEE: A TEE-Blockchain System for Policy-Compliant Multiparty Computation with Fairness
Rohit Sinha, Sivanarayana Gaddam, Ranjit Kumaresan
2019/177
Genus Two Isogeny Cryptography
E. V. Flynn, Yan Bo Ti
2019/176
Homomorphic Encryption for Finite Automata
Nicholas Genise, Craig Gentry, Shai Halevi, Baiyu Li, Daniele Micciancio
2019/175
The Communication Complexity of Threshold Private Set Intersection
Satrajit Ghosh, Mark Simkin
2019/174
Towards an Exponential Lower Bound for Secret Sharing
Kasper Green Larsen, Mark Simkin
2019/173
Shorter Quadratic QA-NIZK Proofs
Vanesa Daza, Alonso González, Zaira Pindado, Carla Ràfols, Javier Silva
2019/172
Correlation of Quadratic Boolean Functions: Cryptanalysis of All Versions of Full MORUS
Danping Shi, Siwei Sun, Yu Sasaki, Chaoyun Li, Lei Hu
2019/171
XONN: XNOR-based Oblivious Deep Neural Network Inference
M. Sadegh Riazi, Mohammad Samragh, Hao Chen, Kim Laine, Kristin Lauter, Farinaz Koushanfar
2019/170
Key-dependent cube attack on reduced Frit permutation in Duplex-AE modes
Lingyue Qin, Xiaoyang Dong, Keting Jia, Rui Zong
2019/169
Updatable Anonymous Credentials and Applications to Incentive Systems
Johannes Blömer, Jan Bobolz, Denis Diemert, Fabian Eidens
2019/168
Profiling Side-channel Analysis in the Efficient Attacker Framework
Stjepan Picek, Annelie Heuser, Guilherme Perin, Sylvain Guilley
2019/167
Analysis of Secure Caches using a Three-Step Model for Timing-Based Attacks
Shuwen Deng, Wenjie Xiong, Jakub Szefer
2019/166
Verifiable Delay Functions from Supersingular Isogenies and Pairings
Luca De Feo, Simon Masson, Christophe Petit, Antonio Sanso
2019/165
libInterMAC: Beyond Confidentiality and Integrity in Practice
Martin R. Albrecht, Torben Brandt Hansen, Kenneth G. Paterson
2019/164
Use your Brain! Arithmetic 3PC For Any Modulus with Active Security
Hendrik Eerikson, Marcel Keller, Claudio Orlandi, Pille Pullonen, Joonas Puura, Mark Simkin
2019/163
Fast Side-Channel Security Evaluation of ECC Implementations: Shortcut Formulas for Horizontal Side-channel Attacks against ECSM with the Montgomery ladder
Melissa Azouaoui, Romain Poussier, François-Xavier Standaert
2019/162
A New Blockchain Proposal Supporting Multi-Stage Proof-of-Work
Palash Sarkar
2019/161
Understanding Optimizations and Measuring Performances of PBKDF2
Andrea Francesco Iuorio, Andrea Visconti
2019/160
FPGA-based High-Performance Parallel Architecture for Homomorphic Computing on Encrypted Data
Sujoy Sinha Roy, Furkan Turan, Kimmo Jarvinen, Frederik Vercauteren, Ingrid Verbauwhede
2019/159
MPC with Synchronous Security and Asynchronous Responsiveness
Chen-Da Liu-Zhang, Julian Loss, Ueli Maurer, Tal Moran, Daniel Tschudi
2019/158
Noninteractive Zero Knowledge for NP from (Plain) Learning With Errors
Chris Peikert, Sina Shiehian
2019/157
Schnorr-based implicit certification: improving the security and efficiency of V2X communications
Paulo S. L. M. Barreto, Marcos A. Simplicio Jr., Jefferson E. Ricardini, Harsh Kupwade Patil
2019/156
Efficient Constructions for Almost-everywhere Secure Computation
Siddhartha Jayanti, Srinivasan Raghuraman, Nikhil Vyas
2019/155
Constant-time BCH Error-Correcting Code
Matthew Walters, Sujoy Sinha Roy
2019/154
FastKitten: Practical Smart Contracts on Bitcoin
Poulami Das, Lisa Eckey, Tommaso Frassetto, David Gens, Kristina Hostáková, Patrick Jauernig, Sebastian Faust, Ahmad-Reza Sadeghi
2019/153
Overdrive2k: Efficient Secure MPC over $Z_{2^k}$ from Somewhat Homomorphic Encryption
Emmanuela Orsini, Nigel P. Smart, Frederik Vercauteren
2019/152
Privacy-preserving Approximate GWAS computation based on Homomorphic Encryption
Duhyeong Kim, Yongha Son, Dongwoo Kim, Andrey Kim, Seungwan Hong, Jung Hee Cheon
2019/151
Solving binary MQ with Grover's algorithm
Peter Schwabe, Bas Westerbaan
2019/150
QcBits: Constant-Time Small-Key Code-Based Cryptography
Tung Chou
2019/149
Improved Lattice-based CCA2-Secure PKE in the Standard Model
Jiang Zhang, Yu Yu, Shuqin Fan, Zhenfeng Zhang
2019/148
On the efficiency of pairing-based proofs under the d-PKE
Ariel Gabizon
2019/147
Practical Collision Attacks against Round-Reduced SHA-3
Jian Guo, Guohong Liao, Guozhen Liu, Meicheng Liu, Kexin Qiao, Ling Song
2019/146
Boomerang Connectivity Table Revisited
Ling Song, Xianrui Qin, Lei Hu
2019/145
Achieving GWAS with Homomorphic Encryption
Jun Jie Sim, Fook Mun Chan, Shibin Chen, Benjamin Hong Meng Tan, Khin Mi Mi Aung
2019/144
Modeling Power Efficiency of S-boxes Using Machine Learning
Rajat Sadhukhan, Nilanjan Datta, Debdeep Mukhopadhyay
2019/143
Deep Neural Network Attribution Methods for Leakage Analysis and Symmetric Key Recovery
Benjamin Hettwer, Stefan Gehrer, Tim Güneysu
2019/142
LegoSNARK: Modular Design and Composition of Succinct Zero-Knowledge Proofs
Matteo Campanelli, Dario Fiore, and Anaïs Querol
2019/141
A General Proof Framework for Recent AES Distinguishers
Christina Boura, Anne Canteaut, Daniel Coggia
2019/140
CodedPrivateML: A Fast and Privacy-Preserving Framework for Distributed Machine Learning
Jinhyun So, Basak Guler, A. Salman Avestimehr, Payman Mohassel
2019/139
Vulnerability and Remedy of Stripped Function Logic Locking
Hai Zhou, Yuanqi Shen, Amin Rezaei
2019/138
Unifying Leakage Models on a Rényi Day
Thomas Prest, Dahmun Goudarzi, Ange Martinelli, Alain Passelègue
2019/137
TEDT, a Leakage-Resilient AEAD mode for High (Physical) Security Applications
Francesco Berti, Chun Guo, Olivier Pereira, Thomas Peters, François-Xavier Standaert
2019/136
Divisible E-Cash from Constrained Pseudo-Random Functions
Florian Bourse, David Pointcheval, Olivier Sanders
2019/135
It wasn't me! Repudiability and Unclaimability of Ring Signatures
Sunoo Park, Adam Sealfon
2019/134
Tighter security proofs for generic key encapsulation mechanism in the quantum random oracle model
Haodong Jiang, Zhenfeng Zhang, Zhi Ma
2019/133
On semigroups of multiplicative Cremona transformations and new solutions of Post Quantum Cryptography.
Vasyl Ustimenko
2019/132
Leakage Certification Revisited: Bounding Model Errors in Side-Channel Security Evaluations
Olivier Bronchain, Julien M. Hendrickx, Clément Massart, Alex Olshevsky, François-Xavier Standaert
2019/131
Secure Evaluation of Quantized Neural Networks
Anders Dalskov, Daniel Escudero, Marcel Keller
2019/130
Are Certificate Thumbprints Unique?
Greg Zaverucha, Dan Shumow
2019/129
Homomorphic Secret Sharing from Lattices Without FHE
Elette Boyle, Lisa Kohl, Peter Scholl
2019/128
Tightly Secure Inner Product Functional Encryption: Multi-Input and Function-Hiding Constructions
Junichi Tomida
2019/127
Beyond Birthday Bound Secure MAC in Faulty Nonce Model
Avijit Dutta, Mridul Nandi, Suprita Talnikar
2019/126
New Automatic search method for Truncated-differential characteristics: Application to Midori, SKINNY and CRAFT
AmirHossein E. Moghaddam, Zahra Ahmadian
2019/125
Combinatorial Primality Test
Maheswara Rao Valluri
2019/124
Anomalous Look at Provable Security
Douglas Wikström
2019/123
Security of Multilinear Galois Mode (MGM)
Liliya Akhmetzyanova, Evgeny Alekseev, Grigory Karpunin, Vladislav Nozdrunov
2019/122
Lightweight Post-Quantum-Secure Digital Signature Approach for IoT Motes
Santosh Ghosh, Rafael Misoczki, Manoj R. Sastry
2019/121
Anonymous Attestation for IoT
Santosh Ghosh, Andrew H. Reinders, Rafael Misoczki, Manoj R. Sastry
2019/120
Cryptanalysis of a New Code-based Signature Scheme with Shorter Public Key in PKC 2019
Keita Xagawa
2019/119
On the security of the BCTV Pinocchio zk-SNARK variant
Ariel Gabizon
2019/118
Defeating the Hart, Kim, Micheli, Pascuel-Perez, Petit, Quek Attack on WalnutDSA(TM)
Iris Anshel, Derek Atkins, Dorian Goldfeld, Paul E Gunnells
2019/117
Non-Interactive Keyed-Verification Anonymous Credentials
Geoffroy Couteau, Michael Reichle
2019/116
Multi-Key Homomophic Encryption from TFHE
Hao Chen, Ilaria Chillotti, Yongsoo Song
2019/115
Distributional Collision Resistance Beyond One-Way Functions
Nir Bitansky, Iftach Haitner, Ilan Komargodski, Eylon Yogev
2019/114
Fast Multiparty Threshold ECDSA with Fast Trustless Setup
Rosario Gennaro, Steven Goldfeder
2019/113
Privacy and Reader-first Authentication in Vaudenay's RFID Model with Temporary State Disclosure
Ferucio Laurentiu Tiplea, Cristian Hristea
2019/112
Variable Elimination - a Tool for Algebraic Cryptanalysis
Bjørn Greve, Øyvind Ytrehus, Håvard Raddum
2019/111
On the Complexity of non-recursive $n$-term Karatsuba Multiplier for Trinomials
Yin Li, Shantanu Sharma, Yu Zhang, Xingpo Ma, Chuanda Qi
2019/110
Optimized Method for Computing Odd-Degree Isogenies on Edwards Curves
Suhri Kim, Kisoon Yoon, Young-Ho Park, Seokhie Hong
2019/109
Design and Implementation of a Fast and Scalable NTT-Based Polynomial Multiplier Architecture
Ahmet Can Mert, Erdinc Ozturk, Erkay Savas
2019/108
Minicrypt Primitives with Algebraic Structure and Applications
Navid Alamati, Hart Montgomery, Sikhar Patranabis, Arnab Roy
2019/107
Constructing Low-latency Involutory MDS Matrices with Lightweight Circuit
Shun Li, Siwei Sun, Chaoyun Li, Zihao Wei, Lei Hu
2019/106
Identity-Based Higncryption
Hongbing Wang, Yunlei Zhao
2019/105
Non-Malleable Secret Sharing in the Computational Setting: Adaptive Tampering, Noisy-Leakage Resilience, and Improved Rate
Antonio Faonio, Daniele Venturi
2019/104
BADGER - Blockchain Auditable Distributed (RSA) key GEneRation
Naomi Farley, Robert Fitzpatrick, Duncan Jones
2019/103
Quantum cryptanalysis in the RAM model: Claw-finding attacks on SIKE
Samuel Jaques, John M. Schanck
2019/102
Trustee: Full Privacy Preserving Vickrey Auction on top of Ethereum
Hisham S. Galal, Amr M. Youssef
2019/101
Privacy-preserving semi-parallel logistic regression training with Fully Homomorphic Encryption
Sergiu Carpov, Nicolas Gama, Mariya Georgieva, Juan Ramon Troncoso-Pastoriza
2019/100
Power Analysis on NTRU Prime
Wei-Lun Huang, Jiun-Peng Chen, Bo-Yin Yang
2019/099
Sonic: Zero-Knowledge SNARKs from Linear-Size Universal and Updateable Structured Reference Strings
Mary Maller, Sean Bowe, Markulf Kohlweiss, Sarah Meiklejohn
2019/098
A Post-Quantum UC-Commitment Scheme in the Global Random Oracle Model from Code-Based Assumptions
Pedro Branco
2019/097
Linearly equivalent S-boxes and the Division Property
Patrick Derbez, Pierre-Alain Fouque, Baptiste Lambin
2019/096
On Recovering Affine Encodings in White-Box Implementations
Patrick Derbez, Pierre-Alain Fouque, Baptiste Lambin, Brice Minaud
2019/095
Variants of the AES Key Schedule for Better Truncated Differential Bounds
Patrick Derbez, Pierre-Alain Fouque, Jérémy Jean, Baptiste Lambin
2019/094
CHES 2018 Side Channel Contest CTF - Solution of the AES Challenges
Aron Gohr, Sven Jacob, Werner Schindler
2019/093
Key Encapsulation Mechanism From Modular Multivariate Linear Equations
Muhammad Rezal Kamel Ariffin, Abderrahmane Nitaj, Yanbin Pan, Nur Azman Abu
2019/092
Partitions in the S-Box of Streebog and Kuznyechik
Léo Perrin
2019/091
Efficient Zero-Knowledge for NP from Secure Two-Party Computation
Li Hongda, Pan Dongxue, Ni Peifang
2019/090
Round5: Compact and Fast Post-Quantum Public-Key Encryption
Hayo Baan, Sauvik Bhattacharya, Scott Fluhrer, Oscar Garcia-Morchon, Thijs Laarhoven, Ronald Rietman, Markku-Juhani O. Saarinen, Ludo Tolhuizen, Zhenfei Zhang
2019/089
The General Sieve Kernel and New Records in Lattice Reduction
Martin R. Albrecht, Léo Ducas, Gottfried Herold, Elena Kirshanova, Eamonn W. Postlethwaite, Marc Stevens
2019/088
Continuous Key Agreement with Reduced Bandwidth
Nir Drucker, Shay Gueron
2019/087
The Secure Link Prediction Problem
Laltu Sardar, Sushmita Ruj
2019/086
Reinterpreting and Improving the Cryptanalysis of the Flash Player PRNG
George Teseleanu
2019/085
The Lattice-Based Digital Signature Scheme qTESLA
Erdem Alkim, Paulo S. L. M. Barreto, Nina Bindel, Juliane Kramer, Patrick Longa, Jefferson E. Ricardini
2019/084
An Information Obfuscation Calculus for Encrypted Computing
Peter T. Breuer
2019/083
Cryptanalysis of an NTRU-based Proxy Encryption Scheme from ASIACCS'15
Zhen Liu, Yanbin Pan, Zhenfei Zhang
2019/082
Arithmetic Garbling from Bilinear Maps
Nils Fleischhacker, Giulio Malavolta, Dominique Schröder
2019/081
Practical Group-Signatures with Privacy-Friendly Openings
Stephan Krenn, Kai Samelin, Christoph Striecks
2019/080
Turbospeedz: Double Your Online SPDZ! Improving SPDZ using Function Dependent Preprocessing
Aner Ben Efraim, Michael Nielsen, Eran Omri
2019/079
New Results about the Boomerang Uniformity of Permutation Polynomials
Kangquan Li, Longjiang Qu, Bing Sun, Chao Li
2019/078
Testing the Randomness of Cryptographic Function Mappings
Alan Kaminsky
2019/077
Pairing Implementation Revisited
Michael Scott
2019/076
Analysis and Improvement of Differential Computation Attacks against Internally-Encoded White-Box Implementations
Matthieu Rivain, Junwei Wang
2019/075
Assessment of the Key-Reuse Resilience of NewHope
Aurélie Bauer, Henri Gilbert, Guénaël Renault, Mélissa Rossi
2019/074
Efficient and Secure Multiparty Computation from Fixed-Key Block Ciphers
Chun Guo, Jonathan Katz, Xiao Wang, Yu Yu
2019/073
Destructive Privacy and Mutual Authentication in Vaudenay's RFID Model
Cristian Hristea, Ferucio Laurentiu Tiplea
2019/072
ZeroCT: Improving ZeroCoin with Confidential Transactions and more
Alex Vazquez
2019/071
Repeatable Oblivious Shuffling of Large Outsourced Data Blocks
Zhilin Zhang, Ke Wang, Weipeng Lin, Ada Wai-Chee Fu, Raymond Chi-Wing Wong
2019/070
Uncle Traps: Harvesting Rewards in a Queue-based Ethereum Mining Pool
Sam M. Werner, Paul J. Pritz, Alexei Zamyatin, William J. Knottenbelt
2019/069
Quantum Indistinguishability of Random Sponges
Jan Czajkowski, Andreas Hülsing, Christian Schaffner
2019/068
Sampling the Integers with Low Relative Error
Michael Walter
2019/067
Managing Your Kleptographic Subscription Plan
George Teseleanu
2019/066
Publicly Verifiable Proofs from Blockchains
Alessandra Scafuro, Luisa Siniscalchi, Ivan Visconti
2019/065
Multi-Protocol UC and its Use for Building Modular and Efficient Protocols
Jan Camenisch, Manu Drijvers, Björn Tackmann
2019/064
A Revocable Group Signature Scheme with Scalability from Simple Assumptions and Its Application to Identity Management
Keita Emura, Takuya Hayashi
2019/063
Efficient Non-Interactive Zero-Knowledge Proofs in Cross-Domains without Trusted Setup
Michael Backes, Lucjan Hanzlik, Amir Herzberg, Aniket Kate, Ivan Pryvalov
2019/062
Additively Homomorphic IBE from Higher Residuosity
Michael Clear, Ciaran McGoldrick
2019/061
SigAttack: New High-level SAT-based Attack on Logic Encryptions
Yuanqi Shen, You Li, Shuyu Kong, Amin Rezaei, Hai Zhou
2019/060
CycSAT-Unresolvable Cyclic Logic Encryption Using Unreachable States
Amin Rezaei, You Li, Yuanqi Shen, Shuyu Kong, Hai Zhou
2019/059
BeSAT: Behavioral SAT-based Attack on Cyclic Logic Encryption
Yuanqi Shen, You Li, Amin Rezaei, Shuyu Kong, David Dlott, Hai Zhou
2019/058
Tightly secure hierarchical identity-based encryption
Roman Langrehr, Jiaxin Pan
2019/057
Short Discrete Log Proofs for FHE and Ring-LWE Ciphertexts
Rafael del Pino, Vadim Lyubashevsky, Gregor Seiler
2019/056
Obfuscating simple functionalities from knowledge assumptions
Ward Beullens, Hoeteck Wee
2019/055
Rate-Optimizing Compilers for Continuously Non-Malleable Codes
Sandro Coretti, Antonio Faonio, Daniele Venturi
2019/054
Deep Learning to Evaluate Secure RSA Implementations
Mathieu Carbone, Vincent Conin, Marie-Angela Cornelie, Francois Dassance, Guillaume Dufresne, Cecile Dumas, Emmanuel Prouff, Alexandre Venelli
2019/053
A New Code-based Signature Scheme with Shorter Public Key
Yongcheng Song, Xinyi Huang, Yi Mu, Wei Wu
2019/052
Key Encapsulation Mechanism with Explicit Rejection in the Quantum Random Oracle Model
Haodong Jiang, Zhenfeng Zhang, Zhi Ma
2019/051
Deterministic Identity-Based Encryption from Lattice-Based Programmable Hash Functions with High Min-Entropy
Daode Zhang, Jie Li, Bao Li, Xianhui Lu, Haiyang Xue, Dingding Jia, Yamin Liu
2019/050
Improved Security Evaluation Techniques for Imperfect Randomness from Arbitrary Distributions
Takahiro Matsuda, Kenta Takahashi, Takao Murakami, Goichiro Hanaoka
2019/049
The Relationship between the Construction and Solution of the MILP Models and Applications
Lingchen Li, Wenling Wu, Yafei Zheng, Lei Zhang
2019/048
Sub-logarithmic Distributed Oblivious RAM with Small Block Size
Eyal Kushilevitz, Tamer Mour
2019/047
NIST Post-Quantum Cryptography- A Hardware Evaluation Study
Kanad Basu, Deepraj Soni, Mohammed Nabeel, Ramesh Karri
2019/046
Block-Anti-Circulant Unbalanced Oil and Vinegar
Alan Szepieniec, Bart Preneel
2019/045
Leakage-resilient Identity-based Encryption in Bounded Retrieval Model with Nearly Optimal Leakage-Ratio
Ryo Nishimaki, Takashi Yamakawa
2019/044
Toha Key Hardened Function
Ahmad Almorabea
2019/043
A Generic Attack on Lattice-based Schemes using Decryption Errors with Application to ss-ntru-pke
Qian Guo, Thomas Johansson, Alexander Nilsson
2019/042
Hunting and Gathering - Verifiable Random Functions from Standard Assumptions with Short Proofs
Lisa Kohl
2019/041
Message Authentication (MAC) Algorithm For The VMPC-R (RC4-like) Stream Cipher
Bartosz Zoltak
2019/040
NTTRU: Truly Fast NTRU Using NTT
Vadim Lyubashevsky, Gregor Seiler
2019/039
Fully Invisible Protean Signatures Schemes
Stephan Krenn, Henrich C. Pöhls, Kai Samelin, Daniel Slamanig
2019/038
Identity-based Broadcast Encryption with Efficient Revocation
Aijun Ge, Puwen Wei
2019/037
Improving Attacks on Round-Reduced Speck32/64 using Deep Learning
Aron Gohr
2019/036
Non-Zero Inner Product Encryption Schemes from Various Assumptions: LWE, DDH and DCR
Shuichi Katsumata, Shota Yamada
2019/035
Using TopGear in Overdrive: A more efficient ZKPoK for SPDZ
Carsten Baum, Daniele Cozzo, Nigel P. Smart
2019/034
A Formal Treatment of Hardware Wallets
Myrto Arapinis, Andriana Gkaniatsou, Dimitris Karakostas, Aggelos Kiayias
2019/033
FE for Inner Products and Its Application to Decentralized ABE
Zhedong Wang, Xiong Fan, Feng-Hao Liu
2019/032
Safety in Numbers: On the Need for Robust Diffie-Hellman Parameter Validation
Steven Galbraith, Jake Massimo, Kenneth G. Paterson
2019/031
Collusion Resistant Broadcast and Trace from Positional Witness Encryption
Rishab Goyal, Satyanarayana Vusirikala, Brent Waters
2019/030
Analysis of Two Countermeasures against the Signal Leakage Attack
Ke Wang, Zhenfeng Zhang
2019/029
Upper Bound on $\lambda_1(\Lambda^{\bot}(\mathbf A))$
Huiwen Jia, Chunming Tang, Yanhua Zhang
2019/028
nQUIC: Noise-Based QUIC Packet Protection
Mathias Hall-Andersen, David Wong, Nick Sullivan, Alishah Chator
2019/027
Group Signatures with Selective Linkability
Lydia Garms, Anja Lehmann
2019/026
Non-malleable encryption with proofs of plaintext knowledge and applications to voting
Ben Smyth, Yoshikazu Hanatani
2019/025
STP Models of Optimal Differential and Linear Trail for S-box Based Ciphers
Yu Liu, Huicong Liang, Muzhou Li, Luning Huang, Kai Hu, Chenhe Yang, Meiqin Wang
2019/024
A publicly verifiable quantum signature scheme based on asymmetric quantum cryptography
Yalin Chen, Jue-Sam Chou, Fang-Qi Zhou, Shu-Mei Hsu
2019/023
Biased Nonce Sense: Lattice Attacks against Weak ECDSA Signatures in Cryptocurrencies
Joachim Breitner, Nadia Heninger
2019/022
The BIG Cipher: Design, Security Analysis, and Hardware-Software Optimization Techniques
Anthony Demeri, Thomas Conroy, Alex Nolan, William Diehl
2019/021
CryptoNote+
Ilya Aldanov
2019/020
Decentralizing Inner-Product Functional Encryption
Michel Abdalla, Fabrice Benhamouda, Markulf Kolhweiss, Hendrik Waldner
2019/019
Improving the MILP-based Security Evaluation Algorithm against Differential/Linear Cryptanalysis Using A Divide-and-Conquer Approach
Chunning Zhou, Wentao Zhang, Tianyou Ding, Zejun Xiang
2019/018
Generic Constructions of Robustly Reusable Fuzzy Extractor
Yunhua Wen, Shengli Liu, Dawu Gu
2019/017
CHURP: Dynamic-Committee Proactive Secret Sharing
Sai Krishna Deepak Maram, Fan Zhang, Lun Wang, Andrew Low, Yupeng Zhang, Ari Juels, Dawn Song
2019/016
Fast Message Franking: From Invisible Salamanders to Encryptment
Yevgeniy Dodis, Paul Grubbs, Thomas Ristenpart, Joanne Woodage
2019/015
More Efficient Algorithms for the NTRU Key Generation using the Field Norm
Thomas Pornin, Thomas Prest
2019/014
BlAnC: Blockchain-based Anonymous and Decentralized Credit Networks
Gaurav Panwar, Satyajayant Misra, Roopa Vishwanathan
2019/013
The Science of Guessing in Collision Optimized Divide-and-Conquer Attacks
Changhai Ou, Siew-Kei Lam, Guiyuan Jiang
2019/012
A Proof of the Beierle-Kranz-Leander’s Conjecture related to Lightweight Multiplication in $F_{2^n}$
Sihem Mesnager, Kwang Ho Kim, Dujin Jo, Junyop Choe, Munhyon Han, Dok Nam Lee
2019/011
Learning to Reconstruct: Statistical Learning Theory and Encrypted Database Attacks
Paul Grubbs, Marie-Sarah Lacharité, Brice Minaud, Kenneth G. Paterson
2019/010
Survey for Performance & Security Problems of Passive Side-channel Attacks Countermeasures in ECC
Rodrigo Abarzúa, Claudio Valencia, Julio López
2019/009
On the Asymptotics of Solving the LWE Problem Using Coded-BKW with Sieving
Qian Guo, Thomas Johansson, Erik Mårtensson, Paul Stankovski Wagner
2019/008
One Fault is All it Needs: Breaking Higher-Order Masking with Persistent Fault Analysis
Jingyu Pan, Shivam Bhasin, Fan Zhang, Kui Ren
2019/007
Tight Security Bounds for Generic Stream Cipher Constructions
Matthias Hamann, Matthias Krause
2019/006
Minimizing Trust in Hardware Wallets with Two Factor Signatures
Antonio Marcedone, Rafael Pass, abhi shelat
2019/005
ScanSAT: Unlocking Obfuscated Scan Chains
Lilas Alrahis, Muhammad Yasin, Hani Saleh, Baker Mohammad, Mahmoud Al-Qutayri, Ozgur Sinanoglu
2019/004
On the Bright Side of Darkness: Side-Channel Based Authentication Protocol Against Relay Attacks
Guillaume Dabosville, Houssem Maghrebi, Alexis Lhuillery, Julien Bringer, Thanh-Ha Le
2019/003
Secure and Effective Logic Locking for Machine Learning Applications
Yuntao Liu, Yang Xie, Abhishek Charkraborty, Ankur Srivastava
2019/002
Leakage-Resilient Group Signature: Definitions and Constructions
Jianye Huang, Qiong Huang
2019/001
Sanctorum: A lightweight security monitor for secure enclaves
Ilia Lebedev, Kyle Hogan, Jules Drean, David Kohlbrenner, Dayeol Lee, Krste Asanović, Dawn Song, Srinivas Devadas
2018/1251
Accountable Tracing Signatures from Lattices
San Ling, Khoa Nguyen, Huaxiong Wang, Yanhong Xu
2018/1250
Function Private Predicate Encryption for Low Min-Entropy Predicates
Sikhar Patranabis, Debdeep Mukhopadhyay, Somindu C. Ramanna
2018/1249
Two round multiparty computation via Multi-key fully homomorphic encryption with faster homomorphic evaluations
NingBo Li, TanPing Zhou, XiaoYuan Yang, YiLiang Han, Longfei Liu, WenChao Liu
2018/1248
Fiat-Shamir: From Practice to Theory, Part II (NIZK and Correlation Intractability from Circular-Secure FHE)
Ran Canetti, Alex Lombardi, Daniel Wichs
2018/1247
qSCMS: Post-quantum certificate provisioning process for V2X
Paulo S. L. M. Barreto, Jefferson E. Ricardini, Marcos A. Simplicio Jr., Harsh Kupwade Patil
2018/1246
Senopra: Reconciling Data Privacy and Utility via Attested Smart Contract Execution
Dat Le Tien, Frank Eliassen
2018/1245
Multi-dimensional Packing for HEAAN for Approximate Matrix Arithmetics
Jung Hee Cheon, Andrey Kim, Donggeon Yhee
2018/1244
Fully Deniable Interactive Encryption
Ran Canetti, Sunoo Park, Oxana Poburinnaya
2018/1243
BoxDB: Realistic Adversary Model for Distance Bounding
Ioana Boureanu, David Gerault, Pascal Lafourcade
2018/1242
Structural Nonlinear Invariant Attacks on T-310: Attacking Arbitrary Boolean Functions
Nicolas T. Courtois
2018/1241
Universally Composable Accumulators
Foteini Baldimtsi, Ran Canetti, Sophia Yakoubov
2018/1240
Jevil's Encryption Systems
Nadim Kobeissi
2018/1239
Proof-of-Stake Sidechains
Peter Gaži, Aggelos Kiayias, Dionysis Zindros
2018/1238
Memory-Constrained Implementation of Lattice-based Encryption Scheme on the Standard Java Card Platform
Ye Yuan, Kazuhide Fukushima, Junting Xiao, Shinsaku Kiyomoto, Tsuyoshi Takagi
2018/1237
Sum-of-Squares Meets Program Obfuscation, Revisited
Boaz Barak, Samuel B. Hopkins, Aayush Jain, Pravesh Kothari, Amit Sahai
2018/1236
Fast Secure Comparison for Medium-Sized Integers and Its Application in Binarized Neural Networks
Mark Abspoel, Niek J. Bouman, Berry Schoenmakers, Niels de Vreede
2018/1235
Setup-Free Secure Search on Encrypted Data: Faster and Post-Processing Free
Adi Akavia, Craig Gentry, Shai Halevi, Max Leibovich
2018/1234
FACCT: FAst, Compact, and Constant-Time Discrete Gaussian Sampler over Integers
Raymond K. Zhao, Ron Steinfeld, Amin Sakzad
2018/1233
Key Assignment Scheme with Authenticated Encryption
Suyash Kandele, Souradyuti Paul
2018/1232
Certificate Transparency Using Blockchain
D S V Madala, Mahabir Prasad Jhanwar, Anupam Chattopadhyay
2018/1231
Post-quantum verifiable random functions from ring signatures
Endre Abraham
2018/1230
Pooled Mining Makes Selfish Mining Tricky
Suhyeon Lee, Seungjoo Kim
2018/1229
On Some Computational Problems in Local Fields
Yingpu Deng, Lixia Luo, Guanju Xiao
2018/1228
Multi-Party Oblivious RAM based on Function Secret Sharing and Replicated Secret Sharing Arithmetic
Marina Blanton, Chen Yuan
2018/1227
Efficient Information Theoretic Multi-Party Computation from Oblivious Linear Evaluation
Louis Cianciullo, Hossein Ghodosi
2018/1226
Boolean Exponent Splitting
Michael Tunstall, Louiza Papachristodoulou, Kostas Papagiannopoulos
2018/1225
XMSS and Embedded Systems - XMSS Hardware Accelerators for RISC-V
Wen Wang, Bernhard Jungk, Julian Wälde, Shuwen Deng, Naina Gupta, Jakub Szefer, Ruben Niederhagen
2018/1224
Further Lower Bounds for Structure-Preserving Signatures in Asymmetric Bilinear Groups
Essam Ghadafi
2018/1223
Error Amplification in Code-based Cryptography
Alexander Nilsson, Thomas Johansson, Paul Stankovski Wagner
2018/1222
Implementing Token-Based Obfuscation under (Ring) LWE
Cheng Chen, Nicholas Genise, Daniele Micciancio, Yuriy Polyakov, Kurt Rohloff
2018/1221
Using the Cloud to Determine Key Strengths -- Triennial Update
M. Delcourt, T. Kleinjung, A. K. Lenstra, S. Nath, D. Page, N. Smart
2018/1220
Tight Reductions for Diffie-Hellman Variants in the Algebraic Group Model
Taiga Mizuide, Atsushi Takayasu, Tsuyoshi Takagi
2018/1219
Cryptanalysis of the Full DES and the Full 3DES Using a New Linear Property
Tomer Ashur, Raluca Posteuca
2018/1218
Exploring Crypto Dark Matter: New Simple PRF Candidates and Their Applications
Dan Boneh, Yuval Ishai, Alain Passelègue, Amit Sahai, David J. Wu
2018/1217
Changing Points in APN Functions
Lilya Budaghyan, Claude Carlet, Tor Helleseth, Nikolay Kaleyski
2018/1216
This is Not an Attack on Wave
Thomas Debris-Alazard, Nicolas Sendrier, Jean-Pierre Tillich
2018/1215
New Hybrid Method for Isogeny-based Cryptosystems using Edwards Curves
Suhri Kim, Kisoon Yoon, Jihoon Kwon, Young-Ho Park, Seokhie Hong
2018/1214
Instant Privacy-Preserving Biometric Authentication for Hamming Distance
Joohee Lee, Dongwoo Kim, Duhyeong Kim, Yongsoo Song, Junbum Shin, Jung Hee Cheon
2018/1213
Deep Learning vs Template Attacks in front of fundamental targets: experimental study
Yevhenii ZOTKIN, Francis OLIVIER, Eric BOURBAO
2018/1212
Multi-Target Attacks on the Picnic Signature Scheme and Related Protocols
Itai Dinur, Niv Nadler
2018/1211
Countering Block Withholding Attack Effciently
Suhyeon Lee, Seungjoo Kim
2018/1210
MProve: A Proof of Reserves Protocol for Monero Exchanges
Arijit Dutta, Saravanan Vijayakumaran
2018/1209
Teleportation-based quantum homomorphic encryption scheme with quasi-compactness and perfect security
Min Liang
2018/1208
Revisiting Orthogonal Lattice Attacks on Approximate Common Divisor Problems and their Applications
Jun Xu, Santanu Sarkar, Lei Hu
2018/1207
On the Decoding Failure Rate of QC-MDPC Bit-Flipping Decoders
Nicolas Sendrier, Valentin Vasseur
2018/1206
ARPA Whitepaper
Derek Zhang, Alex Su, Felix Xu, Jiang Chen
2018/1205
Cryptanalysis of a code-based one-time signature
Jean-Christophe Deneuville, Philippe Gaborit
2018/1204
The Lord of the Shares: Combining Attribute-Based Encryption and Searchable Encryption for Flexible Data Sharing
Antonis Michalas
2018/1203
DAGS: Reloaded Revisiting Dyadic Key Encapsulation
Gustavo Banegas, Paulo S. L. M. Barreto, Brice Odilon Boidje, Pierre-Louis Cayrel, Gilbert Ndollane Dione, Kris Gaj, Cheikh Thiecoumba Gueye, Richard Haeussler, Jean Belo Klamti, Ousmane N'diaye, Duc Tri Nguyen, Edoardo Persichetti, Jefferson E. Ricardini
2018/1202
AuthCropper: Authenticated Image Cropper for Privacy Preserving Surveillance Systems
Jihye Kim, Jiwon Lee, Hankyung Ko, Donghwan Oh, Semin Han, Kwonho Jeong, Hyunok Oh
2018/1201
Subversion in Practice: How to Efficiently Undermine Signatures
Joonsang Baek, Willy Susilo, Jongkil Kim, Yang-Wai Chow
2018/1200
On a Rank-Metric Code-Based Cryptosystem with Small Key Size
Julian Renner, Sven Puchinger, Antonia Wachter-Zeh
2018/1199
Quantum Equivalence of the DLP and CDHP for Group Actions
Steven Galbraith, Lorenz Panny, Benjamin Smith, Frederik Vercauteren
2018/1198
On Lions and Elligators: An efficient constant-time implementation of CSIDH
Michael Meyer, Fabio Campos, Steffen Reith
2018/1197
Automated software protection for the masses against side-channel attacks
NICOLAS BELLEVILLE, DAMIEN COUROUSSÉ, KARINE HEYDEMANN, HENRI-PIERRE CHARLES
2018/1196
Gradient Visualization for General Characterization in Profiling Attacks
Loïc Masure, Cécile Dumas, Emmanuel Prouff
2018/1195
M&M: Masks and Macs against Physical Attacks
Lauren De Meyer, Victor Arribas, Svetla Nikova, Ventzislav Nikov, Vincent Rijmen
2018/1194
On Degree-d Zero-Sum Sets of Full Rank
Christof Beierle, Alex Biryukov, Aleksei Udovenko
2018/1193
Quantum Chosen-Ciphertext Attacks against Feistel Ciphers
Gembu Ito, Akinori Hosoyamada, Ryutaroh Matsumoto, Yu Sasaki, Tetsu Iwata
2018/1192
Durandal: a rank metric based signature scheme
Nicolas Aragon, Olivier Blazy, Philippe Gaborit, Adrien Hauteville, Gilles Zémor
2018/1191
Cryptanalysis of 2-round KECCAK-384
Rajendra Kumar, Nikhil Mittal, Shashank Singh
2018/1190
Large Universe Subset Predicate Encryption Based on Static Assumption (without Random Oracle)
Sanjit Chatterjee, Sayantan Mukherjee
2018/1189
The Role of the Adversary Model in Applied Security Research
Quang Do, Ben Martini, Kim-Kwang Raymond Choo
2018/1188
Batching Techniques for Accumulators with Applications to IOPs and Stateless Blockchains
Dan Boneh, Benedikt Bünz, Ben Fisch
2018/1187
Automatic Search for A Variant of Division Property Using Three Subsets (Full Version)
Kai Hu, Meiqin Wang
2018/1186
MILP Method of Searching Integral Distinguishers Based on Division Property Using Three Subsets
Senpeng Wang, Bin Hu, Jie Guan, Kai Zhang, Tairong Shi
2018/1185
On Quantum Chosen-Ciphertext Attacks and Learning with Errors
Gorjan Alagic, Stacey Jeffery, Maris Ozols, Alexander Poremba
2018/1184
Uncontrolled Randomness in Blockchains: Covert Bulletin Board for Illicit Activity
Nasser Alsalami, Bingsheng Zhang
2018/1183
Lossy Trapdoor Permutations with Improved Lossiness
Benedikt Auerbach, Eike Kiltz, Bertram Poettering, Stefan Schoenen
2018/1182
Code-based Cryptosystem from Quasi-Cyclic Elliptic Codes
Fangguo Zhang, Zhuoran Zhang
2018/1181
Horizontal DEMA Attack as the Criterion to Select the Best Suitable EM Probe
Christian Wittke, Ievgen Kabin, Dan Klann, Zoya Dyka, Anton Datsuk, Peter Langendoerfer
2018/1180
Lattice-Based Signature from Key Consensus
Leixiao Cheng, Boru Gong, Yunlei Zhao
2018/1179
Elliptic Curves in Generalized Huff's Model
Ronal Pranil Chand, Maheswara Rao Valluri
2018/1178
Pseudo-Free Families of Computational Universal Algebras
Mikhail Anokhin
2018/1177
Excalibur Key-Generation Protocols For DAG Hierarchic Decryption
Louis Goubin, Geraldine Monsalve, Juan Reutter, Francisco Vial Prado
2018/1176
Downgradable Identity-based Encryption and Applications
Olivier Blazy, Paul Germouty, Duong Hieu Phan
2018/1175
New Privacy Threat on 3G, 4G, and Upcoming 5G AKA Protocols
Ravishankar Borgaonkar, Lucca Hirschi, Shinjo Park, Altaf Shaik
2018/1174
A Comparison of NTRU Variants
John M. Schanck
2018/1173
The 9 Lives of Bleichenbacher's CAT: New Cache ATtacks on TLS Implementations
Eyal Ronen, Robert Gillham, Daniel Genkin, Adi Shamir, David Wong, Yuval Yarom
2018/1172
The impact of error dependencies on Ring/Mod-LWE/LWR based schemes
Jan-Pieter D'Anvers, Frederik Vercauteren, Ingrid Verbauwhede
2018/1171
PwoP: Intrusion-Tolerant and Privacy-Preserving Sensor Fusion
Chenglu Jin, Marten van Dijk, Michael K. Reiter, Haibin Zhang
2018/1170
Toward RSA-OAEP without Random Oracles
Nairen Cao, Adam O'Neill, Mohammad Zaheri
2018/1169
Placing Conditional Disclosure of Secrets in the Communication Complexity Universe
Benny Applebaum, Prashant Nalini Vasudevan
2018/1168
Result Pattern Hiding Searchable Encryption for Conjunctive Queries
Shangqi Lai, Sikhar Patranabis, Amin Sakzad, Joseph K. Liu, Debdeep Mukhopadhyay, Ron Steinfeld, Shi-Feng Sun, Dongxi Liu, Cong Zuo
2018/1167
On the Price of Proactivizing Round-Optimal Perfectly Secret Message Transmission
Ravi Kishore, Ashutosh Kumar, Chiranjeevi Vanarasa, Kannan Srinathan
2018/1166
Keeping Time-Release Secrets through Smart Contracts
Jianting Ning, Hung Dang, Ruomu Hou, Ee-Chien Chang
2018/1165
Identity-Concealed Authenticated Encryption and Key Exchange
Yunlei Zhao
2018/1164
Can you sign a quantum state
Gorjan Alagic, Tommaso Gagliardoni, Christian Majenz
2018/1163
More on sliding right
Joachim Breitner
2018/1162
On the Concrete Security of Goldreich’s Pseudorandom Generator
Geoffroy Couteau, Aurélien Dupin, Pierrick Méaux, Mélissa Rossi, Yann Rotella
2018/1161
Adaptively Secure MPC with Sublinear Communication Complexity
Ran Cohen, abhi shelat, Daniel Wichs
2018/1160
Algebraic normal form of a bent function: properties and restrictions
Natalia Tokareva
2018/1159
Improved upper bound on root number of linearized polynomials and its application to nonlinearity estimation of Boolean functions
Sihem Mesnager, Kwang Ho Kim, Myong Song Jo
2018/1158
Adversarially Robust Property Preserving Hash Functions
Elette Boyle, Rio LaVigne, Vinod Vaikuntanathan
2018/1157
Special Soundness Revisited
Douglas Wikström
2018/1156
Towards Round-Optimal Secure Multiparty Computations: Multikey FHE without a CRS
Eunkyung Kim, Hyang-Sook Lee, Jeongeun Park
2018/1155
Universally Composable Oblivious Transfer Protocol based on the RLWE Assumption
Pedro Branco, Jintai Ding, Manuel Goulão, Paulo Mateus
2018/1154
Leakage Resilient Secret Sharing and Applications
Akshayaram Srinivasan, Prashant Nalini Vasudevan
2018/1153
Dfinity Consensus, Explored
Ittai Abraham, Dahlia Malkhi, Kartik Nayak, Ling Ren
2018/1152
Improvements of Blockchain’s Block Broadcasting:An Incentive Approach
Qingzhao Zhang, Yijun Leng, Lei Fan
2018/1151
Analysis Of The Simulatability Of An Oblivious Transfer
Bing Zeng
2018/1150
Quantum-secure message authentication via blind-unforgeability
Gorjan Alagic, Christian Majenz, Alexander Russell, Fang Song
2018/1149
Compressive Sensing based Leakage Sampling and Reconstruction: A First Study
Changhai Ou, Chengju Zhou, Siew-Kei Lam
2018/1148
Towards Practical Security of Pseudonymous Signature on the BSI eIDAS Token
Mirosław Kutyłowski, Lucjan Hanzlik, Kamil Kluczniak
2018/1147
Stronger Leakage-Resilient and Non-Malleable Secret-Sharing Schemes for General Access Structures
Divesh Aggarwal, Ivan Damgard, Jesper Buus Nielsen, Maciej Obremski, Erick Purwanto, Joao Ribeiro, Mark Simkin
2018/1146
Functional Analysis Attacks on Logic Locking
Deepak Sirone, Pramod Subramanyan
2018/1145
Privacy Computing: Concept, Computing Framework And Future Development Trends
Fenghua Li, Hui Li, Ben Niu, Jinjun Chen
2018/1144
Revisiting Non-Malleable Secret Sharing
Saikrishna Badrinarayanan, Akshayaram Srinivasan
2018/1143
A new SNOW stream cipher called SNOW-V
Patrik Ekdahl, Thomas Johansson, Alexander Maximov, Jing Yang
2018/1142
Factoring Products of Braids via Garside Normal Form
Simon-Philipp Merz, Christophe Petit
2018/1141
Fast Authentication from Aggregate Signatures with Improved Security
Muslum Ozgur Ozmen, Rouzbeh Behnia, Attila A. Yavuz
2018/1140
Efficient Fully-Leakage Resilient One-More Signature Schemes
Antonio Faonio
2018/1139
Breaking the Binding: Attacks on the Merkle Approach to Prove Liabilities and its Applications
Kexin Hu, Zhenfeng Zhang, Kaiven Guo
2018/1138
Leakage-Resilient Secret Sharing
Ashutosh Kumar, Raghu Meka, Amit Sahai
2018/1137
Genus 2 curves with given split Jacobian
Jasper Scholten
2018/1136
A Provably-Secure Unidirectional Proxy Re-Encryption Scheme Without Pairing in the Random Oracle Model
S. Sharmila Deva Selvi, Arinjita Paul, C. Pandu Rangan
2018/1135
PoTS - A Secure Proof of TEE-Stake for Permissionless Blockchains
Sébastien Andreina, Jens-Matthias Bohli, Ghassan O. Karame, Wenting Li, Giorgia Azzurra Marson
2018/1134
Echoes of the Past: Recovering Blockchain Metrics From Merged Mining
Nicholas Stifter, Philipp Schindler, Aljosha Judmayer, Alexei Zamyatin, Andreas Kern, Edgar Weippl
2018/1133
A Public Key Exchange Cryptosystem Based on Ideal Secrecy
Vamshi Krishna Kammadanam, Virendra R. Sule, Yi Hong
2018/1132
Ouroboros Crypsinous: Privacy-Preserving Proof-of-Stake
Thomas Kerber, Markulf Kohlweiss, Aggelos Kiayias, Vassilis Zikas
2018/1131
A CCA-secure collusion-resistant Identity-based Proxy Re-encryption Scheme
Arinjita Paul, Varshika Srinivasavaradhan, S. Sharmila Deva Selvi, C. Pandu Rangan
2018/1130
A Survey on Applications of H-Technique: Revisiting Security Analysis of PRP and PRF
Ashwin Jha, Mridul Nandi
2018/1129
On Kilian's Randomization of Multilinear Map Encodings
Jean-Sebastien Coron, Hilder V. L. Pereira
2018/1128
Direct Anonymous Attestation with Optimal TPM Signing Efficiency
Kang Yang, Liqun Chen, Zhenfeng Zhang, Christopher J. P. Newton, Bo Yang, Li Xi
2018/1127
Freestyle, a randomized version of ChaCha for resisting offline brute-force and dictionary attacks
P. Arun Babu, Jithin Jose Thomas
2018/1126
Lightweight AE and HASH in a Single Round Function
Dingfeng Ye, Danping Shi, Peng Wang
2018/1125
Verifying liquidity of Bitcoin contracts
Massimo Bartoletti, Roberto Zunino
2018/1124
Secure Opportunistic Multipath Key Exchange
Sergiu Costea, Marios O. Choudary, Doru Gucea, Björn Tackmann, Costin Raiciu
2018/1123
When Theory Meets Practice: A Framework for Robust Profiled Side-channel Analysis
Stjepan Picek, Annelie Heuser, Lichao Wu, Cesare Alippi, Francesco Regazzoni
2018/1122
Improved Quantum Multicollision-Finding Algorithm
Akinori Hosoyamada, Yu Sasaki, Seiichiro Tani, Keita Xagawa
2018/1121
An Analysis of the ProtonMail Cryptographic Architecture
Nadim Kobeissi
2018/1120
Organizational Cryptography for Access Control
Masahito Gotaishi, Shigeo Tsujii
2018/1119
Parallel Chains: Improving Throughput and Latency of Blockchain Protocols via Parallel Composition
Matthias Fitzi, Peter Ga{ž}i, Aggelos Kiayias, Alexander Russell
2018/1118
Non-Interactive Non-Malleability from Quantum Supremacy
Yael Tauman Kalai, Dakshita Khurana
2018/1117
A Note on Transitional Leakage When Masking AES with Only Two Bits of Randomness
Felix Wegener, Amir Moradi
2018/1116
Fly, you fool! Faster Frodo for the ARM Cortex-M4
Joppe W. Bos, Simon Friedberger, Marco Martinoli, Elisabeth Oswald, Martijn Stam
2018/1115
Group Signature without Random Oracles from Randomizable Signatures
Remi Clarisse, Olivier Sanders
2018/1114
Lightweight Circuits with Shift and Swap
Subhadeep Banik, Francesco Regazzoni, Serge Vaudenay
2018/1113
Private Function Evaluation with Cards
Alexander Koch, Stefan Walzer
2018/1112
DEXON: A Highly Scalable, Decentralized DAG-Based Consensus Algorithm
Tai-Yuan Chen, Wei-Ning Huang, Po-Chun Kuo, Hao Chung, Tzu-Wei Chao
2018/1111
Cryptanalysis of the Wave Signature Scheme
Paulo S. L. M. Barreto, Edoardo Persichetti
2018/1110
Minting Mechanisms for Blockchain -- or -- Moving from Cryptoassets to Cryptocurrencies
Dominic Deuber, Nico Döttling, Bernardo Magri, Giulio Malavolta, Sri Aravinda Krishnan Thyagarajan
2018/1109
Faster SeaSign signatures through improved rejection sampling
Thomas Decru, Lorenz Panny, Frederik Vercauteren
2018/1108
Covert Security with Public Verifiability: Faster, Leaner, and Simpler
Cheng Hong, Jonathan Katz, Vladimir Kolesnikov, Wen-jie Lu, Xiao Wang
2018/1107
Further observations on SIMON and SPECK families of block ciphers
S. M. Dehnavi
2018/1106
P4TC—Provably-Secure yet Practical Privacy-Preserving Toll Collection
Valerie Fetzer, Max Hoffmann, Matthias Nagel, Andy Rupp, Rebecca Schwerdt
2018/1105
Proof-of-Stake Protocols for Privacy-Aware Blockchains
Chaya Ganesh, Claudio Orlandi, Daniel Tschudi
2018/1104
Tropical cryptography II: extensions by homomorphisms
Dima Grigoriev, Vladimir Shpilrain
2018/1103
Some Properties of Modular Addition
Victoria Vysotskaya
2018/1102
A fully distributed revocable ciphertext-policy hierarchical attribute-based encryption without pairing
Mohammad Ali, Javad Mohajeri, Mohammad-Reza Sadeghi
2018/1101
Insecurity of a provably secure and lightweight certificateless signature scheme for IIoT environments
Lunzhi Deng
2018/1100
Correction to "Improving the DGK comparison protocol"
Thijs Veugen
2018/1099
SoK: Modular and Efficient Private Decision Tree Evaluation
Ágnes Kiss, Masoud Naderpour, Jian Liu, N. Asokan, Thomas Schneider
2018/1098
MARVELlous: a STARK-Friendly Family of Cryptographic Primitives
Tomer Ashur, Siemen Dhooghe
2018/1097
End-to-End Secure Mobile Group Messaging with Conversation Integrity and Deniability
Michael Schliep, Nicholas Hopper
2018/1096
On Finding Quantum Multi-collisions
Qipeng Liu, Mark Zhandry
2018/1095
Scalable One-Time Pad --- From Information Theoretic Security to Information Conservational Security
Wen-Ran Zhang
2018/1094
Match Me if You Can: Matchmaking Encryption and its Applications
Giuseppe Ateniese, Danilo Francati, David Nuñez, Daniele Venturi
2018/1093
Adaptively Simulation-Secure Attribute-Hiding Predicate Encryption
Pratish Datta, Tatsuaki Okamoto, Katsuyuki Takashima
2018/1092
Shuffle and Mix: On the Diffusion of Randomness in Threshold Implementations of Keccak
Felix Wegener, Christian Baiker, Amir Moradi
2018/1091
Simulation-based Receiver Selective Opening CCA Secure PKE from Standard Computational Assumptions
Keisuke Hara, Fuyuki Kitagawa, Takahiro Matsuda, Goichiro Hanaoka, Keisuke Tanaka
2018/1090
Plaintext Recovery Attack of OCB2
Tetsu Iwata
2018/1089
On the impact of decryption failures on the security of LWE/LWR based schemes
Jan-Pieter D'Anvers, Frederik Vercauteren, Ingrid Verbauwhede
2018/1088
High-speed Side-channel-protected Encryption and Authentication in Hardware
Nele Mentens, Vojtech Miskovsky, Martin Novotny, Jo Vliegen
2018/1087
Breaking the confidentiality of OCB2
Bertram Poettering
2018/1086
Two Party Distribution Testing: Communication and Security
Alexandr Andoni, Tal Malkin, Negev Shekel Nosatzki
2018/1085
Exact maximum expected differential and linear probability for 2-round Kuznyechik
Vitaly Kiryukhin
2018/1084
A Deep Dive into Blockchain Selfish Mining
Qianlan Bai, Xinyan Zhou, Xing Wang, Yuedong Xu, Xin Wang, Qingsheng Kong
2018/1083
Private Stateful Information Retrieval
Sarvar Patel, Giuseppe Persiano, Kevin Yeo
2018/1082
An Algebraic Method to Recover Superpolies in Cube Attacks
Chen-Dong Ye, Tian Tian
2018/1081
Statistical Zeroizing Attack: Cryptanalysis of Candidates of BP Obfuscation over GGH15 Multilinear Map
Jung Hee Cheon, Wonhee Cho, Minki Hhan, Jiseung Kim, Changmin Lee
2018/1080
How Does Strict Parallelism Affect Security? A Case Study on the Side-Channel Attacks against GPU-based Bitsliced AES Implementation
Yiwen Gao, Yongbin Zhou, Wei Cheng
2018/1079
Analysis of Deterministic Longest-Chain Protocols
Elaine Shi
2018/1078
Two Round Information-Theoretic MPC with Malicious Security
Prabhanjan Ananth, Arka Rai Choudhuri, Aarushi Goel, Abhishek Jain
2018/1077
More Efficient Lattice PRFs from Keyed Pseudorandom Synthesizers
Hart Montgomery
2018/1076
Game Theoretic Notions of Fairness in Multi-Party Coin Toss
Kai-Min Chung, Yue Guo, Wei-Kai Lin, Rafael Pass, Elaine Shi
2018/1075
Rectangle and Impossible-differential Cryptanalysis on Versions of ForkAES
Jannis Bossert, Eik List, Stefan Lucks
2018/1074
Yet Another Size Record for AES: A First-Order SCA Secure AES S-box Based on GF($2^8$) Multiplication
Felix Wegener, Amir Moradi
2018/1073
Faster Homomorphic Discrete Fourier Transforms and Improved FHE Bootstrapping
Jung Hee Cheon, Kyoohyung Han, Minki Hhan
2018/1072
Construction of MDS Matrices from Generalized Feistel Structures
Mahdi Sajadieh, Mohsen Mousavi
2018/1071
CertLedger: A New PKI Model with Certificate Transparency Based on Blockchain
Murat Yasin Kubilay, Mehmet Sabir Kiraz, Haci Ali Mantar
2018/1070
A New Batch FHE Scheme over the Integers
Kwak Wi Song, Kim Chol Un
2018/1069
Non-Malleable Codes, Extractors and Secret Sharing for Interleaved Tampering and Composition of Tampering
Eshan Chattopadhyay, Xin Li
2018/1068
Partial Key Exposure in Ring-LWE-Based Cryptosystems: Attacks and Resilience
Dana Dachman-Soled, Huijing Gong, Mukul Kulkarni, Aria Shahverdi
2018/1067
On Quantum Slide Attacks
Xavier Bonnetain, María Naya-Plasencia, André Schrottenloher
2018/1066
Finding Collisions in a Quantum World: Quantum Black-Box Separation of Collision-Resistance and One-Wayness
Akinori Hosoyamada, Takashi Yamakawa
2018/1065
Homomorphic Secret Sharing for Low Degree Polynomials
Russell W. F. Lai, Giulio Malavolta, Dominique Schröder
2018/1064
Towards Provably-Secure Analog and Mixed-Signal Locking Against Overproduction
Nithyashankari Gummidipoondi Jayasankaran, Adriana Sanabria Borbon, Edgar Sanchez-Sinencio, Jiang Hu, Jeyavijayan Rajendran
2018/1063
Your Culture is in Your Password: An Analysis of a Demographically-diverse Password Dataset
Mashael AlSabah, Gabriele Oligeri, Ryan Riley
2018/1062
DAGsim: Simulation of DAG-based distributed ledger protocols
Manuel Zander, Tom Waite, Dominik Harz
2018/1061
On the Design of a Secure Proxy Signature-based Handover Authentication Scheme for LTEWireless Networks
Behnam Zahednejad, Majid Bayat, Ashok Kumar Das
2018/1060
Port Contention for Fun and Profit
Alejandro Cabrera Aldaya, Billy Bob Brumley, Sohaib ul Hassan, Cesar Pereida García, Nicola Tuveri
2018/1059
Quantum circuits for the CSIDH: optimizing quantum evaluation of isogenies
Daniel J. Bernstein, Tanja Lange, Chloe Martindale, Lorenz Panny
2018/1058
Ciphertext-Policy Attribute-Based Encrypted Data Equality Test and Classification
Yuzhao Cui, Qiong Huang, Jianye Huang, Hongbo Li, Guomin Yang
2018/1057
Limiting the impact of unreliable randomness in deployed security protocols
Liliya Akhmetzyanova, Cas Cremers, Luke Garratt, Stanislav V. Smyshlyaev, Nick Sullivan
2018/1056
Towards the AlexNet Moment for Homomorphic Encryption: HCNN, the First Homomorphic CNN on Encrypted Data with GPUs
Ahmad Al Badawi, Jin Chao, Jie Lin, Chan Fook Mun, Jun Jie Sim, Benjamin Hong Meng Tan, Xiao Nan, Khin Mi Mi Aung, Vijay Ramaseshan Chandrasekhar
2018/1055
Candidate Differing-Inputs Obfuscation from Indistinguishability Obfuscation and Auxiliary-Input Point Obfuscation
Pan Dongxue, Li Hongda, Ni Peifang
2018/1054
Efficient Multi-key FHE with short extended ciphertexts and less public parameters
Tanping Zhou, Ningbo Li, Xiaoyuan Yang, Yiliang Han, Wenchao Liu
2018/1053
Revisiting Single-server Algorithms for Outsourcing Modular Exponentiation
Jothi Rangasamy, Lakshmi Kuppusamy
2018/1052
Verifiability Analysis of CHVote
David Bernhard, Véronique Cortier, Pierrick Gaudry, Mathieu Turuani, Bogdan Warinschi
2018/1051
Lower Bounds for Differentially Private RAMs
Giuseppe Persiano, Kevin Yeo
2018/1050
Towards Automatically Penalizing Multimedia Breaches
Easwar Vivek Mangipudi, Krutarth Rao, Jeremy Clark, Aniket Kate
2018/1049
Ouroboros-BFT: A Simple Byzantine Fault Tolerant Consensus Protocol
Aggelos Kiayias, Alexander Russell
2018/1048
Proof-of-Work Sidechains
Aggelos Kiayias, Dionysis Zindros
2018/1047
On the Linear Transformation in White-box Cryptography
Seungkwang Lee, Nam-su Jho, Myungchul Kim
2018/1046
Constructing Infinite Families of Low Differential Uniformity $(n,m)$-Functions with $m>n/2$
Claude Carlet, Xi Chen, Longjiang Qu
2018/1045
MPC Joins the Dark Side
John Cartlidge, Nigel P. Smart, Younes Talibi Alaoui
2018/1044
Strongly Unforgeable Signatures Resilient to Polynomially Hard-to-Invert Leakage under Standard Assumptions
Masahito Ishizaka, Kanta Matsuura
2018/1043
Improved Bootstrapping for Approximate Homomorphic Encryption
Hao Chen, Ilaria Chillotti, Yongsoo Song
2018/1042
Laser-induced Single-bit Faults in Flash Memory: Instructions Corruption on a 32-bit Microcontroller
Brice Colombier, Alexandre Menu, Jean-Max Dutertre, Pierre-Alain Moëllic, Jean-Baptiste Rigaud, Jean-Luc Danger
2018/1041
Secure Outsourced Matrix Computation and Application to Neural Networks
Xiaoqian Jiang, Miran Kim, Kristin Lauter, Yongsoo Song
2018/1040
Cryptanalysis of OCB2
Akiko Inoue, Kazuhiko Minematsu
2018/1039
Aggregate Cash Systems: A Cryptographic Investigation of Mimblewimble
Georg Fuchsbauer, Michele Orrù, Yannick Seurin
2018/1038
On inversion modulo pseudo-Mersenne primes
Michael Scott
2018/1037
The Double Ratchet: Security Notions, Proofs, and Modularization for the Signal Protocol
Joël Alwen, Sandro Coretti, Yevgeniy Dodis
2018/1036
If a Generalised Butterfly is APN then it Operates on 6 Bits
Anne Canteaut, Léo Perrin, Shizhu Tian
2018/1035
Relating different Polynomial-LWE problems
Madalina Bolboceanu
2018/1034
Adding Distributed Decryption and Key Generation to a Ring-LWE Based CCA Encryption Scheme
Michael Kraitsberg, Yehuda Lindell, Valery Osheter, Nigel P. Smart, Younes Talibi Alaoui
2018/1033
One-Round Authenticated Group Key Exchange from Isogenies
Atsushi Fujioka, Katsuyuki Takashima, Kazuki Yoneyama
2018/1032
Conditionals in Homomorphic Encryption and Machine Learning Applications
Diego Chialva, Ann Dooms
2018/1031
Sharing Independence & Relabeling: Efficient Formal Verification of Higher-Order Masking
Roderick Bloem, Rinat Iusupov, Martin Krenn, Stefan Mangard
2018/1030
Registration-Based Encryption from Standard Assumptions
Sanjam Garg, Mohammad Hajiabadi, Mohammad Mahmoody, Ahmadreza Rahimi, Sruthi Sekar
2018/1029
Reducing the Key Size of McEliece Cryptosystem from Automorphism-induced Goppa Codes via Permutations
Zhe Li, Chaoping Xing, Sze Ling Yeo
2018/1028
Synchronous Byzantine Agreement with Expected $O(1)$ Rounds, Expected $O(n^2)$ Communication, and Optimal Resilience
Ittai Abraham, Srinivas Devadas, Danny Dolev, Kartik Nayak, Ling Ren
2018/1027
A Unified Security Perspective on Legally Fair Contract Signing Protocols
Diana Maimut, George Teseleanu
2018/1026
Pairing-Friendly Twisted Hessian Curves
Chitchanok Chuengsatiansup, Chloe Martindale
2018/1025
Integer Matrices Homomorphic Encryption and Its application
Yanan Bai, Jingwei Chen, Yong Feng, Wenyuan Wu
2018/1024
ZLiTE: Lightweight Clients for Shielded Zcash Transactions using Trusted Execution
Karl Wüst, Sinisa Matetic, Moritz Schneider, Ian Miers, Kari Kostiainen, Srdjan Capkun
2018/1023
Make Some Noise: Unleashing the Power of Convolutional Neural Networks for Profiled Side-channel Analysis
Jaehun Kim, Stjepan Picek, Annelie Heuser, Shivam Bhasin, Alan Hanjalic
2018/1022
Blind Certificate Authorities
Liang Wang, Gilad Asharov, Rafael Pass, Thomas Ristenpart, abhi shelat
2018/1021
Multi-Client Functional Encryption with Repetition for Inner Product
Jérémy Chotard, Edouard Dufour-Sans, Romain Gay, Duong Hieu Phan, David Pointcheval
2018/1020
Non-Interactive Secure Computation from One-Way Functions
Saikrishna Badrinarayanan, Abhishek Jain, Rafail Ostrovsky, Ivan Visconti
2018/1019
Decentralized Evaluation of Quadratic Polynomials on Encrypted Data
Chloé Hébant, Duong Hieu Phan, David Pointcheval
2018/1018
Faster multiplication in $\mathbb{Z}_{2^m}[x]$ on Cortex-M4 to speed up NIST PQC candidates
Matthias J. Kannwischer, Joost Rijneveld, Peter Schwabe
2018/1017
TNFS Resistant Families of Pairing-Friendly Elliptic Curves
Georgios Fotiadis, Elisavet Konstantinou
2018/1016
Concealing Ketje: A Lightweight PUF-Based Privacy Preserving Authentication Protocol
Gerben Geltink
2018/1015
Non-Malleable Codes Against Bounded Polynomial Time Tampering
Marshall Ball, Dana Dachman-Soled, Mukul Kulkarni, Huijia Lin, Tal Malkin
2018/1014
An FPGA-based programmable processor for bilinear pairings
Eduardo Cuevas-Farfán, Miguel Morales-Sandoval, René Cumplido
2018/1013
E3: A Framework for Compiling C++ Programs with Encrypted Operands
Eduardo Chielle, Oleg Mazonka, Homer Gamil, Nektarios Georgios Tsoutsos, Michail Maniatakos
2018/1012
The authenticated encryption schemes Kravatte-SANE and Kravatte-SANSE
Guido Bertoni, Joan Daemen, Seth Hoffert, Michaël Peeters, Gilles Van Assche, Ronny Van Keer
2018/1011
BISON - Instantiating the Whitened Swap-Or-Not Construction
Anne Canteaut, Virginie Lallemand, Gregor Leander, Patrick Neumann, Friedrich Wiemer
2018/1010
Space Efficient Computational Multi-Secret Sharing and Its Applications
Aggelos Kiayias, Murat Osmanoglu, Alexander Russell, Qiang Tang
2018/1009
LAC: Practical Ring-LWE Based Public-Key Encryption with Byte-Level Modulus
Xianhui Lu, Yamin Liu, Zhenfei Zhang, Dingding Jia, Haiyang Xue, Jingnan He, Bao Li, Kunpeng Wang
2018/1007
Masking the AES with Only Two Random Bits
Hannes Gross, Ko Stoffelen, Lauren De Meyer, Martin Krenn, Stefan Mangard
2018/1005
Code Offset in the Exponent
Luke Demarest, Benjamin Fuller, Alexander Russell
2018/1004
Fiat-Shamir From Simpler Assumptions
Ran Canetti, Yilei Chen, Justin Holmgren, Alex Lombardi, Guy N. Rothblum, Ron D. Rothblum
2018/1003
Secure Data Retrieval On The Cloud: Homomorphic Encryption Meets Coresets
Adi Akavia, Dan Feldman, Hayim Shaul
2018/1002
"S-Box" Implementation of AES is NOT side-channel resistant
C Ashokkumar, Bholanath Roy, M Bhargav Sri Venkatesh, Bernard L Menezes
2018/1001
Illuminating the Dark or how to recover what should not be seen in FE-based classifiers
Sergiu Carpov, Caroline Fontaine, Damien Ligier, Renaud Sirdey
2018/1000
Adaptively Single-Key Secure Constrained PRFs for NC1
Nuttapong Attrapadung, Takahiro Matsuda, Ryo Nishimaki, Shota Yamada, Takashi Yamakawa
2018/999
A Refinement of ``A Key-recovery Attack on 855-round Trivium" From CRYPTO 2018
Ximing Fu, Xiaoyun Wang, Xiaoyang Dong, Willi Meier, Yonglin Hao, Boxin Zhao
2018/998
A Key Recovery Attack on Streamlined NTRU Prime
Chen Li
2018/997
Turning HATE Into LOVE: Compact Homomorphic Ad Hoc Threshold Encryption for Scalable MPC
Leonid Reyzin, Adam Smith, Sophia Yakoubov
2018/996
Wave: A New Family of Trapdoor One-Way Preimage Sampleable Functions Based on Codes
Thomas Debris-Alazard, Nicolas Sendrier, Jean-Pierre Tillich
2018/995
Preprocess-then-NTT Technique and Its Applications to KYBER and NEWHOPE
Shuai Zhou, Haiyang Xue, Daode Zhang, Kunpeng Wang, Xianhui Lu, Bao Li, Jingnan He
2018/994
People Who Live in Glass Houses Should not Throw Stones: Targeted Opening Message Franking Schemes
Long Chen, Qiang Tang
2018/993
The Multi-user Security of GCM, Revisited: Tight Bounds for Nonce Randomization
Viet Tung Hoang, Stefano Tessaro, Aishwarya Thiruvengadam
2018/992
Deconstructing the Blockchain to Approach Physical Limits
Vivek Bagaria, Sreeram Kannan, David Tse, Giulia Fanti, Pramod Viswanath
2018/991
Reconsidering Generic Composition: the Tag-then-Encrypt case
Francesco Berti, Olivier Pereira, Thomas Peters
2018/990
Quisquis: A New Design for Anonymous Cryptocurrencies
Prastudy Fauzi, Sarah Meiklejohn, Rebekah Mercer, Claudio Orlandi
2018/989
Kleptography trapdoor free cryptographic protocols
Bohdan Kovalenko, Anton Kudin
2018/988
On the Hardness of Learning With Errors with Binary Secrets
Daniele Micciancio
2018/987
Fast Secure Multiparty ECDSA with Practical Distributed Key Generation and Applications to Cryptocurrency Custody
Iftach Haitner, Yehuda Lindell, Ariel Nof, Samuel Ranellucci
2018/986
Watermarking PRFs from Lattices: Stronger Security via Extractable PRFs
Sam Kim, David J. Wu
2018/985
Efficient Arithmetic In (Pseudo-)Mersenne Prime Order Fields
Kaushik Nath, Palash Sarkar
2018/984
Pseudorandomness Against Mean and Variance Bounded Attackers
Maciej Skorski
2018/983
Efficient UC Commitment Extension with Homomorphism for Free (and Applications)
Ignacio Cascudo, Ivan Damgård, Bernardo David, Nico Döttling, Rafael Dowsley, Irene Giacomelli
2018/982
Constrained PRFs for Bit-fixing (and More) from OWFs with Adaptive Security and Constant Collusion Resistance
Alex Davidson, Shuichi Katsumata, Ryo Nishimaki, Shota Yamada
2018/981
PaLa: A Simple Partially Synchronous Blockchain
T-H. Hubert Chan, Rafael Pass, Elaine Shi
2018/980
PiLi: An Extremely Simple Synchronous Blockchain
T-H. Hubert Chan, Rafael Pass, Elaine Shi
2018/979
FPGA-based Assessment of Midori and GIFT Lightweight Block Ciphers
Carlos Andres Lara-Nino, Arturo Diaz-Perez, Miguel Morales-Sandoval
2018/978
Encrypted Multi-Maps with Computationally-Secure Leakage
Seny Kamara, Tarik Moataz
2018/977
Threshold Single Password Authentication
Devriş İşler, Alptekin Küpçü
2018/976
Distributed Single Password Protocol Framework
Devriş İşler, Alptekin Küpçü
2018/975
User Study on Single Password Authentication
Devriş İşler, Alptekin Küpçü, Aykut Coskun
2018/974
Adaptively Secure and Succinct Functional Encryption: Improving Security and Efficiency, Simultaneously
Fuyuki Kitagawa, Ryo Nishimaki, Keisuke Tanaka, Takashi Yamakawa
2018/973
How to leverage hardness of constant-degree expanding polynomials over $\mathbb{R}$ to build iO
Aayush Jain, Amit Sahai
2018/972
Observations on the Dynamic Cube Attack of 855-Round TRIVIUM from Crypto'18
Yonglin Hao, Lin Jiao, Chaoyun Li, Willi Meier, Yosuke Todo, Qingju Wang
2018/971
Chameleon-Hashes with Dual Long-Term Trapdoors and Their Applications
Stephan Krenn, Henrich C. Pöhls, Kai Samelin, Daniel Slamanig
2018/970
Protean Signature Schemes
Stephan Krenn, Henrich C. Pöhls, Kai Samelin, Daniel Slamanig
2018/969
Optimal TNFS-secure pairings on elliptic curves with even embedding degree
Georgios Fotiadis, Chloe Martindale
2018/968
Edrax: A Cryptocurrency with Stateless Transaction Validation
Alexander Chepurnoy, Charalampos Papamanthou, Shravan Srinivasan, Yupeng Zhang
2018/967
Higher dimensional sieving for the number field sieve algorithms
Laurent Grémy
2018/966
On the Security of the Multivariate Ring Learning with Errors Problem
Carl Bootland, Wouter Castryck, Frederik Vercauteren
2018/965
Pump up the Volume: Practical Database Reconstruction from Volume Leakage on Range Queries
Paul Grubbs, Marie-Sarah Lacharité, Brice Minaud, Kenny Paterson
2018/964
Fast Scalar Multiplication for Elliptic Curves over Prime Fields by Efficiently Computable Formulas
Saud Al Musa, Guangwu Xu
2018/963
On Enabling Attribute-Based Encryption to Be Traceable against Traitors
Zhen Liu, Qiong Huang, Duncan S. Wong
2018/962
Zexe: Enabling Decentralized Private Computation
Sean Bowe, Alessandro Chiesa, Matthew Green, Ian Miers, Pratyush Mishra, Howard Wu
2018/961
Jitter Estimation with High Accuracy for Oscillator-Based TRNGs
Shaofeng Zhu, Hua Chen, Limin Fan, Meihui Chen, Wei Xi, Dengguo Feng
2018/960
Towards Quantum One-Time Memories from Stateless Hardware
Anne Broadbent, Sevag Gharibian, Hong-Sheng Zhou
2018/959
Information Entropy Based Leakage Certification
Changhai Ou, Xinping Zhou, Siew-Kei Lam
2018/958
On Tightly Secure Primitives in the Multi-Instance Setting
Dennis Hofheinz, Ngoc Khanh Nguyen
2018/957
Same Point Composable and Nonmalleable Obfuscated Point Functions
Peter Fenteany, Benjamin Fuller
2018/956
Key-Insulated and Privacy-Preserving Signature Scheme with Publicly Derived Public Key
Zhen Liu, Guomin Yang, Duncan S. Wong, Khoa Nguyen, Huaxiong Wang
2018/955
Compact Sparse Merkle Trees
Faraz Haider
2018/954
Efficient Ratcheting: Almost-Optimal Guarantees for Secure Messaging
Daniel Jost, Ueli Maurer, Marta Mularczyk
2018/953
A Comparative Evaluation of Order-Revealing Encryption Schemes and Secure Range-Query Protocols
Dmytro Bogatov, George Kollios, Leonid Reyzin
2018/952
Approximate Homomorphic Encryption over the Conjugate-invariant Ring
Duhyeong Kim, Yongsoo Song
2018/951
The Landscape of Optimal Card-based Protocols
Alexander Koch
2018/950
Security bound for CTR-ACPKM internally re-keyed encryption mode
Liliya R. Akhmetzyanova, Evgeny K. Alekseev, Stanislav V. Smyshlyaev
2018/949
Constructing TI-Friendly Substitution Boxes using Shift-Invariant Permutations
Si Gao, Arnab Roy, Elisabeth Oswald
2018/948
MILP-Based Automatic Differential Searches for LEA and HIGHT
Elnaz Bagherzadeh, Zahra Ahmadian
2018/947
On the security of Circulant UOV/Rainbow
Yasufumi Hashimoto
2018/946
Building an Efficient Lattice Gadget Toolkit: Subgaussian Sampling and More
Nicholas Genise, Daniele Micciancio, Yuriy Polyakov
2018/945
On the Inner Product Predicate and a Generalization of Matching Vector Families
Balthazar Bauer, Jevgēnijs Vihrovs, Hoeteck Wee
2018/944
Data-Independent Memory Hard Functions: New Attacks and Stronger Constructions
Jeremiah Blocki, Ben Harsha, Siteng Kang, Seunghoon Lee, Lu Xing, Samson Zhou
2018/943
Valiant's Universal Circuits Revisited: an Overall Improvement and a Lower Bound
Shuoyao Zhao, Yu Yu, Jiang Zhang, Hanlin Liu
2018/942
Insured MPC: Efficient Secure Computation with Financial Penalties
Carsten Baum, Bernardo David, Rafael Dowsley
2018/941
A tutorial introduction to CryptHOL
Andreas Lochbihler, S. Reza Sefidgar
2018/940
Reusable Non-Interactive Secure Computation
Melissa Chase, Yevgeniy Dodis, Yuval Ishai, Daniel Kraschewski, Tianren Liu, Rafail Ostrovsky, Vinod Vaikuntanathan
2018/939
The Proof is in the Pudding: Proofs of Work for Solving Discrete Logarithms
Marcella Hastings, Nadia Heninger, Eric Wustrow
2018/938
Private Message Franking with After Opening Privacy
Iraklis Leontiadis, Serge Vaudenay
2018/937
Improved Brute-Force Search Strategies for Single-Trace and Few-Traces Template Attacks on the DES Round Keys
Mathias Wagner, Stefan Heyse
2018/936
New Techniques for Obfuscating Conjunctions
James Bartusek, Tancrède Lepoint, Fermi Ma, Mark Zhandry
2018/935
Distinguishing Error of Nonlinear Invariant Attacks
Subhabrata Samajder, Palash Sarkar
2018/934
Integrative Acceleration of First-Order Boolean Masking for Embedded IoT Devices
Yuichi Komano, Hideo Shimizu, Hideyuki Miyake
2018/933
Asymptotically Ideal CRT-based Secret Sharing Schemes for Multilevel and Compartmented Access Structures
Ferucio Laurentiu Tiplea, Constantin Catalin Dragan
2018/932
18 Seconds to Key Exchange: Limitations of Supersingular Isogeny Diffie-Hellman on Embedded Devices
Philipp Koppermann, Eduard Pop, Johann Heyszl, Georg Sigl
2018/931
A Full RNS Variant of Approximate Homomorphic Encryption
Jung Hee Cheon, Kyoohyung Han, Andrey Kim, Miran Kim, Yongsoo Song
2018/930
A study on the fast ElGamal encryption
Kim Gyu-Chol, Li Su-Chol
2018/929
Expander Graphs are Non-Malleable Codes
Peter M. R. Rasmussen, Amit Sahai
2018/928
Generic Authenticated Key Exchange in the Quantum Random Oracle Model
Kathrin Hövelmanns, Eike Kiltz, Sven Schäge, Dominique Unruh
2018/927
Adaptively Secure Distributed PRFs from LWE
Benoît Libert, Damien Stehlé, Radu Titiu
2018/926
Hard Isogeny Problems over RSA Moduli and Groups with Infeasible Inversion
Salim Ali Altug, Yilei Chen
2018/925
PolyShard: Coded Sharding Achieves Linearly Scaling Efficiency and Security Simultaneously
Songze Li, Mingchao Yu, A. Salman Avestimehr, Sreeram Kannan, Pramod Viswanath
2018/924
Forward Secure Signatures on Smart Cards
Andreas Hülsing, Christoph Busold, Johannes Buchmann
2018/923
Delegatable Anonymous Credentials from Mercurial Signatures
Elizabeth C. Crites, Anna Lysyanskaya
2018/922
Optimized Threshold Implementations: Securing Cryptographic Accelerators for Low-Energy and Low-Latency Applications
Dušan Božilov, Miroslav Knežević, Ventzislav Nikov
2018/921
Round Optimal Black-Box “Commit-and-Prove”
Dakshita Khurana, Rafail Ostrovsky, Akshayaram Srinivasan
2018/920
A Message Franking Channel
Loïs Huguenin-Dumittan, Iraklis Leontiadis
2018/919
Registration-Based Encryption: Removing Private-Key Generator from IBE
Sanjam Garg, Mohammad Hajiabadi, Mohammad Mahmoody, Ahmadreza Rahimi
2018/918
Scalable Lightning Factories for Bitcoin
Alejandro Ranchal-Pedrosa, Maria Potop-Butucaru, Sara Tucci-Piergiovanni
2018/917
Secure multiparty PageRank algorithm for collaborative fraud detection
Alex Sangers, Maran van Heesch, Thomas Attema, Thijs Veugen, Mark Wiggerman, Jan Veldsink, Oscar Bloemen, Daniël Worm
2018/916
Forking a Blockcipher for Authenticated Encryption of Very Short Messages
Elena Andreeva, Reza Reyhanitabar, Kerem Varici, Damian Vizár
2018/915
On the Security of a Certificateless Strong Designated Verifier Signature Scheme
Nasrollah Pakniat
2018/914
Note on Constructing Constrained PRFs from OWFs with Constant Collusion Resistance
Shuichi Katsumata, Shota Yamada
2018/913
Best Possible Information-Theoretic MPC
Shai Halevi, Yuval Ishai, Eyal Kushilevitz, Tal Rabin
2018/912
Round-Optimal Fully Black-Box Zero-Knowledge Arguments from One-Way Permutations
Carmit Hazay, Muthuramakrishnan Venkitasubramaniam
2018/911
Achieving Fair Treatment in Algorithmic Classification
Andrew Morgan, Rafael Pass
2018/910
Secure Certification of Mixed Quantum States with Application to Two-Party Randomness Generation
Frédéric Dupuis, Serge Fehr, Philippe Lamontagne, Louis Salvail
2018/909
Two-Round MPC: Information-Theoretic and Black-Box
Sanjam Garg, Yuval Ishai, Akshayaram Srinivasan
2018/908
FE and iO for Turing Machines from Minimal Assumptions
Shweta Agrawal and Monosij Maitra
2018/907
Proving the correct execution of concurrent services in zero-knowledge
Srinath Setty, Sebastian Angel, Trinabh Gupta, Jonathan Lee
2018/906
Watermarking PRFs under Standard Assumptions: Public Marking and Security with Extraction Queries
Willy Quach, Daniel Wichs, Giorgos Zirdelis
2018/905
On the Security Loss of Unique Signatures
Andrew Morgan, Rafael Pass
2018/904
Quantum security proofs using semi-classical oracles
Andris Ambainis, Mike Hamburg, Dominique Unruh
2018/903
Hybrid Key Encapsulation Mechanisms and Authenticated Key Exchange
Nina Bindel, Jacqueline Brendel, Marc Fischlin, Brian Goncalves, Douglas Stebila
2018/902
ProximiTEE: Hardened SGX Attestation by Proximity Verification
Aritra Dhar, Evan Puddu, Kari Kostiainen, Srdjan Capkun
2018/901
On the Complexity of Fair Coin Flipping
Iftach Haitner, Nikolaos Makriyannis, Eran Omri
2018/900
Enhancements Are Blackbox Non-Trivial: Impossibility of Enhanced Trapdoor Permutations from Standard Trapdoor Permutations
Mohammad Hajiabadi
2018/899
Differential Cryptanalysis of Round-Reduced SPECK
Ashutosh Dhar Dwivedi, Pawel Morawiecki
2018/898
Differential Cryptanalysis in ARX Ciphers with specific applications to LEA
Ashutosh Dhar Dwivedi, Gautam Srivastava
2018/897
Traitor-Tracing from LWE Made Simple and Attribute-Based
Yilei Chen, Vinod Vaikuntanathan, Brent Waters, Hoeteck Wee, Daniel Wichs
2018/896
Proofs of Ignorance and Applications to 2-Message Witness Hiding
Apoorvaa Deshpande, Yael Kalai
2018/895
Weak Zero-Knowledge Beyond the Black-Box Barrier
Nir Bitansky, Dakshita Khurana, Omer Paneth
2018/894
Perfect Secure Computation in Two Rounds
Benny Applebaum, Zvika Brakerski, Rotem Tsabary
2018/893
Blockchain as cryptanalytic tool
Manfred Lochter
2018/892
OptORAMa: Optimal Oblivious RAM
Gilad Asharov, Ilan Komargodski, Wei-Kai Lin, Kartik Nayak, Enoch Peserico, Elaine Shi
2018/891
Breaking a Lightweight M2M Authentication Protocol for Communications in IIoT Environment
Seyed Farhad Aghili, Hamid Mala
2018/890
A Bit-fixing PRF with O(1) Collusion-Resistance from LWE
Alex Davidson, Ryo Nishimaki
2018/889
Bidirectional Asynchronous Ratcheted Key Agreement with Linear Complexity
F. Betül Durak, Serge Vaudenay
2018/888
Energy-Efficient ARM64 Cluster with Cryptanalytic Applications: 80 Cores That Do Not Cost You an ARM and a Leg
Thom Wiggers
2018/887
Classical Proofs for the Quantum Collapsing Property of Classical Hash Functions
Serge Fehr
2018/886
Towards Isogeny-Based Password-Authenticated Key Establishment
Oleg Taraskin, Vladimir Soukharev, David Jao, Jason LeGrow
2018/885
PASTA: PASsword-based Threshold Authentication
Shashank Agrawal, Peihan Miao, Payman Mohassel, Pratyay Mukherjee
2018/884
Key Encapsulation from Noisy Key Agreement in the Quantum Random Oracle Model
Alan Szepieniec, Reza Reyhanitabar, Bart Preneel
2018/883
Public Key Encryption Resilient to Post-Challenge Leakage and Tampering Attacks
Suvradip Chakraborty, C. Pandu Rangan
2018/882
Pre- and post-quantum Diffie--Hellman from groups, actions, and isogenies
Benjamin Smith
2018/881
Remote Inter-Chip Power Analysis Side-Channel Attacks at Board-Level
Falk Schellenberg, Dennis R. E. Gnad, Amir Moradi, Mehdi B. Tahoori
2018/880
Spread: a new layer for profiled deep-learning side-channel attacks
Christophe Pfeifer, Patrick Haddad
2018/879
Efficient Group Signature Scheme without Pairings
Ke Gu, Bo Yin
2018/878
RSA Signatures Under Hardware Restrictions
Marc Joye, Yan Michalevsky
2018/877
On QA-NIZK in the BPK Model
Behzad Abdolmaleki, Helger Lipmaa, Janno Siim, Michał Zając
2018/876
Identity Confidentiality in 5G Mobile Telephony Systems
Haibat Khan, Benjamin Dowling, Keith M. Martin
2018/875
Oblivious Transfer in Incomplete Networks
Varun Narayanan, Vinod M. Prabhakaran
2018/874
Enhanced Security of Attribute-Based Signatures
Johannes Blömer, Fabian Eidens, Jakob Juhnke
2018/873
TACHYON: Fast Signatures from Compact Knapsack
Rouzbeh Behnia, Muslum Ozgur Ozmen, Attila A. Yavuz, Mike Rosulek
2018/872
New Techniques for Efficient Trapdoor Functions and Applications
Sanjam Garg, Romain Gay, Mohammad Hajiabadi
2018/871
Non-profiled Mask Recovery: the impact of Independent Component Analysis
Si Gao, Elisabeth Oswald, Hua Chen, Wei Xi
2018/870
Unifying Kleptographic Attacks
George Teseleanu
2018/869
Higher-Order DCA against Standard Side-Channel Countermeasures
Andrey Bogdanov, Matthieu Rivain, Philip S. Vejre, Junwei Wang
2018/868
S-Mbank: Secure Mobile Banking Authentication Scheme Using Signcryption, Pair Based Text Authentication, and Contactless Smartcard
Dea Saka Kurnia Putra, Mohamad Ali Sadikin, Susila Windarta
2018/867
Poly-Logarithmic Side Channel Rank Estimation via Exponential Sampling
Liron David, Avishai Wool
2018/866
Output Compression, MPC, and iO for Turing Machines
Saikrishna Badrinarayanan, Rex Fernando, Venkata Koppula, Amit Sahai, Brent Waters
2018/865
Multiplicative Masking for AES in Hardware
Lauren De Meyer, Oscar Reparaz, Begül Bilgin
2018/864
Optimistic Mixing, Revisited
Antonio Faonio, Dario Fiore
2018/863
Helix: A Scalable and Fair Consensus Algorithm Resistant to Ordering Manipulation
Avi Asayag, Gad Cohen, Ido Grayevsky, Maya Leshkowitz, Ori Rottenstreich, Ronen Tamari, David Yakira
2018/862
Attacking RO-PUFs with Enhanced Challenge-Response Pairs
Nils Wisiol, Marian Margraf
2018/861
Delegating Computations with (almost) Minimal Time and Space Overhead
Justin Holmgren, Ron D. Rothblum
2018/860
Encrypted Databases for Differential Privacy
Archita Agarwal, Maurice Herlihy, Seny Kamara, Tarik Moataz
2018/859
Cryptanalysis of Low-Data Instances of Full LowMCv2
Christian Rechberger, Hadi Soleimany, Tyge Tiessen
2018/858
Stronger Security for Sanitizable Signatures
Stephan Krenn, Kai Samelin, Dieter Sommer
2018/857
Raptor: A Practical Lattice-Based (Linkable) Ring Signature
Xingye Lu, Man Ho Au, Zhenfei Zhang
2018/856
Measuring, simulating and exploiting the head concavity phenomenon in BKZ
Shi Bai, Damien Stehlé, Weiqiang Wen
2018/855
On the Security of the PKCS#1 v1.5 Signature Scheme
Tibor Jager, Saqib A. Kakvi, Alexander May
2018/854
Universal Multi-Party Poisoning Attacks
Saeed Mahloujifar, Mahammad Mahmoody, Ameer Mohammed
2018/853
Towards a Smart Contract-based, Decentralized, Public-Key Infrastructure
Christos Patsonakis, Katerina Samari, Mema Roussopoulos, Aggelos Kiayias
2018/852
Fault Attacks on Nonce-based Authenticated Encryption: Application to Keyak and Ketje
Christoph Dobraunig, Stefan Mangard, Florian Mendel, Robert Primas
2018/851
More is Less: Perfectly Secure Oblivious Algorithms in the Multi-Server Setting
T-H. Hubert Chan, Jonathan Katz, Kartik Nayak, Antigoni Polychroniadou, Elaine Shi
2018/850
Computing supersingular isogenies on Kummer surfaces
Craig Costello
2018/849
Improved (Almost) Tightly-Secure Simulation-Sound QA-NIZK with Applications
Masayuki Abe, Charanjit S. Jutla, Miyako Ohkubo, Arnab Roy
2018/848
A Universally Composable Framework for the Privacy of Email Ecosystems
Pyrros Chaidos, Olga Fourtounelli, Aggelos Kiayias, Thomas Zacharias
2018/847
Realizing Chosen Ciphertext Security Generically in Attribute-Based Encryption and Predicate Encryption
Venkata Koppula, Brent Waters
2018/846
Strong Leakage Resilient Encryption: Enhancing Data Confidentiality by Hiding Partial Ciphertext
Jia Xu, Jianying Zhou
2018/845
A Framework for Achieving KDM-CCA Secure Public-Key Encryption
Fuyuki Kitagawa, Keisuke Tanaka
2018/844
Simulatable Channels: Extended Security that is Universally Composable and Easier to Prove
Jean Paul Degabriele, Marc Fischlin
2018/843
Concretely Efficient Large-Scale MPC with Active Security (or, TinyKeys for TinyOT)
Carmit Hazay, Emmanuela Orsini, Peter Scholl, Eduardo Soria-Vazquez
2018/842
Attribute-Based Signatures for Unbounded Languages from Standard Assumptions
Yusuke Sakai, Shuichi Katsumata, Nuttapong Attrapadung, Goichiro Hanaoka
2018/841
Building Quantum-One-Way Functions from Block Ciphers: Davies-Meyer and Merkle-Damgård Constructions
Akinori Hosoyamada, Kan Yasuda
2018/840
Universal Proxy Re-Encryption
Nico Döttling, Ryo Nishimaki
2018/839
On Kummer Lines With Full Rational 2-torsion and Their Usage in Cryptography
Huseyin Hisil, Joost Renes
2018/838
(Tightly) QCCA-Secure Key-Encapsulation Mechanism in the Quantum Random Oracle Model
Keita Xagawa, Takashi Yamakawa
2018/837
Constructing Ideal Secret Sharing Schemes based on Chinese Remainder Theorem
Yu Ning, Fuyou Miao, Wenchao Huang, Keju Meng, Yan Xiong, Xingfu Wang
2018/836
Pitchforks in Cryptocurrencies: Enforcing rule changes through offensive forking- and consensus techniques
Aljosha Judmayer, Nicholas Stifter, Philipp Schindler, Edgar Weippl
2018/835
Fully-Featured Anonymous Credentials with Reputation System
Kai Bemmann, Johannes Blömer, Jan Bobolz, Henrik Bröcher, Denis Diemert, Fabian Eidens, Lukas Eilers, Jan Haltermann, Jakob Juhnke, Burhan Otour, Laurens Porzenheim, Simon Pukrop, Erik Schilling, Michael Schlichtig, Marcel Stienemeier
2018/834
Identity-based Encryption Tightly Secure under Chosen-ciphertext Attacks
Dennis Hofheinz, Dingding Jia, Jiaxin Pan
2018/833
Improved Inner-product Encryption with Adaptive Security and Full Attribute-hiding
Jie Chen, Junqing Gong, Hoeteck Wee
2018/832
Lightweight and Side-channel Secure 4x4 S-Boxes from Cellular Automata Rules
Ashrujit Ghoshal, Rajat Sadhukhan, Sikhar Patranabis, Nilanjan Datta, Stjepan Picek, Debdeep Mukhopadhyay
2018/831
Practical Attack on RaCoSS-R
Keita Xagawa
2018/830
A remark on a success rate model fpr DPA and CPA
Andreas Wiemers
2018/829
Information-Theoretic Broadcast with Dishonest Majority for Long Messages
Wutichai Chongchitmate, Rafail Ostrovsky
2018/828
Aurora: Transparent Succinct Arguments for R1CS
Eli Ben-Sasson, Alessandro Chiesa, Michael Riabzev, Nicholas Spooner, Madars Virza, Nicholas P. Ward
2018/827
Practical Strategy-Resistant Privacy-Preserving Elections
Sébastien Canard, David Pointcheval, Quentin Santos, Jacques Traoré
2018/826
Simple and More Efficient PRFs with Tight Security from LWE and Matrix-DDH
Tibor Jager, Rafael Kurek, Jiaxin Pan
2018/825
Low Randomness Masking and Shuffling: An Evaluation Using Mutual Information
Kostas Papagiannopoulos
2018/824
SeaSign: Compact isogeny signatures from class group actions
Luca De Feo, Steven D. Galbraith
2018/823
The Security of Lazy Users in Out-of-Band Authentication
Moni Naor, Lior Rotem, Gil Segev
2018/822
LWE Without Modular Reduction and Improved Side-Channel Attacks Against BLISS
Jonathan Bootle, Claire Delaplace, Thomas Espitau, Pierre-Alain Fouque, Mehdi Tibouchi
2018/821
Side-channel Assisted Existential Forgery Attack on Dilithium - A NIST PQC candidate
Prasanna Ravi, Mahabir Prasad Jhanwar, James Howe, Anupam Chattopadhyay, Shivam Bhasin
2018/820
Privacy Loss Classes: The Central Limit Theorem in Differential Privacy
David Sommer, Sebastian Meiser, Esfandiar Mohammadi
2018/819
ZCZ - Achieving n-bit SPRP Security with a Minimal Number of Tweakable-block-cipher Calls
Ritam Bhaumik, Eik List, Mridul Nandi
2018/818
Robustly Reusable Fuzzy Extractor from Standard Assumptions
Yunhua Wen, Shengli Liu
2018/817
Understanding and Constructing AKE via Double-key Key Encapsulation Mechanism
Haiyang Xue, Xianhui Lu, Bao Li, Bei Liang, Jingnan He
2018/816
Revisiting Key-alternating Feistel Ciphers for Shorter Keys and Multi-user Security
Chun Guo, Lei Wang
2018/815
Estimation of the Success Probability of Random Sampling by the Gram-Charlier Approximation
Yoshitatsu Matsuda, Tadanori Teruya, Kenji Kasiwabara
2018/814
White-Box Implementation of the Identity-Based Signature Scheme in the IEEE P1363 Standard for Public Key Cryptography
Yudi Zhang, Debiao He, Xinyi Huang, Ding Wang, Kim-Kwang Raymond Choo
2018/813
Programming the Demirci-Sel{ç}uk Meet-in-the-Middle Attack with Constraints
Danping Shi, Siwei Sun, Patrick Derbez, Yosuke Todo, Bing Sun, Lei Hu
2018/812
Injective Trapdoor Functions via Derandomization: How Strong is Rudich’s Black-Box Barrier?
Lior Rotem, Gil Segev
2018/811
Reconstructing an S-box from its Difference Distribution Table
Orr Dunkelman, Senyang Huang
2018/810
Cube-Attack-Like Cryptanalysis of Round-Reduced Keccak Using MILP
Ling Song, Jian Guo
2018/809
Algebraic Cryptanalysis of Frit
Christoph Dobraunig, Maria Eichlseder, Florian Mendel, and Markus Schofnegger
2018/808
Data Oblivious ISA Extensions for Side Channel-Resistant and High Performance Computing
Jiyong Yu, Lucas Hsiung, Mohamad El Hajj, Christopher W. Fletcher
2018/807
On the Existence of Non-Linear Invariants and Algebraic Polynomial Constructive Approach to Backdoors in Block Ciphers
Nicolas T. Courtois
2018/806
Guards in Action: First-Order SCA Secure Implementations of Ketje without Additional Randomness
Victor Arribas, Svetla Nikova, Vincent Rijmen
2018/805
Beetle Family of Lightweight and Secure Authenticated Encryption Ciphers
Avik Chakraborti, Nilanjan Datta, Mridul Nandi, Kan Yasuda
2018/804
Double-block Hash-then-Sum: A Paradigm for Constructing BBB Secure PRF
Nilanjan Datta, Avijit Dutta, Mridul Nandi, Goutam Paul
2018/803
BITE: Bitcoin Lightweight Client Privacy using Trusted Execution
Sinisa Matetic, Karl Wüst, Moritz Schneider, Kari Kostiainen, Ghassan Karame, Srdjan Capkun
2018/802
Secure Modulo Zero-Sum Randomness as Cryptographic Resource
Masahito Hayashi, Takeshi Koshiba
2018/801
Faster PCA and Linear Regression through Hypercubes in HElib
Deevashwer Rathee, Pradeep Kumar Mishra, Masaya Yasuda
2018/800
Security of the Blockchain against Long Delay Attack
Puwen Wei, Quan Yuan, Yuliang Zheng
2018/799
Finding Ordinary Cube Variables for Keccak-MAC with Greedy Algorithm
Fukang Liu, Zhenfu Cao, Gaoli Wang
2018/798
Recovering Secrets From Prefix-Dependent Leakage
Houda Ferradi, Rémi Géraud, Sylvain Guilley, David Naccache, Mehdi Tibouchi
2018/797
Quantum algorithms for computing general discrete logarithms and orders with tradeoffs
Martin Ekerå
2018/796
On relations between CCZ- and EA-equivalences
Lilya Budaghyan, Marco Calderini, Irene Villa
2018/795
Solving ECDLP via List Decoding
Fangguo Zhang, Shengli Liu
2018/794
Blending FHE-NTRU keys – The Excalibur Property
Louis Goubin, Francisco Vial-Prado
2018/793
Universal Forgery and Multiple Forgeries of MergeMAC and Generalized Constructions
Tetsu Iwata, Virginie Lallemand, Gregor Leander, Yu Sasaki
2018/792
Faster Modular Arithmetic For Isogeny Based Crypto on Embedded Devices
Joppe W. Bos, Simon J. Friedberger
2018/791
Practical Fully Secure Unrestricted Inner Product Functional Encryption modulo $p$
Guilhem Castagnos, Fabien Laguillaumie, Ida Tucker
2018/790
Generic Double-Authentication Preventing Signatures and a Post-Quantum Instantiation
David Derler, Sebastian Ramacher, Daniel Slamanig
2018/789
Free IF: How to Omit Inactive Branches and Implement S-Universal Garbled Circuit (Almost) for Free
Vladimir Kolesnikov
2018/788
Privacy-preserving certificate linkage/revocation in VANETs without Linkage Authorities
Marcos A. Simplicio Jr., Eduardo Lopes Cominetti, Harsh Kupwade Patil, Jefferson E. Ricardini, Leonardo T. D. Ferraz, Marcos Vinicius M. Silva
2018/787
Labeled PSI from Fully Homomorphic Encryption with Malicious Security
Hao Chen, Zhicong Huang, Kim Laine, Peter Rindal
2018/786
Discrete Gaussian Measures and New Bounds of the Smoothing Parameter for Lattices
Zhongxiang Zheng, Guangwu Xu, Chunhuan Zhao
2018/785
Efficiently Processing Complex-Valued Data in Homomorphic Encryption
Carl Bootland, Wouter Castryck, Ilia Iliashenko, Frederik Vercauteren
2018/784
Tweakable Block Ciphers Secure Beyond the Birthday Bound in the Ideal Cipher Model
ByeongHak Lee, Jooyoung Lee
2018/783
Short Variable Length Domain Extenders With Beyond Birthday Bound Security
Yu Long Chen, Bart Mennink, Mridul Nandi
2018/782
A faster way to the CSIDH
Michael Meyer, Steffen Reith
2018/781
Leakage-Resilient Cryptography from Puncturable Primitives and Obfuscation
Yu Chen, Yuyu Wang, Hong-sheng Zhou
2018/780
A Game Theoretic Analysis of Resource Mining in Blockchain
Rajani Singh, Ashutosh Dhar Dwivedi, Gautam Srivastava, Agnieszka Wiszniewska-Matyszkiel, Xiaochun Cheng
2018/779
Lattice-Based Group Signatures and Zero-Knowledge Proofs of Automorphism Stability
Rafael del Pino, Vadim Lyubashevsky, Gregor Seiler
2018/778
PPP-Completeness with Connections to Cryptography
Katerina Sotiraki, Manolis Zampetakis, Giorgos Zirdelis
2018/777
Delegation of Decryption Rights with Revocability from Learning with Errors
Wei Yin, Qiaoyan Wen, Kaitai Liang, Zhenfei Zhang, Liqun Chen, Hanbing Yan, Hua Zhang
2018/776
On Publicly Verifiable Delegation From Standard Assumptions
Yael Kalai, Omer Paneth, Lisa Yang
2018/775
The Fiat-Shamir Zoo: Relating the Security of Different Signature Variants
Matilda Backendal, Mihir Bellare, Jessica Sorrell, Jiahao Sun
2018/774
Thring Signatures and their Applications to Spender-Ambiguous Digital Currencies
Brandon Goodell, Sarang Noether
2018/773
Short Lattice-based One-out-of-Many Proofs and Applications to Ring Signatures
Muhammed F. Esgin, Ron Steinfeld, Amin Sakzad, Joseph K. Liu, Dongxi Liu
2018/772
Linear Equivalence of Block Ciphers with Partial Non-Linear Layers: Application to LowMC
Itai Dinur, Daniel Kales, Angela Promitzer, Sebastian Ramacher, Christian Rechberger
2018/771
A Simple Construction of iO for Turing Machines
Sanjam Garg, Akshayaram Srinivasan
2018/770
Combiners for Backdoored Random Oracles
Balthazar Bauer, Pooya Farshim, Sogol Mazaheri
2018/769
Constructing APN functions through isotopic shifts
Lilya Budaghyan, Marco Calderini, Claude Carlet, Robert S. Coulter, Irene Villa
2018/768
DRANKULA: a McEliece-like rank metric based cryptosystem implementation
Ameera Salem Al Abdouli, Mohamed Al Ali, Emanuele Bellini, Florian Caullery, Alexandros Hasikos, Marc Manzano, Victor Mateu
2018/767
Xoodoo cookbook
Joan Daemen, Seth Hoffert, Michaël Peeters, Gilles Van Assche, Ronny Van Keer
2018/766
Noise Explorer: Fully Automated Modeling and Verification for Arbitrary Noise Protocols
Nadim Kobeissi, Georgio Nicolas, Karthikeyan Bhargavan
2018/765
Symbolic Proofs for Lattice-Based Cryptography
Gilles Barthe, Xiong Fan, Joshua Gancher, Benjamin Grégoire, Charlie Jacomme, Elaine Shi
2018/764
Generating Graphs Packed with Paths
Mathias Hall-Andersen, Philip S. Vejre
2018/763
Block Cipher Invariants as Eigenvectors of Correlation Matrices (Full Version)
Tim Beyne
2018/762
Generalizing the SPDZ Compiler For Other Protocols
Toshinori Araki, Assi Barak, Jun Furukawa, Marcel Keller, Yehuda Lindell, Kazuma Ohara, Hikaru Tsuchida
2018/761
New Single-Trace Side-Channel Attacks on a Specific Class of Elgamal Cryptosystem
Parinaz Mahdion, Hadi Soleimany, Pouya Habibi, Farokhlagha Moazami
2018/760
Strongly Secure Authenticated Key Exchange from Supersingular Isogenies
Xiu Xu, Haiyang Xue, Kunpeng Wang, Man Ho Au, Bei Liang, Song Tian
2018/759
Succinct Garbling Schemes from Functional Encryption through a Local Simulation Paradigm
Prabhanjan Ananth, Alex Lombardi
2018/758
CHIMERA: Combining Ring-LWE-based Fully Homomorphic Encryption Schemes
Christina Boura, Nicolas Gama, Mariya Georgieva, Dimitar Jetchev
2018/757
Cryptography for Human Senses
Kimmo Halunen, Outi-Marja Latvala
2018/756
Obfuscation Using Tensor Products
Craig Gentry, Charanjit S. Jutla, Daniel Kane
2018/755
Simulation-Based Selective Opening Security for Receivers under Chosen-Ciphertext Attacks
Zhengan Huang, Junzuo Lai, Wenbin Chen, Man Ho Au, Zhen Peng, Jin Li
2018/754
SoK: A Consensus Taxonomy in the Blockchain Era
Juan Garay, Aggelos Kiayias
2018/753
Decentralized Policy-Hiding Attribute-Based Encryption with Receiver Privacy
Yan Michalevsky, Marc Joye
2018/752
Isogeny Secrets can be Traded
David Urbanik
2018/751
An End-to-End System for Large Scale P2P MPC-as-a-Service and Low-Bandwidth MPC for Weak Participants
Assi Barak, Martin Hirt, Lior Koskas, Yehuda Lindell
2018/750
Non-Malleable Secret Sharing for General Access Structures
Vipul Goyal, Ashutosh Kumar
2018/749
Prime and Prejudice: Primality Testing Under Adversarial Conditions
Martin R. Albrecht, Jake Massimo, Kenneth G. Paterson, Juraj Somorovsky
2018/748
Definitions for Plaintext-Existence Hiding in Cloud Storage
Colin Boyd, Gareth T. Davies, Kristian Gjøsteen, Håvard Raddum, Mohsen Toorani
2018/747
Pseudo Constant Time Implementations of TLS Are Only Pseudo Secure
Eyal Ronen, Kenneth G. Paterson, Adi Shamir
2018/746
Secret Sharing with Binary Shares
Fuchun Lin, Mahdi Cheraghchi, Venkatesan Guruswami, Reihaneh Safavi-Naini, Huaxiong Wang
2018/745
Achilles' Heel: the Unbalanced Mask Sets May Destroy a Masking Countermeasure
Jingdian Ming, Wei Cheng, Huizhong Li, Guang Yang, Yongbin Zhou, Qian Zhang
2018/744
BAdASS: Preserving Privacy in Behavioural Advertising with Applied Secret Sharing
Leon J. Helsloot, Gamze Tillem, Zekeriya Erkin
2018/743
On the Leakage of Corrupted Garbled Circuits
Aurélien Dupin, David Pointcheval, Christophe Bidan
2018/742
Witness-Indistinguishable Arguments with $\Sigma$-Protocols for Bundled Witness Spaces and its Application to Global Identities
Hiroaki Anada, Seiko Arita
2018/741
LP Solutions of Vectorial Integer Subset Sums - Cryptanalysis of Galbraith's Binary Matrix LWE
Alexander May, Gottfried Herold
2018/740
FairSwap: How to fairly exchange digital goods
Stefan Dziembowski, Lisa Eckey, Sebastian Faust
2018/739
Using MILP in Analysis of Feistel Structures and Improving Type II GFS by Switching Mechanism
Mahdi Sajadieh, Mohammad Vaziri
2018/738
Towards Static Assumption Based Cryptosystem in Pairing Setting: Further Applications of DéjàQ and Dual-Form Signature
Sanjit Chatterjee, R. Kabaleeshwaran
2018/737
Steady: A Simple End-to-End Secure Logging System
Tobias Pulls, Rasmus Dahlberg
2018/736
Improved Signature Schemes for Secure Multi-Party Computation with Certified Inputs
Marina Blanton, Myoungin Jeong
2018/735
AntNest: Fully Non-interactive Secure Multi-party Computation
Lijing Zhou, Licheng Wang, Yiru Sun, Tianyi Ai
2018/734
Random Number Generators Can Be Fooled to Behave Badly
George Teseleanu
2018/733
Threshold Partially-Oblivious PRFs with Applications to Key Management
Stanislaw Jarecki, Hugo Krawczyk, Jason Resch
2018/732
Data Oblivious Genome Variants Search on Intel SGX
Avradip Mandal, John C. Mitchell, Hart Montgomery, Arnab Roy
2018/731
An Optimal Distributed Discrete Log Protocol with Applications to Homomorphic Secret Sharing
Itai Dinur, Nathan Keller, Ohad Klein
2018/730
Supersingular Isogeny Diffie-Hellman Authenticated Key Exchange
Atsushi Fujioka, Katsuyuki Takashima, Shintaro Terada, Kazuki Yoneyama
2018/729
Towards Lightweight Cryptographic Primitives with Built-in Fault-Detection
Thierry Simon, Lejla Batina, Joan Daemen, Vincent Grosso, Pedro Maat Costa Massolino, Kostas Papagiannopoulos, Francesco Regazzoni, Niels Samwel
2018/728
A $k$-out-of-$n$ Ring Signature with Flexible Participation for Signers
Takeshi Okamoto, Raylin Tso, Michitomo Yamaguchi, Eiji Okamoto
2018/727
DiSE: Distributed Symmetric-key Encryption
Shashank Agrawal, Payman Mohassel, Pratyay Mukherjee, Peter Rindal
2018/726
Towards Key-Dependent Integral and Impossible Differential Distinguishers on 5-Round AES
Kai Hu, Tingting Cui, Chao Gao, Meiqin Wang
2018/725
Round5: KEM and PKE based on GLWR
Sauvik Bhattacharya, Oscar Garcia-Morchon, Thijs Laarhoven, Ronald Rietman, Markku-Juhani O. Saarinen, Ludo Tolhuizen, Zhenfei Zhang
2018/724
Rethinking Secure FPGAs: Towards a Cryptography-friendly Configurable Cell Architecture and its Automated Design Flow
Nele Mentens, Edoardo Charbon, Francesco Regazzoni
2018/723
Shorter Messages and Faster Post-Quantum Encryption with Round5 on Cortex M
Markku-Juhani O. Saarinen, Sauvik Bhattacharya, Oscar Garcia-Morchon, Ronald Rietman, Ludo Tolhuizen, Zhenfei Zhang
2018/722
uMine: a Blockchain based on Human Miners
Henning Kopp, Frank Kargl, Christoph Bösch, Andreas Peter
2018/721
Transparency Logs via Append-only Authenticated Dictionaries
Alin Tomescu, Vivek Bhupatiraju, Dimitrios Papadopoulos, Charalampos Papamanthou, Nikos Triandopoulos, Srinivas Devadas
2018/720
{Adiantum}: length-preserving encryption for entry-level processors
Paul Crowley, Eric Biggers
2018/719
Data Recovery on Encrypted Databases With k-Nearest Neighbor Query Leakage
Evgenios M. Kornaropoulos, Charalampos Papamanthou, Roberto Tamassia
2018/718
Cryptographic Pseudorandom Generators Can Make Cryptosystems Problematic
Koji Nuida
2018/717
Key Extraction using Thermal Laser Stimulation: A Case Study on Xilinx Ultrascale FPGAs
Heiko Lohrke, Shahin Tajik, Thilo Krachenfels, Christian Boit, Jean-Pierre Seifert
2018/716
Lattice-Based Zero-Knowledge Arguments for Integer Relations
Benoît Libert, San Ling, Khoa Nguyen, Huaxiong Wang
2018/715
Practical Attacks on Relational Databases Protected via Searchable Encryption
Mohamed Ahmed Abdelraheem, Tobias Andersson, Christian Gehrmann, Cornelius Glackin
2018/714
PKP-Based Signature Scheme
Ward Beullens, Jean-Charles Faugère, Eliane Koussa, Gilles Macario-Rat, Jacques Patarin, Ludovic Perret
2018/713
On CCZ-Equivalence, Extended-Affine Equivalence, and Function Twisting
Anne Canteaut, Léo Perrin
2018/712
A Survey of Two Verifiable Delay Functions
Dan Boneh, Benedikt Bünz, Ben Fisch
2018/711
Cryptanalysis of a Group Key Transfer Protocol Based on Secret Sharing: Generalization and Countermeasures
Kallepu Raju, Appala Naidu Tentuand, V. Ch. Venkaiah
2018/710
Fast Secure Computation for Small Population over the Internet
Megha Byali, Arun Joseph, Arpita Patra, Divya Ravi
2018/709
Simple oblivious transfer protocols compatible with Kummer and supersingular isogenies
Vanessa Vitse
2018/708
Masking the Lightweight Authenticated Ciphers ACORN and Ascon in Software
Alexandre Adomnicai, Jacques J. A. Fournier, Laurent Masson
2018/707
Function Secret Sharing: Improvements and Extensions
Elette Boyle, Niv Gilboa, Yuval Ishai
2018/706
Efficient 3-Party Distributed ORAM
Paul Bunn, Jonathan Katz, Eyal Kushilevitz, Rafail Ostrovsky
2018/705
Subvector Commitments with Application to Succinct Arguments
Russell W. F. Lai, Giulio Malavolta
2018/704
Verifiable Sealed-Bid Auction on the Ethereum Blockchain
Hisham S. Galal, Amr M. Youssef
2018/703
New Protocols for Secure Linear Algebra: Pivoting-Free Elimination and Fast Block-Recursive Matrix Decomposition
Niek J. Bouman, Niels de Vreede
2018/702
Tight Proofs of Space and Replication
Ben Fisch
2018/701
Secure Sketch for All Noisy Sources
Yen-Lung Lai
2018/700
SIDH on ARM: Faster Modular Multiplications for Faster Post-Quantum Supersingular Isogeny Key Exchange
Hwajeong Seo, Zhe Liu, Patrick Longa, Zhi Hu
2018/699
Correlated Sequence Attack on Reduced-Round Simon-32/64 and Simeck-32/64
Raghvendra Rohit, Guang Gong
2018/698
Parameter-Hiding Order Revealing Encryption
David Cash, Feng-Hao Liu, Adam O'Neill, Mark Zhandry, Cong Zhang
2018/697
AUDIT: Practical Accountability of Secret Processes
Jonathan Frankle, Sunoo Park, Daniel Shaar, Shafi Goldwasser, Daniel J. Weitzner
2018/696
Unbounded Inner Product Functional Encryption from Bilinear Maps
Junichi Tomida, Katsuyuki Takashima
2018/695
SPHINX: A Password Store that Perfectly Hides Passwords from Itself
Maliheh Shirvanian, Stanislaw Jarecki, Hugo Krawczyk, Nitesh Saxena
2018/694
Faster Privacy-Preserving Location Proximity Schemes
Kimmo Järvinen, Ágnes Kiss, Thomas Schneider, Oleksandr Tkachenko, Zheng Yang
2018/693
Efficient Side-Channel Protections of ARX Ciphers
Bernhard Jungk, Richard Petri, Marc Stöttinger
2018/692
New Configurations of Grain Ciphers: Security Against Slide Attacks
Diana Maimut, George Teseleanu
2018/691
DIZK: A Distributed Zero Knowledge Proof System
Howard Wu, Wenting Zheng, Alessandro Chiesa, Raluca Ada Popa, Ion Stoica
2018/690
Efficient KEA-Style Lattice-Based Authenticated Key Exchange
Zilong Wang, Honggang Hu
2018/689
Mind the Gap - A Closer Look at the Security of Block Ciphers against Differential Cryptanalysis
Ralph Ankele, Stefan Kölbl
2018/688
Finding Integral Distinguishers with Ease
Zahra Eskandari, Andreas Brasen Kidmose, Stefan Kölbl, Tyge Tiessen
2018/687
Assessing the Feasibility of Single Trace Power Analysis of Frodo
Joppe W. Bos, Simon Friedberger, Marco Martinoli, Elisabeth Oswald, Martijn Stam
2018/686
Standard Lattice-Based Key Encapsulation on Embedded Devices
James Howe, Tobias Oder, Markus Krausz, Tim Güneysu
2018/685
On Trade-offs of Applying Block Chains for Electronic Voting Bulletin Boards
Sven Heiberg, Ivo Kubjas, Janno Siim, Jan Willemson
2018/684
PIEs: Public Incompressible Encodings for Decentralized Storage
Ethan Cecchetti, Ben Fisch, Ian Miers, Ari Juels
2018/683
Usability is not Enough: Lessons Learned from 'Human Factors in Security' Research for Verifiability
Oksana Kulyk, Melanie Volkamer
2018/682
Saber on ARM CCA-secure module lattice-based key encapsulation on ARM
Angshuman Karmakar, Jose Maria Bermudo Mera, Sujoy Sinha Roy, Ingrid Verbauwhede
2018/681
A Reusable Fuzzy Extractor with Practical Storage Size
Jung Hee Cheon, Jinhyuck Jeong, Dongwoo Kim, Jongchan Lee
2018/680
Related-Tweakey Impossible Differential Attack on Reduced-Round Deoxys-BC-256
Rui Zong, Xiaoyang Dong, Xiaoyun Wang
2018/679
DeepChain: Auditable and Privacy-Preserving Deep Learning with Blockchain-based Incentive
Jiasi Weng, Jian Weng, Jilian Zhang, Ming Li, Yue Zhang, Weiqi Luo
2018/678
PoReps: Proofs of Space on Useful Data
Ben Fisch
2018/677
Module-lattice KEM Over a Ring of Dimension 128 for Embedded Systems
François Gérard
2018/676
Static Power Side-Channel Analysis - An Investigation of Measurement Factors
Thorben Moos, Amir Moradi, Bastian Richter
2018/675
A signature scheme from the finite field isomorphism problem
Jeffrey Hoffstein, Joseph H. Silverman, William Whyte, Zhenfei Zhang
2018/674
Practical Fault Injection Attacks on SPHINCS
Aymeric Genêt, Matthias J. Kannwischer, Hervé Pelletier, Andrew McLauchlan
2018/673
Differential Power Analysis of XMSS and SPHINCS
Matthias J. Kannwischer, Aymeric Genêt, Denis Butin, Juliane Krämer, Johannes Buchmann
2018/672
Cold Boot Attacks on Ring and Module LWE Keys Under the NTT
Martin R. Albrecht, Amit Deo, Kenneth G. Paterson
2018/671
A Systematic Study of the Impact of Graphical Models on Inference-based Attacks on AES
Joey Green, Elisabeth Oswald, Arnab Roy
2018/670
Public Key Compression for Constrained Linear Signature Schemes
Ward Beullens, Bart Preneel, Alan Szepieniec
2018/669
Faster cofactorization with ECM using mixed representations
Cyril Bouvier, Laurent Imbert
2018/668
Breaking Message Integrity of an End-to-End Encryption Scheme of LINE
Takanori Isobe, Kazuhiko Minematsu
2018/667
On Hardware Implementation of Tang-Maitra Boolean Functions
Mustafa Khairallah, Anupam Chattopadhyay, Bimal Mandal, Subhamoy Maitra
2018/666
Reproducible Families of Codes and Cryptographic Applications
Paolo Santini, Edoardo Persichetti, Marco Baldi
2018/665
Multiparty Non-Interactive Key Exchange and More From Isogenies on Elliptic Curves
Dan Boneh, Darren Glass, Daniel Krashen, Kristin Lauter, Shahed Sharif, Alice Silverberg, Mehdi Tibouchi, Mark Zhandry
2018/664
Public Accountability vs. Secret Laws: Can They Coexist?
Shafi Goldwasser, Sunoo Park
2018/663
Fast Secure Matrix Multiplications over Ring-Based Homomorphic Encryption
Pradeep Kumar Mishra, Deevashwer Rathee, Dung Hoang Duong, Masaya Yasuda
2018/662
Efficient Logistic Regression on Large Encrypted Data
Kyoohyung Han, Seungwan Hong, Jung Hee Cheon, Daejun Park
2018/661
Exploring Deployment Strategies for the Tor Network
Christoph Döpmann, Sebastian Rust, Florian Tschorsch
2018/660
A New Blind ECDSA Scheme for Bitcoin Transaction Anonymity
Xun Yi, Kwok-Yan Lam, Dieter Gollmann
2018/659
On the Menezes-Teske-Weng’s conjecture
Sihem Mesnager, Kwang Ho Kim, Junyop Choe, Chunming Tang
2018/658
Blockchained Post-Quantum Signatures
Konstantinos Chalkias, James Brown, Mike Hearn, Tommy Lillehagen, Igor Nitto, Thomas Schroeter
2018/657
Platform-independent Secure Blockchain-Based Voting System
Bin Yu, Joseph Liu, Amin Sakzad, Surya Nepal, Paul Rimba, Ron Steinfeld, Man Ho Au
2018/656
FPGA Cluster based high performance Cryptanalysis framework
Abhishek Bajpai, S V Kulgod
2018/655
Loamit: A Blockchain-based Residual Loanable-limit Query System
Lijing Zhou, Licheng Wang, Yiru Sun, Pin Lv
2018/654
Proofs of Replicated Storage Without Timing Assumptions
Ivan Damgård, Chaya Ganesh, Claudio Orlandi
2018/653
Homomorphic Evaluation of Lattice-Based Symmetric Encryption Schemes
Pierre-Alain Fouque, Benjamin Hadjibeyli, Paul Kirchner
2018/652
Efficient Collision Attack Frameworks for RIPEMD-160
Fukang Liu, Christoph Dobraunig, Florian Mendel, Takanori Isobe, Gaoli Wang, Zhenfu Cao
2018/651
Side-Channel Analysis of SM2: A Late-Stage Featurization Case Study
Nicola Tuveri, Sohaib ul Hassan, Cesar Pereida García, Billy Brumley
2018/650
Designing Efficient Dyadic Operations for Cryptographic Applications
Gustavo Banegas, Paulo S. L. M. Barreto, Edoardo Persichetti, Paolo Santini
2018/649
No-signaling Linear PCPs
Susumu Kiyoshima
2018/648
Semi-Commutative Masking: A Framework for Isogeny-based Protocols, with an Application to Fully Secure Two-Round Isogeny-based OT
Cyprien Delpech de Saint Guilhem, Emmanuela Orsini, Christophe Petit, Nigel P. Smart
2018/647
A new perspective on the powers of two descent for discrete logarithms in finite fields
Thorsten Kleinjung, Benjamin Wesolowski
2018/646
Pseudo Flawed-Smudging Generators and Their Application to Indistinguishability Obfuscation
Huijia Lin, Christian Matt
2018/645
Mitigating the One-Use Restriction in Attribute-Based Encryption
Lucas Kowalczyk, Jiahui Liu, Kailash Meiyappan, Tal Malkin
2018/644
Hide The Modulus: A Secure Non-Interactive Fully Verifiable Delegation Scheme for Modular Exponentiations via CRT
Osmanbey Uzunkol, Jothi Rangasamy, Lakshmi Kuppusamy
2018/643
XCLAIM: Trustless, Interoperable Cryptocurrency-Backed Assets
Alexei Zamyatin, Dominik Harz, Joshua Lind, Panayiotis Panayiotou, Arthur Gervais, William J. Knottenbelt
2018/642
Commit-Chains: Secure, Scalable Off-Chain Payments
Rami Khalil, Alexei Zamyatin, Guillaume Felley, Pedro Moreno-Sanchez, Arthur Gervais
2018/641
Membership Privacy for Fully Dynamic Group Signatures
Michael Backes, Lucjan Hanzlik, Jonas Schneider
2018/640
Lower Bounds on Structure-Preserving Signatures for Bilateral Messages
Masayuki Abe, Miguel Ambrona, Miyako Ohkubo, Mehdi Tibouchi
2018/639
Function-Dependent Commitments for Verifiable Multi-Party Computation
Lucas Schabhüser, Denis Butin, Denise Demirel, Johanens Buchmann
2018/638
BurnBox: Self-Revocable Encryption in a World of Compelled Access
Nirvan Tyagi, Muhammad Haris Mughees, Thomas Ristenpart, Ian Miers
2018/637
Efficient Fully Homomorphic Encryption Scheme
Shuhong Gao
2018/636
Lattice-Based Dual Receiver Encryption and More
Daode Zhang, Kai Zhang, Bao Li, Xianhui Lu, Haiyang Xue, Jie Li
2018/635
On linear hulls in one round of DES
Tomer Ashur, Raluca Posteuca
2018/634
Partially Specified Channels: The TLS 1.3 Record Layer without Elision
Christopher Patton, Thomas Shrimpton
2018/633
New Methods for Indistinguishability Obfuscation: Bootstrapping and Instantiation
Shweta Agrawal
2018/632
CHARIOT: Cloud-Assisted Access Control for the Internet of Things
Clementine Gritti, Melek Onen, Refik Molva
2018/631
Efficient Construction of the Boomerang Connection Table
Orr Dunkelman
2018/630
Characterizing overstretched NTRU attacks
Gabrielle De Micheli, Nadia Heninger, Barak Shani
2018/629
Context Hiding Multi-Key Linearly Homomorphic Authenticators
Lucas Schabhüser, Denis Butin, Johannes Buchmann
2018/628
Dynamic Searchable Symmetric Encryption Schemes Supporting Range Queries with Forward (and Backward) Security
Cong Zuo, Shi-Feng Sun, Joseph K. Liu, Jun Shao, Josef Pieprzyk
2018/627
Simple Verifiable Delay Functions
Krzysztof Pietrzak
2018/626
Efficient Evaluation of Low Degree Multivariate Polynomials in Ring-LWE Homomorphic Encryption Schemes
Sergiu Carpov, Oana Stan
2018/625
Better Than Advertised: Improved Collision-Resistance Guarantees for MD-Based Hash Functions
Mihir Bellare, Joseph Jaeger, Julia Len
2018/624
Formal Analysis of Vote Privacy using Computationally Complete Symbolic Attacker
Gergei Bana, Rohit Chadha, Ajay Kumar Eeralla
2018/623
Efficient verifiable delay functions
Benjamin Wesolowski
2018/622
New techniques for Multi-value input Homomorphic Evaluation and Applications
Sergiu Carpov, Malika Izabachène, Victor Mollimard
2018/621
Cache-Attacks on the ARM TrustZone implementations of AES-256 and AES-256-GCM via GPU-based analysis
Ben Lapid, Avishai Wool
2018/620
STELLAR: A Generic EM Side-Channel Attack Protection through Ground-Up Root-cause Analysis
Debayan Das, Mayukh Nath, Baibhab Chatterjee, Santosh Ghosh, Shreyas Sen
2018/619
Is there an Oblivious RAM Lower Bound for Online Reads?
Mor Weiss, Daniel Wichs
2018/618
On some methods for constructing almost optimal S-Boxes and their resilience against side-channel attacks
Reynier Antonio de la Cruz Jiménez
2018/617
Two Notions of Differential Equivalence on Sboxes
Christina Boura, Anne Canteaut, Jérémy Jean, Valentin Suder
2018/616
Matrioska: A Compiler for Multi-Key Homomorphic Signatures
Dario Fiore, Elena Pagnin
2018/615
Indistinguishability Obfuscation Without Multilinear Maps: iO from LWE, Bilinear Maps, and Weak Pseudorandomness
Prabhanjan Ananth, Aayush Jain, Amit Sahai
2018/614
A Note on Key Rank
Daniel P. Martin, Marco Martinoli
2018/613
One-Message Zero Knowledge and Non-Malleable Commitments
Nir Bitansky, Huijia Lin
2018/612
Burning Zerocoins for Fun and for Profit: A Cryptographic Denial-of-Spending Attack on the Zerocoin Protocol
Tim Ruffing, Sri Aravinda Thyagarajan, Viktoria Ronge, Dominique Schröder
2018/611
Is Java Card ready for hash-based signatures?
Ebo van der Laan, Erik Poll, Joost Rijneveld, Joeri de Ruiter, Peter Schwabe, Jan Verschuren
2018/610
Hierarchical Attribute-based Signatures
Constantin-Catalin Dragan, Daniel Gardham, Mark Manulis
2018/609
Improved Results on Factoring General RSA Moduli with Known Bits
Mengce Zheng
2018/608
Domain-specific Accelerators for Ideal Lattice-based Public Key Protocols
Hamid Nejatollahi, Nikil Dutt, Indranil Banerjee, Rosario Cammarota
2018/607
SEEMless: Secure End-to-End Encrypted Messaging with less trust
Melissa Chase, Apoorvaa Deshpande, Esha Ghosh, Harjasleen Malvai
2018/606
Continuously Non-Malleable Codes with Split-State Refresh
Antonio Faonio, Jesper Buus Nielsen, Mark Simkin, Daniele Venturi
2018/605
N-term Karatsuba Algorithm and its Application to Multiplier designs for Special Trinomials
Yin Li, Yu Zhang, Xiaoli Guo, Chuanda Qi
2018/604
Attack on Kayawood Protocol: Uncloaking Private Keys
Matvei Kotov, Anton Menshov, Alexander Ushakov
2018/603
Actively Secure OT-Extension from q-ary Linear Codes
Ignacio Cascudo, René Bødker Christensen, Jaron Skovsted Gundersen
2018/602
On the Universally Composable Security of OpenStack
Kyle Hogan, Hoda Maleki, Reza Rahaeimehr, Ran Canetti, Marten van Dijk, Jason Hennessey, Mayank Varia, Haibin Zhang
2018/601
Verifiable Delay Functions
Dan Boneh, Joseph Bonneau, Benedikt Bünz, Ben Fisch
2018/600
GRANULE: An Ultra lightweight cipher design for embedded security
Gaurav Bansod, Abhijit Patil, Narayan Pisharoty
2018/599
CHQS: Publicly Verifiable Homomorphic Signatures Beyond the Linear Case
Lucas Schabhüser, Denis Butin, Johannes Buchmann
2018/598
Trends in design of ransomware viruses
Vlad Constantin Craciun, Andrei Mogage, Emil Simion
2018/597
Consolidating Security Notions in Hardware Masking
Lauren De Meyer, Begül Bilgin, Oscar Reparaz
2018/596
Continuous NMC Secure Against Permutations and Overwrites, with Applications to CCA Secure Commitments
Ivan Damgård, Tomasz Kazana, Maciej Obremski, Varun Raj, Luisa Siniscalchi
2018/595
Randomness analysis for multiple-recursive matrix generator
Subhrajyoti Deb, Bubu Bhuyan, Sartaj Ul Hasan
2018/594
Cryptanalysis of SFN Block Cipher
Sadegh Sadeghi, Nasour Bagheri
2018/593
Ramanujan graphs in cryptography
Anamaria Costache, Brooke Feigon, Kristin Lauter, Maike Massierer, Anna Puskas
2018/592
XS-circuits in Block Ciphers
Sergey Agievich
2018/591
4-bit crypto S-boxes: Generation with irreducible polynomials over Galois field GF(24) and cryptanalysis.
Sankhanil Dey, Ranjan Ghosh
2018/590
The Twin Conjugacy Search Problem and Applications
Xiaoming Chen, Weiqing You
2018/589
Implementation and Performance Evaluation of RNS Variants of the BFV Homomorphic Encryption Scheme
Ahmad Al Badawi, Yuriy Polyakov, Khin Mi Mi Aung, Bharadwaj Veeravalli, Kurt Rohloff
2018/588
BISEN: Efficient Boolean Searchable Symmetric Encryption with Verifiability and Minimal Leakage
Guilherme Borges, Henrique Domingos, Bernardo Ferreira, João Leitão, Tiago Oliveira, Bernardo Portela
2018/587
Offline Witness Encryption from Witness PRF and Randomized Encoding in CRS model
Tapas Pal, Ratna Dutta
2018/586
Lower Bounds on Lattice Enumeration with Extreme Pruning
Yoshinori Aono, Phong Q. Nguyen, Takenobu Seito, Junji Shikata
2018/585
Polynomial Functional Encryption Scheme with Linear Ciphertext Size
Jung Hee Cheon, Seungwan Hong, Changmin Lee, Yongha Son
2018/584
Bounded Fully Homomorphic Encryption from Monoid Algebras
Mugurel Barcau, Vicentiu Pasol
2018/583
Ring Homomorphic Encryption Schemes
Mugurel Barcau, Vicentiu Pasol
2018/582
Pisa: Arbitration Outsourcing for State Channels
Patrick McCorry, Surya Bakshi, Iddo Bentov, Andrew Miller, Sarah Meiklejohn
2018/581
Smart contracts for bribing miners
Patrick McCorry, Alexander Hicks, Sarah Meiklejohn
2018/580
Secure MPC: Laziness Leads to GOD
Saikrishna Badrinarayanan, Aayush Jain, Nathan Manohar, Amit Sahai
2018/579
PIR-PSI: Scaling Private Contact Discovery
Daniel Demmler, Peter Rindal, Mike Rosulek, Ni Trieu
2018/578
Optimizing Authenticated Garbling for Faster Secure Two-Party Computation
Jonathan Katz, Samuel Ranellucci, Mike Rosulek, Xiao Wang
2018/577
Fast Distributed RSA Key Generation for Semi-Honest and Malicious Adversaries
Tore Kasper Frederiksen, Yehuda Lindell, Valery Osheter, Benny Pinkas
2018/576
Simpler Constructions of Asymmetric Primitives from Obfuscation
Pooya Farshim, Georg Fuchsbauer, Alain Passelègue
2018/575
An Algorithmic Framework for the Generalized Birthday Problem
Itai Dinur
2018/574
Correctness and Fairness of Tendermint-core Blockchains
Yackolley Amoussou-Guenou, Antonella Del Pozzo, Maria Potop-Butucaru, Sara Tucci-Piergiovanni
2018/573
Improved Lightweight Implementations of CAESAR Authenticated Ciphers
Farnoud Farahmand, William Diehl, Abubakr Abdulgadir, Jens-Peter Kaps, Kris Gaj
2018/572
Round-Optimal Secure Multiparty Computation with Honest Majority
Prabhanjan Ananth, Arka Rai Choudhuri, Aarushi Goel, Abhishek Jain
2018/571
Limits of Practical Sublinear Secure Computation
Elette Boyle, Yuval Ishai, Antigoni Polychroniadou
2018/570
Fast Large-Scale Honest-Majority MPC for Malicious Adversaries
Koji Chida, Daniel Genkin, Koki Hamada, Dai Ikarashi, Ryo Kikuchi, Yehuda Lindell, Ariel Nof
2018/569
Dissection-BKW
Andre Esser, Felix Heuer, Robert Kübler, Alexander May, Christian Sohler
2018/568
Finding Small Solutions of the Equation $Bx-Ay=z$ and Its Applications to Cryptanalysis of the RSA Cryptosystem
Shixiong Wang, Longjiang Qu, Chao Li, Shaojing Fu, Hao Chen
2018/567
On the Security Properties of e-Voting Bulletin Boards
Aggelos Kiayias, Annabell Kuldmaa, Helger Lipmaa, Janno Siim, Thomas Zacharias
2018/566
Private Circuits: A Modular Approach
Prabhanjan Ananth, Yuval Ishai, Amit Sahai
2018/565
Homomorphic Encryption for Approximate Matrix Arithmetic
Jung Hee Cheon, Andrey Kim
2018/564
Impossibility on Tamper-Resilient Cryptography with Uniqueness Properties
Yuyu Wang, Takahiro Matsuda, Goichiro Hanaoka, Keisuke Tanaka
2018/563
Multi-client Predicate-only Encryption for Conjunctive Equality Tests
Tim van de Kamp, Andreas Peter, Maarten H. Everts, Willem Jonker
2018/562
maskVerif: automated analysis of software and hardware higher-order masked implementations
Gilles Barthe, Sonia Belaïd, Gaëtan Cassiers, Pierre-Alain Fouque, Benjamin Grégoire, François-Xavier Standaert
2018/561
Blockchain Abstract Data Type
Emmanuelle Anceaume, Antonella Del Pozzo, Romaric Ludinard, Maria Potop-Butucaru, Sara Tucci-Piergiovanni
2018/560
Sub-Linear Lattice-Based Zero-Knowledge Arguments for Arithmetic Circuits
Carsten Baum, Jonathan Bootle, Andrea Cerulli, Rafael del Pino, Jens Groth, Vadim Lyubashevsky
2018/559
Proofs of Work from Worst-Case Assumptions
Marshall Ball, Alon Rosen, Manuel Sabin, Prashant Nalini Vasudevan
2018/558
Simplifying Game-Based Definitions: Indistinguishability up to Correctness and Its Application to Stateful AE
Phillip Rogaway, Yusi Zhang
2018/557
Non-Interactive Zero-Knowledge Proofs for Composite Statements
Shashank Agrawal, Chaya Ganesh, Payman Mohassel
2018/556
The Curse of Small Domains: New Attacks on Format-Preserving Encryption
Viet Tung Hoang, Stefano Tessaro, Ni Trieu
2018/555
Limits on the Power of Garbling Techniques for Public-Key Encryption
Sanjam Garg, Mohammad Hajiabadi, Mohammad Mahmoody, Ameer Mohammed
2018/554
A new class of irreducible pentanomials for polynomial based multipliers in binary fields
Gustavo Banegas, Ricardo Custodio, Daniel Panario
2018/553
Optimal Channel Security Against Fine-Grained State Compromise: The Safety of Messaging
Joseph Jaeger, Igors Stepanovs
2018/552
On the Complexity of Compressing Obfuscation
Gilad Asharov, Naomi Ephraim, Ilan Komargodski, Rafael Pass
2018/551
Structured Encryption and Leakage Suppression
Seny Kamara, Tarik Moataz, Olga Ohrimenko
2018/550
PRank: Fast Analytical Rank Estimation via Pareto Distributions
Liron David, Avishai Wool
2018/549
Adaptive Garbled RAM from Laconic Oblivious Transfer
Sanjam Garg, Rafail Ostrovsky, Akshayaram Srinivasan
2018/548
From Laconic Zero-Knowledge to Public-Key Cryptography
Itay Berman, Akshay Degwekar, Ron D. Rothblum, Prashant Nalini Vasudevan
2018/547
Indifferentiable Authenticated Encryption
Manuel Barbosa, Pooya Farshim
2018/546
Quantum Lattice Enumeration and Tweaking Discrete Pruning
Yoshinori Aono, Phong Q. Nguyen, Yixin Shen
2018/545
Fully Automated Differential Fault Analysis on Software Implementations of Block Ciphers
Xiaolu Hou, Jakub Breier, Fuyuan Zhang, Yang Liu
2018/544
Pseudorandom Quantum States
Zhengfeng Ji, Yi-Kai Liu, Fang Song
2018/543
Practical and Tightly-Secure Digital Signatures and Authenticated Key Exchange
Kristian Gjøsteen, Tibor Jager
2018/542
Continuously Non-Malleable Codes in the Split-State Model from Minimal Assumptions
Rafail Ostrovsky, Giuseppe Persiano, Daniele Venturi, Ivan Visconti
2018/541
Generic Attacks against Beyond-Birthday-Bound MACs
Gaëtan Leurent, Mridul Nandi, Ferdinand Sibleyras
2018/540
Must the Communication Graph of MPC Protocols be an Expander?
Elette Boyle, Ran Cohen, Deepesh Data, Pavel Hubacek
2018/539
Extracting Linearization Equations from Noisy Sources
Daniel Smith-Tone
2018/538
Non-Malleable Codes for Partial Functions with Manipulation Detection
Aggelos Kiayias, Feng-Hao Liu, Yiannis Tselekounis
2018/537
Quantum Security Analysis of CSIDH
Xavier Bonnetain, André Schrottenloher
2018/536
On the Hardness of the Computational Ring-LWR Problem and its Applications
Long Chen, Zhenfeng Zhang, Zhenfei Zhang
2018/535
Monero - Privacy in the Blockchain
Kurt M. Alonso, Jordi Herrera Joancomartí
2018/534
Cryptographic Constructions Supporting Implicit Data Integrity
Michael Kounavis, David Durham, Sergej Deutsch
2018/533
Quantum Attacks against Indistinguishablility Obfuscators Proved Secure in the Weak Multilinear Map Model
Alice Pellet-Mary
2018/532
Ring packing and amortized FHEW bootstrapping
Daniele Micciancio, Jessica Sorrell
2018/531
Polynomial direct sum masking to protect against both SCA and FIA
Claude Carlet, Abderrahman Daif, Sylvain Guilley, Cédric Tavernier
2018/530
Two-Message Statistically Sender-Private OT from LWE
Zvika Brakerski, Nico Döttling
2018/529
Trapdoor Functions from the Computational Diffie-Hellman Assumption
Sanjam Garg, Mohammad Hajiabadi
2018/528
Recovering short secret keys of RLCE in polynomial time
Alain Couvreur, Matthieu Lequesne, Jean-Pierre Tillich
2018/527
Improved Key Recovery Attacks on Reduced-Round AES with Practical Data an d Memory Complexities
Achiya Bar-On, Orr Dunkelman, Nathan Keller, Eyal Ronen, Adi Shamir
2018/526
Towards KEM Unification
Daniel J. Bernstein, Edoardo Persichetti
2018/525
Location-Proof System based on Secure Multi-Party Computations
Aurélien Dupin, Jean-Marc Robert, Christophe Bidan
2018/524
New Smooth Projective Hashing For Oblivious Transfer
Bing Zeng
2018/523
Reducing Complexity of Pairing Comparisons using Polynomial Evaluation
Adam Bobowski, Marcin Słowik
2018/522
Fast Correlation Attack Revisited --Cryptanalysis on Full Grain-128a, Grain-128, and Grain-v1
Yosuke Todo, Takanori Isobe, Willi Meier, Kazumaro Aoki, Bin Zhang
2018/521
Ciphertext Expansion in Limited-Leakage Order-Preserving Encryption: A Tight Computational Lower Bound
Gil Segev, Ido Shahaf
2018/520
Bernstein Bound on WCS is Tight - Repairing Luykx-Preneel Optimal Forgeries
Mridul Nandi
2018/519
Fortified Universal Composability: Taking Advantage of Simple Secure Hardware Modules
Brandon Broadnax, Alexander Koch, Jeremias Mechler, Tobias Müller, Jörn Müller-Quade, Matthias Nagel
2018/518
Secure and Reliable Key Agreement with Physical Unclonable Functions
Onur Gunlu, Tasnad Kernetzky, Onurcan Iscan, Vladimir Sidorenko, Gerhard Kramer, Rafael F. Schaefer
2018/517
Upper and Lower Bounds for Continuous Non-Malleable Codes
Dana Dachman-Soled, Mukul Kulkarni
2018/516
Partial Key Exposure Attacks on RSA: Achieving the Boneh-Durfee Bound
Atsushi Takayasu, Noboru Kunihiro
2018/515
Highly Efficient and Re-executable Private Function Evaluation with Linear Complexity
Osman Bicer, Muhammed Ali Bingol, Mehmet Sabir Kiraz, Albert Levi
2018/514
Weak Compression and (In)security of Rational Proofs of Storage
Ben Fisch, Shashwat Silas
2018/513
Another coin bites the dust: An analysis of dust in UTXO based cryptocurrencies
Cristina Pérez-Solà, Sergi Delgado-Segura, Guillermo Navarro-Arribas, Jordi Herrera-Joancomart
2018/512
Provably Secure Integration Cryptosystem on Non-Commutative Group
Weiqing You, Xiaoming Chen
2018/511
Return of GGH15: Provable Security Against Zeroizing Attacks
James Bartusek, Jiaxin Guan, Fermi Ma, Mark Zhandry
2018/510
Key-Secrecy of PACE with OTS/CafeOBJ
Dominik Klein
2018/509
Improved Collision Attack on Reduced RIPEMD-160
Fukang Liu, Gaoli Wang, Zhenfu Cao
2018/508
Cost-Effective Private Linear Key Agreement With Adaptive CCA Security from Prime Order Multilinear Maps and Tracing Traitors
Mriganka Mandal, Ratna Dutta
2018/507
Tight Tradeoffs in Searchable Symmetric Encryption
Gilad Asharov, Gil Segev, Ido Shahaf
2018/506
Secure Two-Party Computation over Unreliable Channels
Ran Gelles, Anat Paskin-Cherniavsky, Vassilis Zikas
2018/505
Improved Parallel Mask Refreshing Algorithms: Generic Solutions with Parametrized Non-Interference \& Automated Optimizations
Gilles Barthe, Sonia Belaïd, François Dupressoir, Pierre-Alain Fouque, Benjamin Grégoire, François-Xavier Standaert, Pierre-Yves Strub
2018/504
Quantum Attacks on Some Feistel Block Ciphers
Xiaoyang Dong, Bingyou Dong, Xiaoyun Wang
2018/503
Finger Printing Data
Gideon Samid
2018/502
Computer-aided proofs for multiparty computation with active security
Helene Haagh, Aleksandr Karbyshev, Sabine Oechsner, Bas Spitters, Pierre-Yves Strub
2018/501
Secure Grouping and Aggregation with MapReduce
Radu Ciucanu, Matthieu Giraud, Pascal Lafourcade, Lihua Ye
2018/500
Encrypt or Decrypt? To Make a Single-Key Beyond Birthday Secure Nonce-Based MAC
Nilanjan Datta, Avijit Dutta, Mridul Nandi, Kan Yasuda
2018/499
Secure Two-party Threshold ECDSA from ECDSA Assumptions
Jack Doerner, Yashvanth Kondi, Eysa Lee, abhi shelat
2018/498
Modeling Soft Analytical Side-Channel Attacks from a Coding Theory Viewpoint
Qian Guo, Vincent Grosso, François-Xavier Standaert, Olivier Bronchain
2018/497
Forward Private Searchable Symmetric Encryption with Optimized I/O Efficiency
Xiangfu Song, Changyu Dong, Dandan Yuan, Qiuliang Xu, Minghao Zhao
2018/496
Efficient Delegated Private Set Intersection on Outsourced Private Datasets
Aydin Abadi, Sotirios Terzis, Roberto Metere, Changyu Dong
2018/495
Approximating Private Set Union/Intersection Cardinality with Logarithmic Complexity
Changyu Dong, Grigorios Loukides
2018/494
Order-LWE and the Hardness of Ring-LWE with Entropic Secrets
Madalina Bolboceanu, Zvika Brakerski, Renen Perlman, Devika Sharma
2018/493
Out-of-Band Authentication in Group Messaging: Computational, Statistical, Optimal
Lior Rotem, Gil Segev
2018/492
New Instantiations of the CRYPTO 2017 Masking Schemes
Pierre Karpman, Daniel S. Roche
2018/491
Conjugacy Separation Problem in Braids: an Attack on the Original Colored Burau Key Agreement Protocol
Matvei Kotov, Anton Menshov, Alexey Myasnikov, Dmitry Panteleev, Alexander Ushakov
2018/490
Glitch-Resistant Masking Revisited - or Why Proofs in the Robust Probing Model are Needed
Thorben Moos, Amir Moradi, Tobias Schneider, François-Xavier Standaert
2018/489
Betrayal, Distrust, and Rationality: Smart Counter-Collusion Contracts for Verifiable Cloud Computing
Changyu Dong, Yilei Wang, Amjad Aldweesh, Patrick McCorry, Aad van Moorsel
2018/488
Wide Tweakable Block Ciphers Based on Substitution-Permutation Networks: Security Beyond the Birthday Bound
Benoît Cogliati, Jooyoung Lee
2018/487
Unbounded Inner-Product Functional Encryption, with Succinct Keys
Edouard Dufour-Sans, David Pointcheval
2018/486
Pushing the Communication Barrier in Secure Computation using Lookup Tables
Ghada Dessouky, Farinaz Koushanfar, Ahmad-Reza Sadeghi, Thomas Schneider, Shaza Zeitouni, Michael Zohner
2018/485
Towards practical key exchange from ordinary isogeny graphs
Luca De Feo, Jean Kieffer, Benjamin Smith
2018/484
Authenticated Encryption with Nonce Misuse and Physical Leakages: Definitions, Separation Results, and Leveled Constructions
Chun Guo, Olivier Pereira, Thomas Peters, François-Xavier Standaert
2018/483
Compact Multi-Signatures for Smaller Blockchains
Dan Boneh, Manu Drijvers, Gregory Neven
2018/482
SPDZ2k: Efficient MPC mod 2^k for Dishonest Majority
Ronald Cramer, Ivan Damgård, Daniel Escudero, Peter Scholl, Chaoping Xing
2018/481
On the Exact Round Complexity of Secure Three-Party Computation
Arpita Patra, Divya Ravi
2018/480
On Distributional Collision Resistant Hashing
Ilan Komargodski, Eylon Yogev
2018/479
On the security of Jhanwar-Barua Identity-Based Encryption Scheme
Adrian G. Schipor
2018/478
On Non-Monotonicity of the Success Probability in Linear Cryptanalysis
Ali Aydin Selcuk
2018/477
CSI Neural Network: Using Side-channels to Recover Your Artificial Neural Network Information
Lejla Batina, Shivam Bhasin, Dirmanto Jap, Stjepan Picek
2018/476
The Curse of Class Imbalance and Conflicting Metrics with Machine Learning for Side-channel Evaluations
Stjepan Picek, Annelie Heuser, Alan Jovic, Shivam Bhasin, Francesco Regazzoni
2018/475
Improved Non-Interactive Zero Knowledge with Applications to Post-Quantum Signatures
Jonathan Katz, Vladimir Kolesnikov, Xiao Wang
2018/474
Minimising Communication in Honest-Majority MPC by Batchwise Multiplication Verification
Peter Sebastian Nordholt, Meilof Veeningen
2018/473
A Black-Box Construction of Fully-Simulatable, Round-Optimal Oblivious Transfer from Strongly Uniform Key Agreement
Daniele Friolo, Daniel Masny, Daniele Venturi
2018/472
Anonymous Multi-Hop Locks for Blockchain Scalability and Interoperability
Giulio Malavolta, Pedro Moreno-Sanchez, Clara Schneidewind, Aniket Kate, Matteo Maffei
2018/471
Efficient Range ORAM with $\mathbb{O}(\log^{2}{N})$ Locality
Anrin Chakraborti, Adam J. Aviv, Seung Geol Choi, Travis Mayberry, Daniel S. Roche, Radu Sion
2018/470
The Usefulness of Sparsifiable Inputs: How to Avoid Subexponential iO
Thomas Agrikola, Geoffroy Couteau, Dennis Hofheinz
2018/469
An Abstract Model of UTxO-based Cryptocurrencies with Scripts
Joachim Zahnentferner
2018/468
On Beyond-Birthday-Bound Security: Revisiting the Development of ISO/IEC 9797-1 MACs
Yaobin Shen, Lei Wang
2018/467
Error-Detecting in Monotone Span Programs with Application to Communication Efficient Multi-Party Computation
Nigel P. Smart, Tim Wood
2018/466
A secure end-to-end verifiable e-voting system using zero knowledge based blockchain
Somnath Panja, Bimal Kumar Roy
2018/465
A Note on the Communication Complexity of Multiparty Computation in the Correlated Randomness Model
Geoffroy Couteau
2018/464
Cryptanalysis of MORUS
Tomer Ashur, Maria Eichlseder, Martin M. Lauridsen, Gaëtan Leurent, Brice Minaud, Yann Rotella, Yu Sasaki, and Benoît Viguier
2018/463
Generic Hardness of Inversion on Ring and Its Relation to Self-Bilinear Map
Takashi Yamakawa, Shota Yamada, Goichiro Hanaoka, Noboru Kunihiro
2018/462
Logistic regression over encrypted data from fully homomorphic encryption
Hao Chen, Ran Gilad-Bachrach, Kyoohyung Han, Zhicong Huang, Amir Jalali, Kim Laine, Kristin Lauter
2018/461
Continuous-Source Fuzzy Extractors: Source uncertainty and security
Benjamin Fuller, Lowen Peng
2018/460
RapidChain: Scaling Blockchain via Full Sharding
Mahdi Zamani, Mahnush Movahedi, Mariana Raykova
2018/459
Supersingular Isogeny Oblivious Transfer (SIOT)
Paulo Barreto, Anderson Nascimento, Glaucio Oliveira, Waldyr Benits
2018/458
Characterizing Collision and Second-Preimage Resistance in Linicrypt
Ian McQuoid, Trevor Swope, Mike Rosulek
2018/457
From FE Combiners to Secure MPC and Back
Prabhanjan Ananth, Saikrishna Badrinarayanan, Aayush Jain, Nathan Manohar, Amit Sahai
2018/456
An efficient structural attack on NIST submission DAGS
Elise Barelli, Alain Couvreur
2018/455
On Renyi Entropies and their Applications to Guessing Attacks in Cryptography
Serdar Boztas
2018/454
R3C3: Cryptographically secure Censorship Resistant Rendezvous using Cryptocurrencies
Mohsen Minaei, Pedro Moreno-Sanchez, Aniket Kate
2018/453
Floppy-Sized Group Signatures from Lattices
Cecilia Boschini, Jan Camenisch, Gregory Neven
2018/452
Time-space complexity of quantum search algorithms in symmetric cryptanalysis: applying to AES and SHA-2
Panjin Kim, Daewan Han, Kyung Chul Jeong
2018/451
Tighter Security Proofs for GPV-IBE in the Quantum Random Oracle Model
Shuichi Katsumata, Shota Yamada, Takashi Yamakawa
2018/450
From Keys to Databases -- Real-World Applications of Secure Multi-Party Computation
David W. Archer, Dan Bogdanov, Liina Kamm, Y. Lindell, Kurt Nielsen, Jakob Illeborg Pagter, Nigel P. Smart, Rebecca N. Wright
2018/449
Key Prediction Security of Keyed Sponges
Bart Mennink
2018/448
Non-adaptive Group-Testing Aggregate MAC Scheme
Shoichi Hirose, Junji Shikata
2018/447
Improved Distinguisher Search Techniques Based on Parity Sets
Xiaofeng Xie, Tian Tian
2018/446
A voting scheme with post-quantum security based on physical laws
Hua Dong, Li Yang
2018/445
CRPSF and NTRU Signatures over cyclotomic fields
Yang Wang, Mingqiang Wang
2018/444
Founding Cryptography on Smooth Projective Hashing
Bing Zeng
2018/443
Quantum Multi-Key Homomorphic Encryption for Polynomial-Sized Circuits
Rishab Goyal
2018/442
SecureNN: Efficient and Private Neural Network Training
Sameer Wagh, Divya Gupta, Nishanth Chandran
2018/441
Optimal Linear Multiparty Conditional Disclosure of Secrets Protocols
Amos Beimel, Naty Peter
2018/440
Formal Analysis of Distance Bounding with Secure Hardware
Handan Kılınç, Serge Vaudenay
2018/439
Tight Private Circuits: Achieving Probing Security with the Least Refreshing
Sonia Belaïd, Dahmun Goudarzi, Matthieu Rivain
2018/438
Trivially and Efficiently Composing Masked Gadgets with Probe Isolating Non-Interference
Gaëtan Cassiers, François-Xavier Standaert
2018/437
Zero-Knowledge Protocols for Search Problems
Ben Berger, Zvika Brakerski
2018/436
Crash-tolerant Consensus in Directed Graph Revisited
Ashish Choudhury, Gayathri Garimella, Arpita Patra, Divya Ravi, Pratik Sarkar
2018/435
A Treasury System for Cryptocurrencies: Enabling Better Collaborative Intelligence
Bingsheng Zhang, Roman Oliynykov, Hamed Balogun
2018/434
Towards Tight Security of Cascaded LRW2
Bart Mennink
2018/433
Achieving Fine-grained Multi-keyword Ranked Search over Encrypted Cloud Data
Guowen Xu, Hongwei Li
2018/432
Hidden Shift Quantum Cryptanalysis and Implications
Xavier Bonnetain, María Naya-Plasencia
2018/431
Lightweight ASIC Implementation of AEGIS-128
Anubhab Baksi, Vikramkumar Pudi, Swagata Mandal, Anupam Chattopadhyay
2018/430
A Simplified Approach to Rigorous Degree 2 Elimination in Discrete Logarithm Algorithms
Faruk Göloğlu, Antoine Joux
2018/429
Amortized Complexity of Information-Theoretically Secure MPC Revisited
Ignacio Cascudo, Ronald Cramer, Chaoping Xing, Chen Yuan
2018/428
Differential Fault Analysis of Rectangle-80
Shobhit Sinha, Sandip Karmakar
2018/427
Secure Boot and Remote Attestation in the Sanctum Processor
Ilia Lebedev, Kyle Hogan, Srinivas Devadas
2018/426
Adaptively Secure Proxy Re-encryption
Georg Fuchsbauer, Chethan Kamath, Karen Klein, Krzysztof Pietrzak
2018/425
Implementing RLWE-based Schemes Using an RSA Co-Processor
Martin R. Albrecht, Christian Hanser, Andrea Hoeller, Thomas Pöppelmann, Fernando Virdia, Andreas Wallner
2018/424
Circumventing Cryptographic Deniability with Remote Attestation
Lachlan J. Gunn, Ricardo Vieitez Parra, N. Asokan
2018/423
Yes, There is an Oblivious RAM Lower Bound!
Kasper Green Larsen, Jesper Buus Nielsen
2018/422
Message-locked Encryption with File Update
Suyash Kandele, Souradyuti Paul
2018/421
TFHE: Fast Fully Homomorphic Encryption over the Torus
Ilaria Chillotti, Nicolas Gama, Mariya Georgieva, Malika Izabachène
2018/420
Lattice-based Revocable (Hierarchical) IBE with Decryption Key Exposure Resistance
Shuichi Katsumata, Takahiro Matsuda, Atsushi Takayasu
2018/419
Homomorphic Secret Sharing: Optimizations and Applications
Elette Boyle, Geoffroy Couteau, Niv Gilboa, Yuval Ishai, Michele Orrù
2018/418
DAWG: A Defense Against Cache Timing Attacks in Speculative Execution Processors
Vladimir Kiriansky, Ilia Lebedev, Saman Amarasinghe, Srinivas Devadas, Joel Emer
2018/417
On the Security of Two-Round Multi-Signatures
Manu Drijvers, Kasra Edalatnejad, Bryan Ford, Eike Kiltz, Julian Loss, Gregory Neven, Igors Stepanovs
2018/416
Ledger Design Language: Towards Formal Reasoning and Implementation for Public Ledgers
Nadim Kobeissi, Natalia Kulatova
2018/415
Flux: Revisiting Near Blocks for Proof-of-Work Blockchains
Alexei Zamyatin, Nicholas Stifter, Philipp Schindler, Edgar Weippl, William J. Knottenbelt
2018/414
Aggregation of Gamma-Signatures and Applications to Bitcoin
Yunlei Zhao
2018/413
Scaling Backend Authentication at Facebook
Kevin Lewi, Callen Rain, Stephen Weis, Yueting Lee, Haozhi Xiong, Benjamin Yang
2018/412
PRCash: Fast, Private and Regulated Transactions for Digital Currencies
Karl Wüst, Kari Kostiainen, Vedran Capkun, Srdjan Capkun
2018/411
Unsupervised Machine Learning on Encrypted Data
Angela Jäschke, Frederik Armknecht
2018/410
A Note On Clauser-Horne-Shimony-Holt Inequality
Zhengjun Cao, Lihua Liu
2018/409
Laconic Function Evaluation and Applications
Willy Quach, Hoeteck Wee, Daniel Wichs
2018/408
Cryptanalyses of Branching Program Obfuscations over GGH13 Multilinear Map from the NTRU Problem
Jung Hee Cheon, Minki Hhan, Jiseung Kim, Changmin Lee
2018/407
Goshawk: A Novel Efficient, Robust and Flexible Blockchain Protocol
Cencen Wan, Shuyang Tang, Yuncong Zhang, Chen Pan, Zhiqiang Liu, Yu Long, Zhen Liu, Yu Yu
2018/406
“Larger Keys, Less Complexity” A Strategic Proposition
Gideon Samid
2018/405
A review of cryptographic properties of S-boxes with Generation and Analysis of crypto secure S-boxes.
Sankhanil Dey, Ranjan Ghosh
2018/404
Enforcing ideal-world leakage bounds in real-world secret sharing MPC frameworks
José Bacelar Almeida, Manuel Barbosa, Gilles Barthe, Hugo Pacheco, Vitor Pereira, Bernardo Portela
2018/403
ABY3: A Mixed Protocol Framework for Machine Learning
Payman Mohassel, Peter Rindal
2018/402
Another Look at Relay and Distance-based Attacks in Contactless Payments
Ioana Boureanu, Anda Anda
2018/401
Lattice-based Direct Anonymous Attestation (LDAA)
Nada EL Kassem, Liqun Chen, Rachid El Bansarkhani, Ali El Kaafarani, Jan Camenisch, Patrick Hough, Paulo Martins, Leonel Sousa
2018/400
Agreement with Satoshi – On the Formalization of Nakamoto Consensus
Nicholas Stifter, Aljosha Judmayer, Philipp Schindler, Alexei Zamyatin, Edgar Weippl
2018/399
On the Feasibility of an ECDLP Algorithm
Sergey Grebnev
2018/398
Fun with Bitcoin smart contracts
Massimo Bartoletti, Tiziana Cimoli, Roberto Zunino
2018/397
Cryptanalysis on the HHSS Obfuscation Arising from Absence of Safeguards
Jung Hee Cheon, Minki Hhan, Jiseung Kim, Changmin Lee
2018/396
New Bleichenbacher Records: Fault Attacks on qDSA Signatures
Akira Takahashi, Mehdi Tibouchi, Masayuki Abe
2018/395
Secure Computation with Constant Communication Overhead using Multiplication Embeddings
Alexander R. Block, Hemanta K. Maji, Hai H. Nguyen
2018/394
Almost-Surely Terminating Asynchronous Byzantine Agreement Revisited
Laasya Bangalore, Ashish Choudhury, Arpita Patra
2018/393
AN ATTACK ON THE WALNUT DIGITAL SIGNATURE ALGORITHM
Matvei Kotov, Anton Menshov, Alexander Ushakov
2018/392
Making AES great again: the forthcoming vectorized AES instruction
Nir Drucker, Shay Gueron, Vlad Krasnov
2018/391
Tight Adaptively Secure Broadcast Encryption with Short Ciphertexts and Keys
Romain Gay, Lucas Kowalczyk, Hoeteck Wee
2018/390
MILP-based Differential Attack on Round-reduced GIFT
Baoyu Zhu, Xiaoyang Dong, Hongbo Yu
2018/389
Distributed SSH Key Management with Proactive RSA Threshold Signatures
Yotam Harchol, Ittai Abraham, Benny Pinkas
2018/388
Security Analysis of Fan et al. Lightweight RFID Authentication Protocol for Privacy Protection in IoT
Seyed Farhad Aghili, Hamid Mala
2018/387
Efficient Bit-Decomposition and Modulus-Conversion Protocols with an Honest Majority
Ryo Kikuchi, Dai Ikarashi, Takahiro Matsuda, Koki Hamada, Koji Chida
2018/386
Certificateless Public Key Signature Schemes from Standard Algorithms
Zhaohui Cheng, Liqun Chen
2018/385
Cryptographic Hashing From Strong One-Way Functions
Justin Holmgren, Alex Lombardi
2018/384
Fine-Grained and Application-Ready Distance-Bounding Security
Ioana Boureanu, David Gerault, Pascal Lafourcade
2018/383
CSIDH: An Efficient Post-Quantum Commutative Group Action
Wouter Castryck, Tanja Lange, Chloe Martindale, Lorenz Panny, Joost Renes
2018/382
Revocable Identity-based Encryption from Codes with Rank Metric
Donghoon Chang, Amit Kumar Chauhan, Sandeep Kumar, Somitra Kumar Sanadhya
2018/381
Masking the GLP Lattice-Based Signature Scheme at Any Order
Gilles Barthe, Sonia Belaïd, Thomas Espitau, Pierre-Alain Fouque, Benjamin Grégoire, Mélissa Rossi, Mehdi Tibouchi
2018/380
Nearly Linear-Time Zero-Knowledge Proofs for Correct Program Execution
Jonathan Bootle, Andrea Cerulli, Jens Groth, Sune Jakobsen, Mary Maller
2018/379
Post-Quantum One-Time Linkable Ring Signature and Application to Ring Confidential Transactions in Blockchain (Lattice RingCT v1.0)
Wilson Alberto Torres, Ron Steinfeld, Amin Sakzad, Joseph K. Liu, Veronika Kuchta, Nandita Bhattacharjee, Man Ho Au, Jacob Cheng
2018/378
Ouroboros Genesis: Composable Proof-of-Stake Blockchains with Dynamic Availability
Christian Badertscher, Peter Gazi, Aggelos Kiayias, Alexander Russell, Vassilis Zikas
2018/377
ALGORAND AGREEMENT: Super Fast and Partition Resilient Byzantine Agreement
Jing Chen, Sergey Gorbunov, Silvio Micali, Georgios Vlachos
2018/376
Arithmetic Considerations for Isogeny Based Cryptography
Joppe W. Bos, Simon Friedberger
2018/375
Witness Indistinguishability for any Single-Round Argument with Applications to Access Control
Zvika Brakerski, Yael Tauman Kalai
2018/374
Functional Graphs and Their Applications in Generic Attacks on Iterated Hash Constructions
Zhenzhen Bao, Jian Guo, Lei Wang
2018/373
PanORAMa: Oblivious RAM with Logarithmic Overhead
Sarvar Patel, Giuseppe Persiano, Mariana Raykova, Kevin Yeo
2018/372
Secure Computation using Leaky Correlations (Asymptotically Optimal Constructions)
Alexander R. Block, Divya Gupta, Hemanta K. Maji, Hai H. Nguyen
2018/371
Supersingular isogeny graphs and endomorphism rings: reductions and solutions
Kirsten Eisentraeger, Sean Hallgren, Kristin Lauter, Travis Morrison, Christophe Petit
2018/370
Spectral-linear and spectral-differential methods for generating S-boxes having almost optimal cryptographic parameters
A. V. Menyachikhin
2018/369
Security Analysis and Modification of ID-Based Encryption with Equality Test from ACISP 2017
Hyung Tae Lee, Huaxiong Wang, Kai Zhang
2018/368
Encryption with Untrusted Keys: Security against Chosen Objects Attack
Shashank Agrawal, Shweta Agrawal, Manoj Prabhakaran
2018/367
Cache-Timing Attacks on RSA Key Generation
Alejandro Cabrera Aldaya, Cesar Pereida García, Luis Manuel Alvarez Tapia, Billy Bob Brumley
2018/366
Directional Distance-Bounding Identification Protocols
Ahmad Ahmadi, Reihaneh Safavi-Naini
2018/365
Anonymous Distance-Bounding Identification
Ahmad Ahmadi, Reihaneh Safavi-Naini, Mamunur Akand
2018/364
Perfectly Secure Oblivious Parallel RAM
T-H. Hubert Chan, Kartik Nayak, Elaine Shi
2018/363
Private Anonymous Data Access
Ariel Hamlin, Rafail Ostrovsky, Mor Weiss, Daniel Wichs
2018/362
Backdoored Hash Functions: Immunizing HMAC and HKDF
Marc Fischlin, Christian Janson, Sogol Mazaheri
2018/361
Two-message Key Exchange with Strong Security from Ideal Lattices
Zheng Yang, Yu Chen, Song Luo
2018/360
GGH15 Beyond Permutation Branching Programs: Proofs, Attacks, and Candidates
Yilei Chen, Vinod Vaikuntanathan, Hoeteck Wee
2018/359
Privacy-Preserving Multibiometric Authentication in Cloud with Untrusted Database Providers
Christina-Angeliki Toli, Abdelrahaman Aly, Bart Preneel
2018/358
Efficient Erasable PUFs from Programmable Logic and Memristors
Yansong Gao, Chenglu Jin, Jeeson Kim, Hussein Nili, Xiaolin Xu, Wayne Burleson, Omid Kavehei, Marten van Dijk, Damith C. Ranasinghe, Ulrich Rührmair
2018/357
Statistical Ineffective Fault Attacks on Masked AES with Fault Countermeasures
Christoph Dobraunig, Maria Eichlseder, Hannes Gross, Stefan Mangard, Florian Mendel, Robert Primas
2018/356
In Praise of Twisted Embeddings
Jheyne N. Ortiz, Robson R. de Araujo, Diego F. Aranha, Sueli I. R. Costa, Ricardo Dahab
2018/355
Differential Fault Attacks on Deterministic Lattice Signatures
Leon Groot Bruinderink, Peter Pessl
2018/354
Start your ENGINEs: dynamically loadable contemporary crypto
Nicola Tuveri, Billy B. Brumley
2018/353
Non-Malleable Extractors and Non-Malleable Codes: Partially Optimal Constructions
Xin Li
2018/352
Cryptography with Disposable Backdoors
Kai-Min Chung, Marios Georgiou, Ching-Yi Lai, Vassilis Zikas
2018/351
A Chosen Plaintext Attack on Offset Public Permutation Mode
Miloslav Homer
2018/350
The Interpose PUF: Secure PUF Design against State-of-the-art Machine Learning Attacks
Phuong Ha Nguyen, Durga Prasad Sahoo, Chenglu Jin, Kaleel Mahmood, Ulrich Rührmair, Marten van Dijk
2018/349
An Analysis of the NIST SP 800-90A Standard
Joanne Woodage, Dan Shumow
2018/348
Monero Ring Attack: Recreating Zero Mixin Transaction Effect
Dimaz Ankaa Wijaya, Joseph Liu, Ron Steinfeld, Dongxi Liu
2018/347
3PC ORAM with Low Latency, Low Bandwidth, and Fast Batch Retrieval
Stanislaw Jarecki, Boyang Wei
2018/346
Collusion Resistant Traitor Tracing from Learning with Errors
Rishab Goyal, Venkata Koppula, Brent Waters
2018/345
In-region Authentication
Mamunur Rashid Akand, Reihaneh Safavi-Naini
2018/344
Nothing Refreshes Like a RePSI: Reactive Private Set Intersection
Andrea Cerulli, Emiliano De Cristofaro, Claudio Soriente
2018/343
Flexible Signatures: Towards Making Authentication Suitable for Real-Time Environments
Duc Viet Le, Mahimna Kelkar, Aniket Kate
2018/342
MergeMAC: A MAC for Authentication with Strict Time Constraints and Limited Bandwidth
Ralph Ankele, Florian Böhl, Simon Friedberger
2018/341
Comparison of Cost of Protection Against Differential Power Analysis of Selected Authenticated Ciphers
William Diehl, Abubakr Abdulgadir, Farnoud Farahmand, Jens-Peter Kaps, Kris Gaj
2018/340
Delegatable Attribute-based Anonymous Credentials from Dynamically Malleable Signatures
Johannes Blömer, Jan Bobolz
2018/339
Two attacks on rank metric code-based schemes: RankSign and an Identity-Based-Encryption scheme
Thomas Debris-Alazard, Jean-Pierre Tillich
2018/338
Quantum FHE (Almost) As Secure As Classical
Zvika Brakerski
2018/337
Invisible Sanitizable Signatures and Public-Key Encryption are Equivalent
Marc Fischlin, Patrick Harasser
2018/336
SoK: The Problem Landscape of SIDH
David Urbanik, David Jao
2018/335
Fast modular squaring with AVX512IFMA
Nir Drucker, Shay Gueron
2018/334
Impossible Differential Attack on QARMA Family of Block Ciphers
Dong Yang, Wen-feng Qi, Hua-jin Chen
2018/333
Breaking the Circuit-Size Barrier in Secret Sharing
Tianren Liu, Vinod Vaikuntanathan
2018/332
Differential Cryptanalysis of Round-Reduced Sparx-64/128
Ralph Ankele, Eik List
2018/331
Estimate all the {LWE, NTRU} schemes!
Martin R. Albrecht, Benjamin R. Curtis, Amit Deo, Alex Davidson, Rachel Player, Eamonn W. Postlethwaite, Fernando Virdia, Thomas Wunderer
2018/330
Time-Based Direct Revocable Ciphertext-Policy Attribute-Based Encryption with Short Revocation List
Joseph K. Liu, Tsz Hon Yuen, Peng Zhang, Kaitai Liang
2018/329
Symbolic Side-Channel Analysis for Probabilistic Programs
Pasquale Malacaria, MHR. Khouzani, Corina S. Păsăreanu, Quoc-Sang Phan, Kasper Luckow
2018/328
Improved High-Order Conversion From Boolean to Arithmetic Masking
Luk Bettale, Jean-Sebastien Coron, Rina Zeitoun
2018/327
A Note On Groth-Ostrovsky-Sahai Non-Interactive Zero-Knowledge Proof System
Zhengjun Cao, Lihua Liu
2018/326
Verifier Non-Locality in Interactive Proofs
Claude Crepeau, Nan Yang
2018/325
Multi-power Post-quantum RSA
John M. Schanck
2018/324
ACPC: Efficient revocation of pseudonym certificates using activation codes
Marcos A. Simplicio Jr., Eduardo Lopes Cominetti, Harsh Kupwade Patil, Jefferson E. Ricardini, Marcos Vinicius M. Silva
2018/323
PPAD: Privacy Preserving Group-Based ADvertising in Online Social Networks
Sanaz Taheri Boshrooyeh, Alptekin Küpçü, Öznur Özkasap
2018/322
DeepMarks: A Digital Fingerprinting Framework for Deep Neural Networks
Huili Chen, Bita Darvish Rohani, Farinaz Koushanfar
2018/321
Revisiting Proxy Re-Encryption: Forward Secrecy, Improved Security, and Applications
David Derler, Stephan Krenn, Thomas Lorünser, Sebastian Ramacher, Daniel Slamanig, Christoph Striecks
2018/320
General State Channel Networks
Stefan Dziembowski, Sebastian Faust, Kristina Hostáková
2018/319
HydRand: Practical Continuous Distributed Randomness
Philipp Schindler, Aljosha Judmayer, Nicholas Stifter, Edgar Weippl
2018/318
Practical attacks against the Walnut digital signature scheme
Ward Beullens, Simon R. Blackburn
2018/317
Sliding-Window Correlation Attacks Against Encryption Devices with an Unstable Clock
Dor Fledel, Avishai Wool
2018/316
Non-Malleable Secret Sharing
Vipul Goyal, Ashutosh Kumar
2018/315
Secure Multiplication for Bitslice Higher-Order Masking: Optimisation and Comparison
Dahmun Goudarzi, Anthony Journault, Matthieu Rivain, François-Xavier Standaert
2018/314
Secure top most significant genome variants search: iDASH 2017 competition
Sergiu Carpov, Thibaud Tortech
2018/313
On the cost of computing isogenies between supersingular elliptic curves
Gora Adj, Daniel Cervantes-Vázquez, Jesús-Javier Chi-Domínguez, Alfred Menezes, Francisco Rodríguez-Henríquez
2018/312
Multilinear maps via secret ring
Chunsheng Gu
2018/311
DeepSigns: A Generic Watermarking Framework for Protecting the Ownership of Deep Learning Models
Bita Darvish Rouhani, Huili Chen, farinaz Koushanfar
2018/310
Chosen Message Attack on Multivariate Signature ELSA at Asiacrypt 2017
Yasufumi Hashimoto, Yasuhiko Ikematsu, Tsuyoshi Takagi
2018/309
Error Estimation of Practical Convolution Discrete Gaussian Sampling with Rejection Sampling
Zhongxiang Zheng, Xiaoyun Wang, Guangwu Xu, Chunhuan Zhao
2018/308
On perfectly secure 2PC in the OT-hybrid model
Bar Alon, Anat Paskin-Cherniavsky
2018/307
Isolated Curves and the MOV Attack
Travis Scholl
2018/306
State Separation for Code-Based Game-Playing Proofs
Chris Brzuska, Antoine Delignat-Lavaud, Cedric Fournet, Konrad Kohbrok, Markulf Kohlweiss
2018/305
Efficient four-dimensional GLV curve with high security
Olivier Bernard, Renaud Dubois, Simon Masson
2018/304
Geosocial Query with User-Controlled Privacy
Peizhao Hu, Sherman S. M. Chow, Asma Aloufi
2018/303
21 - Bringing Down the Complexity: Fast Composable Protocols for Card Games Without Secret State
Bernardo David, Rafael Dowsley, Mario Larangeira
2018/302
Rethinking Large-Scale Consensus
Rafael Pass, Elaine Shi
2018/301
On the Ineffectiveness of Internal Encodings - Revisiting the DCA Attack on White-Box Cryptography
Estuardo Alpirez Bock, Chris Brzuska, Wil Michiels, Alexander Treff
2018/300
Outsourcing Modular Exponentiation in Cryptographic Web Applications
Pascal Mainini, Rolf Haenni
2018/299
Clusters of Re-used Keys
Stephen Farrell
2018/298
In search of CurveSwap: Measuring elliptic curve implementations in the wild
Luke Valenta, Nick Sullivan, Antonio Sanso, Nadia Heninger
2018/297
Fine-Grained Secure Computation
Matteo Campanelli, Rosario Gennaro
2018/296
Asynchronous ratcheted key exchange
Bertram Poettering, Paul Rösler
2018/295
ExpFault: An Automated Framework for Exploitable Fault Characterization in Block Ciphers (Revised Version)
Sayandeep Saha, Debdeep Mukhopadhyay, Pallab Dasgupta
2018/294
Learning strikes again: the case of the DRS signature scheme
Léo Ducas, Yang Yu
2018/293
Privacy Amplification from Non-malleable Codes
Eshan Chattopadhyay, Bhavana Kanukurthi, Sai Lakshmi Bhavana Obbattu, Sruthi Sekar
2018/292
Linear Biases in AEGIS Keystream
Brice Minaud
2018/291
Simulations of Optical Emissions for Attacking AES and Masked AES
Guido Marco Bertoni, Lorenzo Grassi, Filippo Melzani
2018/290
Direct Anonymous Attestation with Efficient Verifier-Local Revocation for Subscription System
Vireshwar Kumar, He Li, Noah Luther, Pranav Asokan, Jung-Min (Jerry) Park, Kaigui Bian, Martin B. H. Weiss, Taieb Znati
2018/289
Secure and Scalable Document Similarity on Distributed Databases: Differential Privacy to the Rescue
Phillipp Schoppmann, Lennart Vogelsang, Adrià Gascón, Borja Balle
2018/288
Constant Size Traceable Ring Signature Scheme without Random Oracles
Ke Gu, Na Wu
2018/287
Secure Cloud Storage Scheme Based On Hybrid Cryptosystem
Atanu Basu, Indranil Sengupta
2018/286
AuCPace: Efficient verifier-based PAKE protocol tailored for the IIoT
Björn Haase, Benoît Labrique
2018/285
Collateral Damage of Facebook Applications: a Comprehensive Study
Iraklis Symeonidis, Gergely Biczók, Fatemeh Shirazi, Cristina Pérez-Solà, Jessica Schroers, Bart Preneel
2018/284
Hadamard Matrices, $d$-Linearly Independent Sets and Correlation-Immune Boolean Functions with Minimum Hamming Weights
Qichun Wang
2018/283
Homomorphic Rank Sort Using Surrogate Polynomials
Gizem S. Çetin, Berk Sunar
2018/282
Modeling Quantum-Safe Authenticated Key Establishment, and an Isogeny-Based Protocol
Jason LeGrow, David Jao, Reza Azarderakhsh
2018/281
Upgrading to Functional Encryption
Saikrishna Badrinarayanan, Dakshita Khurana, Amit Sahai, Brent Waters
2018/280
Updatable and Universal Common Reference Strings with Applications to zk-SNARKs
Jens Groth, Markulf Kohlweiss, Mary Maller, Sarah Meiklejohn, Ian Miers
2018/279
Worst-Case Hardness for LPN and Cryptographic Hashing via Code Smoothing
Zvika Brakerski, Vadim Lyubashevsky, Vinod Vaikuntanathan, Daniel Wichs
2018/278
Mixed-radix Naccache-Stern encryption
Rémi Géraud, David Naccache
2018/277
Approximate and Probabilistic Differential Privacy Definitions
Sebastian Meiser
2018/276
How to Record Quantum Queries, and Applications to Quantum Indifferentiability
Mark Zhandry
2018/275
Lattice-Based zk-SNARKs from Square Span Programs
Rosario Gennaro, Michele Minelli, Anca Nitulescu, Michele Orrù
2018/274
G-Merkle: A Hash-Based Group Signature Scheme From Standard Assumptions
Rachid El Bansarkhani, Rafael Misoczki
2018/273
Towards Attribute-Based Encryption for RAMs from LWE: Sub-linear Decryption, and More
Prabhanjan Ananth, Xiong Fan, Elaine Shi
2018/272
Multi-Theorem Preprocessing NIZKs from Lattices
Sam Kim, David J. Wu
2018/271
MathCoin: A Blockchain Proposal that Helps Verify Mathematical Theorems In Public
Borching Su
2018/270
A Brief Retrospective Look at the Cayley-Purser Public-key Cryptosystem, 19 Years Later
Douglas R. Stinson
2018/269
Vault: Fast Bootstrapping for the Algorand Cryptocurrency
Derek Leung, Adam Suhl, Yossi Gilad, Nickolai Zeldovich
2018/268
Perfectly Secure Oblivious RAM with Sublinear Bandwidth Overhead
Michael Raskin, Mark Simkin
2018/267
A Note on Post-Quantum Authenticated Key Exchange from Supersingular Isogenies
Patrick Longa
2018/266
Authenticated key exchange for SIDH
Steven D. Galbraith
2018/265
Compact, Scalable, and Efficient Discrete Gaussian Samplers for Lattice-Based Cryptography
Ayesha Khalid, James Howe, Ciara Rafferty, Francesco Regazzoni, Maire O’Neill
2018/264
Security proof for Quantum Key Recycling with noise
Daan Leermakers, Boris Skoric
2018/263
An Efficient and Secure Attribute-Based Signcryption Scheme for Smart Grid Applications
Seyyed Mahdi Sedaghat, Mohammad Hassan Ameri, Mahshid Delavar, Javad Mohajeri, Mohammad Reza Aref
2018/262
Chimeric Ledgers: Translating and Unifying UTXO-based and Account-based Cryptocurrencies
Joachim Zahnentferner
2018/261
Post-Quantum EPID Signatures from Symmetric Primitives
Dan Boneh, Saba Eskandarian, Ben Fisch
2018/260
MDS Matrices with Lightweight Circuits
Sébastien Duval, Gaëtan Leurent
2018/259
The Death and Rebirth of Privacy-Preserving WiFi Fingerprint Localization with Paillier Encryption
Zheng Yang, Kimmo Järvinen
2018/258
Fault Analysis of the KTANTAN Family of Block Ciphers: A Revisited Work of Fault Analysis of the KATAN Family of Block Ciphers
Alya Geogiana Buja, Shekh Faisal Abdul-Latip, Rabiah Ahmad
2018/257
On Quantum Indifferentiability
Tore Vincent Carstens, Ehsan Ebrahimi, Gelo Noel Tabia, Dominique Unruh
2018/256
QC-MDPC: A Timing Attack and a CCA2 KEM
Edward Eaton, Matthieu Lequesne, Alex Parent, Nicolas Sendrier
2018/255
Topology-Hiding Computation Beyond Semi-Honest Adversaries
Rio LaVigne, Chen-Da Liu-Zhang, Ueli Maurer, Tal Moran, Marta Mularczyk, Daniel Tschudi
2018/254
Logistic Regression Model Training based on the Approximate Homomorphic Encryption
Andrey Kim, Yongsoo Song, Miran Kim, Keewoo Lee, Jung Hee Cheon
2018/253
Capsule: A Protocol for Secure Collaborative Document Editing
Nadim Kobeissi
2018/252
The Limit of Blockchains: Infeasibility of a Smart Obama-Trump Contract
Yongge Wang, Qutaibah m. Malluhi
2018/251
VeritasDB: High Throughput Key-Value Store with Integrity
Rohit Sinha, Mihai Christodorescu
2018/250
Making Public Key Functional Encryption Function Private, Distributively
Xiong Fan, Qiang Tang
2018/249
Analysis of Deutsch-Jozsa Quantum Algorithm
Zhengjun Cao, Lihua Liu
2018/248
Stake-Bleeding Attacks on Proof-of-Stake Blockchains
Peter Gaži, Aggelos Kiayias, Alexander Russell
2018/247
Hardware-Supported ORAM in Effect: Practical Oblivious Search and Update on Very Large Dataset
Thang Hoang, Muslum Ozgur Ozmen, Yeongjin Jang, Attila A. Yavuz
2018/246
Universally Verifiable MPC with Applications to IRV Ballot Counting
Chris Culnane, Olivier Pereira, Kim Ramchen, Vanessa Teague
2018/245
Secure Search via Multi-Ring Fully Homomorphic Encryption
Adi Akavia, Dan Feldman, Hayim Shaul
2018/244
Faster Homomorphic Linear Transformations in HElib
Shai Halevi, Victor Shoup
2018/243
A New Approach to Deanonymization of Unreachable Bitcoin Nodes
Indra Deep Mastan, Souradyuti Paul
2018/242
A New Constant-size Accountable Ring Signature Scheme Without Random Oracles
Sudhakar Kumawat, Souradyuti Paul
2018/241
zkLedger: Privacy-Preserving Auditing for Distributed Ledgers
Neha Narula, Willy Vasquez, Madars Virza
2018/240
Towards Non-Interactive Zero-Knowledge for NP from LWE
Ron D. Rothblum, Adam Sealfon, Katerina Sotiraki
2018/239
RepuCoin: Your Reputation is Your Power
Jiangshan Yu, David Kozhaya, Jeremie Decouchant, Paulo Esteves-Verissimo
2018/238
Private Set Intersection with Linear Communication from General Assumptions
Brett Hemenway Falk, Daniel Noble, Rafail Ostrovsky
2018/237
On Tightly Secure Non-Interactive Key Exchange
Julia Hesse, Dennis Hofheinz, Lisa Kohl
2018/236
Low-Resource Eclipse Attacks on Ethereum's Peer-to-Peer Network
Yuval Marcus, Ethan Heilman, Sharon Goldberg
2018/235
Combining Asynchronous and Synchronous Byzantine Agreement: The Best of Both Worlds
Julian Loss, Tal Moran
2018/234
P2KMV: A Privacy-preserving Counting Sketch for Efficient and Accurate Set Intersection Cardinality Estimations
Hagen Sparka, Florian Tschorsch, Björn Scheuermann
2018/233
Privacy-Preserving Logistic Regression Training
Charlotte Bonte, Frederik Vercauteren
2018/232
Improved fully homomorphic public-key encryption with small ciphertext size
Masahiro Yagisawa
2018/231
Remarks on Bell's Inequality
Zhengjun Cao, Lihua Liu
2018/230
Saber: Module-LWR based key exchange, CPA-secure encryption and CCA-secure KEM
Jan-Pieter D’Anvers, Angshuman Karmakar, Sujoy Sinha Roy, Frederik Vercauteren
2018/229
Optimizing polynomial convolution for NTRUEncrypt
Wei Dai, William Whyte, Zhenfei Zhang
2018/228
Non-interactive zaps of knowledge
Georg Fuchsbauer, Michele Orrù
2018/227
Can We Overcome the $n \log n$ Barrier for Oblivious Sorting?
Wei-Kai Lin, Elaine Shi, Tiancheng Xie
2018/226
Non-Uniform Bounds in the Random-Permutation, Ideal-Cipher, and Generic-Group Models
Sandro Coretti, Yevgeniy Dodis, Siyao Guo
2018/225
A foundation for secret, verifiable elections
Ben Smyth
2018/224
Threshold Properties of Prime Power Subgroups with Application to Secure Integer Comparisons
Rhys Carlton, Aleksander Essex, Krzysztof Kapulkin
2018/223
Shorter double-authentication preventing signatures for small address spaces
Bertram Poettering
2018/222
Authentication with weaker trust assumptions for voting systems
Elizabeth A. Quaglia, Ben Smyth
2018/221
Bandwidth-Hard Functions: Reductions and Lower Bounds
Jeremiah Blocki, Peiyuan Liu, Ling Ren, and Samson Zhou
2018/220
PRO-ORAM: Constant Latency Read-Only Oblivious RAM
Shruti Tople, Yaoqi Jia, Prateek Saxena
2018/219
On Side-Channel Vulnerabilities of Bit Permutations: Key Recovery and Reverse Engineering
Jakub Breier, Dirmanto Jap, Xiaolu Hou, Shivam Bhasin
2018/218
On Evaluating Fault Resilient Encoding Schemes in Software
Jakub Breier, Xiaolu Hou, Yang Liu
2018/217
Defending Against Key Exfiltration: Efficiency Improvements for Big-Key Cryptography via Large-Alphabet Subkey Prediction
Mihir Bellare, Wei Dai
2018/216
Secure Computation with Low Communication from Cross-checking
S. Dov Gordon, Samuel Ranellucci, Xiao Wang
2018/215
Towards everlasting privacy and efficient coercion resistance in remote electronic voting
Panagiotis Grontas, Aris Pagourtzis, Alexandros Zacharakis, Bingsheng Zhang
2018/214
RMAC -- A Lightweight Authentication Protocol for Highly Constrained IoT Devices
Ahmad Khoureich Ka
2018/213
Committing to Quantum Resistance: A Slow Defence for Bitcoin against a Fast Quantum Computing Attack
I. Stewart, D. Ilie, A. Zamyatin, S. Werner, M. F. Torshizi, W. J. Knottenbelt
2018/212
How to Subvert Backdoored Encryption: Security Against Adversaries that Decrypt All Ciphertexts
Thibaut Horel, Sunoo Park, Silas Richelson, Vinod Vaikuntanathan
2018/211
Number "Not Used" Once - Practical fault attack on pqm4 implementations of NIST candidates
Prasanna Ravi, Debapriya Basu Roy, Shivam Bhasin, Anupam Chattopadhyay, Debdeep Mukhopadhyay
2018/210
A Simple Obfuscation Scheme for Pattern-Matching with Wildcards
Allison Bishop, Lucas Kowalczyk, Tal Malkin, Valerio Pastro, Mariana Raykova, Kevin Shi
2018/209
CALYPSO: Private Data Management for Decentralized Ledgers
Eleftherios Kokoris-Kogias, Enis Ceyhun Alp, Linus Gasser, Philipp Jovanovic, Ewa Syta, Bryan Ford
2018/208
TinyKeys: A New Approach to Efficient Multi-Party Computation
Carmit Hazay, Emmanuela Orsini, Peter Scholl, Eduardo Soria-Vazquez
2018/207
Non-Malleable Codes for Small-Depth Circuits
Marshall Ball, Dana Dachman-Soled, Siyao Guo, Tal Malkin, Li-Yang Tan
2018/206
Reading in the Dark: Classifying Encrypted Digits with Functional Encryption
Edouard Dufour-Sans, Romain Gay, David Pointcheval
2018/205
Static-Memory-Hard Functions, and Modeling the Cost of Space vs. Time
Thaddeus Dryja, Quanquan C. Liu, Sunoo Park
2018/204
Short Non-Malleable Codes from Related-Key Secure Block Ciphers
Serge Fehr, Pierre Karpman, Bart Mennink
2018/203
Impeccable Circuits
Anita Aghaie, Amir Moradi, Shahram Rasoolzadeh, Aein Rezaei Shahmirzadi, Falk Schellenberg, Tobias Schneider
2018/202
Doing Real Work with FHE: The Case of Logistic Regression
Jack L. H. Crawford, Craig Gentry, Shai Halevi, Daniel Platt, Victor Shoup
2018/201
Efficient Parallel Binary Operations on Homomorphic Encrypted Real Numbers
Jim Basilakis, Bahman Javadi
2018/200
Hermes. A framework for cryptographically assured access control and data security
Eugene Pilyankevich, Ignat Korchagin, Andrey Mnatsakanov
2018/199
Bloom Filter Encryption and Applications to Efficient Forward-Secret 0-RTT Key Exchange
David Derler, Kai Gellert, Tibor Jager, Daniel Slamanig, Christoph Striecks
2018/198
A Key-recovery Attack on 855-round Trivium
Ximing Fu, Xiaoyun Wang, Xiaoyang Dong, Willi Meier
2018/197
Green Mining: toward a less energetic impact of cryptocurrencies
Philippe Jacquet, Bernard Mans
2018/196
Non-Profiled Deep Learning-Based Side-Channel Attacks
Benjamin Timon
2018/195
Breach-Resistant Structured Encryption
Ghous Amjad, Seny Kamara, Tarik Moataz
2018/194
Proofs of Catalytic Space
Krzysztof Pietrzak
2018/193
A New Family of Pairing-Friendly elliptic curves
Michael Scott, Aurore Guillevic
2018/192
SoK: unraveling Bitcoin smart contracts
Nicola Atzei, Massimo Bartoletti, Tiziana Cimoli, Stefano Lande, Roberto Zunino
2018/191
Signatures with Flexible Public Key: Introducing Equivalence Classes for Public Keys
Michael Backes, Lucjan Hanzlik, Kamil Kluczniak, Jonas Schneider
2018/190
New Lower Bounds on Predicate Entropy for Function Private Public-Key Predicate Encryption
Sikhar Patranabis, Debdeep Mukhopadhyay
2018/189
Threshold Implementation in Software - Case Study of PRESENT
Pascal Sasdrich, René Bock, Amir Moradi
2018/188
Kissing numbers and transference theorems from generalized tail bounds
Stephen D. Miller, Noah Stephens-Davidowitz
2018/187
Making Groth's zk-SNARK Simulation Extractable in the Random Oracle Model
Sean Bowe, Ariel Gabizon
2018/186
RKHD ElGamal signing and 1-way sums
Daniel R. L. Brown
2018/185
A privacy-preserving method for temporarily linking/revoking pseudonym certificates in vehicular networks
Marcos A. Simplicio Jr., Eduardo Lopes Cominetti, Harsh Kupwade Patil, Jefferson E. Ricardini, Leonardo T. D. Ferraz, Marcos Vinicius M. Silva
2018/184
Can you find the one for me? Privacy-Preserving Matchmaking via Threshold PSI
Yongjun Zhao, Sherman S. M. Chow
2018/183
Simple Proofs of Sequential Work
Bram Cohen, Krzysztof Pietrzak
2018/182
Truncated Differential Properties of the Diagonal Set of Inputs for 5-round AES
Lorenzo Grassi, Christian Rechberger
2018/181
Rasta: A cipher with low ANDdepth and few ANDs per bit
Christoph Dobraunig, Maria Eichlseder, Lorenzo Grassi, Virginie Lallemand, Gregor Leander, Eik List, Florian Mendel, and Christian Rechberger
2018/180
Two-Round Multiparty Secure Computation Minimizing Public Key Operations
Sanjam Garg, Peihan Miao, Akshayaram Srinivasan
2018/179
Efficient and Constant-Rounds Secure Comparison through Dynamic Groups and Asymmetric Computations
Ken Goss, Wei Jiang
2018/178
--Withdrawn--
Zhi Hu, Lin Wang, Chang-An Zhao
2018/177
On the Use of Independent Component Analysis to Denoise Side-Channel Measurements
Houssem Maghrebi, Emmanuel Prouff
2018/176
Fine-Tuning Decentralized Anonymous Payment Systems based on Arguments for Arithmetic Circuit Satisfiability
Kamil Kluczniak, Man Ho Au
2018/175
Scalable Key Rank Estimation (and Key Enumeration) Algorithm for Large Keys
Vincent Grosso
2018/174
A New Framework for Finding Nonlinear Superpolies in Cube Attacks against Trivium-Like Ciphers
Chen-Dong Ye, Tian Tian
2018/173
Vectorizing Higher-Order Masking
Benjamin Grégoire, Kostas Papagiannopoulos, Peter Schwabe, Ko Stoffelen
2018/172
A First-Order SCA Resistant AES without Fresh Randomness
Felix Wegener, Amir Moradi
2018/171
On the Complexity of Simulating Auxiliary Input
Yi-Hsiu Chen, Kai-Min Chung, Jyun-Jie Liao
2018/170
On the Ring-LWE and Polynomial-LWE problems
Miruna Rosca, Damien Stehlé, Alexandre Wallet
2018/169
Full Indifferentiable Security of the Xor of Two or More Random Permutations Using the $\chi^2$ Method
Srimanta Bhattacharya, Mridul Nandi
2018/168
Statistical Witness Indistinguishability (and more) in Two Messages
Yael Tauman Kalai, Dakshita Khurana, Amit Sahai
2018/167
On the Existence of Three Round Zero-Knowledge Proofs
Nils Fleischhacker, Vipul Goyal, Abhishek Jain
2018/166
Optimal Forgeries Against Polynomial-Based MACs and GCM
Atul Luykx, Bart Preneel
2018/165
The Wonderful World of Global Random Oracles
Jan Camenisch, Manu Drijvers, Tommaso Gagliardoni, Anja Lehmann, Gregory Neven
2018/164
An Efficiency-Preserving Transformation from Honest-Verifier Statistical Zero-Knowledge to Statistical Zero-Knowledge
Pavel Hubáček, Alon Rosen, Margarita Vald
2018/163
OPAQUE: An Asymmetric PAKE Protocol Secure Against Pre-Computation Attacks
Stanislaw Jarecki, Hugo Krawczyk, Jiayu Xu
2018/162
Untagging Tor: A Formal Treatment of Onion Encryption
Jean Paul Degabriele, Martijn Stam
2018/161
Boomerang Connectivity Table: A New Cryptanalysis Tool
Carlos Cid, Tao Huang, Thomas Peyrin, Yu Sasaki, Ling Song
2018/160
DelegaTEE: Brokered Delegation Using Trusted Execution Environments
Sinisa Matetic, Moritz Schneider, Andrew Miller, Ari Juels, Srdjan Capkun
2018/159
The Missing Difference Problem, and its Applications to Counter Mode Encryption
Gaëtan Leurent, Ferdinand Sibleyras
2018/158
Correlation Cube Attacks: From Weak-Key Distinguisher to Key Recovery
Meicheng Liu, Jingchun Yang, Wenhao Wang, Dongdai Lin
2018/157
ROYALE: A Framework for Universally Composable Card Games with Financial Rewards and Penalties Enforcement
Bernardo David, Rafael Dowsley, Mario Larangeira
2018/156
A New Approach to Black-Box Concurrent Secure Computation
Sanjam Garg, Susumu Kiyoshima, Omkant Pandey
2018/155
Memory Lower Bounds of Reductions Revisited
Yuyu Wang, Takahiro Matsuda, Goichiro Hanaoka, Keisuke Tanaka
2018/154
Constrained PRFs for NC1 in Traditional Groups
Nuttapong Attrapadung, Takahiro Matsuda, Ryo Nishimaki, Shota Yamada, Takashi Yamakawa
2018/153
Bootstrapping for Approximate Homomorphic Encryption
Jung Hee Cheon, Kyoohyung Han, Andrey Kim, Miran Kim, Yongsoo Song
2018/152
A General Framework for the Related-key Linear Attack against Block Ciphers with Linear Key Schedules
Jung-Keun Lee, Bonwook Koo, Woo-Hwan Kim
2018/151
Adaptively Secure Garbling with Near Optimal Online Complexity
Sanjam Garg, Akshayaram Srinivasan
2018/150
Analysis of Error-Correcting Codes for Lattice-Based Key Exchange
Tim Fritzmann, Thomas Pöppelmann, Johanna Sepulveda
2018/149
Another Step Towards Realizing Random Oracles: Non-Malleable Point Obfuscation
Ilan Komargodski, Eylon Yogev
2018/148
The Complexity of Multiparty PSM Protocols and Related Models
Amos Beimel, Eyal Kushilevitz, Pnina Nissim
2018/147
Sustained Space Complexity
Joel Alwen, Jeremiah Blocki, Krzysztof Pietrzak
2018/146
Polynomial Time Bounded Distance Decoding near Minkowski’s Bound in Discrete Logarithm Lattices
Léo Ducas, Cécile Pierrot
2018/145
Fast Near Collision Attack on the Grain v1 Stream Cipher
Bin Zhang, Chao Xu, Willi Meier
2018/144
The Communication Complexity of Private Simultaneous Messages, Revisited
Benny Applebaum, Thomas Holenstein, Manoj Mishra, Ofer Shayevitz
2018/143
Conjecturally Superpolynomial Lower Bound for Share Size
Shahram Khazaei
2018/142
MILP-Aided Related-Tweak/Key Impossible Differential Attack and Its applications to QARMA, Joltik-BC
Rui Zong, Xiaoyang Dong
2018/141
Symbolic security of garbled circuits
Baiyu Li, Daniele Micciancio
2018/140
A Reaction Attack on LEDApkc
Tomas Fabsic, Viliam Hromada, Pavol Zajac
2018/139
Faster Multiplication Triplet Generation from Homomorphic Encryption for Practical Privacy-Preserving Machine Learning under a Narrow Bandwidth
Wen-jie Lu, Jun Sakuma
2018/138
But Why does it Work? A Rational Protocol Design Treatment of Bitcoin
Christian Badertscher, Juan Garay, Ueli Maurer, Daniel Tschudi, Vassilis Zikas
2018/137
Naor-Reingold Goes Public: The Complexity of Known-key Security
Pratik Soni, Stefano Tessaro
2018/136
Revisiting AES-GCM-SIV: Multi-user Security, Faster Key Derivation, and Better Bounds
Priyanka Bose, Viet Tung Hoang, Stefano Tessaro
2018/135
A note on the equivalence of IND-CCA & INT-PTXT and IND-CCA & INT-CTXT
Daniel Jost, Christian Badertscher, Fabio Banfi
2018/134
A Las Vegas algorithm to solve the elliptic curve discrete logarithm problem
Ayan Mahalanobis, Vivek Mallick
2018/133
Quasi-Optimal SNARGs via Linear Multi-Prover Interactive Proofs
Dan Boneh, Yuval Ishai, Amit Sahai, David J. Wu
2018/132
On Isogeny Graphs of Supersingular Elliptic Curves over Finite Fields
Gora Adj, Omran Ahmadi, Alfred Menezes
2018/131
Fiat-Shamir and Correlation Intractability from Strong KDM-Secure Encryption
Ran Canetti, Yilei Chen, Leonid Reyzin, Ron D. Rothblum
2018/130
SMT-based Cube Attack on Simeck32/64
Mojtaba Zaheri, Babak Sadeghiyan
2018/129
Multi-mode Cryptocurrency Systems
Tuyet Duong, Alexander Chepurnoy, Hong-Sheng Zhou
2018/128
Authenticated Encryption Mode IAPM using SHA-3's Public Random Permutation
Charanjit S. Jutla
2018/127
Accountability in Security Protocols
Robert Künnemann, Deepak Garg, Michael Backes
2018/126
Onion-AE: Foundations of Nested Encryption
Phillip Rogaway, Yusi Zhang
2018/125
Challenges in cyber security - Ransomware Phenomenon
Pasca Vlad-Raul, Simion Emil
2018/124
Evaluating the indistinguishability of the XTS mode in the proposed security model
Nguyen Tuan Anh, Nguyen Bui Cuong
2018/123
Distributed Time-Memory Tradeoff Attacks on Ciphers (with Application to Stream Ciphers and Counter Mode)
Howard M. Heys
2018/122
BitML: A Calculus for Bitcoin Smart Contracts
Massimo Bartoletti, Roberto Zunino
2018/121
ECC mod 8^91+5
Daniel R. L. Brown
2018/120
Efficient Circuit-based PSI via Cuckoo Hashing
Benny Pinkas, Thomas Schneider, Christian Weinert, Udi Wieder
2018/119
Drive-by Key-Extraction Cache Attacks from Portable Code
Daniel Genkin, Lev Pachmanov, Eran Tromer, Yuval Yarom
2018/118
Updatable Encryption with Post-Compromise Security
Anja Lehmann, Bjoern Tackmann
2018/117
An Improved RNS Variant of the BFV Homomorphic Encryption Scheme
Shai Halevi, Yuriy Polyakov, Victor Shoup
2018/116
Unbounded ABE via Bilinear Entropy Expansion, Revisited
Jie Chen, Junqing Gong, Lucas Kowalczyk, Hoeteck Wee
2018/115
An Improved Affine Equivalence Algorithm for Random Permutations
Itai Dinur
2018/114
Offline Assisted Group Key Exchange
Colin Boyd, Gareth T. Davies, Kristian Gjøsteen, Yao Jiang
2018/113
Classification of Balanced Quadratic Functions
Lauren De Meyer, Begül Bilgin
2018/112
Just in Time Hashing
Benjamin Harsha, Jeremiah Blocki
2018/111
MRHS Solver Based on Linear Algebra and Exhaustive Search
Håvard Raddum, Pavol Zajac
2018/110
Rank Analysis of Cubic Multivariate Cryptosystems
John Baena, Daniel Cabarcas, Daniel Escudero, Karan Khathuria, Javier Verbel
2018/109
NTRU-LPR IND-CPA: A New Ideal Lattices-based Scheme
Soda Diop, Bernard Ousmane Sané, Nafissatou Diarra, Michel Seck
2018/108
Generic Round-Function-Recovery Attacks for Feistel Networks over Small Domains
F. Betül Durak, Serge Vaudenay
2018/107
Towards Practical Lattice-Based One-Time Linkable Ring Signatures
Carsten Baum, Huang Lin, Sabine Oechsner
2018/106
On the Gold Standard for Security of Universal Steganography
Sebastian Berndt, Maciej Liśkiewicz
2018/105
Combining Private Set-Intersection with Secure Two-Party Computation
Michele Ciampi, Claudio Orlandi
2018/104
PHANTOM and GHOSTDAG: A Scalable Generalization of Nakamoto Consensus
Yonatan Sompolinsky, Shai Wyborski, Aviv Zohar
2018/103
Decomposition of Permutations in a Finite Field
Svetla Nikova, Ventzislav Nikov, Vincent Rijmen
2018/102
Grafting Trees: a Fault Attack against the SPHINCS framework
Laurent Castelnovi, Ange Martinelli, Thomas Prest
2018/101
A Secure and Privacy-preserving Protocol for Smart Metering Operational Data Collection
Mustafa A. Mustafa, Sara Cleemput, Abdelrahaman Aly, Aysajan Abidin
2018/100
A Nonstandard Variant of Learning with Rounding with Polynomial Modulus and Unbounded Samples
Hart Montgomery
2018/099
Improved Bounds on the Threshold Gap in Ramp Secret Sharing
Ignacio Cascudo, Jaron Skovsted Gundersen, Diego Ruano
2018/098
How to Reveal the Secrets of an Obscure White-Box Implementation
Louis Goubin, Pascal Paillier, Matthieu Rivain, Junwei Wang
2018/097
Exploiting an HMAC-SHA-1 optimization to speed up PBKDF2
Andrea Visconti, Federico Gorla
2018/096
Paralysis Proofs: Secure Access-Structure Updates for Cryptocurrencies and More
Fan Zhang, Philip Daian, Gabriel Kaptchuk, Iddo Bentov, Ian Miers, Ari Juels
2018/095
Towards Fully Automated Analysis of Whiteboxes: Perfect Dimensionality Reduction for Perfect Leakage
Cees-Bart Breunesse, Ilya Kizhvatov, Ruben Muijrers, Albert Spruyt
2018/094
Parameterization of Edwards curves on the rational field Q with given torsion subgroups
Linh Tung Vo
2018/093
Statistical Attacks on Cookie Masking for RC4
Kenneth G. Paterson, Jacob C. N. Schuldt
2018/092
Constructions of S-boxes with uniform sharing
Kerem Varici, Svetla Nikova, Ventzislav Nikov, Vincent Rijmen
2018/091
Polynomial multiplication over binary finite fields: new upper bounds
Alessandro De Piccoli, Andrea Visconti, Ottavio Giulio Rizzo
2018/090
Secure and Scalable Multi-User Searchable Encryption
Cédric Van Rompay, Refik Molva, Melek Önen
2018/089
The Unified Butterfly Effect: Efficient Security Credential Management System for Vehicular Communications
Marcos A. Simplicio Jr., Eduardo Lopes Cominetti, Harsh Kupwade Patil, Jefferson E. Ricardini, Marcos Vinicius M. Silva
2018/088
Fully homomorphic public-key encryption with small ciphertext size
Masahiro Yagisawa
2018/087
(Short Paper) A Wild Velvet Fork Appears! Inclusive Blockchain Protocol Changes in Practice
Alexei Zamyatin, Nicholas Stifter, Aljosha Judmayer, Philipp Schindler, Edgar Weippl, William J. Knottenbelt
2018/086
Constructing low-weight dth-order correlation-immune Boolean functions through the Fourier-Hadamard transform
Claude Carlet, Xi Chen
2018/085
Protecting Block Ciphers against Differential Fault Attacks without Re-keying (Extended Version)
Anubhab Baksi, Shivam Bhasin, Jakub Breier, Mustafa Khairallah, Thomas Peyrin
2018/084
Threat-Adjusting Security: BitFlip as an AI-Ready, Post-Quantum cipher
Gideon Samid
2018/083
Flaws in a Verifiably Multiplicative Secret Sharing Scheme from ICITS 2017
Maki Yoshida, Satoshi Obana
2018/082
Synchronized Aggregate Signatures from the RSA Assumption
Susan Hohenberger, Brent Waters
2018/081
How to validate the secret of a Ring Learning with Errors (RLWE) key
Jintai Ding, Saraswathy RV, Saed Alsayigh, Crystal Clough
2018/080
A Cryptographic Analysis of the WireGuard Protocol
Benjamin Dowling, Kenneth G. Paterson
2018/079
Progressive lattice sieving
Thijs Laarhoven, Artur Mariano
2018/078
A Systematic Approach To Cryptocurrency Fees
Alexander Chepurnoy, Vasily Kharin, Dmitry Meshkov
2018/077
On the Bit Security of Cryptographic Primitives
Daniele Micciancio, Michael Walter
2018/076
EM Analysis in the IoT Context: Lessons Learned from an Attack on Thread
Daniel Dinu, Ilya Kizhvatov
2018/075
MILP-aided Cube-attack-like Cryptanalysis on Keccak Keyed Modes
Wenquan Bi, Xiaoyang Dong, Zheng Li, Rui Zong, Xiaoyun Wang
2018/074
Secure Logistic Regression Based on Homomorphic Encryption: Design and Evaluation
Miran Kim, Yongsoo Song, Shuang Wang, Yuhou Xia, Xiaoqian Jiang
2018/073
GAZELLE: A Low Latency Framework for Secure Neural Network Inference
Chiraag Juvekar, Vinod Vaikuntanathan, Anantha Chandrakasan
2018/072
Template-based Fault Injection Analysis of Block Ciphers
Ashrujit Ghoshal, Sikhar Patranabis, Debdeep Mukhopadhyay
2018/071
SIFA: Exploiting Ineffective Fault Inductions on Symmetric Cryptography
Christoph Dobraunig, Maria Eichlseder, Thomas Korak, Stefan Mangard, Florian Mendel, Robert Primas
2018/070
A Unified Framework for Trapdoor-Permutation-Based Sequential Aggregate Signatures
Craig Gentry, Adam O'Neill, Leonid Reyzin
2018/069
Reusing Nonces in Schnorr Signatures
Marc Beunardeau, Aisling Connolly, Houda Ferradi, Rémi Géraud, David Naccache, Damien Vergnaud
2018/068
Simple Schnorr Multi-Signatures with Applications to Bitcoin
Gregory Maxwell, Andrew Poelstra, Yannick Seurin, Pieter Wuille
2018/067
Homomorphic Lower Digits Removal and Improved FHE Bootstrapping
Hao Chen, Kyoohyung Han
2018/066
Tweaking Generic OTR to Avoid Forgery Attacks
Hassan Qahur Al Mahri, Leonie Simpson, Harry Bartlett, Ed Dawson, Kenneth Koon-Ho Wong
2018/065
Non-Locality in Interactive Proofs
Claude Crépeau, Nan Yang
2018/064
Systematization Of A 256-Bit Lightweight Block Cipher Marvin
Sukanya Saha, Krishnendu Rarhi, Abhishek Bhattacharya
2018/063
The Viability of Post-quantum X.509 Certificates
Panos Kampanakis, Peter Panburana, Ellie Daw, Daniel Van Geest
2018/062
Countermeasures against a side-channel attack in a kernel memory
Na-Young Ahn, Dong Hoon Lee
2018/061
Full-Hiding (Unbounded) Multi-Input Inner Product Functional Encryption from the $k$-Linear Assumption
Pratish Datta, Tatsuaki Okamoto, Junichi Tomida
2018/060
A Simple Reduction from State Machine Replication to Binary Agreement in Partially Synchronous or Asynchronous Networks
Abhinav Aggarwal, Yue Guo
2018/059
New Insights into Divide-and-Conquer Attacks on the Round-Reduced Keccak-MAC
Chen-Dong Ye, Tian Tian
2018/058
Leakage-resilient Algebraic Manipulation Detection Codes with Optimal Parameters
Divesh Aggarwal, Tomasz Kazana, Maciej Obremski
2018/057
Efficient Noninteractive Certification of RSA Moduli and Beyond
Sharon Goldberg, Leonid Reyzin, Omar Sagga, Foteini Baldimtsi
2018/056
SETLA: Signature and Encryption from Lattices
François Gérard, Keno Merckx
2018/055
High-Resolution EM Attacks Against Leakage-Resilient PRFs Explained - And An Improved Construction
Florian Unterstein, Johann Heyszl, Fabrizio De Santis, Robert Specht, Georg Sigl
2018/054
More Efficient (Almost) Tightly Secure Structure-Preserving Signatures
Romain Gay, Dennis Hofheinz, Lisa Kohl, Jiaxin Pan
2018/053
Study of Deep Learning Techniques for Side-Channel Analysis and Introduction to ASCAD Database
Emmanuel Prouff, Remi Strullu, Ryad Benadjila, Eleonora Cagli, Cecile Dumas
2018/052
Optimizing Trees for Static Searchable Encryption
Mohammad Etemad, Mohammad Mahmoody, David Evans
2018/051
Semantic Security Invariance under Variant Computational Assumptions
Eftychios Theodorakis, John C. Mitchell
2018/050
A Constructive Perspective on Signcryption Security
Christian Badertscher, Fabio Banfi, Ueli Maurer
2018/049
Attacks and Countermeasures for White-box Designs
Alex Biryukov, Aleksei Udovenko
2018/048
Impossible Differential Cryptanalysis on Deoxys-BC-256
Alireza mehrdad, Farokhlagha Moazami, Hadi Soleimany
2018/047
The distinguishing attack on Speck, Simon, Simeck, HIGHT and LEA
Boris Ryabko, Aleksandr Soskov
2018/046
Scalable, transparent, and post-quantum secure computational integrity
Eli Ben-Sasson, Iddo Bentov, Yinon Horesh, Michael Riabzev
2018/045
Efficient Batch Zero-Knowledge Arguments for Low Degree Polynomials
Jonathan Bootle, Jens Groth
2018/044
Fast Lattice Basis Reduction Suitable for Massive Parallelization and Its Application to the Shortest Vector Problem
Tadanori Teruya, Kenji Kashiwabara, Goichiro Hanaoka
2018/043
Efficient Adaptively Secure Zero-knowledge from Garbled Circuits
Chaya Ganesh, Yashvanth Kondi, Arpita Patra, Pratik Sarkar
2018/042
Improved (Almost) Tightly-Secure Structure-Preserving Signatures
Charanjit S. Jutla, Miyako Ohkubo, Arnab Roy
2018/041
Related Randomness Security for Public Key Encryption, Revisited
Takahiro Matsuda, Jacob C. N. Schuldt
2018/040
An Analysis of Acceptance Policies For Blockchain Transactions
Seb Neumayer, Mayank Varia, Ittay Eyal
2018/039
Faster AVX2 optimized NTT multiplication for Ring-LWE lattice cryptography
Gregor Seiler
2018/038
On the Message Complexity of Secure Multiparty Computation
Yuval Ishai, Manika Mittal, Rafail Ostrovsky
2018/037
Weakly Secure Equivalence-Class Signatures from Standard Assumptions
Georg Fuchsbauer, Romain Gay
2018/036
Extending Oblivious Transfer with Low Communication via Key-Homomorphic PRFs
Peter Scholl
2018/035
A Linearly Homomorphic Signature Scheme From Weaker Assumptions
Lucas Schabhüser, Johannes Buchmann, Patrick Struck
2018/034
Constant-size Group Signatures from Lattices
San Ling, Khoa Nguyen, Huaxiong Wang, Yanhong Xu
2018/033
Two-Factor Password-Authenticated Key Exchange with End-to-End Password Security
Stanislaw Jarecki, Mohammed Jubur, Hugo Krawczyk, Maliheh Shirvanian, Nitesh Saxena
2018/032
Publicly Verifiable Proofs of Space
Markus Jakobsson
2018/031
Secure Remote Attestation
Markus Jakobsson
2018/030
Tightly SIM-SO-CCA Secure Public Key Encryption from Standard Assumptions
Lin Lyu, Shengli Liu, Shuai Han, Dawu Gu
2018/029
Practical, Anonymous, and Publicly Linkable Universally-Composable Reputation Systems
Johannes Blömer, Fabian Eidens, Jakob Juhnke
2018/028
Compact Energy and Delay-Aware Authentication
Muslum Ozgur Ozmen, Rouzbeh Behnia, Attila A. Yavuz
2018/027
A verifiable shuffle for the GSW cryptosystem
Martin Strand
2018/026
Zero-Knowledge Proof of Decryption for FHE Ciphertexts
Christopher Carr, Anamaria Costache, Gareth T. Davies, Kristian Gjøsteen, Martin Strand
2018/025
Hedged Nonce-Based Public-Key Encryption: Adaptive Security under Randomness Failures
Zhengan Huang, Junzuo Lai, Wenbin Chen, Man Ho Au, Zhen Peng, Jin Li
2018/024
KEM Combiners
Federico Giacon, Felix Heuer, Bertram Poettering
2018/023
Public-Key Encryption Resistant to Parameter Subversion and its Realization from Efficiently-Embeddable Groups
Benedikt Auerbach, Mihir Bellare, Eike Kiltz
2018/022
Attribute-based Signatures for Unbounded Circuits in the ROM and Efficient Instantiations from Lattices
Ali El Kaafarani, Shuichi Katsumata
2018/021
Regular Lossy Functions and Their Applications in Leakage-Resilient Cryptography
Yu Chen, Baodong Qin, Haiyang Xue
2018/020
Ciphertext-Only Attacks against Compact-LWE Submitted to NIST PQC Project
Haoyu Li, Renzhang Liu, Yanbin Pan, Tianyuan Xie
2018/019
Two Sides of the Same Coin: Counting and Enumerating Keys Post Side-Channel Attacks Revisited.
Daniel P. Martin, Luke Mather, Elisabeth Oswald
2018/018
Multi-Key Searchable Encryption, Revisited
Ariel Hamlin, abhi shelat, Mor Weiss, Daniel Wichs
2018/017
Verifiability of Helios Mixnet
Ben Smyth
2018/016
New Techniques for Public Key Encryption with Sender Recovery
Murali Godi, Roopa Vishwanathan
2018/015
On Composable Security for Digital Signatures
Christian Badertscher, Ueli Maurer, Björn Tackmann
2018/014
Ubiquitous Weak-key Classes of BRW-polynomial Function
Kaiyan Zheng, Peng Wang, Dingfeng Ye
2018/013
Hashing solutions instead of generating problems: On the interactive certification of RSA moduli
Benedikt Auerbach, Bertram Poettering
2018/012
An Inside Job: Remote Power Analysis Attacks on FPGAs
Falk Schellenberg, Dennis R. E. Gnad, Amir Moradi, Mehdi B. Tahoori
2018/011
Graded Encoding Schemes from Obfuscation
Pooya Farshim, Julia Hesse, Dennis Hofheinz, Enrique Larraia
2018/010
Interactively Secure Groups from Obfuscation
Thomas Agrikola, Dennis Hofheinz
2018/009
Evaluation of Resilience of randomized RNS implementation
Jérôme Courtois, Lokman Abbas-Turki, Jean-Claude Bajard
2018/008
Quantum Algorithms for Boolean Equation Solving and Quantum Algebraic Attack on Cryptosystems
Yu-Ao Chen, Xiao-Shan Gao
2018/007
An Efficient Public-Key Searchable Encryption Scheme Secure against Inside Keyword Guessing Attacks
Qiong Huang, Hongbo Li
2018/006
Higher Order Side-Channel Attacks Resilient S-boxes
Liran Lerman, Stjepan Picek, Nikita Veshchikov, Olivier Markowitch
2018/005
Simple and Efficient Two-Server ORAM
S. Dov Gordon, Jonathan Katz, Xiao Wang
2018/004
On the Performance of Convolutional Neural Networks for Side-channel Analysis
Stjepan Picek, Ioannis Petros Samiotis, Annelie Heuser, Jaehun Kim, Shivam Bhasin, Axel Legay
2018/003
How to (not) share a password: Privacy preserving protocols for finding heavy hitters with adversarial behavior
Moni Naor, Benny Pinkas, Eyal Ronen
2018/002
The Multiplicative Complexity of 6-variable Boolean Functions
Cagdas Calik, Meltem Sonmez Turan, Rene Peralta
2018/001
On the Power of Amortization in Secret Sharing: $d$-Uniform Secret Sharing and CDS with Constant Information Rate
Benny Applebaum, Barak Arkis
2017/1262
A New Index Calculus Algorithm for the Elliptic Curve Discrete Logarithm Problem and Summation Polynomial Evaluation
Gary McGuire, Daniela Mueller
2017/1261
A Comprehensive Performance Analysis of Hardware Implementations of CAESAR Candidates
Sachin Kumar, Jawad Haj-Yahya, Mustafa Khairallah, Mahmoud A. Elmohr, Anupam Chattopadhyay
2017/1260
Collision Resistant Hashing from Sub-exponential Learning Parity with Noise
Yu Yu, Jiang Zhang, Jian Weng, Chun Guo, Xiangxue Li
2017/1259
Cryptanalysis of HK17
Haoyu Li, Renzhang Liu, Yanbin Pan, Tianyuan Xie
2017/1258
Remarks on Quaternions/Octonion Based Diffie-Hellman Key Exchange Protocol Submitted to NIST PQC Project
Yongge Wang, Qutaibah m. Malluhi
2017/1257
A first-order chosen-plaintext DPA attack on the third round of DES
Oscar Reparaz, Benedikt Gierlichs
2017/1256
A Universally Composable Treatment of Network Time
Ran Canetti, Kyle Hogan, Aanchal Malhotra, Mayank Varia
2017/1255
On the Strategy and Behavior of Bitcoin Mining with N-attackers
Hanqing Liu, Na Ruan, Rongtian Du, Weijia Jia
2017/1254
Practical Applications of Improved Gaussian Sampling for Trapdoor Lattices
Kamil Doruk Gür, Yuriy Polyakov, Kurt Rohloff, Gerard W. Ryan, Hadi Sajjadpour, Erkay Savaş
2017/1253
Micro-Architectural Power Simulator for Leakage Assessment of Cryptographic Software on ARM Cortex-M3 Processors
Yann Le Corre, Johann Großschädl, Daniel Dinu
2017/1252
Breakdown Resilience of Key Exchange Protocols: NewHope, TLS 1.3, and Hybrids
Jacqueline Brendel, Marc Fischlin, Felix Günther
2017/1251
A toolbox for software optimization of QC-MDPC code-based cryptosystems
Nir Drucker, Shay Gueron
2017/1250
Non-Interactive Delegation for Low-Space Non-Deterministic Computation
Saikrishna Badrinarayanan, Yael Tauman Kalai, Dakshita Khurana, Amit Sahai, Daniel Wichs
2017/1249
Quantum cryptanalysis on some Generalized Feistel Schemes
Xiaoyang Dong, Zheng Li, Xiaoyun Wang
2017/1248
Foundations of Homomorphic Secret Sharing
Elette Boyle, Niv Gilboa, Yuval Ishai, Huijia Lin, Stefano Tessaro
2017/1247
Block encryption of quantum messages
Min Liang, Li Yang
2017/1246
Verification of FPGA-augmented trusted computing mechanisms based on Applied Pi Calculus
Alessandro Cilardo, Andrea Primativo
2017/1245
IntegriKey: End-to-End Integrity Protection of User Input
Aritra Dhar, Der-Yeuan Yu, Kari Kostiainen, Srdjan Capkun
2017/1244
Corrections to ''Further Improving Efficiency of Higher-Order Masking Schemes by Decreasing Randomness Complexity''
Shuang Qiu, Rui Zhang, Yongbin Zhou, Wei Cheng
2017/1243
Augmented Black-Box Simulation and Zero Knowledge Argument for NP
Li Hongda, Pan Dongxue, Ni Peifang
2017/1242
Designing Proof of Transaction Puzzles for Cryptocurrency
Taotao Li, Parhat Abla, Mingsheng Wang, Qianwen Wei
2017/1241
A Public-key Encryption Scheme Based on Non-linear Indeterminate Equations (Giophantus)
Koichiro Akiyama, Yasuhiro Goto, Shinya Okumura, Tsuyoshi Takagi, Koji Nuida, Goichiro Hanaoka, Hideo Shimizu, Yasuhiko Ikematsu
2017/1240
UWB with Pulse Reordering: Securing Ranging against Relay and Physical-Layer Attacks
Mridula Singh, Patrick Leu, Srdjan Capkun
2017/1239
An Efficient NIZK Scheme for Privacy-Preserving Transactions over Account-Model Blockchain
Shunli Ma, Yi Deng, Debiao He, Jiang Zhang, Xiang Xie
2017/1238
Efficient Oblivious Data Structures for Database Services on the Cloud
Thang Hoang, Ceyhun D. Ozkaptan, Gabriel Hackebeil, Attila A. Yavuz
2017/1237
A High-Security Searchable Encryption Framework for Privacy-Critical Cloud Storage Services
Thang Hoang, Attila A. Yavuz, Jorge Guajardo
2017/1236
Fast Quantum Algorithm for Solving Multivariate Quadratic Equations
Jean-Charles Faugère, Kelsey Horan, Delaram Kahrobaei, Marc Kaplan, Elham Kashefi, Ludovic Perret
2017/1235
Practical Quantum-Safe Voting from Lattices
Rafaël del Pino, Vadim Lyubashevsky, Gregory Neven, Gregor Seiler
2017/1234
High-Precision Privacy-Preserving Real-Valued Function Evaluation
Christina Boura, Ilaria Chillotti, Nicolas Gama, Dimitar Jetchev, Stanislav Peceny, Alexander Petric
2017/1233
Provably secure compilation of side-channel countermeasures
Gilles Barthe, Benjamin Grégoire, Vincent Laporte
2017/1232
Optimal Linear Secret Sharing Schemes for Graph Access Structures on Six Participants
Motahhareh Gharahi, Shahram Khazaei
2017/1231
Integer Reconstruction Public-Key Encryption
Houda Ferradi, David Naccache
2017/1230
Overdrive: Making SPDZ Great Again
Marcel Keller, Valerio Pastro, Dragos Rotaru
2017/1229
Quantum Demiric-Selçuk Meet-in-the-Middle Attacks: Applications to 6-Round Generic Feistel Constructions
Akinori Hosoyamada, Yu Sasaki
2017/1228
Speed-ups and time-memory trade-offs for tuple lattice sieving
Gottfried Herold, Elena Kirshanova, Thijs Laarhoven
2017/1227
VerMI: Verification Tool for Masked Implementations
Victor Arribas, Svetla Nikova, Vincent Rijmen
2017/1226
New (and Old) Proof Systems for Lattice Problems
Navid Alamati, Chris Peikert, Noah Stephens-Davidowitz
2017/1225
Fast Garbling of Circuits over 3-Valued Logic
Yehuda Lindell, Avishay Yanai
2017/1224
Practical Cryptanalysis of a Public-key Encryption Scheme Based on Non-linear Indeterminate Equations at SAC 2017
Keita Xagawa
2017/1223
Generic Low-Latency Masking in Hardware
Hannes Gross, Rinat Iusupov, Roderick Bloem
2017/1222
Forward-Private Dynamic Searchable Symmetric Encryption with Efficient Search
Muslum Ozgur Ozmen, Thang Hoang, Attila A. Yavuz
2017/1221
Weak-Unforgeable Tags for Secure Supply Chain Management
Marten van Dijk, Chenglu Jin, Hoda Maleki, Phuong Ha Nguyen, Reza Rahaeimehr
2017/1220
Off-line Digital Cash Schemes Providing Unlinkability, Anonymity and Change
Lynn Batten, Xun Yi
2017/1219
Correlations Between (Nonlinear) Combiners of Input and Output of Random Functions and Permutations
Subhabrata Samajder, Palash Sarkar
2017/1218
TERMinator Suite: Benchmarking Privacy-Preserving Architectures
Dimitris Mouris, Nektarios Georgios Tsoutsos, Michail Maniatakos
2017/1217
Linear Regression Side Channel Attack Applied on Constant XOR
Shan Fu, Zongyue Wang, Fanxing Wei, Guoai Xu, An Wang
2017/1216
Probabilistic and Considerate Attestation of IoT Devices against Roving Malware
Xavier Carpent, Norrathep Rattanavipanon, Gene Tsudik
2017/1215
Lattice-Based Public Key Searchable Encryption from Experimental Perspectives
Rouzbeh Behnia, Muslum Ozgur Ozmen, Attila A. Yavuz
2017/1214
HILA5 Pindakaas: On the CCA security of lattice-based encryption with error correction
Daniel J. Bernstein, Leon Groot Bruinderink, Tanja Lange, Lorenz Panny
2017/1213
On hybrid SIDH schemes using Edwards and Montgomery curve arithmetic
Michael Meyer, Steffen Reith, Fabio Campos
2017/1212
A New Crypto-Classifier Service for Energy Efficiency in Smart Cities
Oana Stan, Mohamed-Haykel Zayani, Renaud Sirdey, Amira Ben Hamida, Alessandro Ferreira Leite, Mallek Mziou-Sallami
2017/1211
Zero-Sum Partitions of PHOTON Permutations
Qingju Wang, Lorenzo Grassi, Christian Rechberger
2017/1210
Two-Face: New Public Key Multivariate Schemes
Gilles Macario-Rat, Jacques Patarin
2017/1209
Improvements for Finding Impossible Differentials of Block Cipher Structures
Yiyuan Luo, Xuejia Lai
2017/1208
Security notions for cloud storage and deduplication
Colin Boyd, Gareth T. Davies, Kristian Gjøsteen, Mohsen Toorani, Håvard Raddum
2017/1207
Unconditionally secure multi-party quantum commitment scheme
Mingqiang Wang, Xue Wang, Tao Zhan
2017/1206
Asymptotically faster quantum algorithms to solve multivariate quadratic equations
Daniel J. Bernstein, Bo-Yin Yang
2017/1205
Connecting Legendre with Kummer and Edwards
Sabyasachi Karati, Palash Sarkar
2017/1204
Horizontal Clustering Side-Channel Attacks on Embedded ECC Implementations (Extended Version)
Erick Nascimento, Lukasz Chmielewski
2017/1203
Short Double- and N-Times-Authentication-Preventing Signatures from ECDSA and More
David Derler, Sebastian Ramacher, Daniel Slamanig
2017/1202
Faster Cryptographic Hash Function From Supersingular Isogeny Graphs
Javad Doliskani, Geovandro C. C. F. Pereira, Paulo S. L. M. Barreto
2017/1201
Collusion Resistant Watermarking Schemes for Cryptographic Functionalities
Rupeng Yang, Man Ho Au, Junzuo Lai, Qiuliang Xu, Zuoxia Yu
2017/1200
MixColumns Properties and Attacks on (round-reduced) AES with a Single Secret S-Box
Lorenzo Grassi
2017/1199
Quantum Key-recovery Attack on Feistel Structures
Xiaoyang Dong, Xiaoyun Wang
2017/1198
Computing isogenies between Montgomery curves using the action of (0,0)
Joost Renes
2017/1197
Reassessing Security of Randomizable Signatures
David Pointcheval, Olivier Sanders
2017/1196
Post-Quantum Secure Remote Password Protocol from RLWE Problem
Xinwei Gao, Jintai Ding, Jiqiang Liu, Lin Li
2017/1195
CAPA: The Spirit of Beaver against Physical Attacks
Oscar Reparaz, Lauren De Meyer, Begül Bilgin, Victor Arribas, Svetla Nikova, Ventzislav Nikov, Nigel Smart
2017/1194
Improved Differential Cryptanalysis on Generalized Feistel Schemes
Ivan Tjuawinata, Tao Huang, Hongjun Wu
2017/1193
Rhythmic Keccak: SCA Security and Low Latency in HW
Victor Arribas, Begül Bilgin, George Petrides, Svetla Nikova, Vincent Rijmen
2017/1192
Efficient Implementation of Password-Based Authenticated Key Exchange from RLWE and Post-Quantum TLS
Xinwei Gao, Jintai Ding, Lin Li, Saraswathy RV, Jiqiang Liu
2017/1191
Data Is a Stream: Security of Stream-Based Channels
Marc Fischlin, Felix Günther, Giorgia Azzurra Marson, Kenneth G. Paterson
2017/1190
EPIC: Efficient Private Image Classification (or: Learning from the Masters)
Eleftheria Makri, Dragos Rotaru, Nigel P. Smart, Frederik Vercauteren
2017/1189
Return Of Bleichenbacher's Oracle Threat (ROBOT)
Hanno Böck, Juraj Somorovsky, Craig Young
2017/1188
Signature Schemes with a Fuzzy Private Key
Kenta Takahashi, Takahiro Matsuda, Takao Murakami, Goichiro Hanaoka, Masakatsu Nishigaki
2017/1187
On the Round Complexity of OT Extension
Sanjam Garg, Mohammad Mahmoody, Daniel Masny, Izaak Meckler
2017/1186
On Multiparty Garbling of Arithmetic Circuits
Aner Ben-Efraim
2017/1185
Complete Attack on RLWE Key Exchange with reused keys, without Signal Leakage
Jintai Ding, Scott Fluhrer, Saraswathy RV
2017/1184
EFLASH: A New Multivariate Encryption Scheme
Ryann Cartor, Daniel Smith-Tone
2017/1183
Round2: KEM and PKE based on GLWR
Hayo Baan, Sauvik Bhattacharya, Oscar Garcia-Morchon, Ronald Rietman, Ludo Tolhuizen, Jose-Luis Torre-Arce, Zhenfei Zhang
2017/1182
Distributed Algorithms Made Secure: A Graph Theoretic Approach
Merav Parter, Eylon Yogev
2017/1181
Implementing Joux-Vitse's Crossbred Algorithm for Solving MQ Systems over GF(2) on GPUs
Ruben Niederhagen, Kai-Chun Ning, Bo-Yin Yang
2017/1180
FPGA-based Niederreiter Cryptosystem using Binary Goppa Codes
Wen Wang, Jakub Szefer, Ruben Niederhagen
2017/1179
On the exponents of APN power functions and Sidon sets, sum-free sets, and Dickson polynomials
Claude Carlet, Stjepan Picek
2017/1178
Comparison analysis and efficient implementation of reconciliation-based RLWE key exchange protocol
Xinwei Gao, Jintai Ding, Saraswathy RV, Lin Li, Jiqiang Liu
2017/1177
Reusable Authentication from the Iris
Benjamin Fuller, Sailesh Simhadri, James Steel
2017/1176
Cyclic Locking and Memristor-based Obfuscation Against CycSAT and Inside Foundry Attacks
Amin Rezaei, Yuanqi Shen, Shuyu Kong, Jie Gu, Hai Zhou
2017/1175
Short Solutions to Nonlinear Systems of Equations
Alan Szepieniec, Bart Preneel
2017/1174
Efficient Optimal Ate Pairing at 128-bit Security Level
Md. Al-Amin Khandaker, Yuki Nanjo, Loubna Ghammam, Sylvain Duquesne, Yasuyuki Nogami, Yuta Kodera
2017/1173
Fully Verifiable Secure Delegation of Pairing Computation: Cryptanalysis and An Efficient Construction
Osmanbey Uzunkol, Öznur Kalkar, İsa Sertkaya
2017/1172
A Note on Stream Ciphers that Continuously Use the IV
Matthias Hamann, Matthias Krause, Willi Meier
2017/1171
Attacks on the AJPS Mersenne-based cryptosystem
Koen de Boer, Léo Ducas, Stacey Jeffery, Ronald de Wolf
2017/1170
SAT-based Bit-flipping Attack on Logic Encryptions
Yuanqi Shen, Amin Rezaei, Hai Zhou
2017/1169
There Goes Your PIN: Exploiting Smartphone Sensor Fusion Under Single and Cross User Setting
David Berend, Bernhard Jungk, Shivam Bhasin
2017/1168
Itsuku: a Memory-Hardened Proof-of-Work Scheme
Fabien Coelho, Arnaud Larroche, Baptiste Colin
2017/1167
Cryptocurrency Voting Games
Sanjay Bhattacherjee, Palash Sarkar
2017/1166
SCADPA: Side-Channel Assisted Differential-Plaintext Attack on Bit Permutation Based Ciphers
Jakub Breier, Dirmanto Jap, Shivam Bhasin
2017/1165
Fast and Universally-Composable Oblivious Transfer and Commitment Scheme with Adaptive Security
Megha Byali, Arpita Patra, Divya Ravi, Pratik Sarkar
2017/1164
Chameleon: A Hybrid Secure Computation Framework for Machine Learning Applications
M. Sadegh Riazi, Christian Weinert, Oleksandr Tkachenko, Ebrahim M. Songhori, Thomas Schneider, Farinaz Koushanfar
2017/1163
MILP-aided Cryptanalysis of Round Reduced ChaCha
Najwa Aaraj, Florian Caullery, Marc Manzano
2017/1162
Kayawood, a Key Agreement Protocol
Iris Anshel, Derek Atkins, Dorian Goldfeld, Paul E Gunnells
2017/1161
A Review of Existing 4-bit Crypto S-box cryptanalysis Techniques and Two New Techniques with 4-bit Boolean Functions for Cryptanalysis of 4-bit Crypto S-boxes.
Sankhanil Dey, Ranjan Ghosh
2017/1160
A Practical Cryptanalysis of WalnutDSA
Daniel Hart, DoHoon Kim, Giacomo Micheli, Guillermo Pascual Perez, Christophe Petit, Yuxuan Quek
2017/1159
Cryptanalysis of indistinguishability obfuscation using GGH13 without ideals
Gu Chunsheng
2017/1158
Oblivious Dynamic Searchable Encryption via Distributed PIR and ORAM
Thang Hoang, Attila A. Yavuz, Betul F. Durak, Jorge Guajardo
2017/1157
ARM2GC: Succinct Garbled Processor for Secure Computation
Ebrahim M Songhori, M Sadegh Riazi, Siam U Hussain, Ahmad-Reza Sadeghi, Farinaz Koushanfar
2017/1156
Two-Round Multiparty Secure Computation from Minimal Assumptions
Sanjam Garg, Akshayaram Srinivasan
2017/1155
A Survey and Refinement of Repairable Threshold Schemes
Thalia M. Laing, Douglas R. Stinson
2017/1154
Post-Quantum Zero-Knowledge Proofs for Accumulators with Applications to Ring Signatures from Symmetric-Key Primitives
David Derler, Sebastian Ramacher, Daniel Slamanig
2017/1153
Tesseract: Real-Time Cryptocurrency Exchange using Trusted Hardware
Iddo Bentov, Yan Ji, Fan Zhang, Yunqi Li, Xueyuan Zhao, Lorenz Breidenbach, Philip Daian, Ari Juels
2017/1152
Symbolic Security Criteria for Blockwise Adaptive Secure Modes of Encryption
Catherine Meadows
2017/1151
Shorter Linear Straight-Line Programs for MDS Matrices
Thorsten Kranz, Gregor Leander, Ko Stoffelen, Friedrich Wiemer
2017/1150
SWiM: Secure Wildcard Pattern Matching From OT Extension
Vladimir Kolesnikov, Mike Rosulek, Ni Trieu
2017/1149
Improved Cryptanalysis of HFEv- via Projection
Jintai Ding, Ray Perlner, Albrecht Petzoldt, Daniel Smith-Tone
2017/1148
Improvements to the Linear Operations of LowMC: A Faster Picnic
Daniel Kales, Léo Perrin, Angela Promitzer, Sebastian Ramacher, Christian Rechberger
2017/1147
Under Pressure: Security of Caesar Candidates beyond their Guarantees
Serge Vaudenay, Damian Vizár
2017/1146
A Zero-Knowledge Version of vSQL
Yupeng Zhang, Daniel Genkin, Jonathan Katz, Dimitrios Papadopoulos, Charalampos Papamanthou
2017/1145
vSQL: Verifying Arbitrary SQL Queries over Dynamic Outsourced Databases
Yupeng Zhang, Daniel Genkin, Jonathan Katz, Dimitrios Papadopoulos, Charalampos Papamanthou
2017/1144
How Far Can We Reach? Breaking Masked AES Smartcard Implementation Using One Trace
Wei Cheng, Chao Zheng, Yuchen Cao, Yongbin Zhou, Hailong Zhang, Sylvain Guilley, Laurent Sauvage
2017/1143
Faster key compression for isogeny-based cryptosystems
Gustavo H. M. Zanon, Marcos A. Simplicio Jr, Geovandro C. C. F. Pereira, Javad Doliskani, Paulo S. L. M. Barreto
2017/1142
PIR with compressed queries and amortized query processing
Sebastian Angel, Hao Chen, Kim Laine, and Srinath Setty
2017/1141
Cryptanalysis of Bivium using a Boolean all solution solver
Virendra Sule, Anmol Yadav
2017/1140
Lattice Klepto: Turning Post-Quantum Crypto Against Itself
Robin Kwant, Tanja Lange, Kimberley Thissen
2017/1139
Decoding Linear Codes with High Error Rate and its Impact for LPN Security
Leif Both, Alexander May
2017/1138
The Parallel Repetition of Non-Signaling Games: Counterexamples and Dichotomy
Justin Holmgren, Lisa Yang
2017/1137
Note on the Robustness of CAESAR Candidates
Daniel Kales, Maria Eichlseder, Florian Mendel
2017/1136
Clustering Related-Tweak Characteristics: Application to MANTIS-6
Maria Eichlseder and Daniel Kales
2017/1135
On the Complexity of the Hybrid Approach on HFEv-
Albrecht Petzoldt
2017/1134
Machine-Learning Attacks on PolyPUFs, OB-PUFs, RPUFs, LHS-PUFs, and PUF–FSMs
Jeroen Delvaux
2017/1133
Sentiment Protocol: A Decentralized Protocol Leveraging Crowd Sourced Wisdom
Anton Muehlemann
2017/1132
Doubly-efficient zkSNARKs without trusted setup
Riad S. Wahby, Ioanna Tzialla, abhi shelat, Justin Thaler, Michael Walfish
2017/1131
A Certain Family of Subgroups of $\mathbb Z_n^\star$ Is Weakly Pseudo-Free under the General Integer Factoring Intractability Assumption
Mikhail Anokhin
2017/1130
Information-Theoretic Secret-Key Agreement: The Asymptotically Tight Relation Between the Secret-Key Rate and the Channel Quality Ratio
Daniel Jost, Ueli Maurer, Joao L. Ribeiro
2017/1129
Probabilistic solution of Yao's millionaires' problem
Mariya Bessonov, Dima Grigoriev, Vladimir Shpilrain
2017/1128
Forward Secure Efficient Group Signature in Dynamic Setting using Lattices
Meenakshi Kansal, Ratna Dutta, Sourav Mukhopadhyay
2017/1127
On the Leakage Resilience of Ring-LWE Based Public Key Encryption
Dana Dachman-Soled, Huijing Gong, Mukul Kulkarni, Aria Shahverdi
2017/1126
Privacy Games for Syntactic Privacy Notions
Robin Ankele, Andrew Simpson
2017/1125
k-Round MPC from k-Round OT via Garbled Interactive Circuits
Fabrice Benhamouda, Huijia Lin
2017/1124
A formal model of Bitcoin transactions
Nicola Atzei, Massimo Bartoletti, Stefano Lande, Roberto Zunino
2017/1123
Relaxed Lattice-Based Signatures with Short Zero-Knowledge Proofs
Cecilia Boschini, Jan Camenisch, Gregory Neven
2017/1122
On post-processing in the quantum algorithm for computing short discrete logarithms
Martin Ekerå
2017/1121
Differential Attacks on LILLIPUT Cipher
Valérie Nachef, Nicolas Marrière, Emmanuel Volte
2017/1120
A Ciphertext-Size Lower Bound for Order-Preserving Encryption with Limited Leakage
David Cash, Cong Zhang
2017/1119
Detection of cryptographic algorithms with grap
Léonard Benedetti, Aurélien Thierry, Julien Francq
2017/1118
Solida: A Blockchain Protocol Based on Reconfigurable Byzantine Consensus
Ittai Abraham, Dahlia Malkhi, Kartik Nayak, Ling Ren, Alexander Spiegelman
2017/1117
Risky Traitor Tracing and New Differential Privacy Negative Results
Rishab Goyal, Venkata Koppula, Andrew Russell, Brent Waters
2017/1116
A Constant-Size Signature Scheme with a Tighter Reduction from the CDH Assumption
Kaisei Kajita, Kazuto Ogawa, Eiichiro Fujisaki
2017/1115
Hardware Aspects of Montgomery Modular Multiplication
Colin D. Walter
2017/1114
Fast Homomorphic Evaluation of Deep Discretized Neural Networks
Florian Bourse, Michele Minelli, Matthias Minihold, Pascal Paillier
2017/1113
The Discrete-Logarithm Problem with Preprocessing
Henry Corrigan-Gibbs, Dmitry Kogan
2017/1112
Manifold Learning Towards Masking Implementations: A First Study
Changhai Ou, Degang Sun, Zhu Wang, Xinping Zhou, Wei Cheng
2017/1111
Fuzzy Password-Authenticated Key Exchange
Pierre-Alain Dupont, Julia Hesse, David Pointcheval, Leonid Reyzin, and Sophia Yakoubov
2017/1110
A Systematic Evaluation of Profiling Through Focused Feature Selection
Stjepan Picek, Annelie Heuser, Alan Jovic, Lejla Batina
2017/1109
EzPC: Programmable, Efficient, and Scalable Secure Two-Party Computation for Machine Learning
Nishanth Chandran, Divya Gupta, Aseem Rastogi, Rahul Sharma, Shardul Tripathi
2017/1108
Cryptographic Pairings
Kristin Lauter, Michael Naehrig
2017/1107
Hardness of Non-Interactive Differential Privacy from One-Way Functions
Lucas Kowalczyk, Tal Malkin, Jonathan Ullman, and Daniel Wichs
2017/1106
Formal Analysis of a TTP-Free Blacklistable Anonymous Credentials System (Full Version)
Weijin Wang, Yu Qin, Jingbin Liu, Dengguo Feng
2017/1105
FFSSE: Flexible Forward Secure Searchable Encryption with Efficient Performance
Zheli Liu, Siyi Lv, Yu Wei, Jin Li, Joseph K. Liu, Yang Xiang
2017/1104
Efficient provable-secure NTRUEncrypt over any cyclotomic field
Yang Wang, Mingqiang Wang
2017/1103
A new chosen IV statistical distinguishing framework to attack symmetric ciphers, and its application to ACORN-v3 and Grain-128a
Vahid Amin Ghafari, Honggang Hu
2017/1102
ID-HABE: Incorporating ID-based Revocation, Delegation, and Authority Hierarchy into Attribute-Based Encryption
Qiuxiang Dong, Dijiang Huang, Jim Luo, Myong Kang
2017/1101
HIR-CP-ABE: Hierarchical Identity Revocable Ciphertext-Policy Attribute-Based Encryption for Secure and Flexible Data Sharing
Qiuxiang Dong, Dijiang Huang, Jim Luo, Myong Kang
2017/1100
IR-CP-ABE: Identity Revocable Ciphertext-Policy Attribute-Based Encryption for Flexible Secure Group-Based Communication
Weijia Wang, Zhijie Wang, Bing Li, Qiuxiang Dong, Dijiang Huang
2017/1099
Security Analysis of a Dynamic Threshold Secret Sharing Scheme Using Linear Subspace Method
Sadegh Jamshidpour, Zahra Ahmadian
2017/1098
The Strength of Weak Randomization: Efficiently Searchable Encryption with Minimal Leakage
David Pouliot, Scott Griffy, Charles V. Wright
2017/1097
Non-malleable Randomness Encoders and their Applications
Bhavana Kanukurthi, Sai Lakshmi Bhavana Obbattu, Sruthi Sekar
2017/1096
IND-CCA-secure Key Encapsulation Mechanism in the Quantum Random Oracle Model, Revisited
Haodong Jiang, Zhenfeng Zhang, Long Chen, Hong Wang, Zhi Ma
2017/1095
Analysis of the Bitcoin UTXO set
Sergi Delgado-Segura, Cristina Pérez-Solà, Guillermo Navarro-Arribas, Jordi Herrera-Joancomartí
2017/1094
Privately Constraining and Programming PRFs, the LWE Way
Chris Peikert, Sina Shiehian
2017/1093
Proposal for Protocol on a Quorum Blockchain with Zero Knowledge
Thomas Espel, Laurent Katz, Guillaume Robin
2017/1092
Universally Composable Secure Computation with Corrupted Tokens
Nishanth Chandran, Wutichai Chongchitmate, Rafail Ostrovsky, Ivan Visconti
2017/1091
Fairness in an Unfair World: Fair Multiparty Computation from public Bulletin Boards
Arka Rai Choudhuri, Matthew Green, Abhishek Jain, Gabriel Kaptchuk, Ian Miers
2017/1090
Enter the Hydra: Towards Principled Bug Bounties and Exploit-Resistant Smart Contracts
Lorenz Breidenbach, Philip Daian, Florian Tramèr, Ari Juels
2017/1089
Secure Deduplication of Encrypted Data: Refined Model and New Constructions
Jian Liu, Li Duan, Yong Li, N. Asokan
2017/1088
Promise Zero Knowledge and its Applications to Round Optimal MPC
Saikrishna Badrinarayanan, Vipul Goyal, Abhishek Jain, Yael Tauman Kalai, Dakshita Khurana, Amit Sahai
2017/1087
General purpose integer factoring
Arjen K. Lenstra
2017/1086
Order-Revealing Encryption: File-Injection Attack and Forward Security
Xingchen Wang, Yunlei Zhao
2017/1085
Improving Side-channel Analysis through Semi-supervised Learning
Stjepan Picek, Annelie Heuser, Alan Jovic, Karlo Knezevic, Tania Richmond
2017/1084
Lightweight MDS Serial-type Matrices with Minimal Fixed XOR Count (Full version)
Dylan Toh, Jacob Teo, Khoongming Khoo, Siang Meng Sim
2017/1083
CAMFAS: A Compiler Approach to Mitigate Fault Attacks via Enhanced SIMDization
Zhi Chen, Junjie Shen, Alex Nicolau, Alex Veidenbaum, Nahid Farhady Ghalaty, Rosario Cammarota
2017/1082
Instruction Duplication: Leaky and Not Too Fault-Tolerant!
Lucian Cojocar, Kostas Papagiannopoulos, Niek Timmers
2017/1081
The Montgomery and Joye Powering Ladders are Dual
Colin D. Walter
2017/1080
Quantum Lightning Never Strikes the Same State Twice
Mark Zhandry
2017/1079
Entropy Reduction for the Correlation-Enhanced Power Analysis Collision Attack
Andreas Wiemers, Dominik Klein
2017/1078
The Tao of Inference in Privacy-Protected Databases
Vincent Bindschaedler, Paul Grubbs, David Cash, Thomas Ristenpart, Vitaly Shmatikov
2017/1077
A New Generalization of the KMOV Cryptosystem
Maher Boudabra, Abderrahmane Nitaj
2017/1076
A generalized attack on RSA type cryptosystems
Martin Bunder, Abderrahmane Nitaj, Willy Susilo, Joseph Tonien
2017/1075
XHX - A Framework for Optimally Secure Tweakable Block Ciphers from Classical Block Ciphers and Universal Hashing
Ashwin Jha, Eik List, Kazuhiko Minematsu, Sweta Mishra, Mridul Nandi
2017/1074
A Practical Fault Attack on ARX-like Ciphers with a Case Study on ChaCha20
S V Dilip Kumar, Sikhar Patranabis, Jakub Breier, Debdeep Mukhopadhyay, Shivam Bhasin, Anupam Chattopadhyay, Anubhab Baksi
2017/1073
One Plus One is More than Two: A Practical Combination of Power and Fault Analysis Attacks on PRESENT and PRESENT-like Block Ciphers
Sikhar Patranabis, Jakub Breier, Debdeep Mukhopadhyay, Shivam Bhasin
2017/1072
Settling the mystery of $Z_r=r$ in RC4
Sabyasachi Dey, Santanu Sarkar
2017/1071
Meet-in-the-Middle Attacks on 3-Line Generalized Feistel Networks
Le Dong, Yongxia Mao
2017/1070
The Transaction Graph for Modeling Blockchain Semantics
Christian Cachin, Angelo De Caro, Pedro Moreno-Sanchez, Björn Tackmann, Marko Vukolić
2017/1069
Non-Malleability vs. CCA-Security: The Case of Commitments
Brandon Broadnax, Valerie Fetzer, Jörn Müller-Quade, Andy Rupp
2017/1068
Frequency-smoothing encryption: preventing snapshot attacks on deterministically encrypted data
Marie-Sarah Lacharité, Kenneth G. Paterson
2017/1067
Regulating Storage Overhead in Existing PoW-based Blockchains
Frederik Armknecht, Jens-Matthias Bohli, Ghassan O. Karame, Wenting Li
2017/1066
Bulletproofs: Short Proofs for Confidential Transactions and More
Benedikt Bünz, Jonathan Bootle, Dan Boneh, Andrew Poelstra, Pieter Wuille, Greg Maxwell
2017/1065
--Withdrawn--
Reyhaneh Rabaninejad, Maryam Rajabzadeh Asaar, Mahmoud Ahmadian Attari, Mohammad Reza Aref
2017/1064
An Algebraic Approach to Maliciously Secure Private Set Intersection
Satrajit Ghosh, Tobias Nilges
2017/1063
Improved Division Property Based Cube Attacks Exploiting Algebraic Properties of Superpoly (Full Version)
Qingju Wang, Yonglin Hao, Yosuke Todo, Chaoyun Li, Takanori Isobe, Willi Meier
2017/1062
Towards Breaking the Exponential Barrier for General Secret Sharing
Tianren Liu, Vinod Vaikuntanathan, Hoeteck Wee
2017/1061
Non-Malleable Codes from Average-Case Hardness: AC0, Decision Trees, and Streaming Space-Bounded Tampering
Marshall Ball, Dana Dachman-Soled, Mukul Kulkarni, Tal Malkin
2017/1060
Thwarting Leakage Abuse Attacks against Searchable Encryption -- A Formal Approach and Applications to Database Padding
Raphael Bost, Pierre-Alain Fouque
2017/1059
CP-consensus: a Blockchain Protocol Based on Synchronous Timestamps of Compass Satellite
Lijing Zhou, Licheng Wang, Yiru Sun
2017/1058
Optimal Key Consensus in Presence of Noise
Zhengzhong Jin, Yunlei Zhao
2017/1057
Montgomery Arithmetic from a Software Perspective
Joppe W. Bos, Peter L. Montgomery
2017/1056
Round-Optimal Secure Multi-Party Computation
Shai Halevi, Carmit Hazay, Antigoni Polychroniadou, Muthuramakrishnan Venkitasubramaniam
2017/1055
Cellular Automata Based S-boxes
Luca Mariot, Stjepan Picek, Alberto Leporati, Domagoj Jakobovic
2017/1054
On the security of another CRC based ultralightweight RFID authentication protocol
Seyed Farhad Aghili, Hamid Mala
2017/1053
A Note on 'Further Improving Efficiency of Higher-Order Masking Scheme by Decreasing Randomness Complexity'
Gilles Barthe, François Dupressoir, Benjamin Grégoire
2017/1052
Early Detection and Analysis of Leakage Abuse Vulnerabilities
Charles V. Wright, David Pouliot
2017/1051
A Novel Use of Kernel Discriminant Analysis as a Higher-Order Side-Channel Distinguisher
Xinping Zhou, Carolyn Whitnall, Elisabeth Oswald, Degang Sun, Zhu Wang
2017/1050
Scalable Multi-party Computation for zk-SNARK Parameters in the Random Beacon Model
Sean Bowe, Ariel Gabizon, Ian Miers
2017/1049
A Practical Implementation of Identity-Based Encryption over NTRU Lattices
Sarah McCarthy, Neil Smyth, Elizabeth O’Sullivan
2017/1048
Non-malleable Codes against Lookahead Tampering
Divya Gupta, Hemanta K. Maji, Mingyuan Wang
2017/1047
Consolidating Inner Product Masking
Josep Balasch, Sebastian Faust, Benedikt Gierlichs, Clara Paglialonga, François-Xavier Standaert
2017/1046
Approximate Thumbnail Preserving Encryption
Byron Marohn, Charles V. Wright, Wu-chi Feng, Mike Rosulek, Rakesh B. Bobba
2017/1045
Tightly-Secure PAK(E)
José Becerra, Vincenzo Iovino, Dimiter Ostrev, Petra Šala, Marjan Škrobot
2017/1044
Strain: A Secure Auction for Blockchains
Erik-Oliver Blass, Florian Kerschbaum
2017/1043
An E-voting Protocol Based on Blockchain
Yi Liu, Qi Wang
2017/1042
On one-round reliable message transmission
René Bødker Christensen
2017/1041
Compact Zero-Knowledge Proofs of Small Hamming Weight
Ivan Damgård, Ji Luo, Sabine Oechsner, Peter Scholl, Mark Simkin
2017/1040
Threshold Implementations of GIFT: A Trade-off Analysis
Arpan Jati, Naina Gupta, Anupam Chattopadhyay, Somitra Kumar Sanadhya, Donghoon Chang
2017/1039
Dronecrypt - An Efficient Cryptographic Framework for Small Aerial Drones
Muslum Ozgur Ozmen, Attila A. Yavuz
2017/1038
Embedded Proofs for Verifiable Neural Networks
Hervé Chabanne, Julien Keuffer, Refik Molva
2017/1037
DAGS: Key Encapsulation using Dyadic GS Codes
Gustavo Banegas, Paulo S. L. M. Barreto, Brice Odilon Boidje, Pierre-Louis Cayrel, Gilbert Ndollane Dione, Kris Gaj, Cheikh Thiecoumba Gueye, Richard Haeussler, Jean Belo Klamti, Ousmane N'diaye, Duc Tri Nguyen, Edoardo Persichetti, Jefferson E. Ricardini
2017/1036
Rotational-XOR Cryptanalysis of Reduced-round SPECK
Yunwen Liu, Glenn De Witte, Adrián Ranea, Tomer Ashur
2017/1035
Privacy-respecting Reward Generation and Accumulation for Participatory Sensing Applications
Tassos Dimitriou
2017/1034
Tight on Budget? Tight Bounds for r-Fold Approximate Differential Privacy
Sebastian Meiser, Esfandiar Mohammadi
2017/1033
Foundations of Differentially Oblivious Algorithms
T-H. Hubert Chan, Kai-Min Chung, Bruce Maggs, Elaine Shi
2017/1032
Performing Computations on Hierarchically Shared Secrets
Giulia Traverso, Denise Demirel, Johannes Buchmann
2017/1031
Lightweight Design Choices for LED-like Block Ciphers
Sumanta Sarkar, Habeeb Syed, Rajat Sadhukhan, Debdeep Mukhopadhyay
2017/1030
New MILP Modeling: Improved Conditional Cube Attacks on Keccak-based Constructions
Ling Song, Jian Guo, Danping Shi, San Ling
2017/1029
Efficient Designated-Verifier Non-Interactive Zero-Knowledge Proofs of Knowledge
Pyrros Chaidos, Geoffroy Couteau
2017/1028
Cryptanalysis of 1-Round KECCAK
Rajendra Kumar, Mahesh Sreekumar Rajasree, Hoda AlKhzaimi
2017/1027
Eliminating Variables in Boolean Equation Systems
Bjørn Møller Greve, Håvard Raddum, Gunnar Fløystad, Øyvind Ytrehus
2017/1026
Cube Attack against Full Kravatte
Jian Guo, Ling Song
2017/1025
Rounded Gaussians -- Fast and Secure Constant-Time Sampling for Lattice-Based Crypto
Andreas Hülsing, Tanja Lange, Kit Smeets
2017/1024
Revisiting a Masked Lookup-Table Compression Scheme
Srinivas Vivek
2017/1023
Several Masked Implementations of the Boyar-Peralta AES S-Box
Ashrujit Ghoshal, Thomas De Cnudde
2017/1022
Direct Anonymous Attestation from Lattices
Rachid El Bansarkhani, Ali El Kaafarani
2017/1021
Bricklayer Attack: A Side-Channel Analysis on the ChaCha Quarter Round
Alexandre Adomnicai, Jacques J. A. Fournier, Laurent Masson
2017/1020
A Novel Pre-Computation Scheme of Window $\tau$NAF for Koblitz Curves
Wei Yu, Saud Al Musa, Guangwu Xu, Bao Li
2017/1019
Looting the LUTs : FPGA Optimization of AES and AES-like Ciphers for Authenticated Encryption
Mustafa Khairallah, Anupam Chattopadhyay, Thomas Peyrin
2017/1018
A Fair Protocol for Data Trading Based on Bitcoin Transactions
Sergi Delgado-Segura, Cristina Pérez-Solà, Guillermo Navarro-Arribas, Jordi Herrera-Joancomart\'ı
2017/1017
Differential Cryptanalysis of 18-Round PRIDE
Virginie Lallemand, Shahram Rasoolzadeh
2017/1016
Differentially Private Access Patterns in Secure Computation
Sahar Mazloom, S. Dov Gordon
2017/1015
A Faster Software Implementation of the Supersingular Isogeny Diffie-Hellman Key Exchange Protocol
Armando Faz-Hernández, Julio López, Eduardo Ochoa-Jiménez, Francisco Rodríguez-Henríquez
2017/1014
Attacking Deterministic Signature Schemes using Fault Attacks
Damian Poddebniak, Juraj Somorovsky, Sebastian Schinzel, Manfred Lochter, Paul Rösler
2017/1013
Homomorphic SIM$^2$D Operations: Single Instruction Much More Data
Wouter Castryck, Ilia Iliashenko, Frederik Vercauteren
2017/1012
Conditional Cube Attack on Round-Reduced River Keyak
Wenquan Bi, Zheng Li, Xiaoyang Dong, Lu Li, Xiaoyun Wang
2017/1011
Efficient and Universally Composable Protocols for Oblivious Transfer from the CDH Assumption
Eduard Hauck, Julian Loss
2017/1010
A New Digital Rights Management Solution Based on White-Box Cryptography
Jun Liu, Yupu Hu
2017/1009
Architecture level Optimizations for Kummer based HECC on FPGAs
Gabriel Gallin, Turku Ozlum Celik, Arnaud Tisserand
2017/1008
Automatic Characterization of Exploitable Faults: A Machine Learning Approach
Sayandeep Saha, Dirmanto Jap, Sikhar Patranabis, Debdeep Mukhopadhyay, Shivam Bhasin, Pallab Dasgupta
2017/1007
Malware encryption schemes - rerandomizable ciphertexts encrypted using environmental keys
Herman Galteland, Kristian Gjøsteen
2017/1006
Round and Communication Efficient Unconditionally-secure MPC with $t < n/3$ in Partially Synchronous Network
Ashish Choudhury, Arpita Patra, Divya Ravi
2017/1005
Tightly-Secure Key-Encapsulation Mechanism in the Quantum Random Oracle Model
Tsunekazu Saito, Keita Xagawa, Takashi Yamakawa
2017/1004
Garbled Protocols and Two-Round MPC from Bilinear Maps
Sanjam Garg, Akshayaram Srinivasan
2017/1003
Secure Multi-Party Computation in Large Networks
Varsha Dani, Valerie King, Mahnush Movahedi, Jared Saia, Mahdi Zamani
2017/1002
On the Closest Vector Problem for Lattices Constructed from Polynomials and Their Cryptographic Applications
Zhe Li, San Ling, Chaoping Xing, Sze Ling Yeo
2017/1001
Impossibility of Order-Revealing Encryption in Idealized Models
Mark Zhandry, Cong Zhang
2017/1000
No right to remain silent: Isolating Malicious Mixes
Hemi Leibowitz, Ania Piotrowska, George Danezis, Amir Herzberg
2017/999
Shortest Vector from Lattice Sieving: a Few Dimensions for Free
Léo Ducas
2017/998
A Comparative Investigation of Approximate Attacks on Logic Encryptions
Yuanqi Shen, Amin Rezaei, Hai Zhou
2017/997
Hash Proof Systems over Lattices Revisited
Fabrice Benhamouda, Olivier Blazy, Léo Ducas, Willy Quach
2017/996
Large FHE gates from Tensored Homomorphic Accumulator
Guillaume Bonnoron, Léo Ducas, Max Fillinger
2017/995
A signature scheme from Learning with Truncation
Jeffrey Hoffstein, Jill Pipher, William Whyte, Zhenfei Zhang
2017/994
Separable Statistics and Multidimensional Linear Cryptanalysis
S. Fauskanger, I. Semaev
2017/993
A Framework for Efficient Adaptively Secure Composable Oblivious Transfer in the ROM
Paulo S. L. M. Barreto, Bernardo David, Rafael Dowsley, Kirill Morozov, Anderson C. A. Nascimento
2017/992
Leakage Bounds for Gaussian Side Channels
Thomas Unterluggauer, Thomas Korak, Stefan Mangard, Robert Schilling, Luca Benini, Frank Gürkaynak, Michael Muehlberghuber
2017/991
Secure Code Updates for Smart Embedded Devices based on PUFs
Wei Feng, Yu Qin, Shijun Zhao, Ziwen Liu, Xiaobo Chu, Dengguo Feng
2017/990
Bounds on Differential and Linear Branch Number of Permutations
Sumanta Sarkar, Habeeb Syed
2017/989
Decentralized Multi-Client Functional Encryption for Inner Product
Jérémy Chotard, Edouard Dufour-Sans, Romain Gay, Duong Hieu Phan, David Pointcheval
2017/988
On Rejection Sampling Algorithms for Centered Discrete Gaussian Distribution over Integers
Yusong Du, Baodian Wei
2017/987
Key Dependent Message Security and Receiver Selective Opening Security for Identity-Based Encryption
Fuyuki Kitagawa, Keisuke Tanaka
2017/986
On the Hardness of Computing Endomorphism Rings of Supersingular Elliptic Curves
Kirsten Eisentraeger, Sean Hallgren, Travis Morrison
2017/985
Breaking Ed25519 in WolfSSL
Niels Samwel, Lejla Batina, Guido Bertoni, Joan Daemen, Ruggero Susella
2017/984
Self-Guarding Cryptographic Protocols against Algorithm Substitution Attacks
Marc Fischlin, Sogol Mazaheri
2017/983
Attribute-Based Encryption in the Generic Group Model: Automated Proofs and New Constructions
Miguel Ambrona, Gilles Barthe, Romain Gay, Hoeteck Wee
2017/982
Mind the Gap: Where Provable Security and Real-World Messaging Don't Quite Meet
Katriel Cohn-Gordon, Cas Cremers
2017/981
Efficient Maliciously Secure Multiparty Computation for RAM
Marcel Keller, Avishay Yanai
2017/980
Yoyo Tricks with AES
Sondre Rønjom, Navid Ghaedi Bardeh, Tor Helleseth
2017/979
Privacy-Preserving Ridge Regression with only Linearly-Homomorphic Encryption
Irene Giacomelli, Somesh Jha, Marc Joye, C. David Page, Kyonghwan Yoon
2017/978
New Constructions of Identity-Based and Key-Dependent Message Secure Encryption Schemes
Nico Döttling, Sanjam Garg, Mohammad Hajiabadi, Daniel Masny
2017/977
Cryptanalysis against Symmetric-Key Schemes with Online Classical Queries and Offline Quantum Computations
Akinori Hosoyamada, Yu Sasaki
2017/976
Improvements for Gate-Hiding Garbled Circuits
Mike Rosulek
2017/975
Differential Attacks on Deterministic Signatures
Christopher Ambrose, Joppe W. Bos, Björn Fay, Marc Joye, Manfred Lochter, Bruce Murray
2017/974
Obscuro: A Bitcoin Mixer using Trusted Execution Environments
Muoi Tran, Loi Luu, Min Suk Kang, Iddo Bentov, Prateek Saxena
2017/973
Symmetric Searchable Encryption with Sharing and Unsharing
Sarvar Patel, Giuseppe Persiano, Kevin Yeo
2017/972
Multi-Input Functional Encryption for Inner Products: Function-Hiding Realizations and Constructions without Pairings
Michel Abdalla, Dario Catalano, Dario Fiore, Romain Gay, Bogdan Ursu
2017/971
A Fast, Practical and Simple Shortest Path Protocol for Multiparty Computation
Abdelrahaman Aly, Sara Cleemput
2017/970
A New Functional Encryption for Multidimensional Range Query
Jia Xu, Ee-Chien Chang, Jianying Zhou
2017/969
Fast and Adaptively Secure Signatures in the Random Oracle Model from Indistinguishability Obfuscation
Bei Liang, Aikaterini Mitrokotsa
2017/968
Template Attack on Blinded Scalar Multiplication with Asynchronous perf-ioctl Calls
Sarani Bhattacharya, Clementine Maurice, Shivam Bhasin, Debdeep Mukhopadhyay
2017/967
Anonymous IBE, Leakage Resilience and Circular Security from New Assumptions
Zvika Brakerski, Alex Lombardi, Gil Segev, Vinod Vaikuntanathan
2017/966
Optimal Parameters for XMSS^MT
Andreas Hülsing, Lea Rausch, Johannes Buchmann
2017/965
WOTS+ -- Shorter Signatures for Hash-Based Signature Schemes
Andreas Hülsing
2017/964
Recursive ORAMs with Practical Constructions
Sarvar Patel, Giuseppe Persiano, Kevin Yeo
2017/963
Non-Interactive Proofs of Proof-of-Work
Aggelos Kiayias, Andrew Miller, Dionysis Zindros
2017/962
Hard and Easy Problems for Supersingular Isogeny Graphs
Christophe Petit, Kristin Lauter
2017/961
An Offline Dictionary Attack against zkPAKE Protocol
Jose Becerra, Peter Y. A. Ryan, Petra Sala, Marjan Skrobot
2017/960
Unforgeable Quantum Encryption
Gorjan Alagic, Tommaso Gagliardoni, Christian Majenz
2017/959
Choosing Parameters for the Subfield Lattice Attack against overstretched NTRU
Dung Hoang Duong, Masaya Yasuda, Tsuyoshi Takagi
2017/958
Two-Message, Oblivious Evaluation of Cryptographic Functionalities
Nico Döttling, Nils Fleischhacker, Johannes Krupp, Dominique Schröder
2017/957
From Selective IBE to Full IBE and Selective HIBE
Nico Döttling, Sanjam Garg
2017/956
Threshold Cryptosystems From Threshold Fully Homomorphic Encryption
Dan Boneh, Rosario Gennaro, Steven Goldfeder, Aayush Jain, Sam Kim, Peter M. R. Rasmussen, Amit Sahai
2017/955
Towards Practical Privacy-Preserving Genome-Wide Association Study
Charlotte Bonte, Eleftheria Makri, Amin Ardeshirdavani, Jaak Simm, Yves Moreau, Frederik Vercauteren
2017/954
Anonymity Trilemma: Strong Anonymity, Low Bandwidth Overhead, Low Latency---Choose Two
Debajyoti Das, Sebastian Meiser, Esfandiar Mohammadi, Aniket Kate
2017/953
Threshold Kleptographic Attacks on Discrete Logarithm Based Signatures
George Teseleanu
2017/952
Secure Two-Party Computation with Fairness -- A Necessary Design Principle
Yehuda Lindell, Tal Rabin
2017/951
Bounding the cache-side-channel leakage of lattice-based signature schemes using program semantics
Nina Bindel, Johannes Buchmann, Juliane Krämer, Heiko Mantel, Johannes Schickel, Alexandra Weber
2017/950
Blockwise $p$-Tampering Attacks on Cryptographic Primitives, Extractors, and Learners
Saeed Mahloujifar, Mohammad Mahmoody
2017/949
Practical and Robust Secure Logging from Fault-Tolerant Sequential Aggregate Signatures
Gunnar Hartung, Björn Kaidel, Alexander Koch, Jessica Koch, Dominik Hartmann
2017/948
Evolving Secret Sharing: Dynamic Thresholds and Robustness
Ilan Komargodski, Anat Paskin-Cherniavsky
2017/947
Actively Secure Garbled Circuits with Constant Communication Overhead in the Plain Model
Carmit Hazay, Yuval Ishai, Muthuramakrishnan Venkitasubramaniam
2017/946
The MMap Strikes Back: Obfuscation and New Multilinear Maps Immune to CLT13 Zeroizing Attacks
Fermi Ma, Mark Zhandry
2017/945
Moderately Hard Functions: Definition, Instantiations, and Applications
Joël Alwen, Björn Tackmann
2017/944
A Unified Approach to Constructing Black-box UC Protocols in Trusted Setup Models
Susumu Kiyoshima, Huijia Lin, Muthuramakrishnan Venkitasubramaniam
2017/943
When does Functional Encryption Imply Obfuscation?
Sanjam Garg, Mohammad Mahmoody, Ameer Mohammed
2017/942
On Secure Two-Party Computation in Three Rounds
Prabhanjan Ananth, Abhishek Jain
2017/941
CoRPA: A Novel Efficient Shared Data Auditing Protocol in Cloud Storage
Reyhaneh Rabaninejad, Mahmoud Ahmadian Attari, Maryam Rajabzadeh Asaar, Mohammad Reza Aref
2017/940
Linear Secret-Sharing Schemes for Forbidden Graph Access Structures
Amos Beimel, Oriol Farràs, Yuval Mintz, Naty Peter
2017/939
Towards Optimal Pre-processing in Leakage Detection
Changhai Ou, Degang Sun, Zhu Wang, Xinping Zhou
2017/938
On the security of the WOTS-PRF signature scheme
Philip Lafrance, Alfred Menezes
2017/937
Random Oracles and Non-Uniformity
Sandro Coretti, Yevgeniy Dodis, Siyao Guo, John Steinberger
2017/936
A tight security reduction in the quantum random oracle model for code-based signature schemes
André Chailloux, Thomas Debris-Alazard
2017/935
Overcoming Cryptographic Impossibility Results using Blockchains
Rishab Goyal, Vipul Goyal
2017/934
Adaptively Indistinguishable Garbled Circuits
Zahra Jafargholi, Alessandra Scafuro, Daniel Wichs
2017/933
Improving Stateless Hash-Based Signatures
Jean-Philippe Aumasson, Guillaume Endignoux
2017/932
Why Attackers Lose: Design and Security Analysis of Arbitrarily Large XOR Arbiter PUFs
Nils Wisiol, Christoph Graebnitz, Marian Margraf, Manuel Oswald, Tudor A. A. Soroceanu, Benjamin Zengin
2017/931
Delayed-Input Non-Malleable Zero Knowledge and Multi-Party Coin Tossing in Four Rounds
Michele Ciampi, Rafail Ostrovsky, Luisa Siniscalchi, Ivan Visconti
2017/930
Four-state Non-malleable Codes with Explicit Constant Rate
Bhavana Kanukurthi, Sai Lakshmi Bhavana Obbattu, Sruthi Sekar
2017/929
How to Securely Compute with Noisy Leakage in Quasilinear Complexity
Dahmun Goudarzi, Antoine Joux, Matthieu Rivain
2017/928
Environmental Authentication in Malware
Jeremy Blackthorne, Benjamin Kaiser, Benjamin Fuller, Bulent Yener
2017/927
Near-Optimal Secret Sharing and Error Correcting Codes in AC0
Kuan Cheng, Yuval Ishai, Xin Li
2017/926
How to Construct a Leakage-Resilient (Stateless) Trusted Party
Daniel Genkin, Yual Ishai, Mor Weiss
2017/925
Resettably-Sound Resettable Zero Knowledge in Constant Rounds
Wutichai Chongchitmate, Rafail Ostrovsky, Ivan Visconti
2017/924
Oblivious Hashing Revisited, and Applications to Asymptotically Efficient ORAM and OPRAM
T-H. Hubert Chan, Yue Guo, Wei-Kai Lin, Elaine Shi
2017/923
Batched Multi-hop Multi-key FHE from ring-LWE with Compact Ciphertext Extension
Long Chen, Zhenfeng Zhang, Xueqing Wang
2017/922
On the impossibility of entropy reversal, and its application to zero-knowledge proofs
Shachar Lovett, Jiapeng Zhang
2017/921
RingCT 2.0: A Compact Accumulator-Based (Linkable Ring Signature) Protocol for Blockchain Cryptocurrency Monero
Shi-Feng Sun, Man Ho Au, Joseph K. Liu, Tsz Hon Yuen, Dawu Gu
2017/920
Round-Optimal Secure Two-Party Computation from Trapdoor Permutations
Michele Ciampi, Rafail Ostrovsky, Luisa Siniscalchi, Ivan Visconti
2017/919
Improving the Linear Programming Technique in the Search for Lower Bounds in Secret Sharing
Oriol Farràs, Tarik Kaced, Sebastià Martín, Carles Padró
2017/918
Linear Repairing Codes and Side-Channel Attacks
Hervé Chabanne, Houssem Maghrebi, Emmanuel Prouff
2017/917
A practical, perfectly secure password scheme in the bounded retrieval model
Moses Liskov
2017/916
A Concrete Treatment of Fiat-Shamir Signatures in the Quantum Random-Oracle Model
Eike Kiltz, Vadim Lyubashevsky, Christian Schaffner
2017/915
Efficient Algorithms for Broadcast and Consensus Based on Proofs of Work
Lisa Eckey, Sebastian Faust, Julian Loss
2017/914
Cache-Oblivious and Data-Oblivious Sorting and Applications
T-H. Hubert Chan, Yue Guo, Wei-Kai Lin, Elaine Shi
2017/913
Thunderella: Blockchains with Optimistic Instant Confirmation
Rafael Pass, Elaine Shi
2017/912
On Two Round Rerunnable MPC Protocols
Paul Laird
2017/911
Variable-Length Bit Mapping and Error-Correcting Codes for Higher-Order Alphabet PUFs
Vincent Immler, Matthias Hiller, Qinzhi Liu, Andreas Lenz, Antonia Wachter-Zeh
2017/910
Thwarting Fault Attacks using the Internal Redundancy Countermeasure (IRC)
Benjamin Lac, Anne Canteaut, Jacques J. A. Fournier, Renaud Sirdey
2017/909
Clarifying the subset-resilience problem
Jean-Philippe Aumasson, Guillaume Endignoux
2017/908
Yet Another Compiler for Active Security or: Efficient MPC Over Arbitrary Rings
Ivan Damgård, Claudio Orlandi, Mark Simkin
2017/907
On the differential equivalence of APN functions
Anastasiya Gorodilova
2017/906
Notes On GGH13 Without The Presence Of Ideals
Martin R. Albrecht, Alex Davidson, Enrique Larraia, Alice Pellet--Mary
2017/905
Shorter Ring Signatures from Standard Assumptions
Alonso González
2017/904
On Iterative Collision Search for LPN and Subset Sum
Srinivas Devadas, Ling Ren, Hanshen Xiao
2017/903
On Zero-Testable Homomorphic Encryption and Publicly Verifiable Non-Interactive Arguments
Omer Paneth, Guy N. Rothblum
2017/902
How Low Can You Go? Short Structure-Preserving Signatures for Diffie-Hellman Vectors
Essam Ghadafi
2017/901
Stateful Multi-Client Verifiable Computation
Christian Cachin, Esha Ghosh, Dimitrios Papadopoulos, Björn Tackmann
2017/900
Proof of a shuffle for lattice-based cryptography (Full version)
Núria Costa, Ramiro Martínez, Paz Morillo
2017/899
Kaleidoscope: An Efficient Poker Protocol with Payment Distribution and Penalty Enforcement
Bernardo David, Rafael Dowsley, Mario Larangeira
2017/898
Putting Wings on SPHINCS
Stefan Kölbl
2017/897
Formal Verification of Masked Hardware Implementations in the Presence of Glitches
Roderick Bloem, Hannes Gross, Rinat Iusupov, Bettina Könighofer, Stefan Mangard, Johannes Winter
2017/896
Design, Implementation and Performance Analysis of Highly Efficient Algorithms for AES Key Retrieval in Access-driven Cache-based Side Channel Attacks
Ashokkumar C, M. Bhargav Sri Venkatesh, Ravi Prakash Giri, Bernard Menezes
2017/895
Linear Cryptanalysis of DES with Asymmetries
Andrey Bogdanov, Philip S. Vejre
2017/894
An Efficient Pairing-Based Shuffle Argument
Prastudy Fauzi, Helger Lipmaa, Janno Siim, Michal Zajac
2017/893
Beyond Hellman's Time-Memory Trade-Offs with Applications to Proofs of Space
Hamza Abusalah, Joël Alwen, Bram Cohen, Danylo Khilko, Krzysztof Pietrzak, Leonid Reyzin
2017/892
The Iterated Random Function Problem
Ritam Bhaumik, Nilanjan Datta, Avijit Dutta, Nicky Mouha, Mridul Nandi
2017/891
Finding Bugs in Cryptographic Hash Function Implementations
Nicky Mouha, Mohammad S Raunak, D. Richard Kuhn, Raghu Kacker
2017/890
On the One-Per-Message Unforgeability of (EC)DSA and its Variants
Manuel Fersch, Eike Kiltz, Bertram Poettering
2017/889
On Fast Multiplication in Binary Finite Fields and Optimal Primitive Polynomials over GF(2)
Alexander Maximov, Helena Sjoberg
2017/888
Asynchronous provably-secure hidden services
Philippe Camacho, Fernando Krell
2017/887
Succinct Spooky Free Compilers Are Not Black Box Sound
Zvika Brakerski, Yael Tauman Kalai, Renen Perlman
2017/886
Compression for trace zero points on twisted Edwards curves
Giulia Bianco, Elisa Gorla
2017/885
PermuteRam: Optimizing Oblivious Computation for Efficiency
Shruti Tople, Hung Dang, Prateek Saxena, Ee-Chien Chang
2017/884
Scalar multiplication in compressed coordinates in the trace-zero subgroup
Giulia Bianco, Elisa Gorla
2017/883
Strengthening the Security of Encrypted Databases: Non-Transitive JOINs
Ilya Mironov, Gil Segev, Ido Shahaf
2017/882
Towards an in-depth understanding of privacy parameters for randomized sanitization mechanisms
Baptiste Olivier, Tony Quertier
2017/881
Möbius: Trustless Tumbling for Transaction Privacy
Sarah Meiklejohn, Rebekah Mercer
2017/880
Using the Estonian Electronic Identity Card for Authentication to a Machine (Extended Version)
Danielle Morgan, Arnis Parsovs
2017/879
Formal Verification of Side-channel Countermeasures via Elementary Circuit Transformations
Jean-Sebastien Coron
2017/878
Raziel: Private and Verifiable Smart Contracts on Blockchains
David Cerezo Sánchez
2017/877
Identity-Based Format-Preserving Encryption
Mihir Bellare, Viet Tung Hoang
2017/876
All-But-Many Lossy Trapdoor Functions and Selective Opening Chosen-Ciphertext Security from LWE
Benoit Libert, Amin Sakzad, Damien Stehle, Ron Steinfeld
2017/875
Instantaneous Decentralized Poker
Iddo Bentov, Ranjit Kumaresan, Andrew Miller
2017/874
Non-Trivial Witness Encryption and Null-iO from Standard Assumptions
Zvika Brakerski, Aayush Jain, Ilan Komargodski, Alain Passelegue, Daniel Wichs
2017/873
Cycle Slicer: An Algorithm for Building Permutations on Special Domains
Sarah Miracle, Scott Yilek
2017/872
Linear-Time Zero-Knowledge Proofs for Arithmetic Circuit Satisfiability
Jonathan Bootle, Andrea Cerulli, Essam Ghadafi, Jens Groth, Mohammad Hajiabadi, Sune K. Jakobsen
2017/871
Non-Interactive Multiparty Computation without Correlated Randomness
Shai Halevi, Yuval Ishai, Abhishek Jain, Ilan Komargodski, Amit Sahai, Eylon Yogev
2017/870
Tightly-Secure Signatures from Five-Move Identification Protocols
Eike Kiltz, Julian Loss, Jiaxin Pan
2017/869
Amortizing Randomness Complexity in Private Circuits
Sebastian Faust, Clara Paglialonga, Tobias Schneider
2017/868
New Key Recovery Attacks on Minimal Two-Round Even-Mansour Ciphers
Takanori Isobe, Kyoji Shibutani
2017/867
On the security of a Certificateless Proxy Re-Encryption Scheme without Pairing
Arinjita Paul, S. Sharmila Deva Selvi, C. Pandu Rangan
2017/866
Enhanced Modelling of Authenticated Key Exchange Security
Papa B. Seye, Augustin P. Sarr
2017/865
The First Thorough Side-Channel Hardware Trojan
Maik Ender, Samaneh Ghandali, Amir Moradi, Christof Paar
2017/864
Quantum Multicollision-Finding Algorithm
Akinori Hosoyamada, Yu Sasaki, Keita Xagawa
2017/863
The Minimum Number of Cards in Practical Card-based Protocols
Julia Kastner, Alexander Koch, Stefan Walzer, Daiki Miyahara, Yu-ichi Hayashi, Takaaki Mizuki, Hideaki Sone
2017/862
Efficient Scalable Constant-Round MPC via Garbled Circuits
Aner Ben-Efraim, Yehuda Lindell, Eran Omri
2017/861
On the Depth of Oblivious Parallel RAM
T-H. Hubert Chan, Kai-Min Chung, Elaine Shi
2017/860
Automatic Search of Bit-Based Division Property for ARX Ciphers and Word-Based Division Property
Ling Sun, Wei Wang, Meiqin Wang
2017/859
ABE with Tag Made Easy: Concise Framework and New Instantiations in Prime-order Groups
Jie Chen, Junqing Gong
2017/858
Differential Fault Analysis of SHA-3 under Relaxed Fault Models
Pei Luo, Yunsi Fei, Liwei Zhang, A. Adam Ding
2017/857
Image Classification using non-linear Support Vector Machines on Encrypted Data
Anthony Barnett, Jay Santokhi, Michael Simpson, Nigel P. Smart, Charlie Stainton-Bygrave, Srnivas Vivek, Adrian Waller
2017/856
Zero-Knowledge Arguments for Lattice-Based PRFs and Applications to E-Cash
Benoît Libert, San Ling, Khoa Nguyen, Huaxiong Wang
2017/855
Fault Attack on ACORN v3
Xiaojuan Zhang, Xiutao Feng, Dongdai Lin
2017/854
Zero-Knowledge Password Policy Check from Lattices
Khoa Nguyen, Benjamin Hong Meng Tan, Huaxiong Wang
2017/853
Generic Forward-Secure Key Agreement Without Signatures
Cyprien de Saint Guilhem, Nigel P. Smart, Bogdan Warinschi
2017/852
Blockcipher-based MACs: Beyond the Birthday Bound without Message Length
Yusuke Naito
2017/851
How to Use Metaheuristics for Design of Symmetric-Key Primitives
Ivica Nikolić
2017/850
Breaking and Fixing Secure Similarity Approximations: Dealing with Adversarially Perturbed Inputs
Evgenios M. Kornaropoulos, Petros Efstathopoulos
2017/849
FAST: Disk Encryption and Beyond
Debrup Chakraborty, Sebati Ghosh, Cuauhtemoc Mancillas Lopez, Palash Sarkar
2017/848
Single Key Variant of PMAC_Plus
Nilanjan Datta, Avijit Dutta, Mridul Nandi, Goutam Paul, Liting Zhang
2017/847
An Efficient Quantum Collision Search Algorithm and Implications on Symmetric Cryptography
André Chailloux, María Naya-Plasencia, André Schrottenloher
2017/846
How to Prove Megabytes (Per Second)
Yaron Gvili
2017/845
Improved Security for OCB3
Ritam Bhaumik, Mridul Nandi
2017/844
Implementing Conjunction Obfuscation under Entropic Ring LWE
David Bruce Cousins, Giovanni Di Crescenzo, Kamil Doruk Gür, Kevin King, Yuriy Polyakov, Kurt Rohloff, Gerard W. Ryan, Erkay Savaş
2017/843
Hybrid Encryption in a Multi-User Setting, Revisited
Federico Giacon, Eike Kiltz, Bertram Poettering
2017/842
Quam Bene Non Quantum: Bias in a Family of Quantum Random Number Generators
Darren Hurley-Smith, Julio Hernandez-Castro
2017/841
Efficient Length Doubling From Tweakable Block Ciphers
Yu Long Chen, Atul Luykx, Bart Mennink, Bart Preneel
2017/840
Fast Scalar Multiplication for Elliptic Curves over Binary Fields by Efficiently Computable Formulas
Saud Al Musa, Guangwu Xu
2017/839
Noiseless Fully Homomorphic Encryption
Jing Li, Licheng Wang
2017/838
Two-Round PAKE from Approximate SPH and Instantiations from Lattices
Jiang Zhang, Yu Yu
2017/837
Tight Security Analysis of EHtM MAC
Avijit Dutta, Ashwin Jha, Mridul Nandi
2017/836
Efficient Square-based Montgomery Multiplier for All Type C.1 Pentanomials
Yin Li, Xingpo Ma, Qin Chen, Chuanda Qi
2017/835
Coppersmith's lattices and ``focus groups'': an attack on small-exponent RSA
Stephen D. Miller, Bhargav Narayanan, Ramarathnam Venkatesan
2017/834
Authentication from Weak PRFs with Hidden Auxiliary Input
Daniel Masny
2017/833
Efficient Hybrid Proxy Re-Encryption for Practical Revocation and Key Rotation
Steven Myers, Adam Shull
2017/832
Mixture Differential Cryptanalysis and Structural Truncated Differential Attacks on round-reduced AES
Lorenzo Grassi
2017/831
Security Proof of JAMBU under Nonce Respecting and Nonce Misuse Cases
Geng Wang, Haiyang Zhang, Fengmei Liu
2017/830
Security proof for Round Robin Differential Phase Shift QKD
Daan Leermakers, Boris Skoric
2017/829
Fault Attacks Made Easy: Differential Fault Analysis Automation on Assembly Code
Jakub Breier, Xiaolu Hou, Yang Liu
2017/828
Standardizing Bad Cryptographic Practice - A Teardown of the IEEE Standard for Protecting Electronic-design Intellectual Property
Animesh Chhotaray, Adib Nahiyan, Thomas Shrimpton, Domenic J Forte, Mark Tehranipoor
2017/827
Scaling ORAM for Secure Computation
Jack Doerner, abhi shelat
2017/826
5Gen-C: Multi-input Functional Encryption and Program Obfuscation for Arithmetic Circuits
Brent Carmer, Alex J. Malozemoff, Mariana Raykova
2017/825
Querying for Queries: Indexes of Queries for Efficient and Expressive IT-PIR
Syed Mahbub Hafiz, Ryan Henry
2017/824
Improved Security Notions for Proxy Re-Encryption to Enforce Access Control
Ela Lee
2017/823
Revive: Rebalancing Off-Blockchain Payment Networks
Rami Khalil, Arthur Gervais
2017/822
On the Power of Optical Contactless Probing: Attacking Bitstream Encryption of FPGAs
Shahin Tajik, Heiko Lohrke, Jean-Pierre Seifert, Christian Boit
2017/821
A Fast and Verified Software Stack for Secure Function Evaluation
José Bacelar Almeida, Manuel Barbosa, Gilles Barthe, François Dupressoir, Benjamin Grégoire, Vincent Laporte, Vitor Pereira
2017/820
Concurrency and Privacy with Payment-Channel Networks
Giulio Malavolta, Pedro Moreno-Sanchez, Aniket Kate, Matteo Maffei, Srivatsan Ravi
2017/819
S3ORAM: A Computation-Efficient and Constant Client Bandwidth Blowup ORAM with Shamir Secret Sharing
Thang Hoang, Ceyhun D. Ozkaptan, Attila A. Yavuz, Jorge Guajardo, Tam Nguyen
2017/818
No-Match Attacks and Robust Partnering Definitions – Defining Trivial Attacks for Security Protocols is Not Trivial
Yong Li, Sven Schäge
2017/817
A Universal Designated Verifier Signature Scheme with Non-Delegatability in the Standard Model
Parvin Rastegari, Mehdi Berenjkoub
2017/816
A Framework for Constructing Fast MPC over Arithmetic Circuits with Malicious Adversaries and an Honest-Majority
Yehuda Lindell, Ariel Nof
2017/815
Revisiting the Expected Cost of Solving uSVP and Applications to LWE
Martin R. Albrecht, Florian Göpfert, Fernando Virdia, Thomas Wunderer
2017/814
Fast FPGA Implementations of Diffie-Hellman on the Kummer Surface of a Genus-2 Curve
Philipp Koppermann, Fabrizio De Santis, Johann Heyszl, Georg Sigl
2017/813
Industrial Feasibility of Private Information Retrieval
Angela Jäschke, Björn Grohmann, Frederik Armknecht, Andreas Schaad
2017/812
Optimal PRFs from Blockcipher Designs
Bart Mennink, Samuel Neves
2017/811
Reassessing Grover's Algorithm
Scott Fluhrer
2017/810
The TypTop System: Personalized Typo-Tolerant Password Checking
Rahul Chatterjee, Joanne Woodage, Yuval Pnueli, Anusha Chowdhury, Thomas Ristenpart
2017/809
High-Precision Arithmetic in Homomorphic Encryption
Hao Chen, Kim Laine, Rachel Player, Yuhou Xia
2017/808
On the Untapped Potential of Encoding Predicates by Arithmetic Circuits and Their Applications
Shuichi Katsumata
2017/807
FAME: Fast Attribute-based Message Encryption
Shashank Agrawal, Melissa Chase
2017/806
May the Fourth Be With You: A Microarchitectural Side Channel Attack on Several Real-World Applications of Curve25519
Daniel Genkin, Luke Valenta, Yuval Yarom
2017/805
Forward and Backward Private Searchable Encryption from Constrained Cryptographic Primitives
Raphael Bost, Brice Minaud, Olga Ohrimenko
2017/804
Improved Conditional Cube Attacks on Keccak Keyed Modes with MILP Method
Zheng Li, Wenquan Bi, Xiaoyang Dong, Xiaoyun Wang
2017/803
Role-Based Ecosystem for Design, Development, and Deployment of Secure Multi-Party Data Analytics Applications
Andrei Lapets, Kinan Dak Albab, Rawane Issa, Lucy Qin, Mayank Varia, Azer Bestavros, Frederick Jansen
2017/802
New Techniques for Structural Batch Verification in Bilinear Groups with Applications to Groth-Sahai Proofs
Gottfried Herold, Max Hoffmann, Michael Kloo\ss, Carla Ràfols, Andy Rupp
2017/801
Short Attribute-Based Signatures for Arbitrary Turing Machines from Standard Assumptions
Pratish Datta, Ratna Dutta, Sourav Mukhopadhyay
2017/800
Collisions and Semi-Free-Start Collisions for Round-Reduced RIPEMD-160
Fukang Liu, Florian Mendel, Gaoli Wang
2017/799
Practical Multi-party Private Set Intersection from Symmetric-Key Techniques
Vladimir Kolesnikov, Naor Matania, Benny Pinkas, Mike Rosulek, Ni Trieu
2017/798
More Efficient Universal Circuit Constructions
Daniel Günther, Ágnes Kiss, Thomas Schneider
2017/797
Multi-Designated Verifiers Signature Schemes with Threshold Verifiability: Generic Pattern and a Concrete Scheme in the Standard Model
Parvin Rastegari, Mehdi Berenjkoub
2017/796
Lightweight Symmetric-Key Hidden Vector Encryption without Pairings
Sikhar Patranabis, Debdeep Mukhopadhyay
2017/795
Private Constrained PRFs (and More) from LWE
Zvika Brakerski, Rotem Tsabary, Vinod Vaikuntanathan, Hoeteck Wee
2017/794
Anonymous Single-Round Server-Aided Verification
Elena Pagnin, Aikaterini Mitrokotsa, Keisuke Tanaka
2017/793
McBits Revisited
Tung Chou
2017/792
Gimli, Lord of the Glittering TRS-80
Jean-Marie Chauvet
2017/791
Merged Mining: Curse of Cure?
Aljosha Judmayer, Alexei Zamyatin, Nicholas Stifter, Artemios G. Voyiatzis, Edgar Weippl
2017/790
TinyOLE: Efficient Actively Secure Two-Party Computation from Oblivious Linear Function Evaluation
Nico Döttling, Satrajit Ghosh, Jesper Buus Nielsen, Tobias Nilges, Roberto Trifiletti
2017/789
Low-communication parallel quantum multi-target preimage search
Gustavo Banegas, Daniel J. Bernstein
2017/788
Attack on AES Implementation Exploiting Publicly-visible Partial Result
William Diehl
2017/787
When Are Opaque Predicates Useful?
Lukas Zobernig, Steven D. Galbraith, Giovanni Russello
2017/786
A Cryptographic Look at Multi-Party Channels
Patrick Eugster, Giorgia Azzurra Marson, Bertram Poettering
2017/785
What about Bob? The Inadequacy of CPA Security for Proxy Reencryption
Aloni Cohen
2017/784
Secure Channels and Termination: The Last Word on TLS
Colin Boyd, Britta Hale
2017/783
HAL — The Missing Piece of the Puzzle for Hardware Reverse Engineering, Trojan Detection and Insertion
Marc Fyrbiak, Sebastian Wallat, Pawel Swierczynski, Max Hoffmann, Sebastian Hoppach, Matthias Wilhelm, Tobias Weidlich, Russell Tessier, Christof Paar
2017/782
Efficient Attribute-Based Secure Keyword Search on the Cloud Storage
Wanfen Guo, Xiaolei Dong, Zhenfu Cao, Jiachen Shen
2017/781
Lattice-Based Techniques for Accountable Anonymity: Composition of Abstract Stern’s Protocols and Weak PRF with Efficient Protocols from LWR
Rupeng Yang, Man Ho Au, Junzuo Lai, Qiuliang Xu, Zuoxia Yu
2017/780
New Algorithms for Solving LPN
Bin Zhang, Xinxin Gong
2017/779
Efficient Random Grid Visual Cryptographic Schemes having Essential Members
Bibhas Chandra Das, Md Kutubuddin Sardar, Avishek Adhikari
2017/778
MCMix: Anonymous Messaging via Secure Multiparty Computation
Nikolaos Alexopoulos, Aggelos Kiayias, Riivo Talviste, Thomas Zacharias
2017/777
Encrypting Messages for Incomplete Chains of Certificates
Sanjit Chatterjee, Deepak Garg, Aniket Kate, Tobias Theobald
2017/776
Field lifting for smaller UOV public keys
Ward Beullens, Bart Preneel
2017/775
Consensus from Signatures of Work
Juan A. Garay, Aggelos Kiayias, Giorgos Panagiotakos
2017/774
Computational problems in supersingular elliptic curve isogenies
Steven D. Galbraith, Frederik Vercauteren
2017/773
A Novel Cryptographic Framework for Cloud File Systems and CryFS, a Provably-Secure Construction
Sebastian Messmer, Jochen Rill, Dirk Achenbach, Jörn Müller-Quade
2017/772
Locality-Preserving Oblivious RAM
Gilad Asharov, T-H. Hubert Chan, Kartik Nayak, Rafael Pass, Ling Ren, Elaine Shi
2017/771
Post-quantum security of the sponge construction
Jan Czajkowski, Leon Groot Bruinderink, Andreas Hülsing, Christian Schaffner, Dominique Unruh
2017/770
PAPEETE: Private, Authorized, and Fast Personal Genomic Testing
Angelo Massimo Perillo, Emiliano De Cristofaro
2017/769
Malicious-Secure Private Set Intersection via Dual Execution
Peter Rindal, Mike Rosulek
2017/768
An Efficient Certificateless Proxy Re-Encryption Scheme without Pairing
S. Sharmila Deva Selvi, Arinjita Paul, C. Pandu Rangan
2017/767
Quantum Key-Recovery on full AEZ
Xavier Bonnetain
2017/766
GLYPH: A New Instantiation of the GLP Digital Signature Scheme
Arjun Chopra
2017/765
Necessary conditions for designing secure stream ciphers with the minimal internal states
Vahid Amin Ghafari, Honggang Hu, Mohammadsadegh alizadeh
2017/764
Categorising and Comparing Cluster-Based DPA Distinguishers
Xinping Zhou, Carolyn Whitnall, Elisabeth Oswald, Degang Sun, Zhu Wang
2017/763
Improved Fully Homomorphic Encryption without Bootstrapping
Masahiro Yagisawa
2017/762
Private Collaborative Neural Network Learning
Melissa Chase, Ran Gilad-Bachrach, Kim Laine, Kristin Lauter, Peter Rindal
2017/761
Anti-SAT: Mitigating SAT Attack on Logic Locking
Yang Xie, Ankur Srivastava
2017/760
GIFT: A Small Present (Full version)
Subhadeep Banik, Sumit Kumar Pandey, Thomas Peyrin, Yu Sasaki, Siang Meng Sim, Yosuke Todo
2017/759
Simple Amortized Proofs of Shortness for Linear Relations over Polynomial Rings
Carsten Baum, Vadim Lyubashevsky
2017/758
On Improving Integer Factorization and Discrete Logarithm Computation using Partial Triangulation
Fabrice Boudot
2017/757
CAKE: Code-based Algorithm for Key Encapsulation
Paulo S. L. M. Barreto, Shay Gueron, Tim Gueneysu, Rafael Misoczki, Edoardo Persichetti, Nicolas Sendrier, Jean-Pierre Tillich
2017/756
Verifiable Private Polynomial Evaluation
Xavier Bultel, Manik Lal Das, Hardik Gajera, David Gérault, Matthieu Giraud, Pascal Lafourcade
2017/755
Efficient, Reusable Fuzzy Extractors from LWE
Daniel Apon, Chongwon Cho, Karim Eldefrawy, Jonathan Katz
2017/754
Long-Term Secure Time-Stamping using Preimage-Aware Hash Functions
Ahto Buldas, Matthias Geihs, Johannes Buchmann
2017/753
CryptHOL: Game-based Proofs in Higher-order Logic
David A. Basin, Andreas Lochbihler, S. Reza Sefidgar
2017/752
A Note on Attribute-Based Group Homomorphic Encryption
Michael Clear, Ciaran McGoldrick
2017/751
Twisting Lattice and Graph Techniques to Compress Transactional Ledgers
Rémi Géraud, David Naccache, Răzvan Roşie
2017/750
Adaptive-Secure VRFs with Shorter Keys from Static Assumptions
Răzvan Roşie
2017/749
Searchable Encryption with Optimal Locality: Achieving Sublogarithmic Read Efficiency
Ioannis Demertzis, Dimitrios Papadopoulos, Charalampos Papamanthou
2017/748
Efficient reductions in cyclotomic rings - Application to R-LWE based FHE schemes
Jean-Claude Bajard, Julien Eynard, Anwar Hasan, Paulo Martins, Leonel Sousa, Vincent Zucca
2017/747
sLiSCP: Simeck-based Permutations for Lightweight Sponge Cryptographic Primitives
Riham AlTawy, Raghvendra Rohit, Morgan He, Kalikinkar Mandal, Gangqiang Yang, Guang Gong
2017/746
On the Tightness of Forward-Secure Signature Reductions
Michel Abdalla, Fabrice Benhamouda, David Pointcheval
2017/745
A Quantum ``Magic Box'' for the Discrete Logarithm Problem
Burton S. Kaliski Jr.
2017/744
Binary Hash Tree based Certificate Access Management
Virendra Kumar, Jonathan Petit, William Whyte
2017/743
Cryptanalysis of 22 1/2 rounds of Gimli
Mike Hamburg
2017/742
Cryptanalysis of Compact-LWE
Jonathan Bootle, Mehdi Tibouchi
2017/741
Dynamic Searchable Public-Key Ciphertexts with Fast Performance and Practical Security
Peng Xu, Xia Gao, Wei Wang, Willy Susilo, Qianhong Wu, Hai Jin
2017/740
Convolutional Neural Networks with Data Augmentation against Jitter-Based Countermeasures -- Profiling Attacks without Pre-Processing --
Eleonora Cagli, Cécile Dumas, Emmanuel Prouff
2017/739
Secure Storage with Replication and Transparent Deduplication
Iraklis Leontiadis, Reza Curtmola
2017/738
Private Intersection-Sum Protocol with Applications to Attributing Aggregate Ad Conversions
Mihaela Ion, Ben Kreuter, Erhan Nergiz, Sarvar Patel, Shobhit Saxena, Karn Seth, David Shanahan, Moti Yung
2017/737
SecReach: Secure Reachability Computation on Encrypted Location Check-in Data
Hanyu Quan, Boyang Wang, Iraklis Leontiadis, Ming Li, Yuqing Zhang
2017/736
SGX Remote Attestation is not Sufficient
Yogesh Swami
2017/735
Faster Bootstrapping with Multiple Addends
TanPing ZHOU, XiaoYuan YANG, LongFei LIU, Wei ZHANG, YiTao DING
2017/734
Round Optimal Concurrent Non-Malleability from Polynomial Hardness
Dakshita Khurana
2017/733
Decoding Generalized Reed-Solomon Codes and Its Application to RLCE Encryption Scheme
Yongge Wang
2017/732
Privacy-Preserving Ridge Regression Without Garbled Circuits
Marc Joye
2017/731
Revisiting Difficulty Control for Blockchain Systems
Dmitry Meshkov, Alexander Chepurnoy, Marc Jansen
2017/730
Second Order Statistical Behavior of LLL and BKZ
Yang Yu, Léo Ducas
2017/729
Success Probability of Multiple/Multidimensional Linear Cryptanalysis Under General Key Randomisation Hypotheses
Subhabrata Samajder, Palash Sarkar
2017/728
Evidence-Based Trust Mechanism Using Clustering Algorithms for Distributed Storage Systems
Giulia Traverso, Carlos Garcia Cordero, Mehrdad Nojoumian, Reza Azarderakhsh, Denise Demirel, Sheikh Mahbub Habib, Johannes Buchmann
2017/727
A note on the implementation of the Number Theoretic Transform
Michael Scott
2017/726
Proposal of primitive polynomials for Linux kernel PRNG
David FONTAINE, Olivier VIVOLO
2017/725
AS$^3$: Adaptive Social Secret Sharing for Distributed Storage Systems
Giulia Traverso, Denise Demirel, Sheikh Mahbub Habib, Johannes Buchmann
2017/724
Dynamic and Verifiable Hierarchical Secret Sharing
Giulia Traverso, Denise Demirel, Johannes Buchmann
2017/723
An Equivalence Between Attribute-Based Signatures and Homomorphic Signatures, and New Constructions for Both
Rotem Tsabary
2017/722
A Simpler Rate-Optimal CPIR Protocol
Helger Lipmaa, Kateryna Pavlyk
2017/721
On Making U2F Protocol Leakage-Resilient via Re-keying
Donghoon Chang, Sweta Mishra, Somitra Kumar Sanadhya, Ajit Pratap Singh
2017/720
Computing Low-Weight Discrete Logarithms
Bailey Kacsmar, Sarah Plosker, Ryan Henry
2017/719
Efficient Proactive Secret Sharing
Jacqueline Brendel, Denise Demirel
2017/718
Conditionally Secure Secrecy Computation using Secret Sharing Scheme for n<2k-1 (full paper)
Ahmad Akmal Aminuddin Mohd Kamal, Keiichi Iwamura
2017/717
Fault Attacks on XEX Mode with Application to certain Authenticated Encryption Modes
Hassan Qahur Al Mahri, Leonie Simpson, Harry Bartlett, Ed Dawson, Kenneth Koon-Ho Wong
2017/716
Anonymous Post-Quantum Cryptocash
Huang Zhang, Fangguo Zhang, Haibo Tian, Man Ho Au
2017/715
Privacy-Preserving Deep Learning via Additively Homomorphic Encryption
Le Trieu Phong, Yoshinori Aono, Takuya Hayashi, Lihua Wang, Shiho Moriai
2017/714
The Edited Truth
Shafi Goldwasser, Saleet Klein, Daniel Wichs
2017/713
More is Less: On the End-to-End Security of Group Chats in Signal, WhatsApp, and Threema
Paul Rösler, Christian Mainka, Jörg Schwenk
2017/712
On desynchronised El Gamal algorithm
Vasyl Ustimenko
2017/711
Composable Masking Schemes in the Presence of Physical Defaults and the Robust Probing Model
Sebastian Faust, Vincent Grosso, Santos Merino Del Pozo, Clara Paglialonga, François-Xavier Standaert
2017/710
Distributed Computing with Channel Noise
Abhinav Aggarwal, Varsha Dani, Thomas P. Hayes, Jared Saia
2017/709
spKEX: An optimized lattice-based key exchange
Sauvik Bhattacharya, Oscar Garcia-Morchon, Ronald Rietman, Ludo Tolhuizen
2017/708
Reconsidering the Security Bound of AES-GCM-SIV
Tetsu Iwata, Yannick Seurin
2017/707
Privacy-Preserving Ridge Regression on Distributed Data
Irene Giacomelli, Somesh Jha, C. David Page, Kyonghwan Yoon
2017/706
SCATTER : A New Dimension in Side-Channel
Hugues Thiebeauld, Georges Gagnerot, Antoine Wurcker, Christophe Clavier
2017/705
Multi-Hop Distance Estimation: How Far are You?
Aikaterini Mitrokotsa, Cristina Onete, Elena Pagnin, Mahesh Perera
2017/704
A Key Backup Scheme Based on Bitcoin
Zhongxiang Zheng, Chunhuan Zhao, Haining Fan, Xiaoyun Wang
2017/703
Optimally Sound Sigma Protocols Under DCRA
Helger Lipmaa
2017/702
Better Bounds for Block Cipher Modes of Operation via Nonce-Based Key Derivation
Shay Gueron, Yehuda Lindell
2017/701
Improved Reconstruction Attacks on Encrypted Data Using Range Query Leakage
Marie-Sarah Lacharité, Brice Minaud, Kenneth G. Paterson
2017/700
Linearly Homomorphic Authenticated Encryption with Provable Correctness and Public Verifiability
Johannes Buchmann, Denise Demirel, Lucas Schabhüser, Patrick Struck
2017/699
Runtime Code Polymorphism as a Protection Against Side Channel Attacks
Damien Couroussé, Thierno Barry, Bruno Robisson, Philippe Jaillon, Olivier Potin, Jean-Louis Lanet
2017/698
δ-subgaussian Random Variables in Cryptography
Sean Murphy, Rachel Player
2017/697
On Internal Re-keying
Liliya R. Ahmetzyanova, Evgeny K. Alekseev, Igor B. Oshkin, Stanislav V. Smyshlyaev
2017/696
A Humble Theory and Application for Logic Encryption
Hai Zhou
2017/695
Updatable Tokenization: Formal Definitions and Provably Secure Constructions
Christian Cachin, Jan Camenisch, Eduarda Freire-Stoegbuchner, Anja Lehmann
2017/694
Atomically Trading with Roger: Gambling on the success of a hardfork
Patrick McCorry, Ethan Heilman, Andrew Miller
2017/693
Cryptanalysis of Deoxys and its Internal Tweakable Block Ciphers
Carlos Cid, Tao Huang, Thomas Peyrin, Yu Sasaki, Ling Song
2017/692
Towards Characterizing Securely Computable Two-Party Randomized Functions
Deepesh Data, Manoj Prabhakaran
2017/691
Universal Forgery and Key Recovery Attacks: Application to FKS, FKD and Keyak
Fanbao Liu, Fengmei Liu
2017/690
High Performance Post-Quantum Key Exchange on FPGAs
Po-Chun Kuo, Wen-Ding Li, Yu-Wei Chen, Yuan-Che Hsu, Bo-Yuan Peng, Chen-Mou Cheng, Bo-Yin Yang
2017/689
On the security of HMFEv
Yasufumi Hashimoto
2017/688
Quantum Collision-Finding in Non-Uniform Random Functions
Marko Balogh, Edward Eaton, Fang Song
2017/687
Impossibility of Secure Multi-Party Products in Non-Abelian Groups
Jessica Covington, Megan Golbek, Mike Rosulek
2017/686
On the Necessity of a Prescribed Block Validity Consensus: Analyzing Bitcoin Unlimited Mining Protocol
Ren Zhang, Bart Preneel
2017/685
Compact-LWE: Enabling Practically Lightweight Public Key Encryption for Leveled IoT Device Authentication
Dongxi Liu, Nan Li, Jongkil Kim, Surya Nepal
2017/684
Z-Channel: Scalable and Efficient Scheme in Zerocash
Yuncong Zhang, Yu Long, Zhen Liu, Zhiqiang Liu, Dawu Gu
2017/683
Efficient Privacy-Preserving General Edit Distance and Beyond
Ruiyu Zhu, Yan Huang
2017/682
Conditional Blind Signatures
Alexandros Zacharakis, Panagiotis Grontas, Aris Pagourtzis
2017/681
Logical loophole in random 3-bit sequence generator
Alexandre de Castro
2017/680
SOFIA: MQ-based signatures in the QROM
Ming-Shing Chen, Andreas Hülsing, Joost Rijneveld, Simona Samardjiska, Peter Schwabe
2017/679
Searchable Encryption with Access Control
Nils Löken
2017/678
Differential Fault Attack on Grain v1, ACORN v3 and Lizard
Akhilesh Anilkumar Siddhanti, Santanu Sarkar, Subhamoy Maitra, Anupam Chattopadhyay
2017/677
Faster Unbalanced Private Set Intersection
Amanda Cristina Davi Resende, Diego de Freitas Aranha
2017/676
Dynamic Verifiable Encrypted Keyword Search Using Bitmap Index and Homomorphic MAC
Rajkumar Ramasamy, S. Sree Vivek, Praveen George, Bharat S. Rawal Kshatriya
2017/675
Memory-Tight Reductions
Benedikt Auerbach, David Cash, Manuel Fersch, Eike Kiltz
2017/674
Transparent Memory Encryption and Authentication
Mario Werner, Thomas Unterluggauer, Robert Schilling, David Schaffenrath, Stefan Mangard
2017/673
Differential Fault Analysis Automation
Sayandeep Saha, Ujjawal Kumar, Debdeep Mukhopadhyay, Pallab Dasgupta
2017/672
Coding for interactive communication beyond threshold adversaries
Anat Paskin-Cherniavsky, Slava Radune
2017/671
Guru: Universal Reputation Module for Distributed Consensus Protocols
Alex Biryukov, Daniel Feher, Dmitry Khovratovich
2017/670
Private Set Intersection for Unequal Set Sizes with Mobile Applications
Ágnes Kiss, Jian Liu, Thomas Schneider, N. Asokan, Benny Pinkas
2017/669
Speeding up Elliptic Curve Scalar Multiplication without Precomputation
Kwang Ho Kim, Junyop Choe, Song Yun Kim, Namsu Kim, Sekung Hong
2017/668
Spot the Black Hat in a Dark Room: Parallelized Controlled Access Searchable Encryption on FPGAs
Sikhar Patranabis, Debdeep Mukhopadhyay
2017/667
High-speed key encapsulation from NTRU
Andreas Hülsing, Joost Rijneveld, John M. Schanck, Peter Schwabe
2017/666
On Ends-to-Ends Encryption: Asynchronous Group Messaging with Strong Security Guarantees
Katriel Cohn-Gordon, Cas Cremers, Luke Garratt, Jon Millican, Kevin Milner
2017/665
Lower bounds on communication for multiparty computation of multiple «AND» instances with secret sharing
Michael Raskin
2017/664
Message Franking via Committing Authenticated Encryption
Paul Grubbs, Jiahui Lu, Thomas Ristenpart
2017/663
Securing Memory Encryption and Authentication Against Side-Channel Attacks Using Unprotected Primitives
Thomas Unterluggauer, Mario Werner, Stefan Mangard
2017/662
The problem with the SURF scheme
Thomas Debris-Alazard, Nicolas Sendrier, Jean-Pierre Tillich
2017/661
MuSE: Multimodal Searchable Encryption for Cloud Applications
Bernardo Ferreira, João Leitão, Henrique Domingos
2017/660
Profiling Good Leakage Models For Masked Implementations
Changhai Ou, Zhu Wang, Degang Sun, Xinping Zhou
2017/659
Forward-Secure Searchable Encryption on Labeled Bipartite Graphs
Russell W. F. Lai, Sherman S. M. Chow
2017/658
Privacy for Targeted Advertising
Avradip Mandal, John Mitchell, Hart Montgomery, Arnab Roy
2017/657
CCA-secure Predicate Encryption from Pair Encoding in Prime Order Groups: Generic and Efficient
Sanjit Chatterjee, Sayantan Mukherjee, Tapas Pandit
2017/656
A Scalable Proof-of-Stake Blockchain in the Open Setting (or, How to Mimic Nakamoto's Design via Proof-of-Stake)
Lei Fan, Hong-Sheng Zhou
2017/655
A Real-time Inversion Attack on the GMR-2 Cipher Used in the Satellite Phones
Jiao Hu, Ruilin Li, Chaojing Tang
2017/654
A Secure and Private Billing Protocol for Smart Metering
Tom Eccles, Basel Halak
2017/653
Universal Forgery with Birthday Paradox: Application to Blockcipher-based Message Authentication Codes and Authenticated Encryptions
Fanbao Liu, Fengmei Liu
2017/652
Pseudorandom Functions: Three Decades Later
Andrej Bogdanov, Alon Rosen
2017/651
Rescuing LoRaWAN 1.0
Gildas Avoine, Loïc Ferreira
2017/650
Efficient Public Trace and Revoke from Standard Assumptions
Shweta Agrawal, Sanjay Bhattacherjee, Duong Hieu Phan, Damien Stehle, Shota Yamada
2017/649
Blockcipher-based Authenticated Encryption: How Small Can We Go?
Avik Chakraborti, Tetsu Iwata, Kazuhiko Minematsu, Mridul Nandi
2017/648
CHAINIAC: Proactive Software-Update Transparency via Collectively Signed Skipchains and Verified Builds
Kirill Nikitin, Eleftherios Kokoris-Kogias, Philipp Jovanovic, Linus Gasser, Nicolas Gailly, Ismail Khoffi, Justin Cappos, Bryan Ford
2017/647
A TMDTO Attack Against Lizard
Subhamoy Maitra, Nishant Sinha, Akhilesh Siddhanti, Ravi Anand, Sugata Gangopadhyay
2017/646
Rational Trust Modeling
Mehrdad Nojoumian
2017/645
SPHINCS-Simpira: Fast Stateless Hash-based Signatures with Post-quantum Security
Shay Gueron, Nicky Mouha
2017/644
On Space-Scarce Economy In Blockchain Systems
Alexander Chepurnoy, Dmitry Meshkov
2017/643
Private Data Aggregation on a Budget
Morten Dahl, Valerio Pastro, Mathieu Poumeyrol
2017/642
Reducing Multi-Secret Sharing Problem to Sharing a Single Secret Based on Cellular Automata
Nasrollah Pakniat, Mahnaz Noroozi, Ziba Eslami
2017/641
Integer Version of Ring-LWE and its Applications
Gu Chunsheng
2017/640
Non-Interactive Provably Secure Attestations for Arbitrary RSA Prime Generation Algorithms
Fabrice Benhamouda, Houda Ferradi, Rémi Géraud, David Naccache
2017/639
One TPM to Bind Them All: Fixing TPM 2.0 for Provably Secure Anonymous Attestation
Jan Camenisch, Liqun Chen, Manu Drijvers, Anja Lehmann, David Novick, Rainer Urian
2017/638
From Single-Key to Collusion-Resistant Secret-Key Functional Encryption by Leveraging Succinctness
Fuyuki Kitagawa, Ryo Nishimaki, Keisuke Tanaka
2017/637
Very High Order Masking: Efficient Implementation and Security Evaluation
Anthony Journault, François-Xavier Standaert
2017/636
Implementing 128-bit Secure MPKC Signatures
Ming-Shing Chen, Wen-Ding Li, Bo-Yuan Peng, Bo-Yin Yang, Chen-Mou Cheng
2017/635
Perun: Virtual Payment Hubs over Cryptocurrencies
Stefan Dziembowski, Lisa Eckey, Sebastian Faust, Daniel Malinowski
2017/634
CRYSTALS -- Kyber: a CCA-secure module-lattice-based KEM
Joppe Bos, Léo Ducas, Eike Kiltz, Tancrède Lepoint, Vadim Lyubashevsky, John M. Schanck, Peter Schwabe, Gregor Seiler, Damien Stehlé
2017/633
CRYSTALS -- Dilithium: Digital Signatures from Module Lattices
Leo Ducas, Tancrede Lepoint, Vadim Lyubashevsky, Peter Schwabe, Gregor Seiler, Damien Stehle
2017/632
Generalized Polynomial Decomposition for S-boxes with Application to Side-Channel Countermeasures
Dahmun Goudarzi, Matthieu Rivain, Damien Vergnaud, Srinivas Vivek
2017/631
Certifying Trapdoor Permutations, Revisited
Ran Canetti, Amit Lichtenberg
2017/630
Gimli: a cross-platform permutation
Daniel J. Bernstein, Stefan Kölbl, Stefan Lucks, Pedro Maat Costa Massolino, Florian Mendel, Kashif Nawaz, Tobias Schneider, Peter Schwabe, François-Xavier Standaert, Yosuke Todo, Benoît Viguier
2017/629
A Systematic Approach to the Side-Channel Analysis of ECC Implementations with Worst-Case Horizontal Attacks
Romain Poussier, Yuanyuan Zhou, François-Xavier Standaert
2017/628
Middle-Product Learning With Errors
Miruna Rosca, Amin Sakzad, Ron Steinfeld, Damien Stehle
2017/627
Sliding right into disaster: Left-to-right sliding windows leak
Daniel J. Bernstein, Joachim Breitner, Daniel Genkin, Leon Groot Bruinderink, Nadia Heninger, Tanja Lange, Christine van Vredendaal, Yuval Yarom
2017/626
CycSAT: SAT-Based Attack on Cyclic Logic Encryptions
Hai Zhou, Ruifeng Jiang, Shuyu Kong
2017/625
How to Break Secure Boot on FPGA SoCs through Malicious Hardware
Nisha Jacob, Johann Heyszl, Andreas Zankl, Carsten Rolfes, Georg Sigl
2017/624
Fast Leakage Assessment
Oscar Reparaz, Benedikt Gierlichs, Ingrid Verbauwhede
2017/623
Back to Massey: Impressively fast, scalable and tight security evaluation tools
Marios O. Choudary, P. G. Popescu
2017/622
GIFT: A Small Present
Subhadeep Banik, Sumit Kumar Pandey, Thomas Peyrin, Yu Sasaki, Siang Meng Sim, Yosuke Todo
2017/621
Novel Bypass Attack and BDD-based Tradeoff Analysis Against all Known Logic Locking Attacks
Xiaolin Xu, Bicky Shakya, Mark M. Tehranipoor, Domenic Forte
2017/620
The Algebraic Group Model and its Applications
Georg Fuchsbauer, Eike Kiltz, Julian Loss
2017/619
Black-Box Constructions of Signature Schemes in the Bounded Leakage Setting
Qiong Huang, Jianye Huang
2017/618
CacheZoom: How SGX Amplifies The Power of Cache Attacks
Ahmad Moghimi, Gorka Irazoqui, Thomas Eisenbarth
2017/617
Secure Arithmetic Computation with Constant Computational Overhead
Benny Applebaum, Ivan Damgård, Yuval Ishai, Michael Nielsen, Lior Zichron
2017/616
Statement Voting
Bingsheng Zhang, Hong-Sheng Zhou
2017/615
A Framework to Select Parameters for Lattice-Based Cryptography
Nabil Alkeilani Alkadri, Johannes Buchmann, Rachid El Bansarkhani, Juliane Krämer
2017/614
Brute–Force Search Strategies for Single–Trace and Few–Traces Template Attacks on the DES Round Keys of a Recent Smart Card
Mathias Wagner, Stefan Heyse, Charles Guillemet
2017/613
Illusion and Dazzle: Adversarial Optical Channel Exploits against Lidars for Automotive Applications
Hocheol Shin, Dohyun Kim, Yujin Kwon, Yongdae Kim
2017/612
Large Modulus Ring-LWE $\geq$ Module-LWE
Martin R. Albrecht, Amit Deo
2017/611
Multi-Rate Threshold FlipThem
David Leslie, Chris Sherfield, Nigel P. Smart
2017/610
Differential Attacks: Using Alternative Operations
Céline Blondeau, Roberto Civino, Massimiliano Sala
2017/609
On the discrete logarithm problem for prime-field elliptic curves
Alessandro Amadori, Federico Pintore, Massimiliano Sala
2017/608
Your Rails Cannot Hide From Localized EM: How Dual-Rail Logic Fails on FPGAs
Vincent Immler, Robert Specht, Florian Unterstein
2017/607
Leighton-Micali Hash-Based Signatures in the Quantum Random-Oracle Model
Edward Eaton
2017/606
Creating Cryptographic Challenges Using Multi-Party Computation: The LWE Challenge
Johannes Buchmann, Niklas Büscher, Florian Göpfert, Stefan Katzenbeisser, Juliane Krämer, Daniele Micciancio, Sander Siim, Christine van Vredendaal, Michael Walter
2017/605
Unlinkable and Strongly Accountable Sanitizable Signatures from Verifiable Ring Signatures
Xavier Bultel, Pascal Lafourcade
2017/604
A Modular Analysis of the Fujisaki-Okamoto Transformation
Dennis Hofheinz, Kathrin Hövelmanns, Eike Kiltz
2017/603
Cryptanalytic Time-Memory Tradeoff for Password Hashing Schemes
Donghoon Chang, Arpan Jati, Sweta Mishra, Somitra Kumar Sanadhya
2017/602
A multi-party protocol for constructing the public parameters of the Pinocchio zk-SNARK
Sean Bowe, Ariel Gabizon, Matthew D. Green
2017/601
Implementation and Evaluation of a Lattice-Based Key-Policy ABE Scheme
Wei Dai, Yarkın Doröz, Yuriy Polyakov, Kurt Rohloff, Hadi Sajjadpour, Erkay Savaş, Berk Sunar
2017/600
Bit-Sliding: A Generic Technique for Bit-Serial Implementations of SPN-based Primitives -- Applications to AES, PRESENT and SKINNY
Jeremy Jean, Amir Moradi, Thomas Peyrin, Pascal Sasdrich
2017/599
A Subversion-Resistant SNARK
Behzad Abdolmaleki, Karim Baghery, Helger Lipmaa, Michal Zajac
2017/598
Quantum Resource Estimates for Computing Elliptic Curve Discrete Logarithms
Martin Roetteler, Michael Naehrig, Krysta M. Svore, Kristin Lauter
2017/597
Round Optimal Concurrent MPC via Strong Simulation
Saikrishna Badrinarayanan, Vipul Goyal, Abhishek Jain, Dakshita Khurana, Amit Sahai
2017/596
A Side-Channel Assisted Cryptanalytic Attack Against QcBits
Mélissa Rossi, Mike Hamburg, Michael Hutter, Mark E. Marson
2017/595
FPGA-based Key Generator for the Niederreiter Cryptosystem using Binary Goppa Codes
Wen Wang, Jakub Szefer, Ruben Niederhagen
2017/594
Single-Trace Side-Channel Attacks on Masked Lattice-Based Encryption
Robert Primas, Peter Pessl, Stefan Mangard
2017/593
Solving multivariate polynomial systems and an invariant from commutative algebra
Alessio Caminata, Elisa Gorla
2017/592
Speeding up lattice sieve with Xeon Phi coprocessor
Anja Becker, Dusan Kostic
2017/591
On the Security of Carrier Phase-based Ranging
Hildur Olafsdottir, Aanjhan Ranganathan, Srdjan Capkun
2017/590
Constant bandwidth ORAM with small block size using PIR operations
Linru Zhang, Gongxian Zeng, Yuechen Chen, Siu-Ming Yiu, Nairen Cao, Zheli Liu
2017/589
An Attempt to Cryptanalyze A Partially Known Cipher Algorithm
Juay Guan Hee
2017/588
Renyi Entropy Estimation Revisited
Maciej Obremski, Maciej Skorski
2017/587
Subversion-zero-knowledge SNARKs
Georg Fuchsbauer
2017/586
Deterministic, Stash-Free Write-Only ORAM
Daniel S. Roche, Adam J. Aviv, Seung Geol Choi, Travis Mayberry
2017/585
Internet Voting Using Zcash
Pavel Tarasov, Hitesh Tewari
2017/584
Hacking in the Blind: (Almost) Invisible Runtime User Interface Attacks
Luka Malisa, Kari Kostiainen, Thomas Knell, David Sommer, Srdjan Capkun
2017/583
Side-Channel Attacks on BLISS Lattice-Based Signatures -- Exploiting Branch Tracing Against strongSwan and Electromagnetic Emanations in Microcontrollers
Thomas Espitau, Pierre-Alain Fouque, Benoit Gerard, Mehdi Tibouchi
2017/582
(Finite) Field Work: Choosing the Best Encoding of Numbers for FHE Computation
Angela Jäschke, Frederik Armknecht
2017/581
Time-Memory Trade-offs for Parallel Collision Search Algorithms
Monika Trimoska, Sorina Ionica, Gilles Dequen
2017/580
Analysing Relations involving small number of Monomials in AES S- Box
Riddhi Ghosal
2017/579
Birthday Attack on Dual EWCDM
Mridul Nandi
2017/578
TLS-N: Non-repudiation over TLS Enabling - Ubiquitous Content Signing for Disintermediation
Hubert Ritzdorf, Karl Wüst, Arthur Gervais, Guillaume Felley, Srdjan Capkun
2017/577
Boot Attestation: Secure Remote Reporting with Off-The-Shelf IoT Sensors
Steffen Schulz, André Schaller, Florian Kohnhäuser, Stefan Katzenbeisser
2017/576
The Security of SIMON-like Ciphers Against Linear Cryptanalysis
Zhengbin Liu, Yongqiang Li, Mingsheng Wang
2017/575
Quantum Collision-Resistance of Non-uniformly Distributed Functions: Upper and Lower Bounds
Ehsan Ebrahimi, Dominique Unruh
2017/574
A Secure User Authentication and Key Agreement Scheme for HWSN Tailored for the Internet of Things Environment
Hamidreza Yazdanpanah, Mahdi Azizi, Seyed Morteza Pournaghi
2017/573
Ouroboros Praos: An adaptively-secure, semi-synchronous proof-of-stake protocol
Bernardo David, Peter Gaži, Aggelos Kiayias, Alexander Russell
2017/572
MXPUF: Secure PUF Design against State-of-the-art Modeling Attacks
Phuong Ha Nguyen, Durga Prasad Sahoo, Chenglu Jin, Kaleel Mahmood, Marten van Dijk
2017/571
Faster Algorithms for Isogeny Problems using Torsion Point Images
Christophe Petit
2017/570
Can You Trust Your Encrypted Cloud? An Assessment of SpiderOakONE’s Security
Anders P. K. Dalskov, Claudio Orlandi
2017/569
Enforcing Input Correctness via Certification in Garbled Circuit Evaluation
Yihua Zhang, Marina Blanton, Fattaneh Bayatbabolghani
2017/568
Towards Doubly Efficient Private Information Retrieval
Ran Canetti, Justin Holmgren, Silas Richelson
2017/567
Can We Access a Database Both Locally and Privately?
Elette Boyle, Yuval Ishai, Rafael Pass, Mary Wootters
2017/566
Zero-Knowledge Contingent Payments Revisited: Attacks and Payments for Services
Matteo Campanelli, Rosario Gennaro, Steven Goldfeder, Luca Nizzardo
2017/565
A Formal Foundation for Secure Remote Execution of Enclaves
Pramod Subramanyan, Rohit Sinha, Ilia Lebedev, Srinivas Devadas, Sanjit Seshia
2017/564
Performance Counters to Rescue: A Machine Learning based safeguard against Micro-architectural Side-Channel-Attacks
Manaar Alam, Sarani Bhattacharya, Debdeep Mukhopadhyay, Sourangshu Bhattacharya
2017/563
Weak is Better: Tightly Secure Short Signatures from Weak PRFs
Jacob Alperin-Sheriff, Daniel Apon
2017/562
Making Password Authenticated Key Exchange Suitable For Resource-Constrained Industrial Control Devices
Björn Haase, Benoît Labrique
2017/561
Privacy-Free Garbled Circuits for Formulas: Size Zero and Information-Theoretic
Yashvanth Kondi, Arpita Patra
2017/560
Notes on the design and analysis of SIMON and SPECK
Ray Beaulieu, Douglas Shors, Jason Smith, Stefan Treatman-Clark, Bryan Weeks, Louis Wingers
2017/559
Human Computing for Handling Strong Corruptions in Authenticated Key Exchange
Alexandra Boldyreva, Shan Chen, Pierre-Alain Dupont, David Pointcheval
2017/558
Detecting Large Integer Arithmetic for Defense Against Crypto Ransomware
Mehmet Sabir Kiraz, Ziya Alper Genç, Erdinç Öztürk
2017/557
Watermarking Public-key Cryptographic Functionalities and Implementations
Foteini Baldimtsi, Aggelos Kiayias, Katerina Samari
2017/556
Multiplication and Division over Extended Galois Field GF($p^q$): A new Approach to find Monic Irreducible Polynomials over any Galois Field GF($p^q$).
Sankhanil Dey, Ranjan Ghosh
2017/555
Robust Non-Interactive Multiparty Computation Against Constant-Size Collusion
Fabrice Benhamouda, Hugo Krawczyk, Tal Rabin
2017/554
Trapping ECC with Invalid Curve Bug Attacks
Renaud Dubois
2017/553
Further Analysis of a Proposed Hash-Based Signature Standard
Scott Fluhrer
2017/552
Fast Secure Two-Party ECDSA Signing
Yehuda Lindell
2017/551
A Fourier Analysis Based Attack against Physically Unclonable Functions
Fatemeh Ganji, Shahin Tajik, Jean-Pierre Seifert
2017/550
Committed MPC - Maliciously Secure Multiparty Computation from Homomorphic Commitments
Tore Kasper Frederiksen, Benny Pinkas, Avishay Yanai
2017/549
ZeroTrace : Oblivious Memory Primitives from Intel SGX
Sajin Sasy, Sergey Gorbunov, Christopher W. Fletcher
2017/548
Fully Homomorphic Encryption from the Finite Field Isomorphism Problem
Yarkın Doröz, Jeffrey Hoffstein, Jill Pipher, Joseph H. Silverman, Berk Sunar, William Whyte, Zhenfei Zhang
2017/547
Security Analysis of an Ultra-lightweight RFID Authentication Protocol for M-commerce
Seyed Farhad Aghili, Hamid Mala
2017/546
X509CLOUD - FRAMEWORK FOR A UBIQUITOUS PKI
Hitesh Tewari, Arthur Hughes, Stefan Weber, Tomas Barry
2017/545
Resource-efficient OT combiners with active security
Ignacio Cascudo, Ivan Damgård, Oriol Farràs, Samuel Ranellucci
2017/544
Securing Abe's Mix-net Against Malicious Verifiers via Witness Indistinguishability
Elette Boyle, Saleet Klein, Alon Rosen, Gil Segev
2017/543
Identity-Based Encryption from the Diffie-Hellman Assumption
Nico Döttling, Sanjam Garg
2017/542
A New Distribution-Sensitive Secure Sketch and Popularity-Proportional Hashing
Joanne Woodage, Rahul Chatterjee, Yevgeniy Dodis, Ari Juels, Thomas Ristenpart
2017/541
Lower Bounds on Obfuscation from All-or-Nothing Encryption Primitives
Sanjam Garg, Mohammad Mahmoody, Ameer Mohammed
2017/540
Snarky Signatures: \\ Minimal Signatures of Knowledge from Simulation-Extractable SNARKs
Jens Groth, Mary Maller
2017/539
Public-Seed Pseudorandom Permutations
Pratik Soni, Stefano Tessaro
2017/538
New security notions and feasibility results for authentication of quantum data
Sumegha Garg, Henry Yuen, Mark Zhandry
2017/537
Information-theoretic Indistinguishability via the Chi-squared Method
Wei Dai, Viet Tung Hoang, Stefano Tessaro
2017/536
HACL*: A Verified Modern Cryptographic Library
Jean Karim Zinzindohoué, Karthikeyan Bhargavan, Jonathan Protzenko, Benjamin Beurdouche
2017/535
ZMAC: A Fast Tweakable Block Cipher Mode for Highly Secure Message Authentication
Tetsu Iwata, Kazuhiko Minematsu, Thomas Peyrin, Yannick Seurin
2017/534
Functional Graph Revisited: Updates on (Second) Preimage Attacks on Hash Combiners
Zhenzhen Bao, Lei Wang, Jian Guo, Dawu Gu
2017/533
Quantum non-malleability and authentication
Gorjan Alagic, Christian Majenz
2017/532
All-But-Many Lossy Trapdoor Functions from Lattices and Applications
Xavier Boyen, Qinyi Li
2017/531
Template Attack vs Bayes Classifier
Stjepan Picek, Annelie Heuser, Sylvain Guilley
2017/530
Non-Malleable Codes for Space-Bounded Tampering
Sebastian Faust, Kristina Hostakova, Pratyay Mukherjee, Daniele Venturi
2017/529
Non-Full Sbox Linearization: Applications to Collision Attacks on Round-Reduced Keccak
Ling Song, Guohong Liao, Jian Guo
2017/528
Componentwise APNness, Walsh uniformity of APN functions and cyclic-additive difference sets
Claude Carlet
2017/527
Key Rotation for Authenticated Encryption
Adam Everspaugh, Kenneth Paterson, Thomas Ristenpart, Sam Scott
2017/526
Evaluating web PKIs - A Survey
Jiangshan Yu, Mark Ryan
2017/525
Kurosawa-Desmedt Meets Tight Security
Romain Gay, Dennis Hofheinz, Lisa Kohl
2017/524
Compact Structure-preserving Signatures with Almost Tight Security
Masayuki Abe, Dennis Hofheinz, Ryo Nishimaki, Miyako Ohkubo, Jiaxin Pan
2017/523
Short, Invertible Elements in Partially Splitting Cyclotomic Rings and Applications to Lattice-Based Zero-Knowledge Proofs
Vadim Lyubashevsky, Gregor Seiler
2017/522
On the Hardness of the Mersenne Low Hamming Ratio Assumption
Marc Beunardeau, Aisling Connolly, Rémi Géraud, David Naccache
2017/521
Breaking the FF3 Format-Preserving Encryption Standard Over Small Domains
F. Betül Durak, Serge Vaudenay
2017/520
The Price of Low Communication in Secure Multi-Party Computation
Juan Garay, Yuval Ishai, Rafail Ostrovsky, Vassilis Zikas
2017/519
Efficient, Constant-Round and Actively Secure MPC: Beyond the Three-Party Case
Nishanth Chandran, Juan A. Garay, Payman Mohassel, Satyanarayana Vusirikala
2017/518
qDSA: Small and Secure Digital Signatures with Curve-based Diffie-Hellman Key Pairs
Joost Renes, Benjamin Smith
2017/517
PRF-ODH: Relations, Instantiations, and Impossibility Results
Jacqueline Brendel, Marc Fischlin, Felix Günther, Christian Janson
2017/516
Characterizations of the differential uniformity of vectorial functions by the Walsh transform
Claude Carlet
2017/515
Be Adaptive, Avoid Overcommitting
Zahra Jafargholi, Chethan Kamath, Karen Klein, Ilan Komargodski, Krzysztof Pietrzak, Daniel Wichs
2017/514
Identity-based Encryption from Codes with Rank Metric
Philippe Gaborit, Adrien Hauteville, Duong Hieu Phan, Jean-Pierre Tillich
2017/513
Recovering Short Generators of Principal Fractional Ideals in Cyclotomic Fields of Conductor $p^\alpha q^\beta$
Patrick Holzer, Thomas Wunderer
2017/512
PROVABLY SECURE TWO-FACTOR AUTHENTICATION SCHEME FOR E-HEALTH USING SMART CARD
Dr. M. AMUTHA PRABAKAR, Dr. B. INDRANI, M. KARTHIGAI VENI
2017/511
State of the Art in Lightweight Symmetric Cryptography
Alex Biryukov, Leo Perrin
2017/510
Hedging Public-Key Encryption in the Real World
Alexandra Boldyreva, Christopher Patton, Thomas Shrimpton
2017/509
Quantum Security of NMAC and Related Constructions
Fang Song, Aaram Yun
2017/508
Generalized Distinguishing Attack: A New Cryptanalysis of AES-like Permutations
Victor Cauchois, Clément Gomez, Reynald Lercier
2017/507
Inverted Leftover Hash Lemma
Maciej Obremski, Maciej Skórski
2017/506
Optimal Overcoming Weak Expectations
Maciej Skorski
2017/505
Side-Channel Attacks on BLISS Lattice-Based Signatures -- Exploiting Branch Tracing Against strongSwan and Electromagnetic Emanations in Microcontrollers
Thomas Espitau, Pierre-Alain Fouque, Benoit Gerard, Mehdi Tibouchi
2017/504
A simple and compact algorithm for SIDH with arbitrary degree isogenies
Craig Costello, Huseyin Hisil
2017/503
Encryption Switching Protocols Revisited: Switching modulo $p$
Guilhem Castagnos, Laurent Imbert, Fabien Laguillaumie
2017/502
DeepSecure: Scalable Provably-Secure Deep Learning
Bita Darvish Rouhani, M. Sadegh Riazi, Farinaz Koushanfar
2017/501
A Formal Treatment of Multi-key Channels
Felix Günther, Sogol Mazaheri
2017/500
Algebraic XOR-RKA-Secure Pseudorandom Functions from Post-Zeroizing Multilinear Maps
Michel Abdalla, Fabrice Benhamouda, Alain Passelègue
2017/499
Optimal Security Reductions for Unique Signatures: Bypassing Impossibilities with A Counterexample
Fuchun Guo, Rongmao Chen, Willy Susilo, Jianchang Lai, Guomin Yang, Yi Mu
2017/498
Full-State Keyed Duplex With Built-In Multi-User Support
Joan Daemen, Bart Mennink, Gilles Van Assche
2017/497
Time-Memory Tradeoff Attacks on the MTP Proof-of-Work Scheme
Itai Dinur, Niv Nadler
2017/496
Modes of Operation Suitable for Computing on Encrypted Data
Dragos Rotaru, Nigel P. Smart, Martijn Stam
2017/495
Multi-Key Authenticated Encryption with Corruptions: Reductions are Lossy
Tibor Jager, Martijn Stam, Ryan Stanley-Oakes, Bogdan Warinschi
2017/494
A Reaction Attack on the QC-LDPC McEliece Cryptosystem
Tomas Fabsic, Viliam Hromada, Paul Stankovski, Pavol Zajac, Qian Guo, Thomas Johansson
2017/493
Robust Fuzzy Extractors and Helper Data Manipulation Attacks Revisited: Theory vs Practice
Georg T. Becker
2017/492
Reducing Communication Channels in MPC
Marcel Keller, Dragos Rotaru, Nigel P. Smart, Tim Wood
2017/491
Laconic Oblivious Transfer and its Applications
Chongwon Cho, Nico Döttling, Sanjam Garg, Divya Gupta, Peihan Miao, Antigoni Polychroniadou
2017/490
To BLISS-B or not to be - Attacking strongSwan's Implementation of Post-Quantum Signatures
Peter Pessl, Leon Groot Bruinderink, Yuval Yarom
2017/489
Multi Collision Resistant Hash Functions and their Applications
Itay Berman, Akshay Degwekar, Ron D. Rothblum, Prashant Nalini Vasudevan
2017/488
Multi-Collision Resistance: A Paradigm for Keyless Hash Functions
Nir Bitansky, Yael Tauman Kalai, Omer Paneth
2017/487
New Linear Attacks on Block Cipher GOST
Yi LU
2017/486
Collision Resistant Hashing for Paranoids: Dealing with Multiple Collisions
Ilan Komargodski, Moni Naor, Eylon Yogev
2017/485
Authenticating compromisable storage systems
Jiangshan Yu, Mark Ryan, Liqun Chen
2017/484
Cryptanalysis of Middle Lattice on the Overstretched NTRU Problem for General Modulus Polynomial
Jung Hee Cheon, Minki Hhan, Changmin Lee
2017/483
A multi-start heuristic for multiplicative depth minimization of boolean circuits
Sergiu Carpov, Pascal Aubry, Renaud Sirdey
2017/482
On the Statistical Leak of the GGH13 Multilinear Map and some Variants
Léo Ducas, Alice Pellet--Mary
2017/481
A New Public-Key Cryptosystem via Mersenne Numbers
Divesh Aggarwal, Antoine Joux, Anupam Prakash, Miklos Santha
2017/480
Sharper Bounds in Lattice-Based Cryptography using the Rényi Divergence
Thomas Prest
2017/479
Privacy-Preserving Aggregation of Time-Series Data with Public Verifiability from Simple Assumptions
Keita Emura
2017/478
Refined Probability of Differential Characteristics Including Dependency Between Multiple Rounds
Anne Canteaut, Eran Lambooij, Samuel Neves, Shahram Rasoolzadeh, Yu Sasaki, Marc Stevens
2017/477
Constrained Keys for Invertible Pseudorandom Functions
Dan Boneh, Sam Kim, David J. Wu
2017/476
Forward-Security under Continual Leakage
Mihir Bellare, Adam O'Neill, Igors Stepanovs
2017/475
Security of Even--Mansour Ciphers under Key-Dependent Messages
Pooya Farshim, Louiza Khati, Damien Vergnaud
2017/474
Insuperability of the Standard Versus Ideal Model Gap for Tweakable Blockcipher Security
Bart Mennink
2017/473
Encrypted Davies-Meyer and Its Dual: Towards Optimal Security Using Mirror Theory
Bart Mennink, Samuel Neves
2017/472
A Unified Framework for Secure Search Over Encrypted Cloud Data
Cengiz Orencik, Erkay Savas, Mahmoud Alewiwi
2017/471
Total Break of the Fully Homomorphic Multivariate Encryption Scheme of 2017/458: Decryption can not be of low degree
Jacob Alperin-Sheriff, Jintai Ding, Albrecht Petzoldt, Daniel Smith Tone
2017/470
On the Relation Between SIM and IND-RoR Security Models for PAKEs
José Becerra, Vincenzo Iovino, Dimiter Ostrev, Marjan Skrobot
2017/469
Short CCA-Secure Attribute-Based Encryption
Hiroaki Anada, Seiko Arita
2017/468
Why Your Encrypted Database Is Not Secure
Paul Grubbs, Thomas Ristenpart, Vitaly Shmatikov
2017/467
Access Control Encryption for General Policies from Standard Assumptions
Sam Kim, David J. Wu
2017/466
Tweakable Blockciphers for Efficient Authenticated Encryptions with Beyond the Birthday-Bound Security
Yusuke Naito
2017/465
Lelantos: A Blockchain-based Anonymous Physical Delivery System
Riham AlTawy, Muhammad ElSheikh, Amr M. Youssef, Guang Gong
2017/464
On the Structure of Unconditional UC Hybrid Protocols
Mike Rosulek, Morgan Shirley
2017/463
Proving Resistance against Invariant Attacks: How to Choose the Round Constants
Christof Beierle, Anne Canteaut, Gregor Leander, Yann Rotella
2017/462
Leakage-Resilient Tweakable Encryption from One-Way Functions
Suvradip Chakraborty, Chester Rebeiro, Debdeep Mukhopadhyay, C. Pandu Rangan
2017/461
Security Definitions For Hash Functions: Combining UCE and Indifferentiability
Daniel Jost, Ueli Maurer
2017/460
Transitioning to a Quantum-Resistant Public Key Infrastructure
Nina Bindel, Udyani Herath, Matthew McKague, Douglas Stebila
2017/459
Security Analysis of Arbiter PUF and Its Lightweight Compositions Under Predictability Test
Phuong Ha Nguyen, Durga Prasad Sahoo, Rajat Subhra Chakraborty, Debdeep Mukhopadhyay
2017/458
Fully Homomorphic Encryption Using Multivariate Polynomials
Matthew Tamayo-Rios, Jean-Charles Faugère, Ludovic Perret, Peng Hui How, Robin Zhang
2017/457
Universal Construction of Cheater-Identifiable Secret Sharing Against Rushing Cheaters without Honest Majority
Masahito Hayashi, Takeshi Koshiba
2017/456
Proxy Re-Encryption and Re-Signatures from Lattices
Xiong Fan, Feng-Hao Liu
2017/455
Vector Encoding over Lattices and Its Applications
Daniel Apon, Xiong Fan, Feng-Hao Liu
2017/454
Algorand: Scaling Byzantine Agreements for Cryptocurrencies
Yossi Gilad, Rotem Hemo, Silvio Micali, Georgios Vlachos, Nickolai Zeldovich
2017/453
Subtleties in Security Definitions for Predicate Encryption with Public Index
Johannes Blömer, Gennadij Liske
2017/452
Oblivious Neural Network Predictions via MiniONN transformations
Jian Liu, Mika Juuti, Yao Lu, N. Asokan
2017/451
Efficient Compilers for After-the-Fact Leakage: from CPA to CCA-2 secure PKE to AKE
Suvradip Chakraborty, Goutam Paul, C. Pandu Rangan
2017/450
Privacy-preserving biometric authentication: challenges and directions
Elena Pagnin, Aikaterini Mitrokotsa
2017/449
Differentially 4-Uniform Permutations with the Best Known Nonlinearity from Butterflies
Shihui Fu, Xiutao Feng, Baofeng Wu
2017/448
Obfuscation of Bloom Filter Queries from Ring-LWE
Alex Davidson
2017/447
Block Chain based Searchable Symmetric Encryption
Huige Li, Haibo Tian, Fangguo Zhang
2017/446
Secretly Embedding Trapdoors into Contract Signing Protocols
Diana Maimut, George Teseleanu
2017/445
Practical Strongly Invisible and Strongly Accountable Sanitizable Signatures
Michael Till Beck, Jan Camenisch, David Derler, Stephan Krenn, Henrich C. Pöhls, Kai Samelin, Daniel Slamanig
2017/444
CrowdBC: A Blockchain-based Decentralized Framework for Crowdsourcing
Ming Li, Jian Weng, Anjia Yang, Wei Lu, Yue Zhang, Lin Hou, Jia-Nan Liu, Yang Xiang, Robert H. Deng
2017/443
Practical Graphs for Optimal Side-Channel Resistant Memory-Hard Functions
Joel Alwen, Jeremiah Blocki, Ben Harsha
2017/442
On the Depth-Robustness and Cumulative Pebbling Cost of Argon2i
Jeremiah Blocki, Samson Zhou
2017/441
New Approach to Practical Leakage-Resilient Public-Key Cryptography
Suvradip Chakraborty, Janaka Alawatugoda, C. Pandu Rangan
2017/440
Cryptographic Security Analysis of T-310
Nicolas T. Courtois, Klaus Schmeh, Jörg Drobick, Jacques Patarin, Maria-Bristena Oprisanu, Matteo Scarlata, Om Bhallamudi
2017/439
Practically Efficient Secure Single-Commodity Multi-Market Auctions
Abdelrahaman Aly, Mathieu Van Vyve
2017/438
GLITCH: A Discrete Gaussian Testing Suite For Lattice-Based Cryptography
James Howe, Máire O'Neill
2017/437
Slothful reduction
Michael Scott
2017/436
A Uniform Class of Weak Keys for Universal Hash Functions
Kaiyan Zheng, Peng Wang
2017/435
Analyzing Multi-Key Security Degradation
Atul Luykx, Bart Mennink, Kenneth G. Paterson
2017/434
FourQ on embedded devices with strong countermeasures against side-channel attacks
Zhe Liu, Patrick Longa, Geovandro Pereira, Oscar Reparaz, Hwajeong Seo
2017/433
Two-Message Witness Indistinguishability and Secure Computation in the Plain Model from New Assumptions
Saikrishna Badrinarayanan, Sanjam Garg, Yuval Ishai, Amit Sahai, Akshay Wadia
2017/432
Statistical and Linear Independence of Binary Random Variables
Kaisa Nyberg
2017/431
Understanding RUP Integrity of COLM
Nilanjan Datta, Atul Luykx, Bart Mennink, Mridul Nandi
2017/430
Improving TFHE: faster packed homomorphic operations and efficient circuit bootstrapping
Ilaria Chillotti, Nicolas Gama, Mariya Georgieva, Malika Izabachène
2017/429
Strengthening Access Control Encryption
Christian Badertscher, Christian Matt, Ueli Maurer
2017/428
Optimal Ramp Schemes and Related Combinatorial Objects
Douglas R. Stinson
2017/427
Grover Meets Simon - Quantumly Attacking the FX-construction
Gregor Leander, Alexander May
2017/426
FHPKE based on multivariate discrete logarithm problem
Masahiro Yagisawa
2017/425
Card-Based Protocols Using Unequal Division Shuffles
Akihiro Nishimura, Takuya Nishida, Yu-ichi Hayashi, Takaaki Mizuki, Hideaki Sone
2017/424
HILA5: On Reliability, Reconciliation, and Error Correction for Ring-LWE Encryption
Markku-Juhani O. Saarinen
2017/423
Foundations for Actively Secure Card-based Cryptography
Alexander Koch, Stefan Walzer
2017/422
PUF+IBE: Blending Physically Unclonable Functions with Identity Based Encryption for Authentication and Key Exchange in IoTs
Urbi Chatterjee, Vidya Govindan, Rajat Sadhukhan, Debdeep Mukhopadhyay, Rajat Subhra Chakraborty, Debashis Mahata, Mukesh Prabhu
2017/421
Exploring Naccache-Stern Knapsack Encryption
Éric Brier, Rémi Géraud, David Naccache
2017/420
Construction and Filtration of Lightweight Formalized MDS Matrices
Shiyi Zhang, Yongjuan Wang, Yang Gao, Tao Wang
2017/419
Efficient hash maps to \mathbb{G}_2 on BLS curves
Alessandro Budroni, Federico Pintore
2017/418
Strong Authenticated Key Exchange with Auxiliary Inputs
Rongmao Chen, Yi Mu, Guomin Yang, Willy Susilo, Fuchun Guo
2017/417
A Proof-of-Stake protocol for consensus on Bitcoin subchains
Massimo Bartoletti, Stefano Lande, Alessandro Sebastian Podda
2017/416
Breaking and Fixing the HB+DB protocol
Ioana Boureanu, David Gerault, Pascal Lafourcade, Cristina Onete
2017/415
Towards Practical PFE: An Efficient 2-Party Private Function Evaluation Protocol Based on Half Gates
Osman Bicer, Muhammed Ali Bingol, Mehmet Sabir Kiraz, Albert Levi
2017/414
Symmetrically and Asymmetrically Hard Cryptography (Full Version)
Alex Biryukov, Leo Perrin
2017/413
Correlation Power Analysis Attack against STT-MRAM Based Cyptosystems
Abhishek Chakraborty, Ankit Mondal, Ankur Srivastava
2017/412
Improved Attack on Full-round Grain-128
Ximing Fu, Xiaoyun Wang, Jiazhe Chen, Marc Stevens, Xiaoyang Dong
2017/411
A New Algorithm for Inversion mod $p^k$
Çetin Kaya Koç
2017/410
Fast Proxy Re-Encryption for Publish/Subscribe Systems
Yuriy Polyakov, Kurt Rohloff, Gyana Sahu, Vinod Vaikuntanthan
2017/409
Maliciously Secure Oblivious Linear Function Evaluation with Constant Overhead
Satrajit Ghosh, Jesper Buus Nielsen, Tobias Nilges
2017/408
Combinatorial Subset Difference Public Key Broadcast Encryption Scheme for Secure Multicast
Jihye Kim, Jiwon Lee, Seunghwa Lee, Hyunok Oh
2017/407
SplitCommit: Implementing and Analyzing Homomorphic UC Commitments
Peter Rindal, Roberto Trifiletti
2017/406
OmniLedger: A Secure, Scale-Out, Decentralized Ledger via Sharding
Eleftherios Kokoris-Kogias, Philipp Jovanovic, Linus Gasser, Nicolas Gailly, Ewa Syta, Bryan Ford
2017/405
Security Analysis of ``PSLP: Privacy-Preserving Single-Layer Perceptron Learning for e-Healthcare''
Jingjing Wang, Xiaoyu Zhang, Jingjing guo, Jianfeng Wang
2017/404
Short generators without quantum computers: the case of multiquadratics
Jens Bauch, Daniel J. Bernstein, Henry de Valence, Tanja Lange, Christine van Vredendaal
2017/403
Condition on composite numbers easily factored with elliptic curve method
Masaaki Shirase
2017/402
A New Approach to Round-Optimal Secure Multiparty Computation
Prabhanjan Ananth, Arka Rai Choudhuri, Abhishek Jain
2017/401
Synthesis of Adaptive Side-Channel Attacks
Quoc-Sang Phan, Lucas Bang, Corina S. Păsăreanu, Pasquale Malacaria, Tevfik Bultan
2017/400
A Leakage-Abuse Attack Against Multi-User Searchable Encryption
Cédric Van Rompay, Refik Molva, Melek Önen
2017/399
Practical Evaluation of Masking Software Countermeasures on an IoT processor
David McCann, Elisabeth Oswald
2017/398
Post-Quantum Security of Fiat-Shamir
Dominique Unruh
2017/397
Efficient One-Time Signatures from Quasi-Cyclic Codes: a Full Treatment
Edoardo Persichetti
2017/396
SecureML: A System for Scalable Privacy-Preserving Machine Learning
Payman Mohassel, Yupeng Zhang
2017/395
Higher-Order Side-Channel Protected Implementations of Keccak
Hannes Gross, David Schaffenrath, Stefan Mangard
2017/394
Double-spending Prevention for Bitcoin zero-confirmation transactions
Cristina Pérez-Solà, Sergi Delgado-Segura, Guillermo Navarro-Arribas, Jordi Herrera-Joancomartı́
2017/393
Privacy-Preserving Interdomain Routing at Internet Scale
Gilad Asharov, Daniel Demmler, Michael Schapira, Thomas Schneider, Gil Segev, Scott Shenker, Michael Zohner
2017/392
Running compression algorithms in the encrypted domain: a case-study on the homomorphic execution of RLE
Sébastien Canard, Sergiu Carpov, Donald Nokam Kuate, Renaud Sirdey
2017/391
Another Look at Success Probability in Linear Cryptanalysis
Subhabrata Samajder, Palash Sarkar
2017/390
On the Security of Classic Protocols for Unique Witness Relations
Yi Deng, Xuyang Song, Jingyue Yu, Yu Chen
2017/389
Decentralized Blacklistable Anonymous Credentials with Reputation
Rupeng Yang, Man Ho Au, Qiuliang Xu, Zuoxia Yu
2017/388
Post-Quantum Key Exchange on ARMv8-A -- A New Hope for NEON made Simple
Silvan Streit, Fabrizio De Santis
2017/387
Homomorphically Encrypted Arithmetic Operations over the Integer Ring
Chen Xu, Jingwei Chen, Wenyuan Wu, Yong Feng
2017/386
Four Round Secure Computation without Setup
Zvika Brakerski, Shai Halevi, Antigoni Polychroniadou
2017/385
Garbled Circuits as Randomized Encodings of Functions: a Primer
Benny Applebaum
2017/384
Time-Memory-Data Tradeoff Attacks against Small-State Stream Ciphers
Matthias Hamann, Matthias Krause, Willi Meier, Bin Zhang
2017/383
Super-Isolated Elliptic Curves and Abelian Surfaces in Cryptography
Travis Scholl
2017/382
A General Degenerate Grouping Power Attack with Specific Application to SIMON and SPECK
Steven Cavanaugh
2017/381
Quantum one-way permutation over the finite field of two elements
Alexandre de Castro
2017/380
Watermarking Cryptographic Functionalities from Standard Lattice Assumptions
Sam Kim, David J. Wu
2017/379
Fault attack on Supersingular Isogeny Cryptosystems
Yan Bo Ti
2017/378
Faster Secure Multi-Party Computation of AES and DES Using Lookup Tables
Marcel Keller, Emmanuela Orsini, Dragos Rotaru, Peter Scholl, Eduardo Soria-Vazquez, Srinivas Vivek
2017/377
Privacy-Preserving Multi-Party Bartering Secure Against Active Adversaries
Stefan Wüller, Ulrike Meyer, Susanne Wetzel
2017/376
Determining the Minimum Degree of an S-box
P. R. Mishra, Sumanta Sarkar, Indivar Gupta
2017/375
Do you need a Blockchain?
Karl Wüst, Arthur Gervais
2017/374
Loop-abort faults on supersingular isogeny cryptosystems
Alexandre Gélin, Benjamin Wesolowski
2017/373
Fully Dynamic Multi Target Homomorphic Attribute-Based Encryption
Ryo Hiromasa, Yutaka Kawai
2017/372
A crossbred algorithm for solving Boolean polynomial systems
Antoine Joux, Vanessa Vitse
2017/371
On the Construction of Lightweight Orthogonal MDS Matrices
Lijing Zhou, Licheng Wang, Yiru Sun
2017/370
"The Simplest Protocol for Oblivious Transfer'' Revisited
Ziya Alper Genç, Vincenzo Iovino, Alfredo Rial
2017/369
Enforcing Input Correctness via Certification in Garbled Circuit Evaluation
Yihua Zhang, Marina Blanton, Fattaneh Bayatbabolghani
2017/368
Analysis of Toeplitz MDS Matrices
Sumanta Sarkar, Habeeb Syed
2017/367
Fork-Free Hybrid Consensus with Flexible Proof-of-Activity
Zhiqiang Liu, Shuyang Tang, Sherman S. M. Chow, Zhen Liu, Yu Long
2017/366
BitFlip: A Randomness-Rich Cipher
Gideon Samid, Serguei Popov
2017/365
The Complexity of Public-Key Cryptography
Boaz Barak
2017/364
Round-Preserving Parallel Composition of Probabilistic-Termination Cryptographic Protocols
Ran Cohen, Sandro Coretti, Juan Garay, Vassilis Zikas
2017/363
TOPPSS: Cost-minimal Password-Protected Secret Sharing based on Threshold OPRF
Stanislaw Jarecki, Aggelos Kiayias, Hugo Krawczyk, Jiayu Xu
2017/362
Universally Composable Zero-Knowledge Proof of Membership
Jesper Buus Nielsen
2017/361
Indistinguishability Obfuscation for All Circuits from Secret-Key Functional Encryption
Fuyuki Kitagawa, Ryo Nishimaki, Keisuke Tanaka
2017/360
Provably Secure Three-party Password Authenticated Key Exchange Protocol Based On Ring Learning With Error
Dongqing Xu, Debiao He, Kim-Kwang Raymond Choo, Jianhua Chen
2017/359
Conditional Disclosure of Secrets via Non-Linear Reconstruction
Tianren Liu, Vinod Vaikuntanathan, Hoeteck Wee
2017/358
Almost Optimal Oblivious Transfer from QA-NIZK
Olivier Blazy, Céline Chevalier, Paul Germouty
2017/357
Continuous Non-Malleable Codes in the 8-Split-State Model
Divesh Aggarwal, Nico Dottling, Jesper Buus Nielsen, Maciej Obremski, Erick Purwanto
2017/356
XOR of PRPs in a Quantum World
Bart Mennink, Alan Szepieniec
2017/355
White-Box Cryptography: Don't Forget About Grey Box Attacks
Estuardo Alpirez Bock, Joppe W. Bos, Chris Brzuska, Charles Hubain, Wil Michiels, Cristofaro Mune, Eloi Sanfelix Gonzalez, Philippe Teuwen, Alexander Treff
2017/354
Tightly Secure Ring-LWE Based Key Encapsulation with Short Ciphertexts
Martin R. Albrecht, Emmanuela Orsini, Kenneth G. Paterson, Guy Peer, Nigel P. Smart
2017/353
Lattice-Based Group Signatures: Achieving Full Dynamicity with Ease
San Ling, Khoa Nguyen, Huaxiong Wang, Yanhong Xu
2017/352
A low-resource quantum factoring algorithm
Daniel J. Bernstein, Jean-François Biasse, Michele Mosca
2017/351
Post-quantum RSA
Daniel J. Bernstein, Nadia Heninger, Paul Lou, Luke Valenta
2017/350
The Montgomery ladder on binary elliptic curves
Thomaz Oliveira, Julio López, Francisco Rodríguez-Henríquez
2017/349
LMS vs XMSS: Comparion of two Hash-Based Signature Standards
Panos Kampanakis, Scott Fluhrer
2017/348
Removal Attacks on Logic Locking and Camouflaging Techniques
Muhammad Yasin, Bodhisatwa Mazumdar, Ozugr Sinanoglu, Jeyavijayan Rajendran
2017/347
Predictive Aging of Reliability of two Delay PUFs
Naghmeh Karimi, Jean-Luc Danger, Florent Lozac'h, Sylvain Guilley
2017/346
Some cryptanalytic results on Lizard
Subhadeep Banik, Takanori Isobe
2017/345
Mind the Gap: Towards Secure 1st-order Masking in Software
Kostas Papagiannopoulos, Nikita Veshchikov
2017/344
DUPLO: Unifying Cut-and-Choose for Garbled Circuits
Vladimir Kolesnikov, Jesper Buus Nielsen, Mike Rosulek, Ni Trieu, Roberto Trifiletti
2017/343
Towards a Classification of Non-interactive Computational Assumptions in Cyclic Groups
Essam Ghadafi, Jens Groth
2017/342
Multilinear Maps Using a Variant of Ring-LWE
Gu Chunsheng
2017/341
Steganography techniques
Dragoş Dumitrescu, Ioan-Mihail Stan, Emil Simion
2017/340
Enhancing Security by Combining Biometrics and Cryptography
Diana Popa, Emil Simion
2017/339
ElsieFour: A Low-Tech Authenticated Encryption Algorithm For Human-to-Human Communication
Alan Kaminsky
2017/338
A Traceability Analysis of Monero's Blockchain
Amrit Kumar, Clément Fischer, Shruti Tople, Prateek Saxena
2017/337
Authentication of Outsourced Linear Function Query with Efficient Updates
Gang Sheng, Chunming Tang, Wei Gao, Yunlu Cai, Xing Hu
2017/336
NIST RANDOMNESS TESTS (IN)DEPENDENCE
Carmina GEORGESCU, Alina PETRESCU-NITA, Emil SIMION, Antonela TOMA
2017/335
Privacy-Preserving Linear Regression on Distributed Data
Irene Giacomelli, Somesh Jha, C. David Page
2017/334
Updating key size estimations for pairings
Razvan Barbulescu, Sylvain Duquesne
2017/333
Faster Homomorphic Function Evaluation using Non-Integral Base Encoding
Charlotte Bonte, Carl Bootland, Joppe W. Bos, Wouter Castryck, Ilia Iliashenko, Frederik Vercauteren
2017/332
Reforgeability of Authenticated Encryption Schemes
Christian Forler, Eik List, Stefan Lucks, Jakob Wenzel
2017/331
Optimal attacks on qubit-based Quantum Key Recycling
Daan Leermakers, Boris Skoric
2017/330
Distinguisher-Dependent Simulation in Two Rounds and its Applications
Abhishek Jain, Yael Tauman Kalai, Dakshita Khurana, Ron Rothblum
2017/329
Maliciously Secure Multi-Client ORAM
Matteo Maffei, Giulio Malavolta, Manuel Reinert, Dominique Schröder
2017/328
Evaluating Bernstein-Rabin-Winograd Polynomials
Sebati Ghosh, Palash Sarkar
2017/327
MQ Signatures for PKI
Alan Szepieniec, Ward Beullens, Bart Preneel
2017/326
Labeled Homomorphic Encryption: Scalable and Privacy-Preserving Processing of Outsourced Data
Manuel Barbosa, Dario Catalano, Dario Fiore
2017/325
CHVote Protocol Specification
Rolf Haenni, Reto E. Koenig, Philipp Locher, and Eric Dubuis
2017/324
Family of PRGs based on Collections of Arithmetic Progressions
Ch. Srikanth, C. E. Veni Madhavan
2017/323
Revocable Identity-based Encryption with Bounded Decryption Key Exposure Resistance: Lattice-based Construction and More
Atsushi Takayasu, Yohei Watanabe
2017/322
Approximate Polynomial Common Divisor Problem Relates to Noisy Multipolynomial Reconstruction
Jun Xu, Santanu Sarkar, Lei Hu
2017/321
How Fast Can We Obfuscate Using Ideal Graded Encoding Schemes
Dingfeng Ye, Peng Liu, Jun Xu
2017/320
Speeding up Huff Form of Elliptic Curves
Neriman Gamze Orhon, Huseyin Hisil
2017/319
Embed-Augment-Recover: Function Private Predicate Encryption from Minimal Assumptions in the Public-Key Setting
Sikhar Patranabis, Debdeep Mukhopadhyay
2017/318
Key-Aggregate Searchable Encryption with Constant-Size Trapdoors for Fine-Grained Access Control in the Cloud
Sikhar Patranabis, Debdeep Mukhopadhyay
2017/317
Solidus: Confidential Distributed Ledger Transactions via PVORM
Ethan Cecchetti, Fan Zhang, Yan Ji, Ahmed Kosba, Ari Juels, Elaine Shi
2017/316
Exploring Potential 6LoWPAN Traffic Side Channels
Yan Yan, Elisabeth Oswald, Theo Tryfonas
2017/315
Multimodal Indexable Encryption for Mobile Cloud-based Applications (Extended Version)
Bernardo Ferreira, Joaão Leitão, Henrique Domingos
2017/314
Post-quantum cryptography---dealing with the fallout of physics success
Daniel J. Bernstein, Tanja Lange
2017/313
A Generic Approach to Identity-based Sequential Aggregate Signatures: New constructions from 2-level HIBE Schemes
Yanqing Yao, Hua Guo, Zhoujun Li
2017/312
Limits on Low-Degree Pseudorandom Generators (Or: Sum-of-Squares Meets Program Obfuscation)
Boaz Barak, Zvika Brakerski, Ilan Komargodski, Pravesh K. Kothari
2017/311
Constructing Multidimensional Differential Addition Chains and their Applications
Aaron Hutchinson, Koray Karabina
2017/310
KDM-Secure Public-Key Encryption from Constant-Noise LPN
Shuai Han, Shengli Liu
2017/309
Perfectly Secure Message Transmission Scheme against Rational Adversaries
Maiki Fujita, Takeshi Koshiba
2017/308
Faster Gaussian Sampling for Trapdoor Lattices with Arbitrary Modulus
Nicholas Genise, Daniele Micciancio
2017/307
Efficient Synchronous Byzantine Consensus
Ittai Abraham, Srinivas Devadas, Danny Dolev, Kartik Nayak, Ling Ren
2017/306
Cube Attacks on Non-Blackbox Polynomials Based on Division Property (Full Version)
Yosuke Todo, Takanori Isobe, Yonglin Hao, Willi Meier
2017/305
A Zero Knowledge Sumcheck and its Applications
Alessandro Chiesa, Michael A. Forbes, Nicholas Spooner
2017/304
Provably Secure NTRUEncrypt over More General Cyclotomic Rings
Yang Yu, Guangwu Xu, Xiaoyun Wang
2017/303
Locally Decodable and Updatable Non-Malleable Codes in the Bounded Retrieval Model
Dana Dachman-Soled, Mukul Kulkarni, Aria Shahverdi
2017/302
Quantum preimage, 2nd-preimage, and collision resistance of SHA3
Jan Czajkowski, Leon Groot Bruinderink, Andreas Hülsing, Christian Schaffner
2017/301
Limits on the Locality of Pseudorandom Generators and Applications to Indistinguishability Obfuscation
Alex Lombardi, Vinod Vaikuntanathan
2017/300
Tortoise and Hares Consensus: the Meshcash Framework for Incentive-Compatible, Scalable Cryptocurrencies
Iddo Bentov, Pavel Hubáček, Tal Moran, Asaf Nadler
2017/299
Fast Private Set Intersection from Homomorphic Encryption
Hao Chen, Kim Laine, Peter Rindal
2017/298
An Investigation of Sources of Randomness Within Discrete Gaussian Sampling
Séamus Brannigan, Neil Smyth, Tobias Oder, Felipe Valencia, Elizabeth O’Sullivan, Tim Güneysu, Francesco Regazzoni
2017/297
A Terrorist-fraud Resistant and Extractor-free Anonymous Distance-bounding Protocol
Gildas Avoine, Xavier Bultel, Sébastien Gambs, David Gérault, Pascal Lafourcade, Cristina Onete, Jean-Marc Robert
2017/296
Topology-Hiding Computation on all Graphs
Adi Akavia, Rio LaVigne, Tal Moran
2017/295
Improved key-reconciliation method
Ludo Tolhuizen, Ronald Rietman, Oscar Garcia-Morchon
2017/294
Secure searching of biomarkers through hybrid homomorphic encryption scheme
Miran Kim, Yongsoo Song, Jung Hee Cheon
2017/293
Montgomery curves and the Montgomery ladder
Daniel J. Bernstein, Tanja Lange
2017/292
Involutory Differentially 4-Uniform Permutations from Known Constructions
Shihui Fu, Xiutao Feng
2017/291
How to Achieve Non-Malleability in One or Two Rounds
Dakshita Khurana, Amit Sahai
2017/290
Double DIP: Re-Evaluating Security of Logic Encryption Algorithms
Yuanqi Shen, Hai Zhou
2017/289
On the Hardness of Trivium and Grain with respect to Generic Time-Memory-Data Tradeoff Attacks
Matthias Krause
2017/288
Security of Symmetric Primitives under Incorrect Usage of Keys
Pooya Farshim, Claudio Orlandi, Răzvan Roşie
2017/287
Towards Sound and Optimal Leakage Detection Procedure
Liwei Zhang, A. Adam Ding, Francois Durvaux, Francois-Xavier Standaert, Yunsi Fei
2017/286
Impossible Differential Attack on Midori128 Using Rebound-like Technique
Wenquan Bi, Zheng Li, Xiaoyang Dong, Xiaoyun Wang
2017/285
Implementation and Evaluation of Improved Gaussian Sampling for Lattice Trapdoors
Kamil Doruk Gür, Yuriy Polyakov, Kurt Rohloff, Gerard W. Ryan, Erkay Savaş
2017/284
SafeDRP: Yet Another Way Toward Power-Equalized Designs in FPGA
Maik Ender, Alexander Wild, Amir Moradi
2017/283
On the Easiness of Turning Higher-Order Leakages into First-Order
Thorben Moos, Amir Moradi
2017/282
Collapsing sponges: Post-quantum security of the sponge construction
Dominique Unruh
2017/281
Practical Secure Aggregation for Privacy Preserving Machine Learning
Keith Bonawitz, Vladimir Ivanov, Ben Kreuter, Antonio Marcedone, H. Brendan McMahan, Sarvar Patel, Daniel Ramage, Aaron Segal, Karn Seth
2017/280
Amortization with Fewer Equations for Proving Knowledge of Small Secrets
Rafael del Pino, Vadim Lyubashevsky
2017/279
Post-Quantum Zero-Knowledge and Signatures from Symmetric-Key Primitives
Melissa Chase, David Derler, Steven Goldfeder, Claudio Orlandi, Sebastian Ramacher, Christian Rechberger, Daniel Slamanig, Greg Zaverucha
2017/278
New Observations on Invariant Subspace Attack
Yunwen Liu, Vincent Rijmen
2017/277
Minimizing the Complexity of Goldreich's Pseudorandom Generator
Alex Lombardi, Vinod Vaikuntanathan
2017/276
Obfuscating Compute-and-Compare Programs under LWE
Daniel Wichs, Giorgos Zirdelis
2017/275
Simple and Generic Constructions of Succinct Functional Encryption
Fuyuki Kitagawa, Ryo Nishimaki, Keisuke Tanaka
2017/274
Lockable Obfuscation
Rishab Goyal, Venkata Koppula, Brent Waters
2017/273
Two-Round and Non-Interactive Concurrent Non-Malleable Commitments from Time-Lock Puzzles
Huijia Lin, Rafael Pass, Pratik Soni
2017/272
Dissecting Leakage Resilient PRFs with Multivariate Localized EM Attacks - A Practical Security Evaluation on FPGA
Florian Unterstein, Johann Heyszl, Fabrizio De Santis, Robert Specht
2017/271
High Order Masking of Look-up Tables with Common Shares
Jean-Sebastien Coron, Franck Rondepierre, Rina Zeitoun
2017/270
Rational Proofs against Rational Verifiers
Keita Inasawa, Kenji Yasunaga
2017/269
Extending Glitch-Free Multiparty Protocols to Resist Fault Injection Attacks
Okan Seker, Thomas Eisenbarth, Rainer Steinwandt
2017/268
Efficient Sanitizable Signatures without Random Oracles
Russell W. F. Lai, Tao Zhang, Sherman S. M. Chow, Dominique Schröder
2017/267
A Masked White-box Cryptographic Implementation for Protecting against Differential Computation Analysis
Seungkwang Lee
2017/266
From Higher-Order Differentials to Polytopic Cryptanalysis
Tyge Tiessen
2017/265
Enhanced Outsider-anonymous Broadcast Encryption with Subset Difference Revocation
Kamalesh Acharya, Ratna Dutta
2017/264
A note on how to (pre-)compute a ladder
Thomaz Oliveira, Julio López, Hüseyin Hışıl, Armando Faz-Hernández, Francisco Rodrıíguez-Henrıíquez
2017/263
Bivariate attacks and confusion coefficients
Sylvain Guilley, Liran Lerman
2017/262
When It’s All Just Too Much: Outsourcing MPC-Preprocessing
Peter Scholl, Nigel P. Smart, Tim Wood
2017/261
Side-channel Analysis of Lightweight Ciphers: Does Lightweight Equal Easy?
Annelie Heuser, Stjepan Picek, Sylvain Guilley, Nele Mentens
2017/260
Message-Recovery MACs and Verification-Unskippable AE
Shoichi Hirose, Yu Sasaki, Kan Yasuda
2017/259
Gaussian Sampling over the Integers: Efficient, Generic, Constant-Time
Daniele Micciancio, Michael Walter
2017/258
Pseudorandomness of Ring-LWE for Any Ring and Modulus
Chris Peikert, Oded Regev, Noah Stephens-Davidowitz
2017/257
Threshold Fully Homomorphic Encryption
Aayush Jain, Peter M. R. Rasmussen, Amit Sahai
2017/256
A Framework for Universally Composable Diffie-Hellman Key Exchange
Ralf Kuesters, Daniel Rausch
2017/255
New and Old Limits for AES Known-Key Distinguishers
Lorenzo Grassi, Christian Rechberger
2017/254
Towards Easy Key Enumeration
Changhai Ou, Degang Sun, Zhu Wang, Xinping Zhou
2017/253
A Modular Security Analysis of EAP and IEEE 802.11
Chris Brzuska, Håkon Jacobsen
2017/252
High-Order Conversion From Boolean to Arithmetic Masking
Jean-Sebastien Coron
2017/251
A Lattice-Based Universal Thresholdizer for Cryptographic Systems
Dan Boneh, Rosario Gennaro, Steven Goldfeder, Sam Kim
2017/250
Indistinguishability Obfuscation from Trilinear Maps and Block-Wise Local PRGs
Huijia Lin, Stefano Tessaro
2017/249
Proof of Luck: an Efficient Blockchain Consensus Protocol
Mitar Milutinovic, Warren He, Howard Wu, Maxinder Kanwal
2017/248
IPcore implementation susceptibility: A case study of Low latency ciphers
Dillibabu Shanmugam, Ravikumar Selvam, Suganya Annadurai
2017/247
Efficient Multivariate Ring Signature Schemes
Mohamed Saied Emam Mohamed, Albrecht Petzoldt
2017/246
An Analysis of FV Parameters Impact Towards its Hardware Acceleration
Joël Cathébras, Alexandre Carbon, Renaud Sirdey, Nicolas Ventroux
2017/245
Cache-Base Application Detection in the Cloud Using Machine Learning
Berk Gulmezoglu, Thomas Eisenbarth, Berk Sunar
2017/244
Model-counting Approaches For Nonlinear Numerical Constraints
Mateus Borges, Quoc-Sang Phan, Antonio Filieri, Corina S. Păsăreanu
2017/243
Key Recovery: Inert and Public
Colin Boyd, Xavier Boyen, Christopher Carr, Thomas Haines
2017/242
Full accounting for verifiable outsourcing
Riad S. Wahby, Ye Ji, Andrew J. Blumberg, abhi shelat, Justin Thaler, Michael Walfish, Thomas Wies
2017/241
Linear Consistency for Proof-of-Stake Blockchains
Erica Blum, Aggelos Kiayias, Cristopher Moore, Saad Quader, Alexander Russell
2017/240
Lattice-Based SNARGs and Their Application to More Efficient Obfuscation
Dan Boneh, Yuval Ishai, Amit Sahai, David J. Wu
2017/239
Boosting Authenticated Encryption Robustness With Minimal Modifications
Tomer Ashur, Orr Dunkelman, Atul Luykx
2017/238
Mixing Confidential Transactions: Comprehensive Transaction Privacy for Bitcoin
Tim Ruffing, Pedro Moreno-Sanchez
2017/237
Switch Commitments: A Safety Switch for Confidential Transactions
Tim Ruffing, Giulio Malavolta
2017/236
A new rank metric codes based encryption scheme
Pierre Loidreau
2017/235
Efficient Oblivious Transfer from Lossy Threshold Homomorphic Encryption
Isheeta Nargis
2017/234
Automatically Detecting the Misuse of Secrets: Foundations, Design Principles, and Applications
Kevin Milner, Cas Cremers, Jiangshan Yu, Mark Ryan
2017/233
Simplifying Design and Analysis of Complex Predicate Encryption Schemes
Shashank Agrawal, Melissa Chase
2017/232
TwinsCoin: A Cryptocurrency via Proof-of-Work and Proof-of-Stake
Alexander Chepurnoy, Tuyet Duong, Lei Fan, Hong-Sheng Zhou
2017/231
EHE: nonce misuse-resistant message authentication
Sergey Agievich
2017/230
Smart Contracts Make Bitcoin Mining Pools Vulnerable
Yaron Velner, Jason Teutsch, Loi Luu
2017/229
Multi-Prover Interactive Proofs: Unsound Foundations
Claude Crépeau, Nan Yang
2017/228
Efficient and Secure Outsourcing of Genomic Data Storage
João Sá Sousa, Cédric Lefebvre, Zhicong Huang, Jean Louis Raisaro, Carlos Aguilar, Marc-Olivier Killijian, Jean-Pierre Hubaux
2017/227
Towards Shared Ownership in the Cloud
Hubert Ritzdorf, Claudio Soriente, Ghassan O. Karame, Srdjan Marinovic, Damian Gruber, Srdjan Capkun
2017/226
JIMU: Faster LEGO-based Secure Computation using Additive Homomorphic Hashes
Ruiyu Zhu, Yan Huang
2017/225
Bandwidth Hard Functions for ASIC Resistance
Ling Ren, Srinivas Devadas
2017/224
Simple Encrypted Arithmetic Library - SEAL v2.1
Hao Chen, Kim Laine, Rachel Player
2017/223
0-RTT Key Exchange with Full Forward Secrecy
Felix Günther, Britta Hale, Tibor Jager, Sebastian Lauer
2017/222
A Note on Obtain Confidentiality or/ and Authenticity in Big Data by ID-Based Generalized Signcryption
Nizamud Dina, Arif Iqbal Umar, Abdul Waheed, Noor ul Amin
2017/221
A Hybrid Lattice Basis Reduction and Quantum Search Attack on LWE
Florian Göpfert, Christine van Vredendaal, Thomas Wunderer
2017/220
Cryptanalysis of PMACx, PMAC2x, and SIVx
Kazuhiko Minematsu, Tetsu Iwata
2017/219
Attribute-Based Encryption from Identity-Based Encryption
Chun-I Fan, Yi-Fan Tseng, Chih-Wen Lin
2017/218
Repeated Games for Generating Randomness in Encryption
Kenji Yasunaga, Kosuke Yuzawa
2017/217
Cryptanalysis of Wang et al’s Certificateless Signature Scheme without Bilinear Pairings
Kuo-Hui Yeh
2017/216
SCRAPE: Scalable Randomness Attested by Public Entities
Ignacio Cascudo, Bernardo David
2017/215
SEVDSI: Secure, Efficient and Verifiable Data Set Intersection
Ozgur Oksuz, Iraklis Leontiadis, Sixia Chen, Alexander Russell, Qiang Tang, Bing Wang
2017/214
Low Cost Constant Round MPC Combining BMR and Oblivious Transfer
Carmit Hazay, Peter Scholl, Eduardo Soria-Vazquez
2017/213
Quantum Information Set Decoding Algorithms
Ghazal Kachigar, Jean-Pierre Tillich
2017/212
Montgomery curves and their arithmetic: The case of large characteristic fields
Craig Costello, Benjamin Smith
2017/211
Multi-level Access in Searchable Symmetric Encryption
James Alderman, Keith M. Martin, Sarah Louise Renwick
2017/210
Public Key Cryptosystems with Noisy Secret Keys
Charles Herder, Benjamin Fuller, Marten van Dijk, Srinivas Devadas
2017/209
Exploding Obfuscation: A Framework for Building Applications of Obfuscation From Polynomial Hardness
Qipeng Liu, Mark Zhandry
2017/208
SoK: Security Models for Pseudo-Random Number Generators
Sylvain Ruhault
2017/207
Private Queries on Encrypted Genomic Data
Gizem S Cetin, Hao Chen, Kim Laine, Kristin Lauter, Peter Rindal, Yuhou Xia
2017/206
Quantum Resistant Public Key Encryption Scheme RLCE and IND-CCA2 Security for McEliece Schemes
Yongge Wang
2017/205
ZETA: Towards Tagless Authenticated Encryption
Anindya Shankar Bhandari, Dipanwita Roy Chowdhury
2017/204
Linear Cryptanalysis Using Low-bias Linear Approximations
Tomer Ashur, Daniël Bodden, Orr Dunkelman
2017/203
Proofs of Useful Work
Marshall Ball, Alon Rosen, Manuel Sabin, Prashant Nalini Vasudevan
2017/202
Average-Case Fine-Grained Hardness
Marshall Ball, Alon Rosen, Manuel Sabin, Prashant Nalini Vasudevan
2017/201
Giving State to the Stateless: Augmenting Trustworthy Computation with Ledgers
Gabriel Kaptchuk, Ian Miers, Matthew Green
2017/200
Anonymous Attestation with Subverted TPMs
Jan Camenisch, Manu Drijvers, Anja Lehmann
2017/199
Improved Attacks for Characteristic-2 Parameters of the Cubic ABC Simple Matrix Encryption Scheme
Dustin Moody, Ray Perlner, Daniel Smith-Tone
2017/198
FHE with Recursive Ciphertext
Masahiro Yagisawa
2017/197
A Construction of Bent Functions with Optimal Algebraic Degree and Large Symmetric Group
Wenying Zhang, Zhaohui Xing, Keqin Feng
2017/196
Attribute-based concurrent signatures
BaoHong Li, Guoqing Xu, Yinliang Zhao
2017/195
Design of Lightweight Linear Diffusion Layers from Near-MDS Matrices
Chaoyun Li, Qingju Wang
2017/194
Improved upper bounds for the expected circuit complexity of dense systems of linear equations over GF(2)
Andrea Visconti, Chiara Valentina Schiavo, René Peralta
2017/193
SecChisel: Language and Tool for Practical and Scalable Security Verification of Security-Aware Hardware Architectures
Shuwen Deng, Doğuhan Gümüşoğlu, Wenjie Xiong, Y. Serhan Gener, Onur Demir, Jakub Szefer
2017/192
Improved Hybrid Consensus Scheme with Privacy-preserving Property
Shuyang Tang, Zhiqiang Liu, Zhen Liu, Yu Long, Shengli Liu
2017/191
CoverUp: Privacy Through "Forced" Participation in Anonymous Communication Networks
David Sommer, Aritra Dhar, Luka Malisa, Esfandiar Mohammadi, Daniel Ronzani, Srdjan Capkun
2017/190
The first collision for full SHA-1
Marc Stevens, Elie Bursztein, Pierre Karpman, Ange Albertini, Yarik Markov
2017/189
Global-Scale Secure Multiparty Computation
Xiao Wang, Samuel Ranellucci, Jonathan Katz
2017/188
Division Cryptanalysis of Block Ciphers with a Binary Diffusion Layer
Wenying Zhang, Vincent Rijmen
2017/187
The discrete logarithm problem over prime fields: the safe prime case. The Smart attack, non-canonical lifts and logarithmic derivatives
H. Gopalakrishna Gadiyar, R. Padma
2017/186
A Post-Quantum Digital Signature Scheme Based on Supersingular Isogenies
Youngho Yoo, Reza Azarderakhsh, Amir Jalali, David Jao, Vladimir Soukharev
2017/185
A Virtual Wiretap Channel for Secure MessageTransmission
Setareh Sharifian, Reihaneh Safavi-Naini, Fuchun Lin
2017/184
Linking Online Misuse-Resistant Authenticated Encryption and Blockwise Attack Models
Guillaume Endignoux, Damian Vizár
2017/183
Analysis of Software Countermeasures for Whitebox Encryption
Subhadeep Banik, Andrey Bogdanov, Takanori Isobe, Martin Bjerregaard Jepsen
2017/182
The Approximate $k$-List Problem
Leif Both, Alexander May
2017/181
New techniques for trail bounds and application to differential trails in Keccak
Silvia Mella, Joan Daemen, Gilles Van Assche
2017/180
Robust P2P Primitives Using SGX Enclaves
Yaoqi Jia, Shruti Tople, Tarik Moataz, Deli Gong, Prateek Saxena, Zhenkai Liang
2017/179
REM: Resource-Efficient Mining for Blockchains
Fan Zhang, Ittay Eyal, Robert Escriva, Ari Juels, Robbert van Renesse
2017/178
Optimal Differential Trails in SIMON-like Ciphers
Zhengbin Liu, Yongqiang Li, Mingsheng Wang
2017/177
Some results on the existence of $t$-all-or-nothing transforms over arbitrary alphabets
Navid Nasr Esfahani, Ian Goldberg, D. R. Stinson
2017/176
Probabilistically Checkable Proofs of Proximity with Zero-Knowledge
Yuval Ishai, Mor Weiss
2017/175
Analysis of Burn-in period for RC4 State Transition
Goutam Paul, Souvik Ray
2017/174
Cost-Aware Cut-and-Choose Games with Applications in Cryptography and Prefix-Free Codes
Ruiyu Zhu, Yan Huang
2017/173
Speeding up detection of SHA-1 collision attacks using unavoidable attack conditions
Marc Stevens, Dan Shumow
2017/172
On The Exact Security of Message Authentication Using Pseudorandom Functions
Ashwin Jha, Avradip Mandal, Mridul Nandi
2017/171
Quantum Key Search with Side Channel Advice
Daniel P. Martin, Ashley Montanaro, Elisabeth Oswald, Dan Shepherd
2017/170
Error-free protection of EC point multiplication by modular extension
Martin Seysen
2017/169
UFace: Your Universal Password That No One Can See
Nicholas Hilbert, Christian Storer, Dan Lin, Wei Jiang
2017/168
AES-GCM-SIV: Specification and Analysis
Shay Gueron, Adam Langley, Yehuda Lindell
2017/167
Cloud Storage File Recoverability
Christian A. Gorke, Christian Janson, Frederik Armknecht, Carlos Cid
2017/166
A roadmap to fully homomorphic elections: Stronger security, better verifiability
Kristian Gjøsteen, Martin Strand
2017/165
SymSum: Symmetric-Sum Distinguishers Against Round Reduced SHA3
Dhiman Saha, Sukhendu Kuila, Dipanwita Roy Chowdhury
2017/164
Conditional Disclosure of Secrets: Amplification, Closure, Amortization, Lower-bounds, and Separations
Benny Applebaum, Barak Arkis, Pavel Raykov, Prashant Nalini Vasudevan
2017/163
Homomorphic Encryption without Gaussian Noise
Anamaria Costache, Nigel P. Smart
2017/162
Analysis of AES, SKINNY, and Others with Constraint Programming
Siwei Sun, David Gerault, Pascal Lafourcade, Qianqian Yang, Yosuke Todo, Kexin Qiao, Lei Hu
2017/161
Security Notions for Bidirectional Channels
Giorgia Azzurra Marson, Bertram Poettering
2017/160
Conditional Cube Attack on Round-Reduced ASCON
Zheng Li, Xiaoyang Dong, Xiaoyun Wang
2017/159
Cube-like Attack on Round-Reduced Initialization of Ketje Sr
Xiaoyang Dong, Zheng Li, Xiaoyun Wang, Ling Qin
2017/158
Passphone: Outsourcing Phone-based Web Authentication while Protecting User Privacy
Martin Potthast, Christian Forler, Eik List, Stefan Lucks
2017/157
Detecting General Algebraic Manipulation Attacks
Kim Ramchen
2017/156
Trust Is Risk: A Decentralized Financial Trust Platform
Orfeas Stefanos Thyfronitis Litos, Dionysis Zindros
2017/155
Random Sampling Revisited: Lattice Enumeration with Discrete Pruning
Yoshinori Aono, Phong Q. Nguyen
2017/154
Linear Cryptanalysis: Key Schedules and Tweakable Block Ciphers
Thorsten Kranz, Friedrich Wiemer, Gregor Leander
2017/153
Storage Efficient Substring Searchable Symmetric Encryption
Iraklis Leontiadis, Ming Li
2017/152
Encryptor Combiners: A Unified Approach to Multiparty NIKE, (H)IBE, and Broadcast Encryption
Fermi Ma, Mark Zhandry
2017/151
Practical Functional Encryption for Quadratic Functions with Applications to Predicate Encryption
Carmen Elisabetta Zaira Baltico, Dario Catalano, Dario Fiore, Romain Gay
2017/150
Group-Based Secure Computation: Optimizing Rounds, Communication, and Computation
Elette Boyle, Niv Gilboa, Yuval Ishai
2017/149
Bitcoin as a Transaction Ledger: A Composable Treatment
Christian Badertscher, Ueli Maurer, Daniel Tschudi, and Vassilis Zikas
2017/148
Pattern Matching on Encrypted Streams
Nicolas Desmoulins, Pierre-Alain Fouque, Cristina Onete, Olivier Sanders
2017/147
Ad Hoc PSM Protocols: Secure Computation Without Coordination
Amos Beimel, Yuval Ishai, Eyal Kushilevitz
2017/146
Toward Fine-Grained Blackbox Separations Between Semantic and Circular-Security Notions
Mohammad Hajiabadi, Bruce M. Kapron
2017/145
The Multi-User Security of Double Encryption
Viet Tung Hoang, Stefano Tessaro
2017/144
Privacy-Preserving Search of Similar Patients in Genomic Data
Gilad Asharov, Shai Halevi, Yehuda Lindell, Tal Rabin
2017/143
Constraint-hiding Constrained PRFs for NC1 from LWE
Ran Canetti, Yilei Chen
2017/142
Computing generator in cyclotomic integer rings, A subfield algorithm for the Principal Ideal Problem in L(1/2) and application to cryptanalysis of a FHE scheme
Jean-François Biasse, Thomas Espitau, Pierre-Alain Fouque, Alexandre Gélin, Paul Kirchner
2017/141
Partitioned Group Password-Based Authenticated Key Exchange
Dario Fiore, Maria Isabel Gonzalez Vasco, Claudio Soriente
2017/140
Estimation of the Hardness of the Learning with Errors Problem with a Restricted Number of Samples
Nina Bindel, Johannes Buchmann, Florian Göpfert, Markus Schmidt
2017/139
Revisiting AES Related-Key Differential Attacks with Constraint Programming
David Gérault, Pascal Lafourcade, Marine Minier, Christine Solnon
2017/138
How (not) to Use Welch's T-test in Side-Channel Security Evaluations
François-Xavier Standaert
2017/137
Modifying an Enciphering Scheme after Deployment
Paul Grubbs, Thomas Ristenpart, Yuval Yarom
2017/136
Dispersed Cryptography and the Quotient Ring Transform
Anna Johnston
2017/135
Hashing Garbled Circuits for Free
Xiong Fan, Chaya Ganesh, Vladimir Kolesnikov
2017/134
A Provably Secure PKCS\#11 Configuration Without Authenticated Attributes
Ryan Stanley-Oakes
2017/133
Composable and Robust Outsourced Storage
Christian Badertscher, Ueli Maurer
2017/132
Attacks on Karlsson and Mitrokotsa's Grouping-Proof-Distance-Bounding Protocol
Roel Peeters, Jens Hermans, Aysajan Abidin
2017/131
A Practical Multivariate Blind Signature Scheme
Albrecht Petzoldt, Alan Szepieniec, Mohamed Saied Emam Mohamed
2017/130
Topology-Hiding Computation Beyond Logarithmic Diameter
Adi Akavia, Tal Moran
2017/129
Sublinear Zero-Knowledge Arguments for RAM Programs
Payman Mohassel, Mike Rosulek, Alessandra Scafuro
2017/128
New Collision Attacks on Round-Reduced Keccak
Kexin Qiao, Ling Song, Meicheng Liu, Jian Guo
2017/127
Robust Transforming Combiners from Indistinguishability Obfuscation to Functional Encryption
Prabhanjan Ananth, Aayush Jain, Amit Sahai
2017/126
Boolean Searchable Symmetric Encryption with Worst-Case Sub-Linear Complexity
Seny Kamara, Tarik Moataz
2017/125
Non-Interactive Secure 2PC in the Offline/Online and Batch Settings
Payman Mohassel, Mike Rosulek
2017/124
On the Exact Round Complexity of Self-Composable Two-Party Computation
Sanjam Garg, Susumu Kiyoshima, Omkant Pandey
2017/123
Separating IND-CPA and Circular Security for Unbounded Length Key Cycles
Rishab Goyal, Venkata Koppula, Brent Waters
2017/122
One-Shot Verifiable Encryption from Lattices
Vadim Lyubashevsky, Gregory Neven
2017/121
Twisted $\mu_4$-normal form for elliptic curves
David Kohel
2017/120
Separating Semantic and Circular Security for Symmetric-Key Bit Encryption from the Learning with Errors Assumption
Rishab Goyal, Venkata Koppula, Brent Waters
2017/119
Quantum Authentication with Key Recycling
Christopher Portmann
2017/118
A New Structural-Differential Property of 5-Round AES
Lorenzo Grassi, Christian Rechberger, Sondre Rønjom
2017/117
The SM9 Cryptographic Schemes
Zhaohui Cheng
2017/116
Masking Proofs are Tight (and How to Exploit it in Security Evaluations)
Vincent Grosso, François-Xavier Standaert
2017/115
An efficient self-blindable attribute-based credential scheme
Sietse Ringers, Eric Verheul, Jaap-Henk Hoepman
2017/114
Zero-Knowledge Proofs of Proximity
Itay Berman, Ron D. Rothblum, Vinod Vaikuntanathan
2017/113
Algebraic Fault Analysis of SHA-3
Pei Luo, Konstantinos Athanasiou, Yunsi Fei, Thomas Wahl
2017/112
Zero-Knowledge Proxy Re-Identification Revisited
Xavier Bultel, Pascal Lafourcade
2017/111
EC-OPRF: Oblivious Pseudorandom Functions using Elliptic Curves
Jonathan Burns, Daniel Moore, Katrina Ray, Ryan Speers, Brian Vohaska
2017/110
A Smart Contract for Boardroom Voting with Maximum Voter Privacy
Patrick McCorry, Siamak F. Shahandashti, Feng Hao
2017/109
Unilaterally-Authenticated Key Exchange
Yevgeniy Dodis, Dario Fiore
2017/108
Photonic Side Channel Attacks Against RSA
Elad Carmon, Jean-Pierre Seifert, Avishai Wool
2017/107
Secure Logging with Crash Tolerance
Erik-Oliver Blass, Guevara Noubir
2017/106
$\mu$chain: How to Forget without Hard Forks
Ivan Puddu, Alexandra Dmitrienko, Srdjan Capkun
2017/105
A Secure and Fast Dispersal Storage Scheme Based on the Learning with Errors Problem
Ling Yang, Fuyang Fang, Xianhui Lu, Wen-Tao Zhu, Qiongxiao Wang, Shen Yan, Shiran Pan
2017/104
Implementing BP-Obfuscation Using Graph-Induced Encoding
Shai Halevi, Tzipora Halevi, Victor Shoup, Noah Stephens-Davidowitz
2017/103
Reconciling d+1 Masking in Hardware and Software
Hannes Gross, Stefan Mangard
2017/102
Quantum Authentication and Encryption with Key Recycling
Serge Fehr, Louis Salvail
2017/101
Optimizing Implementations of Lightweight Building Blocks
Jeremy Jean, Thomas Peyrin, Siang Meng Sim, Jade Tourteaux
2017/100
Private Puncturable PRFs From Standard Lattice Assumptions
Dan Boneh, Sam Kim, Hart Montgomery
2017/099
Making NSEC5 Practical for DNSSEC
Dimitrios Papadopoulos, Duane Wessels, Shumon Huque, Moni Naor, Jan Včelák, Leonid Reyzin, Sharon Goldberg
2017/098
Designing Fully Secure Protocols for Secure Two-Party Computation of Constant-Domain Functions
Vanesa Daza, Nikolaos Makriyannis
2017/097
Boolean functions with restricted input and their robustness; application to the FLIP cipher
Claude Carlet, Pierrick Méaux, Yann Rotella
2017/096
Asymptotically Compact Adaptively Secure Lattice IBEs and Verifiable Random Functions via Generalized Partitioning Techniques
Shota Yamada
2017/095
Attacks on Secure Logging Schemes
Gunnar Hartung
2017/094
Quantum Tokens for Digital Signatures
Shalev Ben-David, Or Sattath
2017/093
On new multivariate cryptosystems based on hidden Eulerian equations over finite fields
Vasyl Ustimenko
2017/092
Small CRT-Exponent RSA Revisited
Atsushi Takayasu, Yao Lu, Liqiang Peng
2017/091
Design and Implementation of Low Depth Pairing-based Homomorphic Encryption Scheme
Vincent Herbert, Bhaskar Biswas, Caroline Fontaine
2017/090
Crypt-DAC: Cryptographically Enforced Dynamic Access Control in the Cloud
Saiyu Qi, Yuanqing Zheng
2017/089
On a Linear Cryptanalysis of a Family of Modified DES Ciphers with Even Weight S-boxes
Yuri Borissov, Peter Boyvalenkov, Robert Tsenkov
2017/088
A Differential Fault Attack on Plantlet
Subhamoy Maitra, Akhilesh Siddhanti
2017/087
Cryptanalysis of full round Fruit
Sabyasachi Dey, Santanu Sarkar
2017/086
Homomorphic Proxy Re-Authenticators and Applications to Verifiable Multi-User Data Aggregation
David Derler, Sebastian Ramacher, Daniel Slamanig
2017/085
Information Security Applications of Bit-Mixers
Laszlo Hars
2017/084
Hardware Bit-Mixers
Laszlo Hars
2017/083
Shor's Algorithm and Factoring: Don't Throw Away the Odd Orders
Anna Johnston
2017/082
Replay Attacks on Zero Round-Trip Time: The Case of the TLS 1.3 Handshake Candidates
Marc Fischlin, Felix Günther
2017/081
Estonian Voting Verification Mechanism Revisited Again
Ivo Kubjas, Tiit Pikma, Jan Willemson
2017/080
From Minicrypt to Obfustopia via Private-Key Functional Encryption
Ilan Komargodski, Gil Segev
2017/079
Faster Bootstrapping of FHE over the Integers
Jung Hee Cheon, Kyoohyung Han, Duhyeong Kim
2017/078
LPN Decoded
Andre Esser, Robert Kübler, Alexander May
2017/077
Quantum algorithms for computing short discrete logarithms and factoring RSA integers
Martin Ekerå, Johan Håstad
2017/076
DFA on LS-Designs with a Practical Implementation on SCREAM (extended version)
Benjamin Lac, Anne Canteaut, Jacques Fournier, Renaud Sirdey
2017/075
A First DFA on PRIDE: from Theory to Practice (extended version)
Benjamin Lac, Marc Beunardeau, Anne Canteaut, Jacques Fournier, Renaud Sirdey
2017/074
Honey Chatting: A novel instant messaging system robust to eavesdropping over communication
Joo-Im Kim, Ji Won Yoon
2017/073
Visual Honey Encryption: Application to Steganography
Ji Won Yoon, Hyoungshick Kim, Hyun-Ju Jo, Hyelim Lee, Kwangsu Lee
2017/072
How to Circumvent the Two-Ciphertext Lower Bound for Linear Garbling Schemes
Carmen Kempka, Ryo Kikuchi, Koutarou Suzuki
2017/071
Efficient Differential Trail Searching Algorithm for ARX Block Ciphers
Seojin Kim, HyungChul Kang, Deukjo Hong, Jaechul Sung, Seokhie Hong
2017/070
Symbolic Models for Isolated Execution Environments
Charlie Jacomme, Steve Kremer, Guillaume Scerri
2017/069
The Exact Security of PMAC
Peter Gaži, Krzysztof Pietrzak, Michal Rybár
2017/068
Authenticated Encryption in the Face of Protocol and Side Channel Leakage
Guy Barwell, Daniel P. Martin, Elisabeth Oswald, Martijn Stam
2017/067
Computation of a 768-bit prime field discrete logarithm
Thorsten Kleinjung, Claus Diem, Arjen K. Lenstra, Christine Priplata, Colin Stahlke
2017/066
Subring Homomorphic Encryption
Seiko Arita, Sari Handa
2017/065
FHE Over the Integers: Decomposed and Batched in the Post-Quantum Regime
Daniel Benarroch, Zvika Brakerski, Tancrède Lepoint
2017/064
Fast Montgomery-like Square Root Computation over $GF(2^m)$ for All Trinomials
Yin Li, Yu Zhang
2017/063
Optimal Extension Protocols for Byzantine Broadcast and Agreement
Chaya Ganesh, Arpita Patra
2017/062
Efficient Maliciously Secure Two Party Computation for Mixed Programs
Arash Afshar, Payman Mohassel, Mike Rosulek
2017/061
Short Digital Signatures and ID-KEMs via Truncation Collision Resistance
Tibor Jager, Rafael Kurek
2017/060
Zero Round-Trip Time for the Extended Access Control Protocol
Jacqueline Brendel, Marc Fischlin
2017/059
Adaptively Secure Recipient Revocable Broadcast Encryption with Constant size Ciphertext
Kamalesh Acharya, Ratna Dutta
2017/058
WalnutDSA(TM): A Quantum-Resistant Digital Signature Algorithm
Iris Anshel, Derek Atkins, Dorian Goldfeld, Paul E Gunnells
2017/057
Single--Trace Template Attack on the DES Round Keys of a Recent Smart Card
Mathias Wagner, Stefan Heyse
2017/056
Verifiable Classroom Voting in Practice
Feng Hao, Dylan Clarke, Brian Randell, Siamak F. Shahandashti
2017/055
A Probabilistic Baby-Step Giant-Step Algorithm
Prabhat Kushwaha, Ayan Mahalanobis
2017/054
Attribute-Based Encryption Implies Identity-Based Encryption
Javier Herranz
2017/053
Horizontal isogeny graphs of ordinary abelian varieties and the discrete logarithm problem
Dimitar Jetchev, Benjamin Wesolowski
2017/052
A short note on the security of Round-Robin Differential Phase-Shift QKD
Boris Skoric
2017/051
A note on VRFs from Verifiable Functional Encryption
Saikrishna Badrinarayanan, Vipul Goyal, Aayush Jain, Amit Sahai
2017/050
An Obfuscating Compiler
Peter T. Breuer
2017/049
LARA - A Design Concept for Lattice-based Encryption
El Bansarkhani Rachid
2017/048
ROTE: Rollback Protection for Trusted Execution
Sinisa Matetic, Mansoor Ahmed, Kari Kostiainen, Aritra Dhar, David Sommer, Arthur Gervais, Ari Juels, Srdjan Capkun
2017/047
On dual lattice attacks against small-secret LWE and parameter choices in HElib and SEAL
Martin R. Albrecht
2017/046
Practical Passive Leakage-Abuse Attacks Against Symmetric Searchable Encryption
Matthieu Giraud, Alexandre Anzala-Yamajako, Olivier Bernard, Pascal Lafourcade
2017/045
Efficient Round-Optimal Blind Signatures in the Standard Model
Essam Ghadafi
2017/044
Anonymous contribution of data
Matthew McKague, David Eyers
2017/043
Accumulators with Applications to Anonymity-Preserving Revocation
Foteini Baldimtsi, Jan Camenisch, Maria Dubovitskaya, Anna Lysyanskaya, Leonid Reyzin, Kai Samelin, Sophia Yakoubov
2017/042
Indifferentiability of Iterated Even-Mansour Ciphers with Non-Idealized Key-Schedules: Five Rounds are Necessary and Sufficient
Yuanxi Dai, Yannick Seurin, John Steinberger, Aishwarya Thiruvengadam
2017/041
Reducing Garbled Circuit Size While Preserving Circuit Gate Privacy
Yongge Wang, Qutaibah m. Malluhi
2017/040
Practical Non-Malleable Codes from $\ell$-more Extractable Hash Functions
Aggelos Kiayias, Feng-Hao Liu, Yiannis Tselekounis
2017/039
SePCAR: A Secure and Privacy-Enhancing Protocol for Car Access Provision (Full Version)
Iraklis Symeonidis, Abdelrahaman Aly, Mustafa A. Mustafa, Bart Mennink, Siemen Dhooghe, Bart Preneel
2017/038
CCA-Secure Inner-Product Functional Encryption from Projective Hash Functions
Fabrice Benhamouda, Florian Bourse, Helger Lipmaa
2017/037
Double-base scalar multiplication revisited
Daniel J. Bernstein, Chitchanok Chuengsatiansup, Tanja Lange
2017/036
Low-Complexity Cryptographic Hash Functions
Benny Applebaum, Naama Haramaty, Yuval Ishai, Eyal Kushilevitz, Vinod Vaikuntanathan
2017/035
Privacy-Preserving Classification on Deep Neural Network
Hervé Chabanne, Amaury de Wargny, Jonathan Milgram, Constance Morel, Emmanuel Prouff
2017/034
Analysis of the NORX Core Permutation
Alex Biryukov, Aleksei Udovenko, Vesselin Velichkov
2017/033
Analyzing the Shuffling Side-Channel Countermeasure for Lattice-Based Signatures
Peter Pessl
2017/032
Cryptanalysis of GlobalPlatform Secure Channel Protocols
Mohamed Sabt, Jacques Traoré
2017/031
Honey Encryption for Language
Marc Beunardeau, Houda Ferradi, Rémi Géraud, David Naccache
2017/030
Authenticated Garbling and Efficient Maliciously Secure Two-Party Computation
Xiao Wang, Samuel Ranellucci, Jonathan Katz
2017/029
Bounded-Collusion Attribute-Based Encryption from Minimal Assumptions
Gene Itkis, Emily Shen, Mayank Varia, David Wilson, Arkady Yerukhimovich
2017/028
A Decentralized PKI In A Mobile Ecosystem
Varun Chandrasekaran, Lakshminarayanan Subramanian
2017/027
Scalable Multi-Party Private Set-Intersection
Carmit Hazay, Muthuramakrishnan Venkitasubramaniam
2017/026
Constant Round Adaptively Secure Protocols in the Tamper-Proof Hardware Model
Carmit Hazay, Antigoni Polychroniadou, Muthuramakrishnan Venkitasubramaniam
2017/025
Improved Structure Preserving Signatures under Standard Bilinear Assumptions
Charanjit S. Jutla, Arnab Roy
2017/024
Searchable Encrypted Relational Databases: Risks and Countermeasures
Mohamed Ahmed Abdelraheem, Tobias Andersson, Christian Gehrmann
2017/023
Dual System Framework in Multilinear Settings and Applications to Fully Secure (Compact) ABE for Unbounded-Size Circuits
Nuttapong Attrapadung
2017/022
Privacy for Distributed Databases via (Un)linkable Pseudonyms
Jan Camenisch, Anja Lehmann
2017/021
A Generic Approach to Constructing and Proving Verifiable Random Functions
Rishab Goyal, Susan Hohenberger, Venkata Koppula, Brent Waters
2017/020
concerto: A Methodology Towards Reproducible Analyses of TLS Datasets
Olivier Levillain, Maxence Tury, Nicolas Vivet
2017/019
SmartPool: Practical Decentralized Pooled Mining
Loi Luu, Yaron Velner, Jason Teutsch, Prateek Saxena
2017/018
Verifiable Random Functions from Non-Interactive Witness-Indistinguishable Proofs
Nir Bitansky
2017/017
Improved Algorithms for the Approximate k-List Problem in Euclidean Norm
Gottfried Herold, Elena Kirshanova
2017/016
Provable Security of Substitution-Permutation Networks
Yevgeniy Dodis, Jonathan Katz, John Steinberger, Aishwarya Thiruvengadam, Zhe Zhang
2017/015
Tight Upper and Lower Bounds for Leakage-Resilient, Locally Decodable and Updatable Non-Malleable Codes
Dana Dachman-Soled, Mukul Kulkarni, Aria Shahverdi
2017/014
ORAMs in a Quantum World
Tommaso Gagliardoni, Nikolaos P. Karvelas, Stefan Katzenbeisser
2017/013
Pinocchio-Based Adaptive zk-SNARKs and Secure/Correct Adaptive Function Evaluation
Meilof Veeningen
2017/012
Universal Samplers with Fast Verification
Venkata Koppula, Andrew Poelstra, Brent Waters
2017/011
Chameleon-Hashes with Ephemeral Trapdoors And Applications to Invisible Sanitizable Signatures
Jan Camenisch, David Derler, Stephan Krenn, Henrich C. Pöhls, Kai Samelin, Daniel Slamanig
2017/010
Circuit-Private Multi-Key FHE
Wutichai Chongchitmate, Rafail Ostrovsky
2017/009
Access Control Encryption for Equality, Comparison, and More
Georg Fuchsbauer, Romain Gay, Lucas Kowalczyk, Claudio Orlandi
2017/008
Externally Verifiable Oblivious RAM
Joshua Gancher, Adam Groce, Alex Ledger
2017/007
Algebraic Attack Efficiency versus S-box Representation
Hossein Arabnezhad-Khanoki, Babak Sadeghiyan, Josef Pieprzyk
2017/006
Reduced Mumford divisors of a genus 2 curve through its jacobian function field
Eduardo Ruiz Duarte
2017/005
High-speed Hardware Implementations of Point Multiplication for Binary Edwards and Generalized Hessian Curves
Bahram Rashidi, Reza Rezaeian Farashahi, Sayed Masoud Sayedi
2017/004
A New Approach for Practical Function-Private Inner Product Encryption
Sungwook Kim, Jinsu Kim, Jae Hong Seo
2017/003
The STROBE protocol framework
Mike Hamburg
2017/002
Generalized Tweakable Even-Mansour Cipher with Strong Security Guarantee and Its Application to Authenticated Encryption
Ping Zhang, Honggang Hu, Peng Wang
2017/001
Equivalences and Black-Box Separations of Matrix Diffie-Hellman Problems
Jorge Luis Villar
2016/1196
MASCAT: Stopping Microarchitectural Attacks Before Execution
Gorka Irazoqui, Thomas Eisenbarth, Berk Sunar
2016/1195
Constant-Time Callees with Variable-Time Callers
Cesar Pereida Garcïa, Billy Bob Brumley
2016/1194
Efficient Encryption from Random Quasi-Cyclic Codes
Carlos Aguilar, Olivier Blazy, Jean-Christophe Deneuville, Philippe Gaborit, Gilles Zémor
2016/1193
The Secret Processor Will Go to The Ball: Benchmark Insider-Proof Encrypted Computing
P. T. Breuer, J. P. Bowen, E. Palomar, Z. Liu
2016/1192
Non-Malleable Codes with Split-State Refresh
Antonio Faonio, Jesper Buus Nielsen
2016/1191
On the Security of Practical and Complete Homomorphic Encrypted Computation
P. T. Breuer, J. P. Bowen
2016/1190
Equivocating Yao: Constant-Round Adaptively Secure Multiparty Computation in the Plain Model
Ran Canetti, Oxana Poburinnaya, Muthuramakrishnan Venkitasubramaniam
2016/1189
On the Bit Security of Elliptic Curve Diffie--Hellman
Barak Shani
2016/1188
Farfalle: parallel permutation-based cryptography
Guido Bertoni, Joan Daemen, Seth Hoffert, Michaël Peeters, Gilles Van Assche, Ronny Van Keer
2016/1187
Computing Optimal Ate Pairings on Elliptic Curves with Embedding Degree $9,15$ and $27$
Emmanuel Fouotsa, Nadia El Mrabet, Aminatou Pecha
2016/1186
On the Complexity of Breaking Pseudoentropy
Maciej Skorski
2016/1185
A Digital Signature Scheme Based On Supersingular Isogeny Problem
Kisoon Yoon, Jihoon Kwon, Suhri Kim
2016/1184
Bitcoin Private Key Locked Transactions
Sergi Delgado-Segura, Cristina Pérez-Solà, Jordi Herrera-Joancomartí, Guillermo Navarro-Arribas
2016/1183
Some Results on the Known Classes of Quadratic APN Functions
Lilya Budaghyan, Tor Helleseth, Nian Li, Bo Sun
2016/1182
Public Key Encryption with Equality Test in the Standard Model
Hyung Tae Lee, San Ling, Jae Hong Seo, Huaxiong Wang, Taek-Young Youn
2016/1181
New Impossible Differential Search Tool from Design and Cryptanalysis Aspects
Yu Sasaki, Yosuke Todo
2016/1180
How to Meet Big Data When Private Set Intersection Realizes Constatnt Communication Complexity
Sumit Kumar Debnath, Ratna Dutta
2016/1179
Updatable Functional Encryption
Afonso Arriaga, Vincenzo Iovino, Qiang Tang
2016/1178
Implementing and Proving the TLS 1.3 Record Layer
Karthikeyan Bhargavan, Antoine Delignat-Lavaud, Cédric Fournet, Markulf Kohlweiss, Jianyang Pan, Jonathan Protzenko, Aseem Rastogi, Nikhil Swamy, Santiago Zanella-Béguelin, Jean Karim Zinzindohoué
2016/1177
Efficient Slide Attacks
Achiya Bar-On, Eli Biham, Orr Dunkelman, Nathan Keller
2016/1176
Leakage of Signal function with reused keys in RLWE key exchange
Jintai Ding, Saed Alsayigh, Saraswathy RV, Scott Fluhrer, Xiaodong Lin
2016/1175
On the Security Notions for Homomorphic Signatures
Dario Catalano, Dario Fiore, Luca Nizzardo
2016/1174
Revisiting Full-PRF-Secure PMAC and Using It for Beyond-Birthday Authenticated Encryption
Eik List, Mridul Nandi
2016/1173
Construction of Lightweight MDS Matrices over the Matrix Polynomial Residue Ring
Lijing Zhou, Licheng Wang, Yiru Sun
2016/1172
On the Provable Security of the Tweakable Even-Mansour Cipher Against Multi-Key and Related-Key Attacks
Ping Zhang, Honggang Hu
2016/1171
A Salad of Block Ciphers
Roberto Avanzi
2016/1170
Impossible-Differential and Boomerang Cryptanalysis of Round-Reduced Kiasu-BC
Christoph Dobraunig, Eik List
2016/1169
LWE from Non-commutative Group Rings
Qi Cheng, Jun Zhang, Jincheng Zhuang
2016/1168
Generic Zero-Knowledge and Multivariate Quadratic Systems
Alan Szepieniec, Bart Preneel
2016/1167
Mobile Commerce: Secure Multi-party Computation & Financial Cryptography
Sumit Chakraborty
2016/1166
Group key exchange protocols withstanding ephemeral-key reveals
Maria Isabel Gonzalez Vasco, Angel L. Perez del Pozo, Adriana Suarez Corona
2016/1165
Efficient Transparent Redactable Signatures with a Single Signature Invocation
Stuart Haber, William Horne, Miaomiao Zhang
2016/1164
Attacking FHE-based applications by software fault injections
Ilaria Chillotti, Nicolas Gama, Louis Goubin
2016/1163
Using Fully Homomorphic Encryption for Statistical Analysis of Categorical, Ordinal and Numerical Data
Wen-jie Lu, Shohei Kawasaki, Jun Sakuma
2016/1162
Meet-in-the-Middle Attacks on Classes of Contracting and Expanding Feistel Constructions
Jian Guo, Jérémy Jean, Ivica Nikolic, Yu Sasaki
2016/1161
Impossible Differential Attack on Simpira v2
Rui Zong, Xiaoyang Dong, Xiaoyun Wang
2016/1160
Meet-in-the-Middle Attack on QARMA Block Cipher
Rui Zong, Xiaoyang Dong
2016/1159
SPECTRE: A Fast and Scalable Cryptocurrency Protocol
Yonatan Sompolinsky, Yoad Lewenberg, Aviv Zohar
2016/1158
Activate Later Certificates for V2X -- Combining ITS efficiency with privacy
Eric R. Verheul
2016/1157
NewHope without reconciliation
Erdem Alkim, Léo Ducas, Thomas Pöppelmann, Peter Schwabe
2016/1156
Scripting smart contracts for distributed ledger technology
Pablo Lamela Seijas, Simon Thompson, Darryl McAdams
2016/1155
Comparative Study of Various Approximations to the Covariance Matrix in Template Attacks
Mathias Wagner, Yongbo Hu, Chen Zhang, Yeyang Zheng
2016/1154
Identification Protocols and Signature Schemes Based on Supersingular Isogeny Problems
Steven D. Galbraith, Christophe Petit, Javier Silva
2016/1153
Attacks against search Poly-LWE
Momonari Kudo
2016/1152
Leak Me If You Can: Does TVLA Reveal Success Rate?
Debapriya Basu Roy, Shivam Bhasin, Sylvain Guilley, Annelie Heuser, Sikhar Patranabis, Debdeep Mukhopadhyay
2016/1151
A Novel Multi-factor ID-based Designated Verifier Signature scheme
Mike Scott
2016/1150
Simple Homomorphisms of Cocks IBE and Applications
Rio LaVigne
2016/1149
Exploiting Safe Error based Leakage of RFID Authentication Protocol using Hardware Trojan Horse
Krishna Bagadia, Urbi Chatterjee, Debapriya Basu Roy, Debdeep Mukhopadhyay, Rajat Subhra Chakraborty
2016/1148
Splinter: Practical Private Queries on Public Data
Frank Wang, Catherine Yun, Shafi Goldwasser, Vinod Vaikuntanathan, Matei Zaharia
2016/1147
Cryptanalysis of a certificateless aggregate signature scheme
Nasrollah Pakniat, Mahnaz Noroozi
2016/1146
Preventing Adaptive Key Recovery Attacks on the Gentry-Sahai-Waters Leveled Homomorphic Encryption Scheme
Zengpeng Li, Steven D. Galbraith, Chunguang Ma
2016/1145
Evolving S-Boxes with Reduced Differential Power Analysis Susceptibility
Merrielle Spain, Mayank Varia
2016/1144
Private Projections & Variants
Xavier Carpent, Sky Faber, Tomas Sander, Gene Tsudik
2016/1143
Ciphertext and Plaintext Leakage Reveals the Entire TDES Key
Yongbo Hu, Chen Zhang, Yeyang Zheng, Mathias Wagner
2016/1142
New construction of single-cycle T-function families
Shiyi ZHANG, Yongjuan WANG, Guangpu GAO
2016/1141
An Oblivious Parallel RAM with $O(\log^2 N)$ Parallel Runtime Blowup
Kartik Nayak, Jonathan Katz
2016/1140
Attribute Based Encryption: Traitor Tracing, Revocation and Fully Security on Prime Order Groups
Xiaoyi Li, Kaitai Liang, Zhen Liu, Duncan S. Wong
2016/1139
Comments on “Flaw in the Security Analysis of Leakage-resilient Authenticated Key Exchange Protocol from CT-RSA 2016 and Restoring the Security Proof”
Rongmao Chen, Yi Mu, Guomin Yang, Willy Susilo, Fuchun Guo
2016/1138
Pairing Cryptography Meets Isogeny: A New Framework of Isogenous Pairing Groups
Takeshi Koshiba, Katsuyuki Takashima
2016/1137
New Impossible Differential Characteristic of SPECK64 using MILP
HoChang Lee, HyungChul Kang, Deukjo Hong, Jaechul Sung, Seokhie Hong
2016/1136
Cryptography During the French and American Wars in Vietnam
Phan Duong Hieu, Neal Koblitz
2016/1135
Static Power Side-Channel Analysis of a Threshold Implementation Prototype Chip
Thorben Moos, Amir Moradi, Bastian Richter
2016/1134
Privacy-preserving Hybrid Recommender System
Qiang Tang, Husen Wang
2016/1133
Implementing Complete Formulas on Weierstrass Curves in Hardware
Pedro Maat C. Massolino, Joost Renes, Lejla Batina
2016/1132
Some results on ACORN
Dibyendu Roy, Sourav Mukhopadhyay
2016/1131
New construction of single cycle T-function families
Shiyi ZHANG, Yongjuan WANG, Guangpu GAO
2016/1130
Are RNGs Achilles’ heel of RFID Security and Privacy Protocols ?
Atakan Arslan, Suleyman Kardas, Sultan Aldirmaz, Sarp Erturk
2016/1129
Certificateless Public Key Encryption with Equality Test
Xi-Jun Lin, Zhen Yan, Qi Zhang, Haipeng Qu
2016/1128
Modifying Shor’s algorithm to compute short discrete logarithms
Martin Ekerå
2016/1127
Related-Key Impossible-Differential Attack on Reduced-Round SKINNY
Ralph Ankele, Subhadeep Banik, Avik Chakraborti, Eik List, Florian Mendel, Siang Meng Sim, Gaoli Wang
2016/1126
Lizard: Cut off the Tail! Practical Post-Quantum Public-Key Encryption from LWE and LWR
Jung Hee Cheon, Duhyeong Kim, Joohee Lee, Yongsoo Song
2016/1125
Estonian Voting Verification Mechanism Revisited
Koksal Mus, Mehmet Sabir Kiraz, Murat Cenk, Isa Sertkaya
2016/1124
Integrity Analysis of Authenticated Encryption Based on Stream Ciphers
Kazuya Imamura, Kazuhiko Minematsu, Tetsu Iwata
2016/1123
Dude, is my code constant time?
Oscar Reparaz, Josep Balasch, Ingrid Verbauwhede
2016/1122
Quantum Key Recycling with eight-state encoding (The Quantum One Time Pad is more interesting than we thought)
B. Skoric, M. de Vries
2016/1121
Insecurity of RCB: Leakage-Resilient Authenticated Encryption
Farzaneh abed, Francesco Berti, Stefan Lucks
2016/1120
Cryptanalysis of Reduced round SKINNY Block Cipher
Sadegh Sadeghi, Tahere Mohammadi, Nasour Bagheri
2016/1119
A Code-Based Group Signature Scheme
Quentin Alamélou, Olivier Blazy, Stéphane Cauchie, Philippe Gaborit
2016/1118
Designing Optimal Implementations of Linear Layers (Full Version)
Ruoxin Zhao, Baofeng Wu, Rui Zhang, Qian Zhang
2016/1117
Privacy-friendly Forecasting for the Smart Grid using Homomorphic Encryption and the Group Method of Data Handling
Joppe W. Bos, Wouter Castryck, Ilia Iliashenko, Frederik Vercauteren
2016/1116
Evaluating Entropy for TRNGs: Efficient, Robust and Provably Secure
Maciej Skorski
2016/1115
Impossible Differential Cryptanalysis of Reduced-Round SKINNY
Mohamed Tolba, Ahmed Abdelkhalek, Amr M. Youssef
2016/1114
Full Disk Encryption: Bridging Theory and Practice
Louiza Khati, Nicky Mouha, Damien Vergnaud
2016/1113
Efficient Construction of Visual Cryptographic Scheme for Compartmented Access Structures
Sabyasachi Dutta, Tamal Bhore, Avishek Adhikari
2016/1112
Direct construction of quasi-involutory recursive-like MDS matrices from $2$-cyclic codes
Victor Cauchois, Pierre Loidreau, Nabil Merkiche
2016/1111
Hiding Higher-Order Side-Channel Leakage - Randomizing Cryptographic Implementations in Reconfigurable Hardware
Pascal Sasdrich, Amir Moradi, Tim Güneysu
2016/1110
Efficient Post-Quantum Zero-Knowledge and Signatures
Steven Goldfeder, Melissa Chase, Greg Zaverucha
2016/1109
Practical CCA2-Secure and Masked Ring-LWE Implementation
Tobias Oder, Tobias Schneider, Thomas Pöppelmann, Tim Güneysu
2016/1108
Security Analysis of SKINNY under Related-Tweakey Settings
Guozhen Liu, Mohona Ghosh, Ling Song
2016/1107
Magic Adversaries Versus Individual Reduction: Science Wins Either Way
Yi Deng
2016/1106
Functional Encryption for Quadratic Functions, and Applications to Predicate Encryption
Romain Gay
2016/1105
Generic Transformations of Predicate Encodings: Constructions and Applications
Miguel Ambrona, Gilles Barthe, Benedikt Schmidt
2016/1104
Practical Functional Encryption for Bilinear Forms
Carmen Elisabetta Zaira Baltico, Dario Catalano, Dario Fiore
2016/1103
A Fast Single-Key Two-Level Universal Hash Function
Debrup Chakraborty, Sebati Ghosh, Palash Sarkar
2016/1102
Challenges with Assessing the Impact of NFS Advances on the Security of Pairing-based Cryptography
Alfred Menezes, Palash Sarkar, Shashank Singh
2016/1101
MILP-Aided Bit-Based Division Property for ARX-Based Block Cipher
Ling Sun, Wei Wang, Ru Liu, Meiqin Wang
2016/1100
Pseudoentropic Isometries: A New Framework for Fuzzy Extractor Reusability
Quentin Alamélou, Paul-Edmond Berthier, Chloé Cachet, Stéphane Cauchie, Benjamin Fuller, Philippe Gaborit, Sailesh Simhadri
2016/1099
Improved Parameters for the Ring-TESLA Digital Signature Scheme
Arjun Chopra
2016/1098
Multi-key Analysis of Tweakable Even-Mansour with Applications to Minalpher and OPP
Zhiyuan Guo, Wenling Wu, Renzhang Liu, Liting Zhang
2016/1097
Projective Arithmetic Functional Encryption and Indistinguishability Obfuscation From Degree-5 Multilinear Maps
Prabhanjan Ananth, Amit Sahai
2016/1096
Indistinguishability Obfuscation from SXDH on 5-Linear Maps and Locality-5 PRGs
Huijia Lin
2016/1095
Improved Key Recovery Algorithms from Noisy RSA Secret Keys with Analog Noise
Noboru Kunihiro, Yuki Takahashi
2016/1094
New Revocable IBE in Prime-Order Groups: Adaptively Secure, Decryption Key Exposure Resistant, and with Short Public Parameters
Yohei Watanabe, Keita Emura, Jae Hong Seo
2016/1093
Energy Optimization of Unrolled Block Ciphers using Combinational Checkpointing
Siva Nishok Dhanuskodi, Daniel Holcomb
2016/1092
Parametrizations for Families of ECM-friendly curves
Alexandre Gélin, Thorsten Kleinjung, Arjen K. Lenstra
2016/1091
On the Entropy of Oscillator-Based True Random Number Generators
Yuan Ma, Jingqiang Lin, Jiwu Jing
2016/1090
OleF: An Inverse-Free Online Cipher
Ritam Bhaumik, Mridul Nandi
2016/1089
Homomorphic-Policy Attribute-Based Key Encapsulation Mechanisms
Jérémy Chotard, Duong Hieu Phan, David Pointcheval
2016/1088
How to infinitely share a secret more efficiently
Anat Paskin-Cherniavsky
2016/1087
CENC is Optimally Secure
Tetsu Iwata, Bart Mennink, Damian Vizár
2016/1086
An Attribute-Based Anonymous Broadcast Encryption Scheme with Adaptive Security in the Standard Model
Reyhaneh Rabaninejad, Mohammad Hassan Ameri, Mahshid Delavar, Javad Mohajeri
2016/1085
Digital Signatures from Symmetric-Key Primitives
David Derler, Claudio Orlandi, Sebastian Ramacher, Christian Rechberger, Daniel Slamanig
2016/1084
Circuit OPRAM: Unifying Statistically and Computationally Secure ORAMs and OPRAMs
T-H. Hubert Chan, Elaine Shi
2016/1083
Constructions Secure against Receiver Selective Opening and Chosen Ciphertext Attacks
Dingding Jia, Xianhui Lu, Bao Li
2016/1082
My traces learn what you did in the dark: recovering secret signals without key guesses
Si Gao, Hua Chen, Wenling Wu, Limin Fan, Weiqiong Cao, Xiangliang Ma
2016/1081
Attacks to a proxy-mediated key agreement protocol based on symmetric encryption
David Nuñez, Isaac Agudo, Javier Lopez
2016/1080
Does Coupling Affect the Security of Masked Implementations?
Thomas De Cnudde, Begül Bilgin, Benedikt Gierlichs, Ventzislav Nikov, Svetla Nikova, Vincent Rijmen
2016/1079
Revisiting the Cubic UOV Signature Scheme
Dung Hoang Duong, Takanori Yasuda, Albrecht Petzoldt, Yacheng Wang, Tsuyoshi Takagi
2016/1078
Construction of $n$-variable ($n\equiv 2 \bmod 4$) balanced Boolean functions with maximum absolute value in autocorrelation spectra $< 2^{\frac n2}$
Deng Tang, Subhamoy Maitra
2016/1077
Blurry-ORAM: A Multi-Client Oblivious Storage Architecture
N. P. Karvelas, Andreas Peter, Stefan Katzenbeisser
2016/1076
A Note on Quantum-Secure PRPs
Mark Zhandry
2016/1075
Cryptanalysis of Simple Matrix Scheme for Encryption
Gu Chunsheng
2016/1074
Side-Channel Plaintext-Recovery Attacks on Leakage-Resilient Encryption
Thomas Unterluggauer, Mario Werner, Stefan Mangard
2016/1073
Linking-Based Revocation for Group Signatures: A Pragmatic Approach for Efficient Revocation Checks
Daniel Slamanig, Raphael Spreitzer, Thomas Unterluggauer
2016/1072
Game-Theoretic Security for Two-Party Protocols
Haruna Higo, Keisuke Tanaka, Akihiro Yamada, Kenji Yasunaga
2016/1071
Iron: Functional Encryption using Intel SGX
Ben A. Fisch, Dhinakaran Vinayagamurthy, Dan Boneh, Sergey Gorbunov
2016/1070
Preventing CLT Attacks on Obfuscation with Linear Overhead
Rex Fernando, Peter M. R. Rasmussen, Amit Sahai
2016/1069
Constant Round Maliciously Secure 2PC with Function-independent Preprocessing using LEGO
Jesper Buus Nielsen, Thomas Schneider, Roberto Trifiletti
2016/1068
On Finding Short Cycles in Cryptographic Algorithms
Elena Dubrova, Maxim Teslenko
2016/1067
Scalable Bias-Resistant Distributed Randomness
Ewa Syta, Philipp Jovanovic, Eleftherios Kokoris Kogias, Nicolas Gailly, Linus Gasser, Ismail Khoffi, Michael J. Fischer, Bryan Ford
2016/1066
Optimizing Semi-Honest Secure Multiparty Computation for the Internet
Aner Ben-Efraim, Yehuda Lindell, Eran Omri
2016/1065
Revisiting the Efficient Key Generation of ZHFE
Yasuhiko Ikematsu, Dung H. Duong, Albrecht Petzoldt, Tsuyoshi Takagi
2016/1064
Signer-Anonymous Designated-Verifier Redactable Signatures for Cloud-Based Data Sharing
David Derler, Stephan Krenn, Daniel Slamanig
2016/1063
Authenticated LSM Trees with Minimal Trust
Yuzhe (Richard) Tang, Ju Chen, Kai Li
2016/1062
Catena: Efficient Non-equivocation via Bitcoin
Alin Tomescu, Srinivas Devadas
2016/1061
Changing of the Guards: a simple and efficient method for achieving uniformity in threshold sharing
Joan Daemen
2016/1060
On Analyzing Program Behavior Under Fault Injection Attacks
Jakub Breier
2016/1059
The INT-RUP Security of OCB with Intermediate (Parity) Checksum
Ping Zhang, Peng Wang, Honggang Hu
2016/1058
Ring-LWE Ciphertext Compression and Error Correction: Tools for Lightweight Post-Quantum Cryptography
Markku-Juhani O. Saarinen
2016/1057
Secure Multiparty Computation from SGX
Raad Bahmani, Manuel Barbosa, Ferdinand Brasser, Bernardo Portela, Ahmad-Reza Sadeghi, Guillaume Scerri, Bogdan Warinschi
2016/1056
A Tool Kit for Partial Key Exposure Attacks on RSA
Atsushi Takayasu, Noboru Kunihiro
2016/1055
A Practical Post-Quantum Public-Key Cryptosystem Based on spLWE
Jung Hee Cheon, Kyoo Hyung Han, Jinsu Kim, Changmin Lee, Yongha Son
2016/1054
SilentWhispers: Enforcing Security and Privacy in Decentralized Credit Networks
Giulio Malavolta, Pedro Moreno-Sanchez, Aniket Kate, Matteo Maffei
2016/1053
SAT-based Cryptanalysis of Authenticated Ciphers from the CAESAR Competition
Ashutosh Dhar Dwivedi, Miloš Klouček, Pawel Morawiecki, Ivica Nikolic̈, Josef Pieprzyk, Sebastian Wöjtowicz
2016/1052
Hickory Hash(TM): Implementing an Instance of an Algebraic Eraser(TM) Hash Function on an MSP430 Microcontroller
Iris Anshel, Derek Atkins, Dorian Goldfeld, Paul E Gunnells
2016/1051
Super-Strong RKA Secure MAC, PKE and SE from Tag-based Hash Proof System
Shuai Han, Shengli Liu, Lin Lyu
2016/1050
Cryptographic decoding of the Leech lattice
Alex van Poppelen
2016/1049
Randomized stopping times and provably secure pseudorandom permutation generators
Michal Kulis, Pawel Lorek, Filip Zagorski
2016/1048
The Bitcoin Backbone Protocol with Chains of Variable Difficulty
Juan A. Garay, Aggelos Kiayias, Nikos Leonardos
2016/1047
IoT Goes Nuclear: Creating a ZigBee Chain Reaction
Eyal Ronen, Colin O’Flynn, Adi Shamir, Achi-Or Weingarten
2016/1046
Efficient Finite field multiplication for isogeny based post quantum cryptography
Angshuman karmakar, Sujoy Sinha Roy, Frederik Vercauteren, Ingrid Verbauwhede
2016/1045
On Fast Calculation of Addition Chains for Isogeny-Based Cryptography
Brian Koziel, Reza Azarderakhsh, David Jao, Mehran Mozaffari-Kermani
2016/1044
Fast Hardware Architectures for Supersingular Isogeny Diffie-Hellman Key Exchange on FPGA
Brian Koziel, Reza Azarderakhsh, Mehran Mozaffari Kermani
2016/1043
Concurrently Composable Security With Shielded Super-polynomial Simulators
Brandon Broadnax, Nico Döttling, Gunnar Hartung, Jörn Müller-Quade, Matthias Nagel
2016/1042
"Oops, I did it again" -- Security of One-Time Signatures under Two-Message Attacks
Leon Groot Bruinderink, Andreas Hülsing
2016/1041
XDedup: Efficient Provably-Secure Cross-User Chunk-Level Client-Side Deduplicated Cloud Storage of Encrypted Data
Chia-Mu Yu
2016/1040
Semi-Honest Secure Multiparty Computation Can Be Insecure by Using Secure Pseudorandom Generators
Koji Nuida
2016/1039
A Fiat-Shamir Implementation Note
Simon Cogliani, Rémi Géraud, David Naccache
2016/1038
An Efficient Non-Interactive Multi-client Searchable Encryption with Support for Boolean Queries
Shi-Feng Sun, Joseph K. Liu, Amin Sakzad, Ron Steinfeld, Tsz Hon Yuen
2016/1037
Apollo - End-to-end Verifiable Internet Voting with Recovery from Vote Manipulation
Dawid Gawel, Maciej Kosarzecki, Poorvi L. Vora, Hua Wu, Filip Zagorski
2016/1036
Direct Construction of Lightweight Rotational-XOR MDS Diffusion Layers
Zhiyuan Guo, Renzhang Liu, Wenling Wu, Dongdai Lin
2016/1035
Improved Estimation of Collision Entropy in High and Low-Entropy Regimes and Applications to Anomaly Detection
Maciej Skorski
2016/1034
Significantly Improved Multi-bit Differentials for Reduced Round Salsa and ChaCha
Arka Rai Choudhuri, Subhamoy Maitra
2016/1033
Decentralized Anonymous Micropayments
Alessandro Chiesa, Matthew Green, Jingcheng Liu, Peihan Miao, Ian Miers, Pratyush Mishra
2016/1032
Efficient Covert Two-Party Computation
Stanislaw Jarecki
2016/1031
A Multiplexer based Arbiter PUF Composition with Enhanced Reliability and Security
Durga Prasad Sahoo, Debdeep Mukhopadhyay, Rajat Subhra Chakraborty, Phuong Ha Nguyen
2016/1030
Novel Inner Product Encryption Resistant to Partial Collusion Attacks
Yuqiao Deng, Ge Song
2016/1029
Scalable Attribute-Based Encryption Under the Strictly Weaker Assumption Family
Yuqiao Deng, Ge Song
2016/1028
Ratcheted Encryption and Key Exchange: The Security of Messaging
Mihir Bellare, Asha Camper Singh, Joseph Jaeger, Maya Nyayapati, Igors Stepanovs
2016/1027
Formal Abstractions for Attested Execution Secure Processors
Rafael Pass, Elaine Shi, Florian Tramer
2016/1026
Sharper Ring-LWE Signatures
Paulo S. L. M. Barreto, Patrick Longa, Michael Naehrig, Jefferson E. Ricardini, Gustavo Zanon
2016/1025
An Algorithm for Counting the Number of $2^n$-Periodic Binary Sequences with Fixed $k$-Error Linear Complexity
Wenlun Pan, Zhenzhen Bao, Dongdai Lin, Feng Liu
2016/1024
LDA-Based Clustering as a Side-Channel Distinguisher
Rauf Mahmudlu, Valentina Banciu, Lejla Batina, Ileana Buhan
2016/1023
Constant-Time Higher-Order Boolean-to-Arithmetic Masking
Michael Hutter, Michael Tunstall
2016/1022
Randomized Mixed-Radix Scalar Multiplication
Eleonora Guerrini, Laurent Imbert, Théo Winterhalter
2016/1021
Cryptographic Randomness on a CC2538: a Case Study
Yan Yan, Elisabeth Oswald, Theo Tryfonas
2016/1020
KDM Security for Identity-Based Encryption: Constructions and Separations
Yu Chen, Jiang Zhang, Yi Deng, Jinyong Chang
2016/1019
Faster Homomorphic Evaluation of Discrete Fourier Transforms
Anamaria Costache, Nigel P. Smart, Srinivas Vivek
2016/1018
IKP: Turning a PKI Around with Blockchains
Stephanos Matsumoto, Raphael M. Reischuk
2016/1017
Post-Quantum Key Exchange for the Internet and the Open Quantum Safe Project
Douglas Stebila, Michele Mosca
2016/1016
Deterring Certificate Subversion: Efficient Double-Authentication-Preventing Signatures
Mihir Bellare, Bertram Poettering, Douglas Stebila
2016/1015
MaxLength Considered Harmful to the RPKI
Yossi Gilad, Omar Sagga, Sharon Goldberg
2016/1014
Revisiting and Extending the AONT-RS scheme: a Robust Computationally Secure Secret Sharing Scheme
Liqun Chen, Thalia M. Laing, Keith M. Martin
2016/1013
A Formal Security Analysis of the Signal Messaging Protocol
Katriel Cohn-Gordon, Cas Cremers, Benjamin Dowling, Luke Garratt, Douglas Stebila
2016/1012
Comment on "Attribute-Based Signatures for Supporting Anonymous Certification" by N. Kaaniche and M. Laurent (ESORICS 2016)
Damien Vergnaud
2016/1011
Zeroizing Attacks on Indistinguishability Obfuscation over CLT13
Jean-Sébastien Coron, Moon Sung Lee, Tancrède Lepoint, Mehdi Tibouchi
2016/1010
Are We There Yet? On RPKI's Deployment and Security
Yossi Gilad, Avichai Cohen, Amir Herzberg, Michael Schapira, Haya Shulman
2016/1009
Efficient Resettably Secure Two-Party Computation
Tobias Nilges
2016/1008
KP+ : Fixing Availability Issues on KP Ownership Transfer Protocols
Jorge Munilla
2016/1007
A survey of attacks on Ethereum smart contracts
Nicola Atzei, Massimo Bartoletti, Tiziana Cimoli
2016/1006
The Security of NTP’s Datagram Protocol
Aanchal Malhotra, Matthew Van Gundy, Mayank Varia, Haydn Kennedy, Jonathan Gardner, Sharon Goldberg
2016/1005
Atomic-AES v2.0
Subhadeep Banik, Andrey Bogdanov, Francesco Regazzoni
2016/1004
Private Circuits III: Hardware Trojan-Resilience via Testing Amplification
Stefan Dziembowski, Sebastian Faust, Francois-Xavier Standaert
2016/1003
Cryptanalysis of Indistinguishability Obfuscations of Circuits over GGH13
Daniel Apon, Nico Döttling, Sanjam Garg, Pratyay Mukherjee
2016/1002
Decryption phase in Norwegian electronic voting
Anders Smedstuen Lund, Martin Strand
2016/1001
Revisiting RC4 Key Collision: Faster Search Algorithm and New 22-byte Colliding Key Pairs
Amit Jana, Goutam Paul
2016/1000
Solving Trapdoor Basis of Ideal Lattice from Public Basis
Yupu Hu, Zhizhu Lian, Jiangshan Chen
2016/999
Indiscreet Logs: Persistent Diffie-Hellman Backdoors in TLS
Kristen Dorey, Nicholas Chang-Fong, Aleksander Essex
2016/998
Cryptanalyses of Candidate Branching Program Obfuscators
Yilei Chen, Craig Gentry, Shai Halevi
2016/997
More Efficient Commitments from Structured Lattice Assumptions
Carsten Baum, Ivan Damgård, Vadim Lyubashevsky, Sabine Oechsner, Chris Peikert
2016/996
Leakage-Resilient and Misuse-Resistant Authenticated Encryption
Francesco Berti, François Koeune, Olivier Pereira, Thomas Peters, François-Xavier Standaert
2016/995
Measuring small subgroup attacks against Diffie-Hellman
Luke Valenta, David Adrian, Antonio Sanso, Shaanan Cohney, Joshua Fried, Marcella Hastings, J. Alex Halderman, Nadia Heninger
2016/994
Improving Authenticated Dynamic Dictionaries, with Applications to Cryptocurrencies
Leonid Reyzin, Dmitry Meshkov, Alexander Chepurnoy, Sasha Ivanov
2016/993
Comparing Sboxes of Ciphers from the Perspective of Side-Channel Attacks
Liran Lerman, Olivier Markowitch, Nikita Veshchikov
2016/992
Estimating the cost of generic quantum pre-image attacks on SHA-2 and SHA-3
Matthew Amy, Olivia Di Matteo, Vlad Gheorghiu, Michele Mosca, Alex Parent, John Schanck
2016/991
Bootstrapping the Blockchain, with Applications to Consensus and Fast PKI Setup
Juan A. Garay, Aggelos Kiayias, Nikos Leonardos, Giorgos Panagiotakos
2016/990
Revisiting the Wrong-Key-Randomization Hypothesis
Tomer Ashur, Tim Beyne, Vincent Rijmen
2016/989
Scrypt is Maximally Memory-Hard
Joël Alwen, Binyi Chen, Krzysztof Pietrzak, Leonid Reyzin, Stefano Tessaro
2016/988
Zero Knowledge Protocols from Succinct Constraint Detection
Eli Ben-Sasson, Alessandro Chiesa, Michael A. Forbes, Ariel Gabizon, Michael Riabzev, Nicholas Spooner
2016/987
A Key to Success -- Success Exponents for Side-Channel Distinguishers
Sylvain Guilley, Annelie Heuser, and Olivier Rioul
2016/986
Fast Arithmetic Modulo $2^xp^y\pm 1$
Joppe W. Bos, Simon Friedberger
2016/985
Hash First, Argue Later: Adaptive Verifiable Computations on Outsourced Data
Dario Fiore, Cédric Fournet, Esha Ghosh, Markulf Kohlweiss, Olga Ohrimenko, Bryan Parno
2016/984
Design Strategies for ARX with Provable Bounds: SPARX and LAX (Full Version)
Daniel Dinu, Léo Perrin, Aleksei Udovenko, Vesselin Velichkov, Johann Großschädl, Alex Biryukov
2016/983
Exact Security Analysis of Hash-then-Mask Type Probabilistic MAC Constructions
Avijit Dutta, Ashwin Jha, Mridul Nandi
2016/982
Securing Systems with Scarce Entropy: LWE-Based Lossless Computational Fuzzy Extractor for the IoT
Christopher Huth, Daniela Becker, Jorge Guajardo, Paul Duplys, Tim Güneysu
2016/981
Efficient No-dictionary Verifiable SSE
Wakaha Ogata, Kaoru Kurosawa
2016/980
TruSpy: Cache Side-Channel Information Leakage from the Secure World on ARM Devices
Ning Zhang, Kun Sun, Deborah Shands, Wenjing Lou, Y. Thomas Hou
2016/979
The Reason Why Some Divide-and-Conquer Algorithms Cannot Be Efficiently Implemented
Zhengjun Cao, Lihua Liu
2016/978
Testing the Trustworthiness of IC Testing: An Oracle-less Attack on IC Camouflaging
Muhammad Yasin, Ozgur Sinanoglu, Jeyavijayan Rajendran
2016/977
Side channels in deduplication: trade-offs between leakage and efficiency
Frederik Armknecht, Colin Boyd, Gareth T. Davies, Kristian Gjøsteen, Mohsen Toorani
2016/976
On Adaptively Secure Multiparty Computation with a Short CRS
Ran Cohen, Chris Peikert
2016/975
(Universal) Unconditional Verifiability in E-Voting without Trusted Parties
Gina Gallegos-Garcia, Vincenzo Iovino, Alfredo Rial, Peter B. Roenne, Peter Y. A. Ryan
2016/974
Server-Aided Revocable Identity-Based Encryption from Lattices
Khoa Nguyen, Huaxiong Wang, Juanyang Zhang
2016/973
Invariant Subspace Attack Against Midori64 and The Resistance Criteria for S-box Designs
Jian Guo, Jérémy Jean, Ivica Nikolić, Kexin Qiao, Yu Sasaki, Siang Meng Sim
2016/972
Revealing Encryption for Partial Ordering
Helene Haagh, Yue Ji, Chenxing Li, Claudio Orlandi, Yifan Song
2016/971
Authenticated communication from Quantum Readout of PUFs
B. Skoric, P. W. H. Pinkse, A. P. Mosk
2016/970
Statistical Analysis for Access-Driven Cache Attacks Against AES
Liwei Zhang, A. Adam Ding, Yunsi Fei, Zhen Hang Jiang
2016/969
Garbling Gadgets for Boolean and Arithmetic Circuits
Marshall Ball, Tal Malkin, Mike Rosulek
2016/968
System Clock and Power Supply Cross-Checking for Glitch Detection
Pei Luo, Chao Luo, Yunsi Fei
2016/967
Faulty Clock Detection for Crypto Circuits Against Differential Fault Analysis Attack
Pei Luo, Yunsi Fei
2016/966
High-speed VLSI implementation of Digit-serial Gaussian normal basis Multiplication over GF(2m)
Bahram Rashidi, Sayed Masoud Sayedi, Reza Rezaeian Farashahi
2016/965
A Cryptographic Proof of Regularity Lemmas: Simpler Unified Proofs and Refined Bounds
Maciej Skorski
2016/964
Practical low data-complexity subspace-trail cryptanalysis of round-reduced PRINCE
Lorenzo Grassi, Christian Rechberger
2016/963
Efficient compression of SIDH public keys
Craig Costello, David Jao, Patrick Longa, Michael Naehrig, Joost Renes, David Urbanik
2016/962
On Removing Graded Encodings from Functional Encryption
Nir Bitansky, Huijia Lin, Omer Paneth
2016/961
A kilobit hidden SNFS discrete logarithm computation
Joshua Fried, Pierrick Gaudry, Nadia Heninger, Emmanuel Thomé
2016/960
Quantum-Secure Symmetric-Key Cryptography Based on Hidden Shifts
Gorjan Alagic, Alexander Russell
2016/959
Impossibility of Simulation Secure Functional Encryption Even with Random Oracles
Shashank Agrawal, Venkata Koppula, Brent Waters
2016/958
SafeDeflate: compression without leaking secrets
Michał Zieliński
2016/957
Computing generator in cyclotomic integer rings
Thomas Espitau, Pierre-Alain Fouque, Alexandre Gélin, Paul Kirchner
2016/956
Two Simple Composition Theorems with H-coefficients
Jacques Patarin
2016/955
Constant-deposit multiparty lotteries on Bitcoin
Massimo Bartoletti, Roberto Zunino
2016/954
Improving the lower bound on the maximum nonlinearity of 1-resilient Boolean functions and designing functions satisfying all cryptographic criteria
WeiGuo Zhang, Enes Pasalic
2016/953
Collusion-Resistant Broadcast Encryption with Tight Reductions and Beyond
Linfeng Zhou
2016/952
ISAP -- Towards Side-Channel Secure Authenticated Encryption
Christoph Dobraunig, Maria Eichlseder, Stefan Mangard, Florian Mendel, Thomas Unterluggauer
2016/951
Revisiting Covert Multiparty Computation
Geoffroy Couteau
2016/950
Orthogonalized Lattice Enumeration for Solving SVP
Zhongxiang Zheng, Xiaoyun Wang, Guangwu Xu, Yang Yu
2016/949
Functional Encryption for Computational Hiding in Prime Order Groups via Pair Encodings
Jongkil Kim, Willy Susilo, Fuchun Guo, Man Ho Au
2016/948
Secure Computation in Online Social Networks
Foteini Baldimtsi, Dimitrios Papadopoulos, Stavros Papadopoulos, Alessandra Scafuro, Nikos Triandopoulos
2016/947
Isogeny graphs of ordinary abelian varieties
Ernest Hunter Brooks, Dimitar Jetchev, Benjamin Wesolowski
2016/946
Bitsliced Masking and ARM: Friends or Foes?
Wouter de Groot, Kostas Papagiannopoulos, Antonio de La Piedra, Erik Schneider, Lejla Batina
2016/945
High throughput in slices: the case of PRESENT, PRINCE and KATAN64 ciphers
Kostas Papapagiannopoulos
2016/944
High-Throughput Secure Three-Party Computation for Malicious Adversaries and an Honest Majority
Jun Furukawa, Yehuda Lindell, Ariel Nof, Or Weinstein
2016/943
Stadium: A Distributed Metadata-Private Messaging System
Nirvan Tyagi, Yossi Gilad, Derek Leung, Matei Zaharia, Nickolai Zeldovich
2016/942
Optimizing Secure Computation Programs with Private Conditionals
Peeter Laud, Alisa Pankova
2016/941
A New Class of Differentially 4-uniform Permutations from the Inverse Function
Jian Bai, Dingkang Wang
2016/940
Fast Actively Secure OT Extension for Short Secrets
Arpita Patra, Pratik Sarkar, Ajith Suresh
2016/939
Key Reconciliation Protocols for Error Correction of Silicon PUF Responses
Brice Colombier, Lilian Bossuet, David Hély, Viktor Fischer
2016/938
Kummer for Genus One over Prime Order Fields
Sabyasachi Karati, Palash Sarkar
2016/937
A Comparative S-Index in Factoring RSA Modulus via Lucas Sequences
Nur Azman Abu, Shekh Faisal Abdul-Latip, Muhammad Rezal Kamel Ariffin
2016/936
Linear Complexity of Designs based on Coordinate Sequences of LRS and on Digital Sequences of Matrix/Skew LRS Coordinate Sequences over Galois Ring
Vadim N. Tsypyschev
2016/935
Concealing Secrets in Embedded Processors Designs
Hannes Gross, Manuel Jelinek, Stefan Mangard, Thomas Unterluggauer, Mario Werner
2016/934
Cryptography with Updates
Prabhanjan Ananth, Aloni Cohen, Abhishek Jain
2016/933
Actively Secure 1-out-of-N OT Extension with Application to Private Set Intersection
Michele Orrù, Emmanuela Orsini, Peter Scholl
2016/932
Mistakes Are Proof That You Are Trying: On Verifying Software Encoding Schemes' Resistance to Fault Injection Attacks
Jakub Breier, Dirmanto Jap, Shivam Bhasin
2016/931
Feeding Two Cats with One Bowl: On Designing a Fault and Side-Channel Resistant Software Encoding Scheme (Extended Version)
Jakub Breier, Xiaolu Hou
2016/930
Scalable Private Set Intersection Based on OT Extension
Benny Pinkas, Thomas Schneider, Michael Zohner
2016/929
A Generalized Ideal Secret Sharing Scheme
Tanujay Sha
2016/928
The complexity of the connected graph access structure on seven participants
Massoud Hadian Dehkordi, Ali Safi
2016/927
Atomic-AES: A Compact Implementation of the AES Encryption/Decryption Core
Subhadeep Banik, Andrey Bogdanov, Francesco Regazzoni
2016/926
LIZARD - A Lightweight Stream Cipher for Power-constrained Devices
Matthias Hamann, Matthias Krause, Willi Meier
2016/925
Secure Channel Injection and Anonymous Proofs of Account Ownership
Liang Wang, Rafael Pass, abhi shelat, Thomas Ristenpart
2016/924
Bit Coincidence Mining Algorithm II
Koh-ichi Nagao
2016/923
Attacking embedded ECC implementations through cmov side channels
Erick Nascimento, Lukasz Chmielewski, David Oswald, Peter Schwabe
2016/922
Side-Channel Leakage Evaluation and Detection Based on Communication Theory
Wei Yang, Yuchen Cao, Ke Ma, Hailong Zhang
2016/921
Breaking Cryptographic Implementations Using Deep Learning Techniques
Houssem Maghrebi, Thibault Portigliatti, Emmanuel Prouff
2016/920
Breaking Web Applications Built On Top of Encrypted Data
Paul Grubbs, Richard McPherson, Muhammad Naveed, Thomas Ristenpart, Vitaly Shmatikov
2016/919
Snow White: Robustly Reconfigurable Consensus and Applications to Provably Secure Proof of Stake
Phil Daian, Rafael Pass, Elaine Shi
2016/918
The Sleepy Model of Consensus
Rafael Pass, Elaine Shi
2016/917
Hybrid Consensus: Efficient Consensus in the Permissionless Model
Rafael Pass, Elaine Shi
2016/916
FruitChains: A Fair Blockchain
Rafael Pass, Elaine Shi
2016/915
Transparency Overlays and Applications
Melissa Chase, Sarah Meiklejohn
2016/914
Computing discrete logarithms in cryptographically-interesting characteristic-three finite fields
Gora Adj, Isaac Canales-Martínez, Nareli Cruz-Cortés, Alfred Menezes, Thomaz Oliveira, Luis Rivera-Zamarripa, Francisco Rodríguez-Henríquez
2016/913
Small Field Attack, and Revisiting RLWE-Based Authenticated Key Exchange from Eurocrypt'15
Boru Gong, Yunlei Zhao
2016/912
Parallel Implementations of Masking Schemes and the Bounded Moment Leakage Model
Gilles Barthe, François Dupressoir, Sebastian Faust, Benjamin Grégoire, François-Xavier Standaert, Pierre-Yves Strub
2016/911
The Shortest Signatures Ever
Mohamed Saied Emam Mohamed, Albrecht Petzoldt
2016/910
The closest vector problem in tensored root lattices of type A and in their duals
Léo Ducas, Wessel P. J. van Woerden
2016/909
Multi-core FPGA Implementation of ECC with Homogeneous Co-Z Coordinate Representation
Bo-Yuan Peng, Yuan-Che Hsu, Yu-Jia Chen, Di-Chia Chueh, Chen-Mou Cheng, Bo-Yin Yang
2016/908
Secure Error-Tolerant Graph Matching Protocols
Kalikinkar Mandal, Basel Alomair, Radha Poovendran
2016/907
Cut-and-Choose for Garbled RAM
Peihan Miao
2016/906
On Basing Search SIVP on NP-Hardness
Tianren Liu
2016/905
Generalized Desynchronization Attack on UMAP: Application to RCIA, KMAP, SLAP and SASI$^+$ protocols
Masoumeh Safkhani, Nasour Bagheri
2016/904
Succinct Predicate and Online-Offline Multi-Input Inner Product Encryptions under Standard Static Assumptions
Pratish Datta, Ratna Dutta, Sourav Mukhopadhyay
2016/903
From Indifferentiability to Constructive Cryptography (and Back)
Ueli Maurer, Renato Renner
2016/902
Universally Composable Cryptographic Role-Based Access Control
Bin Liu, Bogdan Warinschi
2016/901
Distance Bounding based on PUF
Mathilde Igier, Serge Vaudenay
2016/900
Quantifying Web Adblocker Privacy
Arthur Gervais, Alexandros Filios, Vincent Lenders, Srdjan Capkun
2016/899
Parallelized Side-Channel Attack Resisted Scalar Multiplication Using q-Based Addition-Subtraction k-chains
Kittiphop Phalakarn, Kittiphon Phalakarn, Vorapong Suppakitpaisarn
2016/898
Physical Unclonable Functions based on Temperature Compensated Ring Oscillators
Sha Tao, Elena Dubrova
2016/897
An efficient somewhat homomorphic encryption scheme based on factorization
Gérald Gavin
2016/896
Security Analysis of Anti-SAT
Muhammad Yasin, Bodhisatwa Mazumdar, Ozgur Sinanoglu, Jeyavijayan Rajendran
2016/895
Leakage-Abuse Attacks against Order-Revealing Encryption
Paul Grubbs, Kevin Sekniqi, Vincent Bindschaedler, Muhammad Naveed, Thomas Ristenpart
2016/894
Indifferentiability of 3-Round Even-Mansour with Random Oracle Key Derivation
Chun Guo, Dongdai Lin
2016/893
Building web applications on top of encrypted data using Mylar
Raluca Ada Popa, Emily Stark, Jonas Helfer, Steven Valdez, Nickolai Zeldovich, M. Frans Kaashoek, Hari Balakrishnan
2016/892
Privacy-Preserving Distributed Linear Regression on High-Dimensional Data
Adrià Gascón, Phillipp Schoppmann, Borja Balle, Mariana Raykova, Jack Doerner, Samee Zahur, David Evans
2016/891
Tightly Secure IBE under Constant-size Master Public Key
Jie Chen, Junqing Gong, Jian Weng
2016/890
A Parallel Variant of LDSieve for the SVP on Lattices
Artur Mariano, Thijs Laarhoven, Christian Bischof
2016/889
Ouroboros: A Provably Secure Proof-of-Stake Blockchain Protocol
Aggelos Kiayias, Alexander Russell, Bernardo David, Roman Oliynykov
2016/888
Finding closest lattice vectors using approximate Voronoi cells
Emmanouil Doulgerakis, Thijs Laarhoven, Benne de Weger
2016/887
A generalisation of Dillon's APN permutation with the best known differential and nonlinear properties for all fields of size $2^{4k+2}$
Anne Canteaut, Sébastien Duval, Léo Perrin
2016/886
A Robust and Sponge-Like PRNG with Improved Efficiency
Daniel Hutchinson
2016/885
Short Stickelberger Class Relations and application to Ideal-SVP
Ronald Cramer, Léo Ducas, Benjamin Wesolowski
2016/884
Robust, low-cost, auditable random number generation for embedded system security
Ben Lampert, Riad S. Wahby, Shane Leonard, Philip Levis
2016/883
DEMO: Integrating MPC in Big Data Workflows
Nikolaj Volgushev, Malte Schwarzkopf, Andrei Lapets, Mayank Varia, Azer Bestavros
2016/882
MSKT-ORAM: A Constant Bandwidth ORAM without Homomorphic Encryption
Jinsheng Zhang, Qiumao Ma, Wensheng Zhang, Daji Qiao
2016/881
Near Collisions in the RC4 Stream Cipher
Anindya Shankar Bhandari
2016/880
Naor-Yung Paradigm with Shared Randomness and Applications
Silvio Biagioni, Daniel Masny, Daniele Venturi
2016/879
Zero-Knowledge Arguments for Matrix-Vector Relations and Lattice-Based Group Encryption
Benoît Libert, San Ling, Fabrice Mouhartem, Khoa Nguyen, Huaxiong Wang
2016/878
Linear Structures: Applications to Cryptanalysis of Round-Reduced Keccak
Jian Guo, Meicheng Liu, Ling Song
2016/877
How to Obtain Fully Structure-Preserving (Automorphic) Signatures from Structure-Preserving Ones
Yuyu Wang, Zongyang Zhang, Takahiro Matsuda, Goichiro Hanaoka, Keisuke Tanaka
2016/876
How to Build Fully Secure Tweakable Blockciphers from Classical Blockciphers
Lei Wang, Jian Guo, Guoyan Zhang, Jingyuan Zhao, Dawu Gu
2016/875
Depth-Robust Graphs and Their Cumulative Memory Complexity
Joël Alwen, Jeremiah Blocki, Krzysztof Pietrzak
2016/873
Cryptographic Reverse Firewall via Malleable Smooth Projective Hash Functions
Rongmao Chen, Yi Mu, Guomin Yang, Willy Susilo, Fuchun Guo, Mingwu Zhang
2016/872
Iterated Random Oracle: A Universal Approach for Finding Loss in Security Reduction
Fuchun Guo, Willy Susilo, Yi Mu, Rongmao Chen, Jianchang Lai, Guomin Yang
2016/871
Blockchain-Free Cryptocurrencies: A Framework for Truly Decentralised Fast Transactions
Xavier Boyen, Christopher Carr, Thomas Haines
2016/870
Faster Fully Homomorphic Encryption: Bootstrapping in less than 0.1 Seconds
Ilaria Chillotti, Nicolas Gama, Mariya Georgieva, Malika Izabachène
2016/869
Cryptographic applications of capacity theory: On the optimality of Coppersmith's method for univariate polynomials
Ted Chinburg, Brett Hemenway, Nadia Heninger, Zachary Scherr
2016/868
Selective-Opening Security in the Presence of Randomness Failures
Viet Tung Hoang, Jonathan Katz, Adam O’Neill, Mohammad Zaheri
2016/867
A survey on physiological-signal-based security for medical devices
Eduard Marin, Enrique Argones Rúa, Dave Singelée, Bart Preneel
2016/866
A Shuffle Argument Secure in the Generic Model
Prastudy Fauzi, Helger Lipmaa, Michał Zając
2016/865
Reverse Cycle Walking and Its Applications
Sarah Miracle, Scott Yilek
2016/864
Salvaging Weak Security Bounds for Blockcipher-Based Constructions
Thomas Shrimpton, R. Seth Terashima
2016/863
More Powerful and Reliable Second-level Statistical Randomness Tests for NIST SP 800-22
Shuangyi Zhu, Yuan Ma, Jingqiang Lin, Jia Zhuang, Jiwu Jing
2016/862
Flaw in the Security Analysis of Leakage-resilient Authenticated Key Exchange Protocol from CT-RSA 2016 and Restoring the Security Proof
Suvradip Chakraborty, Goutam Paul, C. Pandu Rangan
2016/861
Secure Stable Matching at Scale
Jack Doerner, David Evans, abhi shelat
2016/860
Efficient IBE with Tight Reduction to Standard Assumption in the Multi-challenge Setting
Junqing Gong, Xiaolei Dong, Jie Chen, Zhenfu Cao
2016/859
On the Security of Supersingular Isogeny Cryptosystems
Steven D. Galbraith, Christophe Petit, Barak Shani, Yan Bo Ti
2016/858
A Key Recovery Attack on MDPC with CCA Security Using Decoding Errors
Qian Guo, Thomas Johansson, Paul Stankovski
2016/857
Applying MILP Method to Searching Integral Distinguishers Based on Division Property for 6 Lightweight Block Ciphers
Zejun Xiang, Wentao Zhang, Zhenzhen Bao, Dongdai Lin
2016/856
Spritz---a spongy RC4-like stream cipher and hash function.
Ronald L. Rivest, Jacob C. N. Schuldt
2016/855
Combinatorial Repairability for Threshold Schemes
Douglas R. Stinson, Ruizhong Wei
2016/854
Algebraic Security Analysis of Key Generation with Physical Unclonable Functions
Matthias Hiller, Michael Pehl, Gerhard Kramer, Georg Sigl
2016/853
Stronger Security Variants of GCM-SIV
Tetsu Iwata, Kazuhiko Minematsu
2016/852
Faster LLL-type Reduction of Lattice Bases
Arnold Neumaier, Damien Stehle
2016/851
A New Algorithm for the Unbalanced Meet-in-the-Middle Problem
Ivica Nikolic, Yu Sasaki
2016/850
Lightweight Fault Attack Resistance in Software Using Intra-Instruction Redundancy
Conor Patrick, Bilgiday Yuce, Nahid Farhady Ghalaty, Patrick Schaumont
2016/849
Asymptotically Tight Bounds for Composing ORAM with PIR
Ittai Abraham, Christopher W. Fletcher, Kartik Nayak, Benny Pinkas, Ling Ren
2016/848
From Weakly Selective to Selective Security in Compact Functional Encryption, Revisited
Linfeng Zhou
2016/847
On the smallest ratio problem of lattice bases
Jianwei Li
2016/846
Survey of Approaches and Techniques for Security Verification of Computer Systems
Ferhat Erata, Shuwen Deng, Faisal Zaghloul, Wenjie Xiong, Onur Demir, Jakub Szefer
2016/845
Selective Opening Security from Simulatable Data Encapsulation
Felix Heuer, Bertram Poettering
2016/844
Secure and Efficient Construction of Broadcast Encryption with Dealership
Kamalesh Acharya, Ratna Dutta
2016/843
Partitioning via Non-Linear Polynomial Functions: More Compact IBEs from Ideal Lattices and Bilinear Maps
Shuichi Katsumata, Shota Yamada
2016/842
Improved, Black-Box, Non-Malleable Encryption from Semantic Security
Seung Geol Choi, Dana Dachman-Soled, Tal Malkin, Hoeteck Wee
2016/841
A Methodology for the Characterisation of Leakages in Combinatorial Logic
Guido Bertoni, Marco Martinoli
2016/840
Deja Q All Over Again: Tighter and Broader Reductions of q-Type Assumptions
Melissa Chase, Mary Maller, Sarah Meiklejohn
2016/839
On the Division Property of SIMON48 and SIMON64
Zejun Xiang, Wentao Zhang, Dongdai Lin
2016/838
Passive Secret Disclosure Attack on an Ultralightweight Authentication Protocol for Internet of Things
Masoumeh Safkhani, Nasour Bagheri
2016/837
Fully Homomorphic Encryption over the Integers Revisited
Jung Hee Cheon, Damien Stehle
2016/836
The Discrete Logarithm Problem over Prime Fields can be transformed to a Linear Multivariable Chinese Remainder Theorem
H. Gopalakrishna Gadiyar, R. Padma
2016/835
Lightweight Diffusion Layer: Importance of Toeplitz Matrices
Sumanta Sarkar, Habeeb Syed
2016/834
Multi-Key Homomorphic Signatures Unforgeable under Insider Corruption
Russell W. F. Lai, Raymond K. H. Tai, Harry W. H. Wong, Sherman S. M. Chow
2016/833
Multi-Cast Key Distribution: Scalable, Dynamic and Provably Secure Construction
Kazuki Yoneyama, Reo Yoshida, Yuto Kawahara, Tetsutaro Kobayashi, Hitoshi Fuji, Tomohide Yamamoto
2016/832
Is AEZ v4.1 Sufficiently Resilient Against Key-Recovery Attacks?
Colin Chaigneau, Henri Gilbert
2016/831
Reducing the Number of Non-linear Multiplications in Masking Schemes
Jürgen Pulkus, Srinivas Vivek
2016/830
IO-DSSE: Scaling Dynamic Searchable Encryption to Millions of Indexes By Improving Locality
Ian Miers, Payman Mohassel
2016/829
Efficient KDM-CCA Secure Public-Key Encryption for Polynomial Functions
Shuai Han, Shengli Liu, Lin Lyu
2016/828
Faster Key Recovery Attack on Round-Reduced PRINCE
Shahram Rasoolzadeh, Håvard Raddum
2016/827
Security Analysis of BLAKE2's Modes of Operation
Atul Luykx, Bart Mennink, Samuel Neves
2016/826
Rotational Cryptanalysis in the Presence of Constants
Tomer Ashur, Yunwen Liu
2016/825
Revisiting Cascade Ciphers in Indifferentiability Setting
Chun Guo, Dongdai Lin, Meicheng Liu
2016/824
P2P Mixing and Unlinkable Bitcoin Transactions
Tim Ruffing, Pedro Moreno-Sanchez, Aniket Kate
2016/823
Post-Quantum Attribute-Based Signatures from Lattice Assumptions
Rachid El Bansarkhani, Ali El Kaafarani
2016/822
A Secure and Efficient Authentication Technique for Vehicular Ad-Hoc Networks
Maryam Rajabzadeh Asaar, Mahmoud Salmasizadeh, Willy Susilo, Akbar Majidi
2016/821
Multivariate Cryptography with Mappings of Discrete Logarithms and Polynomials
Duggirala Meher Krishna, Duggirala Ravi
2016/820
Separating Computational and Statistical Differential Privacy in the Client-Server Model
Mark Bun, Yi-Hsiu Chen, Salil Vadhan
2016/819
Virtual Grey-Boxes Beyond Obfuscation: A Statistical Security Notion for Cryptographic Agents
Shashank Agrawal, Manoj Prabhakaran, Ching-Hua Yu
2016/818
Composable Adaptive Secure Protocols without Setup under Polytime Assumptions
Carmit Hazay, Muthuramakrishnan Venkitasubramaniam
2016/817
Secure Obfuscation in a Weak Multilinear Map Model
Sanjam Garg, Eric Miles, Pratyay Mukherjee, Amit Sahai, Akshayaram Srinivasan, Mark Zhandry
2016/816
Concentrated Differential Privacy: Simplifications, Extensions, and Lower Bounds
Mark Bun, Thomas Steinke
2016/815
Secure Multiparty RAM Computation in Constant Rounds
Sanjam Garg, Divya Gupta, Peihan Miao, Omkant Pandey
2016/814
Adaptive Security of Yao's Garbled Circuits
Zahra Jafargholi, Daniel Wichs
2016/813
Fast Pseudorandom Functions Based on Expander Graphs
Benny Applebaum, Pavel Raykov
2016/812
Towards Non-Black-Box Separations of Public Key Encryption and One Way Function
Dana Dachman-Soled
2016/811
MILP-Aided Bit-Based Division Property for Primitives with Non-Bit-Permutation Linear Layers
Ling Sun, Wei Wang, Meiqin Wang
2016/810
Fault Injection using Crowbars on Embedded Systems
Colin O'Flynn
2016/809
Binary AMD Circuits from Secure Multiparty Computation
Daniel Genkin, Yuval Ishai, Mor Weiss
2016/808
Simulating Auxiliary Inputs, Revisited
Maciej Skorski
2016/807
Multilateral White-Box Cryptanalysis: Case study on WB-AES of CHES Challenge 2016
Hyunjin Ahn, Dong-Guk Han
2016/806
Healing the Hill Cipher, Improved Approach to Secure Modified Hill against Zero-plaintext Attack
Mohammad Hadi Valizadeh
2016/805
Constant-Round Maliciously Secure Two-Party Computation in the RAM Model
Carmit Hazay, Avishay Yanai
2016/804
Multi-Key Homomorphic Authenticators
Dario Fiore, Aikaterini Mitrokotsa, Luca Nizzardo, Elena Pagnin
2016/803
Biometric Based Network Security Using MIPS Cryptography Processor
Kirat Pal Singh
2016/802
Proofs of Data Residency: Checking whether Your Cloud Files Have Been Relocated
Hung Dang, Erick Purwanto, Ee-Chien Chang
2016/801
Blind Web Search: How far are we from a privacy preserving search engine?
Gizem S. Çetin, Wei Dai, Yarkın Doröz, William J. Martin, Berk Sunar
2016/800
Almost-Optimally Fair Multiparty Coin-Tossing with Nearly Three-Quarters Malicious
Bar Alon, Eran Omri
2016/799
Efficient Batched Oblivious PRF with Applications to Private Set Intersection
Vladimir Kolesnikov, Ranjit Kumaresan, Mike Rosulek, Ni Trieu
2016/798
On the Practical (In-)Security of 64-bit Block Ciphers: Collision Attacks on HTTP over TLS and OpenVPN
Karthikeyan Bhargavan, Gaëtan Leurent
2016/797
An MPC-based Privacy-Preserving Protocol for a Local Electricity Trading Market
Aysajan Abidin, Abdelrahaman Aly, Sara Cleemput, Mustafa A. Mustafa
2016/796
Digital Signatures Based on the Hardness of Ideal Lattice Problems in all Rings
Vadim Lyubashevsky
2016/795
Indistinguishability Obfuscation from DDH-like Assumptions on Constant-Degree Graded Encodings
Huijia Lin, Vinod Vaikuntanathan
2016/794
Message-recovery attacks on Feistel-based Format Preserving Encryption
Mihir Bellare, Viet Tung Hoang, Stefano Tessaro
2016/793
Side-Channel Analysis of Keymill
Christoph Dobraunig, Maria Eichlseder, Thomas Korak, Florian Mendel
2016/792
Key-Homomorphic Signatures: Definitions and Applications to Multiparty Signatures and Non-Interactive Zero-Knowledge
David Derler, Daniel Slamanig
2016/791
Leakage Resilient One-Way Functions: The Auxiliary-Input Setting
Ilan Komargodski
2016/790
Conditional Cube Attack on Reduced-Round Keccak Sponge Function
Senyang Huang, Xiaoyun Wang, Guangwu Xu, Meiqin Wang, Jingyuan Zhao
2016/789
An Efficient Hardware design and Implementation of Advanced Encryption Standard (AES) Algorithm
Kirat Pal Singh, Shiwani Dod
2016/788
On the security of Cubic UOV and its variants
Yasufumi Hashimoto
2016/787
On the security of new vinegar-like variant of multivariate signature scheme
Yasufumi Hashimoto
2016/786
What Else is Revealed by Order-Revealing Encryption?
F. Betül Durak, Thomas M. DuBuisson, David Cash
2016/785
Optimization of Bootstrapping in Circuits
Fabrice Benhamouda, Tancrède Lepoint, Claire Mathieu, Hang Zhou
2016/784
Verifiable and Delegatable Constrained Pseudorandom Functions for Unconstrained Inputs
Pratish Datta, Ratna Dutta, Sourav Mukhopadhyay
2016/783
On the Memory-Hardness of Data-Independent Password-Hashing Functions
Joël Alwen, Peter Gaži, Chethan Kamath, Karen Klein, Georg Osang, Krzysztof Pietrzak, Leonid Reyzin, Michal Rolínek, Michal Rybár
2016/782
Challenges for Ring-LWE
Eric Crockett, Chris Peikert
2016/781
Privately Matching $k$-mers
Justin Bed{ő}, Thomas Conway, Kim Ramchen, Vanessa Teague
2016/780
Efficient and Provable Secure Anonymous Hierarchical Identity-based Broadcast Encryption (HIBBE) Scheme without Random Oracle
Mohammmad Hassan Ameri, Javad Mohajeri, Mahmoud Salmasizadeh
2016/779
Code-based Strong Designated Verifier Signatures: Security Analysis and a New Construction
Maryam Rajabzadeh Asaar
2016/778
Algorithmic Mechanism Construction bridging Secure Multiparty Computation and Intelligent Reasoning
Sumit Chakraborty
2016/777
Fast, uniform scalar multiplication for genus 2 Jacobians with fast Kummers
Ping Ngai Chung, Craig Costello, Benjamin Smith
2016/776
Homomorphic Tallying for the Estonian Internet Voting System
Arnis Parsovs
2016/775
Cryptanalysis of a Homomorphic Encryption Scheme
Sonia Bogos, John Gaspoz, Serge Vaudenay
2016/774
TV-PUF : A Fast Lightweight Aging-Resistant Threshold Voltage PUF
Tanujay Saha, Vikash Sehwag
2016/773
Alternative Implementations of Secure Real Numbers
Vassil Dimitrov, Liisi Kerik, Toomas Krips, Jaak Randmets, Jan Willemson
2016/772
Time-Frequency Analysis for Second-Order Attacks
Pierre BELGARRIC, Shivam BHASIN, Nicolas BRUNEAU, Jean-Luc DANGER, Nicolas DEBANDE, Sylvain GUILLEY, Annelie HEUSER, Zakaria NAJM, Olivier RIOUL
2016/771
How not to Prove Yourself: Pitfalls of the Fiat-Shamir Heuristic and Applications to Helios
David Bernhard, Olivier Pereira, Bogdan Warinschi
2016/770
KangarooTwelve: fast hashing based on Keccak-p
Guido Bertoni, Joan Daemen, Michaël Peeters, Gilles Van Assche, Ronny Van Keer, Benoît Viguier
2016/769
Low-temperature data remanence attacks against intrinsic SRAM PUFs
Nikolaos Athanasios Anagnostopoulos, Stefan Katzenbeisser, Markus Rosenstihl, André Schaller, Sebastian Gabmeyer, Tolga Arul
2016/768
High-Throughput Semi-Honest Secure Three-Party Computation with an Honest Majority
Toshinori Araki, Jun Furukawa, Yehuda Lindell, Ariel Nof, Kazuma Ohara
2016/767
A conjecture about Gauss sums and bentness of binomial Boolean functions
Jean-Pierre Flori
2016/766
Functional Commitment Schemes: From Polynomial Commitments to Pairing-Based Accumulators from Simple Assumptions
Benoît Libert, Somindu C. Ramanna, and Moti Yung
2016/765
Cryptographic Voting — A Gentle Introduction
David Bernhard, Bogdan Warinschi
2016/764
ANOTEL: Cellular Networks with Location Privacy (Extended Version)
Tim Dittler, Florian Tschorsch, Stefan Dietzel, Björn Scheuermann
2016/763
Human Public-Key Encryption
Houda Ferradi, Rémi Géraud, David Naccache
2016/762
Faster Secure Two-Party Computation in the Single-Execution Setting
Xiao Wang, Alex J. Malozemoff, Jonathan Katz
2016/761
Two-party authenticated key exchange protocol using lattice-based cryptography
Xiaopeng Yang, Wenping Ma
2016/760
Simultaneous Secrecy and Reliability Amplification for a General Channel Model
Russell Impagliazzo, Ragesh Jaiswal, Valentine Kabanets, Bruce M. Kapron, Valerie King, Stefano Tessaro
2016/759
Towards Practical Attacks on Argon2i and Balloon Hashing
Joël Alwen, Jeremiah Blocki
2016/758
NewHope on ARM Cortex-M
Erdem Alkim, Philipp Jakubeit, Peter Schwabe
2016/757
Redactable Blockchain -- or -- Rewriting History in Bitcoin and Friends
Giuseppe Ateniese, Bernardo Magri, Daniele Venturi, Ewerton Andrade
2016/756
Adapting Helios for provable ballot privacy
David Bernhard, Véronique Cortier, Olivier Pereira, Ben Smyth, Bogdan Warinschi
2016/755
Auditable Data Structures
Michael T. Goodrich, Evgenios M. Kornaropoulos, Michael Mitzenmacher, Roberto Tamassia
2016/754
Practical Key Recovery Attack on MANTIS-5
Christoph Dobraunig, Maria Eichlseder, Daniel Kales, and Florian Mendel
2016/753
Improved Reduction from the Bounded Distance Decoding Problem to the Unique Shortest Vector Problem in Lattices
Shi Bai, Damien Stehle, Weiqiang Wen
2016/752
ELiF : An Extremely Lightweight & Flexible Block Cipher Family and Its Experimental Security
Adnan Baysal, Ünal Kocabaş
2016/751
Feistel Like Construction of Involutory Binary Matrices With High Branch Number
Adnan Baysal, Mustafa Çoban, Mehmet Özen
2016/750
Public-Key Based Lightweight Swarm Authentication
Simon Cogliani, Bao Feng, Houda Ferradi, Rémi Géraud, Diana Maimut, David Naccache, Rodrigo Portella do Canto, Guilin Wang
2016/749
Revocable Hierarchical Identity-Based Encryption with Adaptive Security
Kwangsu Lee
2016/748
A Generic Dynamic Provable Data Possession Framework
Mohammad Etemad, Alptekin Küpçü
2016/747
Beyond Bitcoin -- Part II: Blockchain-based systems without mining
Pasquale Forte, Diego Romano, Giovanni Schmid
2016/746
Improved Private Set Intersection against Malicious Adversaries
Peter Rindal, Mike Rosulek
2016/745
Novel differentially private mechanisms for graphs
Solenn Brunet, Sébastien Canard, Sébastien Gambs, Baptiste Olivier
2016/744
A New Method to Investigate the CCZ-Equivalence between Functions with Low Differential Uniformity
Xi Chen, Longjiang Qu, Chao Li, Jiao Du
2016/743
Investigating Cube Attacks on the Authenticated Encryption Stream Cipher ACORN
Md Iftekhar Salam, Harry Bartlett, Ed Dawson, Josef Pieprzyk, Leonie Simpson, Kenneth Koon-Ho Wong
2016/742
LINCOS - A Storage System Providing Long-Term Integrity, Authenticity, and Confidentiality (Full Paper)
Johannes Braun, Johannes Buchmann, Denise Demirel, Mikio Fujiwara, Matthias Geihs, Shiho Moriai, Masahide Sasaki, Atsushi Waseda
2016/741
MARKOV MODELING OF MOVING TARGET DEFENSE GAMES
Hoda Maleki, Saeed Valizadeh, William Koch, Azer Bestavros, Marten van Dijk
2016/740
Software Benchmarking of the 2$^{\text{nd}}$ round CAESAR Candidates
Ralph Ankele, Robin Ankele
2016/739
Unconditionally Secure Signatures
Ryan Amiri, Aysajan Abidin, Petros Wallden, Erika Andersson
2016/738
FHPKE with Zero Norm Noises based on DLA&CDH
Masahiro Yagisawa
2016/737
Zero Knowledge Authentication Protocols With Algebraic Geometry Techniques
Edgar González, Guillermo Morales-Luna, Feliú D. Sagols
2016/736
Efficient and Private Scoring of Decision Trees, Support Vector Machines and Logistic Regression Models based on Pre-Computation
Martine De Cock, Rafael Dowsley, Caleb Horst, Raj Katti, Anderson C. A. Nascimento, Stacey C. Newman, Wing-Sea Poon
2016/735
Efficient Robust Secret Sharing from Expander Graphs
Brett Hemenway, Rafail Ostrovsky
2016/734
Efficient Oblivious Transfer Protocols based on White-Box Cryptography
Aram Jivanyan, Gurgen Khachatryan, Andriy Oliynyk, Mykola Raievskyi
2016/733
Revisiting the Hybrid Attack: Improved Analysis and Refined Security Estimates
Thomas Wunderer
2016/732
Nonlinear Invariant Attack --Practical Attack on Full SCREAM, iSCREAM, and Midori64
Yosuke Todo, Gregor Leander, Yu Sasaki
2016/731
SRMAP and ISLAP Authentication Protocols: Attacks and Improvements
Mohammad Mardani Shahrbabak, Shahab Abdolmaleky
2016/730
Leakage-Resilient Public-Key Encryption from Obfuscation
Dana Dachman-Soled, S. Dov Gordon, Feng-Hao Liu, Adam O’Neill, Hong-Sheng Zhou
2016/729
Attacks on cMix - Some Small Overlooked Details
Herman Galteland, Stig F. Mjølsnes, Ruxandra F. Olimid
2016/728
Sophos - Forward Secure Searchable Encryption
Raphael Bost
2016/727
Improvements on the Individual Logarithm Step in Extended Tower Number Field Sieve
Yuqing Zhu, Jincheng Zhuang, Chang Lv, Dongdai Lin
2016/726
Local Bounds for the Optimal Information Ratio of Secret Sharing Schemes
Oriol Farràs, Jordi Ribes-González, Sara Ricci
2016/725
Tile-Based Modular Architecture for Accelerating Homomorphic Function Evaluation on FPGA
Mustafa Khairallah, Maged Ghoneima
2016/724
SPORT: Sharing Proofs of Retrievability across Tenants
Frederik Armknecht, Jens-Matthias Bohli, David Froelicher, Ghassan O. Karame
2016/723
Robust Multi-Property Combiners for Hash Functions
Marc Fischlin, Anja Lehmann, Krzysztof Pietrzak
2016/722
Improved Meet-in-the-Middle Attacks on Reduced-Round Kalyna-128/256 and Kalyna-256/512
Li Lin, Wenling Wu
2016/721
Strong Hardness of Privacy from Weak Traitor Tracing
Lucas Kowalczyk, Tal Malkin, Jonathan Ullman, Mark Zhandry
2016/720
A Black-Box Construction of Non-Malleable Encryption from Semantically Secure Encryption
Seung Geol Choi, Dana Dachman-Soled, Tal Malkin, Hoeteck Wee
2016/719
Bridging the Gap: Advanced Tools for Side-Channel Leakage Estimation beyond Gaussian Templates and Histograms
Tobias Schneider, Amir Moradi, François-Xavier Standaert, Tim Güneysu
2016/718
Leakage-Abuse Attacks Against Searchable Encryption
David Cash, Paul Grubbs, Jason Perry, Thomas Ristenpart
2016/717
Comparison between Subfield and Straightforward Attacks on NTRU
Paul Kirchner, Pierre-Alain Fouque
2016/716
2-hop Blockchain: Combining Proof-of-Work and Proof-of-Stake Securely
Tuyet Duong, Lei Fan, Hong-Sheng Zhou
2016/715
Uniform First-Order Threshold Implementations
Tim Beyne, Begül Bilgin
2016/714
All the AES You Need on Cortex-M3 and M4
Peter Schwabe, Ko Stoffelen
2016/713
Tuple lattice sieving
Shi Bai, Thijs Laarhoven, Damien Stehle
2016/712
A Survey of Hardware Implementations of Elliptic Curve Cryptographic Systems
Basel Halak, Said Subhan Waizi, Asad Islam
2016/711
A Unilateral-to-Mutual Authentication Compiler for Key Exchange (with Applications to Client Authentication in TLS 1.3)
Hugo Krawczyk
2016/710
Keymill: Side-Channel Resilient Key Generator
Mostafa Taha, Arash Reyhani-Masoleh, Patrick Schaumont
2016/709
Differential Fault Analysis of SHA3-224 and SHA3-256
Pei Luo, Yunsi Fei, Liwei Zhang, A. Adam Ding
2016/708
From 5-pass MQ-based identification to MQ-based signatures
Ming-Shing Chen, Andreas Hülsing, Joost Rijneveld, Simona Samardjiska, Peter Schwabe
2016/707
Towards a Characterization of the Related-Key Attack Security of the Iterated Even-Mansour Cipher
Dana Dachman-Soled, Angela Park, Ben San Nicolas
2016/706
Memory Erasability Amplification
Jan Camenisch, Robert R. Enderlein, Ueli Maurer
2016/705
New construction of single cycle T-function families
Shiyi ZHANG, Yongjuan WANG, Guangpu GAO
2016/704
High Saturation Complete Graph Approach for EC Point Decomposition and ECDL Problem
Nicolas T. Courtois
2016/703
(In-)Secure messaging with the Silent Circle instant messaging protocol
Sebastian R. Verschoor, Tanja Lange
2016/702
Mirror Theory and Cryptography
Jacques Patarin
2016/701
Bolt: Anonymous Payment Channels for Decentralized Currencies
Matthew Green, Ian Miers
2016/700
Side-Channel Protections for Cryptographic Instruction Set Extensions
Sami Saab, Pankaj Rohatgi, Craig Hampel
2016/699
A Note on One Privacy-Preserving Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data
Zhengjun Cao, Lihua Liu
2016/698
A Note on One Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in the Cloud
Zhengjun Cao, Lihua Liu
2016/697
Ciphertext Forgery on HANUMAN
Damian Vizár
2016/696
Solving the Secure Storage Dilemma: An Efficient Scheme for Secure Deduplication with Privacy-Preserving Public Auditing
Süleyman Kardaş, Mehmet Sabır Kiraz
2016/695
Gate-scrambling Revisited - or: The TinyTable protocol for 2-Party Secure Computation
Ivan Damgård, Jesper Buus Nielsen, Michael Nielsen, Samuel Ranellucci
2016/694
Mastrovito Form of Non-recursive Karatsuba Multiplier for All Trinomials
Yin Li, Xingpo Ma, Yu Zhang, Chuanda Qi
2016/693
Identity-Based Key Aggregate Cryptosystem from Multilinear Maps
Sikhar Patranabis, Debdeep Mukhopadhyay
2016/692
Cryptanalysis and improvement of certificateless aggregate signature with conditional privacy-preserving for vehicular sensor networks
Jiguo Li, Hong Yuan, Yichen Zhang
2016/691
Targeted Homomorphic Attribute Based Encryption
Zvika Brakerski, David Cash, Rotem Tsabary, Hoeteck Wee
2016/690
When Are Three Voters Enough for Privacy Properties?
Myrto Arapinis, Véronique Cortier, Steve Kremer
2016/689
New Automatic Search Tool for Impossible Differentials and Zero-Correlation Linear Approximations
Tingting Cui, Shiyao Chen, Keting Jia, Kai Fu, Meiqin Wang
2016/688
Bounded KDM Security from iO and OWF
Antonio Marcedone, Rafael Pass, abhi shelat
2016/687
Ciphers for MPC and FHE
Martin Albrecht, Christian Rechberger, Thomas Schneider, Tyge Tiessen, Michael Zohner
2016/686
The Lightest 4x4 MDS Matrices over $GL(4,\mathbb{F}_2)$
Jian Bai, Ting Li, Yao Sun, Dingkang Wang, Dongdai Lin
2016/685
Overlaying Circuit Clauses for Secure Computation
W. Sean Kennedy, Vladimir Kolesnikov, Gordon Wilfong
2016/684
Faster individual discrete logarithms in finite fields of composite extension degree
Aurore Guillevic
2016/683
Efficient Sparse Merkle Trees: Caching Strategies and Secure (Non-)Membership Proofs
Rasmus Dahlberg, Tobias Pulls, Roel Peeters
2016/682
Finding Significant Fourier Coefficients: Clarifications, Simplifications, Applications and Limitations
Steven D. Galbraith, Joel Laity, Barak Shani
2016/681
Amortized Complexity of Zero-Knowledge Proofs Revisited: Achieving Linear Soundness Slack
Ronald Cramer, Ivan Damgard, Chaoping Xing, Chen Yuan
2016/680
Fair Client Puzzles from the Bitcoin Blockchain
Colin Boyd, Christopher Carr
2016/679
Hybrid WBC: Secure and Efficient White-Box Encryption Schemes
Jihoon Cho, Kyu Young Choi, Orr Dunkelman, Nathan Keller, Dukjae Moon, Aviya Vaidberg
2016/678
Anonymous RAM
Michael Backes, Amir Herzberg, Aniket Kate, Ivan Pryvalov
2016/677
Breaking Into the KeyStore: A Practical Forgery Attack Against Android KeyStore
Mohamed Sabt, Jacques Traoré
2016/676
Cryptanalysis of Reduced-Round Midori64 Block Cipher
Xiaoyang Dong, Yanzhao Shen
2016/675
Accelerating Homomorphic Computations on Rational Numbers
Angela Jäschke, Frederik Armknecht
2016/674
A PUF-based Secure Communication Protocol for IoT
URBI CHATTERJEE, RAJAT SUBHRA CHAKRABORTY, DEBDEEP MUKHOPADHYAY
2016/673
Dirichlet Product for Boolean Functions
Abderrahmane Nitaj, Willy Susilo, Joseph Tonien
2016/672
Post-Quantum Cryptography on FPGA Based on Isogenies on Elliptic Curves
Brian Koziel, Reza Azarderakhsh, Mehran Mozaffari Kermani, David Jao
2016/671
Efficient probabilistic algorithm for estimating the algebraic properties of Boolean functions for large $n$
Yongzhuang Wei, Enes Pasalic, Fengrong Zhang, Samir Hod\v zić
2016/670
DRE-ip: A Verifiable E-Voting Scheme without Tallying Authorities
Siamak F. Shahandashti, Feng Hao
2016/669
NEON-SIDH: Efficient Implementation of Supersingular Isogeny Diffie-Hellman Key-Exchange Protocol on ARM
Brian Koziel, Amir Jalali, Reza Azarderakhsh, Mehran Mozaffari Kermani, David Jao
2016/668
Analysis of a Secure and Verifiable Policy Update Outsourcing Scheme for Big Data Access Control in the Cloud
Wei Yuan
2016/667
Multivariate Profiling of Hulls for Linear Cryptanalysis
Andrey Bogdanov, Elmar Tischhauser, Philip S. Vejre
2016/666
Construction of resilient S-boxes with higher-dimensional vectorial outputs and strictly almost optimal nonlinearity
WeiGuo Zhang, LuYang Li, Enes Pasalic
2016/665
Breaking and Fixing Private Set Intersection Protocols
Mikkel Lambæk
2016/664
Efficient Conversion Method from Arithmetic to Boolean Masking in Constrained Devices
Yoo-Seung Won, Dong-Guk Han
2016/663
Anonymous Attestation Using the Strong Diffie Hellman Assumption Revisited
Jan Camenisch, Manu Drijvers, Anja Lehmann
2016/662
Practical Round-Optimal Blind Signatures in the Standard Model from Weaker Assumptions
Georg Fuchsbauer, Christian Hanser, Chethan Kamath, Daniel Slamanig
2016/661
Reducing the Leakage in Practical Order-Revealing Encryption
David Cash, Feng-Hao Liu, Adam O'Neill, Cong Zhang
2016/660
The SKINNY Family of Block Ciphers and its Low-Latency Variant MANTIS
Christof Beierle, Jérémy Jean, Stefan Kölbl, Gregor Leander, Amir Moradi, Thomas Peyrin, Yu Sasaki, Pascal Sasdrich, Siang Meng Sim
2016/659
Frodo: Take off the ring! Practical, Quantum-Secure Key Exchange from LWE
Joppe Bos, Craig Costello, Léo Ducas, Ilya Mironov, Michael Naehrig, Valeria Nikolaenko, Ananth Raghunathan, Douglas Stebila
2016/658
Asymptotic Analysis of Plausible Tree Hash Modes for SHA-3
Kevin Atighehchi, Alexis Bonnecaze
2016/657
Bounded Size-Hiding Private Set Intersection
Tatiana Bradley, Sky Faber, Gene Tsudik
2016/656
Improving Practical UC-Secure Commitments based on the DDH Assumption
Eiichiro Fujisaki
2016/655
A Tag Based Encoding: An Efficient Encoding for Predicate Encryption in Prime Order Groups
Jongkil Kim, Willy Susilo, Fuchun Guo, Man Ho Au
2016/654
Stronger Security for Reusable Garbled Circuits, General Definitions and Attacks
Shweta Agrawal
2016/653
Fully Homomorphic Encryption with Zero Norm Cipher Text
Masahiro Yagisawa
2016/652
Automatic Search for a Maximum Probability Differential Characteristic in a Substitution-Permutation Network
Arnaud BANNIER, Nicolas BODIN, Eric FILIOL
2016/651
Pen and Paper Arguments for SIMON and SIMON-like Designs
Christof Beierle
2016/650
Securing Multiparty Protocols against the Exposure of Data to Honest Parties
Peeter Laud, Alisa Pankova
2016/649
Game-Based Privacy Analysis of RFID Security Schemes for Confident Authentication in IoT
Behzad Abdolmaleki, Karim Baghery, Shahram Khazaei, Mohammad Reza Aref
2016/648
ParTI -- Towards Combined Hardware Countermeasures against Side-Channel and Fault-Injection Attacks
Tobias Schneider, Amir Moradi, Tim Güneysu
2016/647
Strong 8-bit Sboxes with Efficient Masking in Hardware
Erik Boss, Vincent Grosso, Tim Güneysu, Gregor Leander, Amir Moradi, Tobias Schneider
2016/646
Computational integrity with a public random string from quasi-linear PCPs
Eli Ben-Sasson, Iddo Ben-Tov, Alessandro Chiesa, Ariel Gabizon, Daniel Genkin, Matan Hamilis, Evgenya Pergament, Michael Riabzev, Mark Silberstein, Eran Tromer, Madars Virza
2016/645
FourQNEON: Faster Elliptic Curve Scalar Multiplications on ARM Processors
Patrick Longa
2016/644
How to Backdoor Diffie-Hellman
David Wong
2016/643
On the Computational Overhead of MPC with Dishonest Majority
Jesper Buus Nielsen, Samuel Ranellucci
2016/642
Efficient and Provable White-Box Primitives
Pierre-Alain Fouque, Pierre Karpman, Paul Kirchner, Brice Minaud
2016/641
Bitstream Fault Injections (BiFI) – Automated Fault Attacks against SRAM-based FPGAs
Pawel Swierczynski, Georg T. Becker, Amir Moradi, Christof Paar
2016/640
Universal Forgery and Key Recovery Attacks on ELmD Authenticated Encryption Algorithm
Asli Bay, Oguzhan Ersoy, Ferhat Karakoç
2016/639
Game-Theoretic Framework for Integrity Verification in Computation Outsourcing
Qiang Tang, Balazs Pejo
2016/638
A Tweak for a PRF Mode of a Compression Function and Its Applications
Shoichi Hirose, Atsushi Yabumoto
2016/637
On the Security and Key Generation of the ZHFE Encryption Scheme
Wenbin Zhang, Chik How Tan
2016/636
Unconditional UC-Secure Computation with (Stronger-Malicious) PUFs
Saikrishna Badrinarayanan, Dakshita Khurana, Rafail Ostrovsky, Ivan Visconti
2016/635
Sealed-Glass Proofs: Using Transparent Enclaves to Prove and Sell Knowledge
Florian Tramer, Fan Zhang, Huang Lin, Jean-Pierre Hubaux, Ari Juels, Elaine Shi
2016/634
Compact CCA2-secure Hierarchical Identity-Based Broadcast Encryption for Fuzzy-entity Data Sharing
Weiran Liu, Jianwei Liu, Qianhong Wu, Bo Qin, David Naccache, Houda Ferradi
2016/633
Making Smart Contracts Smarter
Loi Luu, Duc-Hiep Chu, Hrishi Olickel, Prateek Saxena, Aquinas Hobor
2016/632
Faster Malicious 2-party Secure Computation with Online/Ofine Dual Execution
Peter Rindal, Mike Rosulek
2016/631
Masking AES with d+1 Shares in Hardware
Thomas De Cnudde, Oscar Reparaz, Begül Bilgin, Svetla Nikova, Ventzislav Nikov, Vincent Rijmen
2016/630
Decomposed S-Boxes and DPA Attacks: A Quantitative Case Study using PRINCE
Ravikumar Selvam, Dillibabu Shanmugam, Suganya Annadurai, Jothi Rangasamy
2016/629
Verifiable Functional Encryption
Saikrishna Badrinarayanan, Vipul Goyal, Aayush Jain, Amit Sahai
2016/628
On the properties of the CTR encryption mode of the Magma and Kuznyechik block ciphers with re-keying method based on CryptoPro Key Meshing
Liliya R. Ahmetzyanova, Evgeny K. Alekseev, Igor B. Oshkin, Stanislav V. Smyshlyaev, Lolita A. Sonina
2016/627
Cyber Passport: Preventing Massive Identity Theft
Gideon Samid
2016/626
CAESAR Hardware API
Ekawat Homsirikamol, William Diehl, Ahmed Ferozpuri, Farnoud Farahmand, Panasayya Yalla, Jens-Peter Kaps, Kris Gaj
2016/625
On the Design Rationale of SIMON Block Cipher: Integral Attacks and Impossible Differential Attacks against SIMON Variants
Kota Kondo, Yu Sasaki, Tetsu Iwata
2016/624
Equational Security Proofs of Oblivious Transfer Protocols
Baiyu Li, Daniele Micciancio
2016/623
EnCounter: On Breaking the Nonce Barrier in Differential Fault Analysis with a Case-Study on PAEQ
Dhiman Saha, Dipanwita Roy Chowdhury
2016/622
Function-Revealing Encryption
Marc Joye, Alain Passelègue
2016/621
4-Round Concurrent Non-Malleable Commitments from One-Way Functions
Michele Ciampi, Rafail Ostrovsky, Luisa Siniscalchi, Ivan Visconti
2016/620
Secure Data Exchange: A Marketplace in the Cloud
Ran Gilad-Bachrach, Kim Laine, Kristin Lauter, Peter Rindal, Mike Rosulek
2016/619
5Gen: A Framework for Prototyping Applications Using Multilinear Maps and Matrix Branching Programs
Kevin Lewi, Alex J. Malozemoff, Daniel Apon, Brent Carmer, Adam Foltzer, Daniel Wagner, David W. Archer, Dan Boneh, Jonathan Katz, Mariana Raykova
2016/618
Curious case of Rowhammer: Flipping Secret Exponent Bits using Timing Analysis
Sarani Bhattacharya, Debdeep Mukhopadhyay
2016/617
On the Impossibility of Merkle Merge Homomorphism
Yuzhe Tang
2016/616
Statistical Fault Attacks on Nonce-Based Authenticated Encryption Schemes
Christoph Dobraunig, Maria Eichlseder, Thomas Korak, Victor Lomné, Florian Mendel
2016/615
Reusing Tamper-Proof Hardware in UC-Secure Protocols
Jeremias Mechler, Jörn Müller-Quade, Tobias Nilges
2016/614
Better Two-Round Adaptive Multi-Party Computation
Ran Canetti, Oxana Poburinnaya, Muthuramakrishnan Venkitasubramaniam
2016/613
A Survey of Microarchitectural Timing Attacks and Countermeasures on Contemporary Hardware
Qian Ge, Yuval Yarom, David Cock, Gernot Heiser
2016/612
Order-Revealing Encryption: New Constructions, Applications, and Lower Bounds
Kevin Lewi, David J. Wu
2016/611
Catching MPC Cheaters: Identification and Openability
Robert Cunningham, Benjamin Fuller, Sophia Yakoubov
2016/610
The GGM Function Family is Weakly One-Way
Aloni Cohen, Saleet Klein
2016/609
How low can you go? Using side-channel data to enhance brute-force key recovery
Jake Longo, Daniel P. Martin, Luke Mather, Elisabeth Oswald, Benjamin Sach, Martijn Stam
2016/608
LightSource: Ultra Lightweight Clone Detection of RFID Tags from Software Unclonable Responses
Hoda Maleki, Reza Rahaeimehr, Marten van Dijk
2016/607
Protocols for Authenticated Oblivious Transfer
Mehrad Jaberi, Hamid Mala
2016/606
Strong Machine Learning Attack against PUFs with No Mathematical Model
Fatemeh Ganji, Shahin Tajik, Fabian Fäßler, Jean-Pierre Seifert
2016/605
Improving NFS for the discrete logarithm problem in non-prime finite fields
Razvan Barbulescu, Pierrick Gaudry, Aurore Guillevic, François Morain
2016/604
FMNV Continuous Non-malleable Encoding Scheme is More Efficient Than Believed
Amir S. Mortazavia, Mahmoud Salmasizadeh, Amir Daneshgar
2016/603
Koblitz curves over quadratic fields
Thomaz Oliveira, Julio López, Daniel Cervantes-Vázquez, Francisco Rodríguez-Henríquez
2016/602
More Efficient Oblivious Transfer Extensions
Gilad Asharov, Yehuda Lindell, Thomas Schneider, Michael Zohner
2016/601
Physical Layer Group Key Agreement for Automotive Controller Area Networks
Shalabh Jain, Jorge Guajardo
2016/600
A Design Methodology for Stealthy Parametric Trojans and Its Application to Bug Attacks
Samaneh Ghandali, Georg T. Becker, Daniel Holcomb, Christof Paar
2016/599
Obfuscation from Low Noise Multilinear Maps
Nico Döttling, Sanjam Garg, Divya Gupta, Peihan Miao, Pratyay Mukherjee
2016/598
Polynomial Batch Codes for Efficient IT-PIR
Ryan Henry
2016/597
Correlated Extra-Reductions Defeat Blinded Regular Exponentiation - Extended Version
Margaux Dugardin, Sylvain Guilley, Jean-Luc Danger, Zakaria Najm, Olivier Rioul
2016/596
Cache Attacks Enable Bulk Key Recovery on the Cloud
Mehmet S. Inci, Berk Gulmezoglu, Gorka Irazoqui, Thomas Eisenbarth, Berk Sunar
2016/595
A High Throughput/Gate AES Hardware Architecture by Compressing Encryption and Decryption Datapaths --- Toward Efficient CBC-Mode Implementation
Rei Ueno, Sumio Morioka, Naofumi Homma, Takafumi Aoki
2016/594
"Make Sure DSA Signing Exponentiations Really are Constant-Time''
Cesar Pereida García, Billy Bob Brumley, Yuval Yarom
2016/593
No Place to Hide: Contactless Probing of Secret Data on FPGAs
Heiko Lohrke, Shahin Tajik, Christian Boit, Jean-Pierre Seifert
2016/592
Subspace Trail Cryptanalysis and its Applications to AES
Lorenzo Grassi, Christian Rechberger, Sondre Rønjom
2016/591
Arx: An Encrypted Database using Semantically Secure Encryption
Rishabh Poddar, Tobias Boelter, Raluca Ada Popa
2016/590
Mitigating SAT Attack on Logic Locking
Yang Xie, Ankur Srivastava
2016/589
Dimension-Preserving Reductions from LWE to LWR
Jacob Alperin-Sheriff, Daniel Apon
2016/588
Secure obfuscation in a weak multilinear map model: A simple construction secure against all known attacks
Eric Miles, Amit Sahai, Mark Zhandry
2016/587
Bash-f: another LRX sponge function
Sergey Agievich, Vadim Marchuk, Alexander Maslau, Vlad Semenov
2016/586
A Modular Treatment of Cryptographic APIs: The Symmetric-Key Case
Thomas Shrimpton, Martijn Stam, Bogdan Warinschi
2016/585
Breaking the Circuit Size Barrier for Secure Computation Under DDH
Elette Boyle, Niv Gilboa, Yuval Ishai
2016/584
Network Oblivious Transfer
Ranjit Kumaresan, Srinivasan Raghuraman, Adam Sealfon
2016/583
Efficient Zero-Knowledge Proof of Algebraic and Non-Algebraic Statements with Applications to Privacy Preserving Credentials
Melissa Chase, Chaya Ganesh, Payman Mohassel
2016/582
TV-PUF : A Fast Lightweight Analog Physically Unclonable Function
Tanujay Saha
2016/581
UC Commitments for Modular Protocol Design and Applications to Revocation and Attribute Tokens
Jan Camenisch, Maria Dubovitskaya, Alfredo Rial
2016/580
Fine-grained Cryptography
Akshay Degwekar, Vinod Vaikuntanathan, Prashant Nalini Vasudevan
2016/579
Automatic Search of Meet-in-the-Middle and Impossible Differential Attacks
Patrick Derbez, Pierre-Alain Fouque
2016/578
Key-alternating Ciphers and Key-length Extension: Exact Bounds and Multi-user Security
Viet Tung Hoang, Stefano Tessaro
2016/577
Backdoors in Pseudorandom Number Generators: Possibility and Impossibility Results
Jean Paul Degabriele, Kenneth G. Paterson, Jacob C. N. Schuldt, Joanne Woodage
2016/576
Indistinguishability Obfuscation Does Not Reduce to Structured Languages
Gilad Asharov, Alon Rosen, Gil Segev
2016/575
TumbleBit: An Untrusted Bitcoin-Compatible Anonymous Payment Hub
Ethan Heilman, Leen Alshenibr, Foteini Baldimtsi, Alessandra Scafuro, Sharon Goldberg
2016/574
Structure vs Hardness through the Obfuscation Lens
Nir Bitansky, Akshay Degwekar, Vinod Vaikuntanathan
2016/573
Towards Sound Fresh Re-Keying with Hard (Physical) Learning Problems
Stefan Dziembowski, Sebastian Faust, Gottfried Herold, Anthony Journault, Daniel Masny, Francois-Xavier Standaert
2016/572
Faster Evaluation of SBoxes via Common Shares
Jean-Sebastien Coron, Aurelien Greuet, Emmanuel Prouff, Rina Zeitoun
2016/571
Simple Key Enumeration (and Rank Estimation) using Histograms: an Integrated Approach
Romain poussier, François-Xavier Standaert, Vincent Grosso
2016/570
Design in Type-I, Run in Type-III: Fast and Scalable Bilinear-Type Conversion using Integer Programming
Masayuki Abe, Fumitaka Hoshino, Miyako Ohkubo
2016/569
FourQ on FPGA: New Hardware Speed Records for Elliptic Curve Cryptography over Large Prime Characteristic Fields
Kimmo Järvinen, Andrea Miele, Reza Azarderakhsh, Patrick Longa
2016/568
A Secure One-Roundtrip Index for Range Queries
Tobias Boelter, Rishabh Poddar, Raluca Ada Popa
2016/567
Adversary-dependent Lossy Trapdoor Function from Hardness of Factoring Semi-smooth RSA Subgroup Moduli
Takashi Yamakawa, Shota Yamada, Goichiro Hanaoka, Noboru Kunihiro
2016/566
Concurrent Non-Malleable Commitments (and More) in 3 Rounds
Michele Ciampi, Rafail Ostrovsky, Luisa Siniscalchi, Ivan Visconti
2016/565
Bounded Indistinguishability and the Complexity of Recovering Secrets
Andrej Bogdanov, Yuval Ishai, Emanuele Viola, Christopher Williamson
2016/564
The Multi-User Security of Authenticated Encryption: AES-GCM in TLS 1.3
Mihir Bellare, Bjoern Tackmann
2016/563
Garbling Scheme for Formulas with Constant Size of Garbled Gates
Carmen Kempka, Ryo Kikuchi, Susumu Kiyoshima, Koutarou Suzuki
2016/562
Deniable Attribute Based Encryption for Branching Programs from LWE
Daniel Apon, Xiong Fan, Feng-Hao Liu
2016/561
Compactness vs Collusion Resistance in Functional Encryption
Baiyu Li, Daniele Micciancio
2016/560
Memory-Efficient Algorithms for Finding Needles in Haystacks
Itai Dinur, Orr Dunkelman, Nathan Keller, Adi Shamir
2016/559
Quantum homomorphic encryption for polynomial-sized circuits
Yfke Dulek, Christian Schaffner, Florian Speelman
2016/558
From Cryptomania to Obfustopia through Secret-Key Functional Encryption
Nir Bitansky, Ryo Nishimaki, Alain Passelègue, Daniel Wichs
2016/557
On the Multiplicative Complexity of Boolean Functions and Bitsliced Higher-Order Masking
Dahmun Goudarzi, Matthieu Rivain
2016/556
Network-Hiding Communication and Applications to Multi-Party Protocols
Martin Hirt, Ueli Maurer, Daniel Tschudi, Vassilis Zikas
2016/555
On the Security and Performance of Proof of Work Blockchains
Arthur Gervais, Ghassan O. Karame, Karl Wüst, Vasileios Glykantzis, Hubert Ritzdorf, Srdjan Capkun
2016/554
Another view of the division property
Christina Boura, Anne Canteaut
2016/553
Storage Efficient Substring Searchable Symmetric Encryption
Iraklis Leontiadis, Ming Li
2016/552
Provably Secure Password Authenticated Key Exchange Based on RLWE for the Post-QuantumWorld
Jintai Ding, Saed Alsayigh, Jean Lancrenon, Saraswathy RV, Michael Snook
2016/551
Improved Factorization of $N=p^rq^s$
Jean-Sebastien Coron, Rina Zeitoun
2016/550
Antikernel: A Decentralized Secure Hardware-Software Operating System Architecture
Andrew D. Zonenberg, Bulent Yener
2016/549
Short and Adjustable Signatures
Xiong Fan, Juan Garay, Payman Mohassel
2016/548
Linicrypt: A Model for Practical Cryptography
Brent Carmer, Mike Rosulek
2016/547
Efficient High-Speed WPA2 Brute Force Attacks using Scalable Low-Cost FPGA Clustering
Markus Kammerstetter, Markus Muellner, Daniel Burian, Christian Kudera, Wolfgang Kastner
2016/546
An Unconditionally Hiding Auditing Procedure for Multi-Party Computations
Lucas Schabhüser, Denise Demirel, Johannes Buchmann
2016/545
On Trees, Chains and Fast Transactions in the Blockchain
Aggelos Kiayias, Giorgos Panagiotakos
2016/544
New Protocols for Secure Equality Test and Comparison
Geoffroy Couteau
2016/543
ObliviSync: Practical Oblivious File Backup and Synchronization
Adam J. Aviv, Seung Geol Choi, Travis Mayberry, Daniel S. Roche
2016/542
MPC-Friendly Symmetric Key Primitives
Lorenzo Grassi, Christian Rechberger, Dragos Rotaru, Peter Scholl, Nigel P. Smart
2016/541
Big-Key Symmetric Encryption: Resisting Key Exfiltration
Mihir Bellare, Daniel Kane, Phillip Rogaway
2016/540
Horizontal Side-Channel Attacks and Countermeasures on the ISW Masking Scheme
Alberto Battistello, Jean-Sebastien Coron, Emmanuel Prouff, Rina Zeitoun
2016/539
Cryptanalysis of a Theorem: Decomposing the Only Known Solution to the Big APN Problem (Full Version)
Léo Perrin, Aleksei Udovenko, Alex Biryukov
2016/538
How to prove knowledge of small secrets
Carsten Baum, Ivan Damgård, Kasper Larsen, Michael Nielsen
2016/537
A Generalisation of the Conjugation Method for Polynomial Selection for the Extended Tower Number Field Sieve Algorithm
Palash Sarkar, Shashank Singh
2016/536
Position-Based Cryptography and Multiparty Communication Complexity
Joshua Brody, Stefan Dziembowski, Sebastian Faust, Krzysztof Pietrzak
2016/535
Impossible Differential Cryptanalysis of Midori
Chen Zhan, Wang Xiaoyun
2016/534
Damaging, Simplifying, and Salvaging p-OMD
Tomer Ashur, Bart Mennink
2016/533
New Insights on AES-like SPN Ciphers
Bing Sun, Meicheng Liu, Jian Guo, Longjiang Qu, Vincent Rijmen
2016/532
Cryptanalysis of GOST2
Tomer Ashur, Achiya Bar-On, Orr Dunkelman
2016/531
Reducing number field defining polynomials: An application to class group computations
Alexandre Gélin, Antoine Joux
2016/530
Generic Semantic Security against a Kleptographic Adversary
Alexander Russell, Qiang Tang, Moti Yung, Hong-Sheng Zhou
2016/529
Efficient Public-Key Cryptography with Bounded Leakage and Tamper Resilience
Antonio Faonio, Daniele Venturi
2016/528
Certified lattice reduction
Thomas Espitau, Antoine Joux
2016/527
Secure Outsourcing of Circuit Manufacturing
Giuseppe Ateniese, Aggelos Kiayias, Bernardo Magri, Yiannis Tselekounis, Daniele Venturi
2016/526
Extended Tower Number Field Sieve with Application to Finite Fields of Arbitrary Composite Extension Degree
Taechan Kim, Jinhyuck Jeong
2016/525
EWCDM: An Efficient, Beyond-Birthday Secure, Nonce-Misuse Resistant MAC
Benoît Cogliati, Yannick Seurin
2016/524
Single-Key to Multi-Key Functional Encryption with Polynomial Loss
Sanjam Garg, Akshayaram Srinivasan
2016/523
Programmable Hash Functions from Lattices: Short Signatures and IBEs with Small Key Sizes
Jiang Zhang, Yu Chen, Zhenfeng Zhang
2016/522
A Novel Methodology for Testing Hardware Security and Trust Exploiting On-Chip Power Noise Measurements (Extended Version)
Daisuke Fujimoto, Shivam Bhasin, Makoto Nagata, Jean-Luc Danger
2016/521
SAT-based cryptanalysis of ACORN
Frédéric Lafitte, Liran Lerman, Olivier Markowitch, Dirk Van Heule
2016/520
Universally Composable Two-Server PAKE
Franziskus Kiefer, Mark Manulis
2016/519
On the Relationship between Statistical Zero-Knowledge and Statistical Randomized Encodings
Benny Applebaum, Pavel Raykov
2016/518
Attribute-based Key Exchange with General Policies
Vladimir Kolesnikov, Hugo Krawczyk, Yehuda Lindell, Alex J. Malozemoff, Tal Rabin
2016/517
Towards Practical Tools for Side Channel Aware Software Engineering: `Grey Box' Modelling for Instruction Leakages
David McCann, Elisabeth Oswald, Carolyn Whitnall
2016/516
Boneh-Gentry-Hamburg's Identity-based Encryption Schemes Revisited
George Teseleanu, Ferucio Laurentiu Tiplea, Sorin Iftene, Anca-Maria Nica
2016/515
RSA Weak Public Keys available on the Internet
Mihai Barbulescu, Adrian Stratulat, Vlad Traista-Popescu, Emil Simion
2016/514
Cryptography with Auxiliary Input and Trapdoor from Constant-Noise LPN
Yu Yu, Jiang Zhang
2016/513
Applying TVLA to Public Key Cryptographic Algorithms
Michael Tunstall, Gilbert Goodwill
2016/512
Security Analysis of ePrint Report 2016/500 "Efficient Identity-Based Encryption and Public-Key Signature from Trapdoor Subgroups"
Lucjan Hanzlik, Kamil Kluczniak
2016/511
Optimal-Rate Non-Committing Encryption in a CRS Model
Ran Canetti, Oxana Poburinnaya, Mariana Raykova
2016/510
A Full RNS Variant of FV like Somewhat Homomorphic Encryption Schemes
Jean-Claude Bajard, Julien Eynard, Anwar Hasan, Vincent Zucca
2016/509
Chosen-Key Distinguishers on 12-Round Feistel-SP and 11-Round Collision Attacks on Its Hashing Modes
Xiaoyang Dong, Xiaoyun Wang
2016/508
Collapse-binding quantum commitments without random oracles
Dominique Unruh
2016/507
Solving discrete logarithms on a 170-bit MNT curve by pairing reduction
Aurore Guillevic, François Morain, Emmanuel Thomé
2016/506
TOR - Didactic pluggable transport
Ioana-Cristina Panait, Cristian Pop, Alexandru Sirbu, Adelina Vidovici, Emil Simion
2016/505
MASCOT: Faster Malicious Arithmetic Secure Computation with Oblivious Transfer
Marcel Keller, Emmanuela Orsini, Peter Scholl
2016/504
Speeding up the Number Theoretic Transform for Faster Ideal Lattice-Based Cryptography
Patrick Longa, Michael Naehrig
2016/503
MQSAS - A Multivariate Sequential Aggregate Signature Scheme
Rachid El Bansarkhani, Mohamed Saied Emam Mohamed, Albrecht Petzoldt
2016/502
Key Recovery Attack against 2.5-round pi-Cipher
Christina Boura, Avik Chakraborti, Gaëtan Leurent, Goutam Paul, Dhiman Saha, Hadi Soleimany, Valentin Suder
2016/501
Certificateless Key Insulated Encryption: Cryptographic Primitive for Achieving Key-escrow free and Key-exposure Resilience
Libo He, Chen Yuan, Hu Xiong, Zhiguang Qin
2016/500
Efficient Identity-Based Encryption and Public-Key Signature from Trapdoor Subgroups
Jong Hwan Park, Kwangsu Lee, Dong Hoon Lee
2016/499
Drone Targeted Cryptography
Gideon Samid
2016/498
Towards Tightly Secure Short Signature and IBE
Xavier Boyen, Qinyi Li
2016/497
Secure Computation from Elastic Noisy Channels
Dakshita Khurana, Hemanta K. Maji, Amit Sahai
2016/496
All Complete Functionalities are Reversible
Daniel Kraschewski, Dakshita Khurana, Hemanta K. Maji, Manoj Prabhakaran, Amit Sahai
2016/495
Cross&Clean: Amortized Garbled Circuits with Constant Overhead
Jesper Buus Nielsen, Claudio Orlandi
2016/494
AEP-M: Practical Anonymous E-Payment for Mobile Devices using ARM TrustZone and Divisible E-Cash (Full Version)
Bo Yang, Kang Yang, Zhenfeng Zhang, Yu Qin, Dengguo Feng
2016/493
Partition-Based Trapdoor Ciphers
Arnaud Bannier, Nicolas Bodin, Eric Filiol
2016/492
MiMC: Efficient Encryption and Cryptographic Hashing with Minimal Multiplicative Complexity
Martin Albrecht, Lorenzo Grassi, Christian Rechberger, Arnab Roy, Tyge Tiessen
2016/491
Characterisation and Estimation of the Key Rank Distribution in the Context of Side Channel Evaluations
Daniel P. Martin, Luke Mather, Elisabeth Oswald, Martijn Stam
2016/490
Truncated, Impossible, and Improbable Differential Analysis of Ascon
Cihangir Tezcan
2016/489
Two Cents for Strong Anonymity: The Anonymous Post-office Protocol
Nethanel Gelernter, Amir Herzberg, Hemi Leibowitz
2016/488
Efficient Homomorphic Integer Polynomial Evaluation based on GSW FHE
Husen Wang, Qiang Tang
2016/487
A Systolic Hardware Architectures of Montgomery Modular Multiplication for Public Key Cryptosystems
Amine MRABET, Nadia EL-MRABET, Ronan LASHERMES, Jean Baptiste RIGAUD, Belgacem BOUALLEGUE, Sihem MESNAGER, Mohsen MACHHOUT
2016/486
Domain-Oriented Masking: Compact Masked Hardware Implementations with Arbitrary Protection Order
Hannes Gross, Stefan Mangard, Thomas Korak
2016/485
A General Polynomial Selection Method and New Asymptotic Complexities for the Tower Number Field Sieve Algorithm
Palash Sarkar, Shashank Singh
2016/484
Ghostshell: Secure Biometric Authentication using Integrity-based Homomorphic Evaluations
Jung Hee Cheon, HeeWon Chung, Myungsun Kim, Kang-Won Lee
2016/483
Proofs of Knowledge on Monotone Predicates and its Application to Attribute-Based Identifications and Signatures
Hiroaki Anada, Seiko Arita, Kouichi Sakurai
2016/482
Functional Encryption: Deterministic to Randomized Functions from Simple Assumptions
Shashank Agrawal, David J. Wu
2016/481
Side-Channel Analysis Protection and Low-Latency in Action - case study of PRINCE and Midori
Amir Moradi, Tobias Schneider
2016/480
Achieving Better Privacy for the 3GPP AKA Protocol
Pierre-Alain Fouque, Cristina Onete, Benjamin Richard
2016/479
Survey of Microarchitectural Side and Covert Channels, Attacks, and Defenses
Jakub Szefer
2016/478
Cryptographic Solutions for Credibility and Liability Issues of Genomic Data
Erman Ayday, Qiang Tang, Arif Yilmaz
2016/477
Shortening the Libert-Peters-Yung Revocable Group Signature Scheme by Using the Random Oracle Methodology
Kazuma Ohara, Keita Emura, Goichiro Hanaoka, Ai Ishida, Kazuo Ohta, Yusuke Sakai
2016/476
Groth-Sahai Proofs Revisited Again: A Bug in ``Optimized'' Randomization
Keita Xagawa
2016/475
Nonce-Disrespecting Adversaries: Practical Forgery Attacks on GCM in TLS
Hanno Böck, Aaron Zauner, Sean Devlin, Juraj Somorovsky, Philipp Jovanovic
2016/474
T-Proof: Secure Communication via Non-Algorithmic Randomization
Gideon Samid
2016/473
Exploiting the Physical Disparity: Side-Channel Attacks on Memory Encryption
Thomas Unterluggauer, Stefan Mangard
2016/472
Adequate Elliptic Curve for Computing the Product of n Pairings
Loubna Ghammam, Emmanuel Fouotsa
2016/471
NTRU Modular Lattice Signature Scheme on CUDA GPUs
Wei Dai, John Schanck, Berk Sunar, William Whyte, Zhenfei Zhang
2016/470
Better Security for Queries on Encrypted Databases
Myungsun Kim, Hyung Tae Lee, San Ling, Shu Qin Ren, Benjamin Hong Meng Tan, Huaxiong Wang
2016/469
Identity Chains
Andrew Egbert, Brad Chun, Thomas Otte
2016/468
Chaos Machine: Different Approach to the Application and Significance of Numbers
Maciej A. Czyzewski
2016/467
Speeding up R-LWE post-quantum key exchange
Shay Gueron, Fabian Schlieker
2016/466
AnNotify: A Private Notification Service
Ania Piotrowska, Jamie Hayes, Nethanel Gelernter, George Danezis, Amir Herzberg
2016/465
Can Large Deviation Theory be Used for Estimating Data Complexity?
Subhabrata Samajder, Palash Sarkar
2016/464
Beaver: A Decentralized Anonymous Marketplace with Secure Reputation
Kyle Soska, Albert Kwon, Nicolas Christin, Srinivas Devadas
2016/463
Authenticated Encryption with Variable Stretch
Reza Reyhanitabar, Serge Vaudenay, Damian Vizár
2016/462
Fully Homomorphic Encryption with Isotropic Elements
Masahiro Yagisawa
2016/461
NTRU Prime: reducing attack surface at low cost
Daniel J. Bernstein, Chitchanok Chuengsatiansup, Tanja Lange, Christine van Vredendaal
2016/460
Revocable Hierarchical Identity-Based Encryption with Shorter Private Keys and Update Keys
Kwangsu Lee, Seunghwan Park
2016/459
Non-Interactive RAM and Batch NP Delegation from any PIR
Zvika Brakerski, Justin Holmgren, Yael Kalai
2016/458
CompGC: Efficient Offline/Online Semi-honest Two-party Computation
Adam Groce, Alex Ledger, Alex J. Malozemoff, Arkady Yerukhimovich
2016/457
--Withdrawn--
Wei Yuan
2016/456
Secure Protocol Transformations
Yuval Ishai, Eyal Kushilevitz, Manoj Prabhakaran, Amit Sahai, Ching-Hua Yu
2016/455
Extracting the RC4 secret key of the Open Smart Grid Protocol
Linus Feiten, Matthias Sauer
2016/454
Analysis of the Blockchain Protocol in Asynchronous Networks
Rafael Pass, Lior Seeman, abhi shelat
2016/453
SQL on Structurally-Encrypted Databases
Seny Kamara, Tarik Moataz
2016/452
Secure Logging Schemes and Certificate Transparency
Benjamin Dowling, Felix Günther, Udyani Herath, Douglas Stebila
2016/451
Efficient Zero-Knowledge Contingent Payments in Cryptocurrencies Without Scripts
Wacław Banasik, Stefan Dziembowski, Daniel Malinowski
2016/450
A Provably Secure Code-based Concurrent Signature Scheme
Maryam Rajabzadeh Asaar, Mahmoud Salmasizadeh, Mohammad Reza Aref
2016/449
Loop-Abort Faults on Lattice-Based Fiat–Shamir and Hash-and-Sign Signatures
Thomas Espitau, Pierre-Alain Fouque, Benoît Gérard, Mehdi Tibouchi
2016/448
A Note on ``Outsourcing Large Matrix Inversion Computation to a Public Cloud"
Zhengjun Cao, Lihua Liu
2016/447
Theoretical Attacks on E2E Voting Systems
Peter Hyun-Jeen Lee, Siamak F. Shahandashti
2016/446
Quantum key distribution with combined conjugate coding and information overloading
Boris Skoric
2016/445
SecureMed: Secure Medical Computation using GPU-Accelerated Homomorphic Encryption Scheme
Alhassan Khedr, Glenn Gulak
2016/444
The QARMA Block Cipher Family -- Almost MDS Matrices Over Rings With Zero Divisors, Nearly Symmetric Even-Mansour Constructions With Non-Involutory Central Rounds, and Search Heuristics for Low-Latency S-Boxes
Roberto Avanzi
2016/443
Thrifty Zero-Knowledge - When Linear Programming Meets Cryptography
Simon Cogliani, Houda Ferradi, Rémi Géraud, David Naccache
2016/442
Blind Password Registration for Verifier-based PAKE
Franziskus Kiefer, Mark Manulis
2016/441
Fault Tolerant Implementations of Delay-based Physically Unclonable Functions on FPGA
Durga Prasad Sahoo, Sikhar Patranabis, Debdeep Mukhopadhyay, Rajat Subhra Chakraborty
2016/440
Function-Hiding Inner Product Encryption is Practical
Sam Kim, Kevin Lewi, Avradip Mandal, Hart Montgomery, Arnab Roy, David J. Wu
2016/439
A Measure Version of Gaussian Heuristic
Hao Chen
2016/438
sElect: A Lightweight Verifiable Remote Voting System
Ralf Kuesters, Johannes Mueller, Enrico Scapin, Tomasz Truderung
2016/437
Observations on the LPN Solving Algorithm from Eurocrypt'16
Sonia Bogos, Serge Vaudenay
2016/436
Cryptanalysis of Reduced NORX
Nasour Bagheri, Tao Huang, Keting Jia, Florian Mendel, Yu Sasaki
2016/435
The Whole is Less than the Sum of its Parts: Constructing More Efficient Lattice-Based AKEs
Rafael del Pino, Vadim Lyubashevsky, David Pointcheval
2016/434
A Tale of Two Shares: Why Two-Share Threshold Implementation Seems Worthwhile-and Why it is Not
Cong Chen, Mohammad Farmani, Thomas Eisenbarth
2016/433
Analysis of Key Wrapping APIs: Generic Policies, Computational Security
Guillaume Scerri, Ryan Stanley-Oakes
2016/432
Two-Input Functional Encryption for Inner Products from Bilinear Maps
Kwangsu Lee, Dong Hoon Lee
2016/431
Security Proofs for Participation Privacy, Receipt-Freeness, Ballot Privacy, and Verifiability Against Malicious Bulletin Board for the Helios Voting Scheme
David Bernhard, Oksana Kulyk, Melanie Volkamer
2016/430
Partially homomorphic encryption schemes over finite fields
Jian Liu, Lusheng Chen, Sihem Mesnager
2016/429
Information-Theoretical Analysis of Two Shannon's Ciphers
Boris Ryabko
2016/428
An Efficient and Scalable Modeling Attack on Lightweight Secure Physically Unclonable Function
Phuong Ha Nguyen, Durga Prasad Sahoo
2016/427
Privacy Preserving Network Analysis of Distributed Social Networks
Varsha Bhat Kukkala, Jaspal Singh Saini, S. R. S. Iyengar
2016/426
A Practical Framework for Executing Complex Queries over Encrypted Multimedia Data
Fahad Shaon, Murat Kantarcioglu
2016/425
Multi-Input Inner-Product Functional Encryption from Pairings
Michel Abdalla, Romain Gay, Mariana Raykova, Hoeteck Wee
2016/424
Computational Security of Quantum Encryption
Gorjan Alagic, Anne Broadbent, Bill Fefferman, Tommaso Gagliardoni, Christian Schaffner, Michael St. Jules
2016/423
Modeling Random Oracles under Unpredictable Queries
Pooya Farshim, Arno Mittelbach
2016/422
A deeper understanding of the XOR count distribution in the context of lightweight cryptography
Sumanta Sarkar, Siang Meng Sim
2016/421
Homomorphic Encryption for Arithmetic of Approximate Numbers
Jung Hee Cheon, Andrey Kim, Miran Kim, Yongsoo Song
2016/420
A note on the security of threshold implementations with $d+1$ input shares
Santos Merino Del Pozo, François-Xavier Standaert
2016/419
Walsh-Hadamard Transform and Cryptographic Applications in Bias Computing
Yi LU, Yvo DESMEDT
2016/418
Shorter Circuit Obfuscation in Challenging Security Models
Zvika Brakerski, Or Dagmi
2016/417
New Tools for Multi-Party Computation
Lisa Kohl
2016/416
A Decentralized Anonymity-Preserving Reputation System with Constant-time Score Retrieval
Rémi Bazin, Alexander Schaub, Omar Hasan, Lionel Brunie
2016/415
Lattice-Based Signature Schemes and their Sensitivity to Fault Attacks
Nina Bindel, Johannes Buchmann, Juliane Krämer
2016/414
Automatic Search for Key-Bridging Technique: Applications to LBlock and TWINE (Full Version)
Li Lin, Wenling Wu, Yafei Zheng
2016/413
Efficient algorithms for supersingular isogeny Diffie-Hellman
Craig Costello, Patrick Longa, Michael Naehrig
2016/412
Solving Quadratic Equations with XL on Parallel Architectures - extended version
Chen-Mou Cheng, Tung Chou, Ruben Niederhagen, Bo-Yin Yang
2016/411
Polymorphic Encryption and Pseudonymisation for Personalised Healthcare
Eric Verheul, Bart Jacobs, Carlo Meijer, Mireille Hildebrandt, Joeri de Ruiter
2016/410
Efficient Quantum-Resistant Trust Infrastructure based on HIMMO
Oscar Garcia-Morchon, Sauvik Bhattacharya, Ronald Rietman, Ludo Tolhuizen, Jose-Luis Torre-Arce, Maarten Bodlaender
2016/409
Automatic Search for the Best Trails in ARX: Application to Block Cipher \textsc{Speck}
Alex Biryukov, Vesselin Velichkov, Yann Le Corre
2016/408
Towards Bitcoin Payment Networks
Patrick McCorry, Malte Möser, Siamak F. Shahandashti, Feng Hao
2016/407
MILP-Based Automatic Search Algorithms for Differential and Linear Trails for Speck
Kai Fu, Meiqin Wang, Yinghua Guo, Siwei Sun, Lei Hu
2016/406
On the Construction of Lightweight Circulant Involutory MDS Matrices
Yongqiang Li, Mingsheng Wang
2016/405
Multiple Differential Cryptanalysis: A Rigorous Analysis
Subhabrata Samajder, Palash Sarkar
2016/404
A New Test Statistic for Key Recovery Attacks Using Multiple Linear Approximations
Subhabrata Samajder, Palash Sarkar
2016/403
On Instantiating Pairing-Based Protocols with Elliptic Curves of Embedding Degree One
Sanjit Chatterjee, Alfred Menezes, Francisco Rodriguez-Henriquez
2016/402
Fully Homomorphic Encryption for Point Numbers
Seiko Arita, Shota Nakasato
2016/401
Tower Number Field Sieve Variant of a Recent Polynomial Selection Method
Palash Sarkar, Shashank Singh
2016/400
Towards Secure Quadratic Voting
Sunoo Park, Ronald L. Rivest
2016/399
Slow Motion Zero Knowledge Identifying With Colliding Commitments
Houda Ferradi, Rémi Géraud, David Naccache
2016/398
Algebraic Insights into the Secret Feistel Network (Full version)
Léo Perrin, Aleksei Udovenko
2016/397
Linear-Time Non-Malleable Codes in the Bit-Wise Independent Tampering Model
Ronald Cramer, Ivan Damgård, Nico Döttling, Irene Giacomelli, Chaoping Xing
2016/396
Cryptanalysis of Haraka
Jérémy Jean
2016/395
Efficient Beyond-Birthday-Bound-Secure Deterministic Authenticated Encryption with Minimal Stretch
Christian Forler, Eik List, Stefan Lucks, Jakob Wenzel
2016/394
Strengthening the Known-Key Security Notion for Block Ciphers
Benoît Cogliati, Yannick Seurin
2016/393
De Bruijn Sequences, Adjacency Graphs and Cyclotomy
Ming Li, Dongdai Lin
2016/392
Towards a Further Understanding of Bit-Based Division Property
Ling Sun, Meiqin Wang
2016/391
A Digital Signature Scheme Based on Random Split of St-Gen Codes
Danilo Gligoroski, Simona Samardjiska
2016/390
Obfuscation without the Vulnerabilities of Multilinear Maps
Sanjam Garg, Pratyay Mukherjee, Akshayaram Srinivasan
2016/389
A Quasipolynomial Reduction for Generalized Selective Decryption on Trees
Georg Fuchsbauer, Zahra Jafargholi, Krzysztof Pietrzak
2016/388
Tightly-Secure Authenticated Key Exchange without NAXOS' approach based on Decision Linear Problem
Mojahed Mohamed, Xiaofen Wang, Xiaosong Zhang
2016/387
Game-Based Cryptanalysis of a Lightweight CRC-Based Authentication Protocol for EPC Tags
K. Baghery, B. Abdolmaleki, M. J. Emadi
2016/386
Canary Numbers: Design for Light-weight Online Testability of True Random Number Generators
Vladimir Rožić, Bohan Yang, Nele Mentens, Ingrid Verbauwhede
2016/385
A note on Ring-LWE security in the case of Fully Homomorphic Encryption
Guillaume Bonnoron, Caroline Fontaine
2016/384
Attacks against Filter Generators Exploiting Monomial Mappings
Anne Canteaut, Yann Rotella
2016/383
Reducing the Key Size of the SRP Encryption Scheme - Extended version
Dung Hoang Duong, Albrecht Petzoldt, Tsuyoshi Takagi
2016/382
Faster elliptic-curve discrete logarithms on FPGAs
Daniel J. Bernstein, Susanne Engels, Tanja Lange, Ruben Niederhagen, Christof Paar, Peter Schwabe, Ralf Zimmermann
2016/381
FHE Circuit Privacy Almost For Free
Florian Bourse, Rafaël Del Pino, Michele Minelli, Hoeteck Wee
2016/380
Parallel Implementation of BDD enumeration for LWE
Elena Kirshanova, Alexander May, Friedrich Wiemer
2016/379
Two More Efficient Variants of the J-PAKE Protocol
Jean Lancrenon, Marjan Škrobot, Qiang Tang
2016/378
Using semidirect product of (semi)groups in public key cryptography
Delaram Kahrobaei, Vladimir Shpilrain
2016/377
Differential Cryptanalysis of Salsa and ChaCha -- An Evaluation with a Hybrid Model
Arka Rai Choudhuri, Subhamoy Maitra
2016/376
A Systematic Analysis of the Juniper Dual EC Incident
Stephen Checkoway, Shaanan Cohney, Christina Garman, Matthew Green, Nadia Heninger, Jacob Maskiewicz, Eric Rescorla, Hovav Shacham, Ralf-Philipp Weinmann
2016/375
Can PPAD Hardness be Based on Standard Cryptographic Assumptions?
Alon Rosen, Gil Segev, Ido Shahaf
2016/374
Analysis of SHA-512/224 and SHA-512/256
Christoph Dobraunig, Maria Eichlseder, and Florian Mendel
2016/373
Adaptive partitioning
Dennis Hofheinz
2016/372
NIZKs with an Untrusted CRS: Security in the Face of Parameter Subversion
Mihir Bellare, Georg Fuchsbauer, Alessandra Scafuro
2016/371
A Cryptographic Analysis of UMTS/LTE AKA
Stéphanie Alt, Pierre-Alain Fouque, Gilles Macario-rat, Cristina Onete, Benjamin Richard
2016/370
Malleability of the blockchain’s entropy
Cecile Pierrot, Benjamin Wesolowski
2016/369
Efficient Multi-Point Local Decoding of Reed-Muller Codes via Interleaved Codex
Ronald Cramer, Chaoping Xing, Chen Yuan
2016/368
Foundations of Fully Dynamic Group Signatures
Jonathan Bootle, Andrea Cerulli, Pyrros Chaidos, Essam Ghadafi, Jens Groth
2016/367
An Analysis of OpenSSL's Random Number Generator
Falko Strenzke
2016/366
\(\mu\)Kummer: efficient hyperelliptic signatures and key exchange on microcontrollers
Joost Renes, Peter Schwabe, Benjamin Smith, Lejla Batina
2016/365
Fast Modular Arithmetic on the Kalray MPPA-256 Processor for an Energy-Efficient Implementation of ECM
Masahiro Ishii, Jérémie Detrey, Pierrick Gaudry, Atsuo Inomata, Kazutoshi Fujikawa
2016/364
Cryptographic Analysis of the 3GPP AKA Protocol
Stéphanie Alt, Pierre-Alain Fouque, Gilles Macario-rat, Cristina Onete, Benjamin Richard
2016/363
Legally Fair Contract Signing Without Keystones
Houda Ferradi, Rémi Géraud, Diana Maimut, David Naccache, David Pointcheval
2016/362
An Empirical Study towards Refining the AKS Primality Testing Algorithm
Lalitha Kiran Nemana, V. Ch. Venkaiah
2016/361
Functional Encryption for Bounded Collusions, Revisited
Shweta Agrawal, Alon Rosen
2016/360
Another Look at Tightness II: Practical Issues in Cryptography
Sanjit Chatterjee, Neal Koblitz, Alfred Menezes, Palash Sarkar
2016/359
Less is More - Dimensionality Reduction from a Theoretical Perspective
Nicolas Bruneau, Sylvain Guilley, Annelie Heuser, Damien Marion, Olivier Rioul
2016/358
The Ring of Gyges: Investigating the Future of Criminal Smart Contracts
Ari Juels, Ahmed Kosba, Elaine Shi
2016/357
State Management for Hash-Based Signatures
David McGrew, Panos Kampanakis, Scott Fluhrer, Stefan-Lukas Gazdag, Denis Butin, Johannes Buchmann
2016/356
More Efficient Constructions for Inner-Product Encryption
Somindu C. Ramanna
2016/355
Fruit-v2: Ultra-Lightweight Stream Cipher with Shorter Internal State
Vahid Amin Ghafari, Honggang Hu, Ying Chen
2016/354
A Pairing-Free, One Round Identity Based Authenticated Key Exchange Protocol Secure Against Memory-Scrapers
Suvradip Chakraborty, Srinivasan Raghuraman, C. Pandu Rangan
2016/353
General Bounds for Small Inverse Problems and Its Applications to Multi-Prime RSA
Atsushi Takayasu, Noboru Kunihiro
2016/352
Closing the Gap in RFC 7748: Implementing Curve448 in Hardware
Pascal Sasdrich, Tim Güneysu
2016/351
How (Not) to Instantiate Ring-LWE
Chris Peikert
2016/350
Probabilistic Termination and Composability of Cryptographic Protocols
Ran Cohen, Sandro Coretti, Juan Garay, Vassilis Zikas
2016/349
Note on Impossible Differential Attacks
Patrick Derbez
2016/348
A Note on Non-Perfect Secret Sharing
Oriol Farràs, Sebastià Martín, Carles Padró
2016/347
Cryptanalysis of Searchable Anonymous Attribute Based Encryption
Payal Chaudhari, Manik Lal Das
2016/346
New Framework for Secure Server-Designation Public Key Encryption with Keyword Search
Xi-Jun Lin, Lin Sun, Haipeng Qu
2016/345
Provably Secure Password Reset Protocol: Model, Definition, and Generic Construction
Satsuya Ohata, Takahiro Matsuda, Kanta Matsuura
2016/344
Encoding Rational Numbers for FHE-based Applications
HeeWon Chung, Myungsun Kim
2016/343
On the complexity of constructing pseudorandom functions (especially when they don't exist)
Eric Miles, Emanuele Viola
2016/342
On the Selective Opening Security of Practical Public-Key Encryption Schemes
Felix Heuer, Tibor Jager, Eike Kiltz, Sven Schäge
2016/341
Semantically Secure Anonymity: Foundations of Re-encryption
Adam L. Young, Moti Yung
2016/340
Non-Malleable Extractors and Codes, with their Many Tampered Extensions
Eshan Chattopadhyay, Vipul Goyal, Xin Li
2016/339
Lattice-Based Fully Dynamic Multi-Key FHE with Short Ciphertexts
Zvika Brakerski, Renen Perlman
2016/338
Mixed Integer Programming Models for Finite Automaton and Its Application to Additive Differential Patterns of Exclusive-Or
Siwei Sun, Lei Hu, Peng Wang, Meiqin Wang, Danping Shi, Xiaoshuang Ma, Qianqian Yang, Kai Fu
2016/337
State recovery of RC4 and Spritz Revisited
Martin Gábriš, Martin Stanek
2016/336
No Bot Expects the DeepCAPTCHA! Introducing Immutable Adversarial Examples with Applications to CAPTCHA
Margarita Osadchy, Julio Hernandez-Castro, Stuart Gibson, Orr Dunkelman, Daniel Pérez-Cabo
2016/335
Complete characterization of generalized bent and 2^k-bent Boolean functions
Chunming Tang, Can Xiang, Yanfeng Qi, Keqin Feng
2016/334
Probability that the k-gcd of products of positive integers is B-friable
Jung Hee Cheon, Duhyeong Kim
2016/333
Proof of Space from Stacked Expanders
Ling Ren, Srinivas Devadas
2016/332
Micropayments for Decentralized Currencies
Rafael Pass, abhi shelat
2016/331
TRVote: A New, Trustworthy and Robust Electronic Voting System
Fatih Tiryakioglu, Mehmet Sabir Kiraz, Fatih Birinci
2016/330
NaCl's Crypto_Box in Hardware
Michael Hutter, Jürgen Schilling, Peter Schwabe, Wolfgang Wieser
2016/329
A modified block Lanczos algorithm with fewer vectors
Emmanuel Thomé
2016/328
Constructing genus 3 hyperelliptic Jacobians with CM
Jennifer Balakrishnan, Sorina Ionica, Kristin Lauter, Christelle Vincent
2016/327
Proxy Re-Encryption Schemes with Key Privacy from LWE
Le Trieu Phong, Lihua Wang, Yoshinori Aono, Manh Ha Nguyen, Xavier Boyen
2016/326
Square Attack on 7-Round Kiasu-BC
Christoph Dobraunig, Maria Eichlseder, Florian Mendel
2016/325
Optimized quantization in Zero Leakage Helper Data Systems
Taras Stanko, Fitria Nur Andini, Boris Skoric
2016/324
Interactive Oracle Proofs with Constant Rate and Query Complexity
Eli Ben-Sasson, Alessandro Chiesa, Ariel Gabizon, Michael Riabzev, Nicholas Spooner
2016/323
A Family of Scalable Polynomial Multiplier Architectures for Ring-LWE Based Cryptosystems
Chaohui Du, Guoqiang Bai
2016/322
On the Security of PUF Protocols under Bad PUFs and PUFs-inside-PUFs Attacks
Ulrich Rührmair
2016/321
Algebraic Decomposition for Probing Security
Claude Carlet, Emmanuel Prouff, Matthieu Rivain, Thomas Roche
2016/320
On Metrics to Quantify the Inter-Device Uniqueness of PUFs
Linus Feiten, Matthias Sauer, Bernd Becker
2016/319
High-precision Secure Computation of Satellite Collision Probabilities
Brett Hemenway, Steve Lu, Rafail Ostrovsky, William Welser IV
2016/318
Generic Construction of Certificateless Signcryption Scheme
Jayaprakash Kar, Sagar Naik
2016/317
Semi-Adaptive Security and Bundling Functionalities Made Generic and Easy
Rishab Goyal, Venkata Koppula, Brent Waters
2016/316
A Note on Black-Box Separations for Indistinguishability Obfuscation
Mohammad Mahmoody, Ameer Mohammed, Soheil Nematihaji, Rafael Pass, abhi shelat
2016/315
Flattening NTRU for Evaluation Key Free Homomorphic Encryption
Yarkın Doröz, Berk Sunar
2016/314
Blind Source Separation from Single Measurements using Singular Spectrum Analysis
Santos Merino Del Pozo, François-Xavier Standaert
2016/313
Fiat-Shamir for Highly Sound Protocols is Instantiable
Arno Mittelbach, Daniele Venturi
2016/312
Refinements of the k-tree Algorithm for the Generalized Birthday Problem
Ivica Nikolic, Yu Sasaki
2016/311
Fast Correlation Attacks over Extension Fields, Large-unit Linear Approximation and Cryptanalysis of SNOW 2.0
Bin Zhang, Chao Xu, Willi Meier
2016/310
Coded-BKW: Solving LWE Using Lattice Codes
Qian Guo, Thomas Johansson, Paul Stankovski
2016/309
Privately Outsourcing Exponentiation to a Single Server: Cryptanalysis and Optimal Constructions
Celine Chevalier, Fabien Laguillaumie, Damien Vergnaud
2016/308
Strongly Leakage-Resilient Authenticated Key Exchange
Rongmao Chen, Yi Mu, Guomin Yang, Willy Susilo, Fuchun Guo
2016/307
Non-Malleable Codes for Bounded Depth, Bounded Fan-in Circuits
Marshall Ball, Dana Dachman-Soled, Mukul Kulkarni, Tal Malkin
2016/306
A Formal Treatment of Backdoored Pseudorandom Generators
Yevgeniy Dodis, Chaya Ganesh, Alexander Golovnev, Ari Juels, Thomas Ristenpart
2016/305
Certicateless Aggregate Short Signature Scheme
Jayaprakash Kar
2016/304
A Fast Attribute Based Encryption
Yacov Yacobi
2016/303
From Obfuscation to the Security of Fiat-Shamir for Proofs
Yael Tauman Kalai, Guy N. Rothblum, Ron D. Rothblum
2016/302
A Polynomial-Time Attack on the BBCRS Scheme
Alain Couvreur, Ayoub Otmani, Jean-Pierre Tillich, Valérie Gauthier-Umana
2016/301
Constrained Pseudorandom Functions for Unconstrained Inputs
Apoorvaa Deshpande, Venkata Koppula, Brent Waters
2016/300
Flush, Gauss, and Reload -- A Cache Attack on the BLISS Lattice-Based Signature Scheme
Leon Groot Bruinderink, Andreas Hülsing, Tanja Lange, Yuval Yarom
2016/299
Efficient Design Strategies Based on the AES Round Function
Jérémy Jean, Ivica Nikolic
2016/298
Reverse-Engineering of the Cryptanalytic Attack Used in the Flame Super-Malware
Max Fillinger, Marc Stevens
2016/297
A Unified Metric for Quantifying Information Leakage of Cryptographic Devices under Power Analysis Attacks
Liwei Zhang, A. Adam Ding, Yunsi Fei, Pei Luo
2016/296
How to Sequentialize Independent Parallel Attacks?
Sonia Bogos, Serge Vaudenay
2016/295
Collision Attack on GRINDAHL
Thomas Peyrin
2016/294
Evaluation and Improvement of Generic-Emulating DPA Attacks
Weijia Wang, Yu Yu, Junrong Liu, Zheng Guo, François-Xavier Standaert, Dawu Gu, Sen Xu, Rong Fu
2016/293
A Parametric Family of Attack Models for Proxy Re-Encryption
David Nuñez, Isaac Agudo, Javier Lopez
2016/292
New Bounds for Keyed Sponges with Extendable Output: Independence between Capacity and Message Length
Yusuke Naito, Kan Yasuda
2016/291
Spooky Interaction and its Discontents: Compilers for Succinct Two-Message Argument Systems
Cynthia Dwork, Moni Naor, Guy N. Rothblum
2016/290
Nonce-Based Cryptography: Retaining Security when Randomness Fails
Mihir Bellare, Björn Tackmann
2016/289
Obfuscation Combiners
Marc Fischlin, Amir Herzberg, Hod Bin Noon, Haya Shulman
2016/288
Optimization of LPN Solving Algorithms
Sonia Bogos, Serge Vaudenay
2016/287
Verifiability Notions for E-Voting Protocols
Veronique Cortier, David Galindo, Ralf Kuesters, Johannes Mueller, Tomasz Truderung
2016/286
On a remarkable property of APN Gold functions
Anastasiya Gorodilova
2016/285
Bit-Based Division Property and Application to Simon Family
Yosuke Todo, Masakatu Morii
2016/284
Co-location detection on the Cloud
Mehmet Sinan Inci, Berk Gulmezoglu, Thomas Eisenbarth, Berk Sunar
2016/283
Secure Audit Logs with Verifiable Excerpts
Gunnar Hartung
2016/282
Detecting flawed masking schemes with leakage detection tests
Oscar Reparaz
2016/281
Universal Obfuscation and Witness Encryption: Boosting Correctness and Combining Security
Prabhanjan Ananth, Aayush Jain, Moni Naor, Amit Sahai, Eylon Yogev
2016/280
Low Power Montgomery Modular Multiplication on Reconfigurable Systems
Pedro Maat C. Massolino, Lejla Batina, Ricardo Chaves, Nele Mentens
2016/279
Constrained PRFs for Unbounded Inputs with Short Keys
Hamza Abusalah, Georg Fuchsbauer
2016/278
Various Proxy Re-Encryption Schemes from Lattices
Xiong Fan, Feng-Hao Liu
2016/277
Public Key Encryption Supporting Equality Test and Flexible Authorization without Bilinear Pairings
Xi-Jun Lin, Haipeng Qu, Xiaoshuai Zhang
2016/276
Arithmetic coding and blinding countermeasures for lattice signatures
Markku-Juhani O. Saarinen
2016/275
Faster Algorithms for Solving LPN
Bin Zhang, Lin Jiao, Mingsheng Wang
2016/274
What users should know about Full Disk Encryption based on LUKS
Simone Bossi, Andrea Visconti
2016/273
On the weaknesses of PBKDF2
Andrea Visconti, Simone Bossi, Hany Ragab, Alexandro Calò
2016/272
Spooky Encryption and its Applications
Yevgeniy Dodis, Shai Halevi, Ron D. Rothblum, Daniel Wichs
2016/271
Cryptanalysis of the FLIP Family of Stream Ciphers
Sébastien Duval, Virginie Lallemand, Yann Rotella
2016/270
Automated Unbounded Analysis of Cryptographic Constructions in the Generic Group Model
Miguel Ambrona, Gilles Barthe, Benedikt Schmidt
2016/269
The Adjacency Graphs of Linear Feedback Shift Registers with Primitive-like Characteristic Polynomials
Ming Li, Dongdai Lin
2016/268
Efficient Lattice-based Authenticated Encryption: A Practice-Oriented Provable Security Approach
Ahmad Boorghany, Siavash Bayat-Sarmadi, Rasool Jalili
2016/267
Improved Meet-in-the-Middle Attacks on Round-Reduced Crypton-256
Yonglin Hao
2016/266
Exact Error Bound of Cox-Rower Architecture for RNS Arithmetic
Shinichi Kawamura, Tomoko Yonemura, Yuichi Komano, Hideo Shimizu
2016/265
Multi-prover Proof-of-Retrievability
Maura B. Paterson, Douglas R. Stinson, Jalaj Upadhyay
2016/264
How Fast Can Higher-Order Masking Be in Software?
Dahmun Goudarzi, Matthieu Rivain
2016/263
Efficient Zero-Knowledge Arguments for Arithmetic Circuits in the Discrete Log Setting
Jonathan Bootle, Andrea Cerulli, Pyrros Chaidos, Jens Groth, Christophe Petit
2016/262
Collaborative Multi-Authority Key-Policy Attribute-Based Encryption for Shorter Keys and Parameters
Riccardo Longo, Chiara Marcolla, Massimiliano Sala
2016/261
MEMS-based Gyroscopes as Physical Unclonable Functions
Oliver Willers, Christopher Huth, Jorge Guajardo, Helmut Seidel
2016/260
On the Size of Pairing-based Non-interactive Arguments
Jens Groth
2016/259
Adaptive Oblivious Transfer and Generalizations
Olivier Blazy, Céline Chevalier, Paul Germouty
2016/258
Structure-Preserving Smooth Projective Hashing
Olivier Blazy, Céline Chevalier
2016/257
Indistinguishability Obfuscation from Constant-Degree Graded Encoding Schemes
Huijia Lin
2016/256
SE-ORAM: A Storage-Efficient Oblivious RAM for Privacy-Preserving Access to Cloud Storage
Qiumao Ma, Jinsheng Zhang, Wensheng Zhang, Daji Qiao
2016/255
More Efficient Structure-Preserving Signatures - Or: Bypassing the Type-III Lower Bounds
Essam Ghadafi
2016/254
Towards Stream Ciphers for Efficient FHE with Low-Noise Ciphertexts
Pierrick Méaux, Anthony Journault, François-Xavier Standaert, Claude Carlet
2016/253
Run-time Accessible DRAM PUFs in Commodity Devices
Wenjie Xiong, André Schaller, Nikolaos A. Anagnostopoulos, Muhammad Umair Saleem, Sebastian Gabmeyer, Stefan Katzenbeisser, Jakub Szefer
2016/252
The Exact Round Complexity of Secure Computation
Sanjam Garg, Pratyay Mukherjee, Omkant Pandey, Antigoni Polychroniadou
2016/251
Searchable Symmetric Encryption: Optimal Locality in Linear Space via Two-Dimensional Balanced Allocations
Gilad Asharov, Moni Naor, Gil Segev, Ido Shahaf
2016/250
Fixed Point Arithmetic in SHE Scheme
A. Costache, N. P. Smart, S. Vivek, A. Waller
2016/249
Improved Side-Channel Analysis Attacks on Xilinx Bitstream Encryption of 5, 6, and 7 Series
Amir Moradi, Tobias Schneider
2016/248
Invariant subspaces in Simpira
Sondre Rønjom
2016/247
Public Verifiable Function Secret Sharing
Wang Qiang, Zhou Fucai, Chen Chunyu, Li Fuxiang, Xu Zifeng
2016/246
LINGUISTIC CRACKING OF PASSPHRASES USING MARKOV CHAINS
Peder Sparell, Mikael Simovits
2016/245
DEcryption Contract ENforcement Tool (DECENT): A Practical Alternative to Government Decryption Backdoors
Peter Linder
2016/244
Cryptanalysis of Simpira v1
Christoph Dobraunig, Maria Eichlseder, and Florian Mendel
2016/243
On the Key Dependent Message Security of the Fujisaki-Okamoto Constructions
Fuyuki Kitagawa, Takahiro Matsuda, Goichiro Hanaoka, Keisuke Tanaka
2016/242
Attribute-Based Signatures for Circuits from Bilinear Map
Yusuke Sakai, Nuttapong Attrapadung, Goichiro Hanaoka
2016/241
A trivial debiasing scheme for Helper Data Systems
Boris Skoric
2016/240
On Error Distributions in Ring-based LWE
Wouter Castryck, Ilia Iliashenko, Frederik Vercauteren
2016/239
Provably Weak Instances of Ring-LWE Revisited
Wouter Castryck, Ilia Iliashenko, Frederik Vercauteren
2016/238
Algorithmic Countermeasures Against Fault Attacks and Power Analysis for RSA-CRT
Ágnes Kiss, Juliane Krämer, Pablo Rauzy, Jean-Pierre Seifert
2016/237
May-Ozerov Algorithm for Nearest-Neighbor Problem over $\mathbb{F}_{q}$ and Its Application to Information Set Decoding
Shoichi Hirose
2016/236
A Distinguisher on PRESENT-Like Permutations with Application to SPONGENT
Guoyan Zhang, Meicheng Liu
2016/235
Trading Plaintext-Awareness for Simulatability to Achieve Chosen Ciphertext Security
Takahiro Matsuda, Goichiro Hanaoka
2016/234
Trick or Tweak: On the (In)security of OTR’s Tweaks
Raphael Bost, Olivier Sanders
2016/233
Smooth NIZK Arguments with Applications to Asymmetric UC-PAKE and Threshold-IBE
Charanjit S. Jutla, Arnab Roy
2016/232
Efficient Privacy-Preserving Matrix Factorization via Fully Homomorphic Encryption
Sungwook Kim, Jinsu Kim, Dongyoung Koo, Yuna Kim, Hyunsoo Yoon, Junbum Shin
2016/231
Side-Channel Analysis of Weierstrass and Koblitz Curve ECDSA on Android Smartphones
Pierre Belgarric, Pierre-Alain Fouque, Gilles Macario-Rat, Mehdi Tibouchi
2016/230
ECDSA Key Extraction from Mobile Devices via Nonintrusive Physical Side Channels
Daniel Genkin, Lev Pachmanov, Itamar Pipman, Eran Tromer, Yuval Yarom
2016/229
Key Compression for Isogeny-Based Cryptosystems
Reza Azarderakhsh, David Jao, Kassem Kalach, Brian Koziel, Christopher Leonardi
2016/228
On a decentralized trustless pseudo-random number generation algorithm
Serguei Popov
2016/227
Process Table Covert Channels: Exploitation and Countermeasures
Jean-Michel Cioranesco, Houda Ferradi, Rémi Géraud, David Naccache
2016/226
On Statistically Secure Obfuscation with Approximate Correctness
Zvika Brakerski, Chris Brzuska, Nils Fleischhacker
2016/225
A New Birthday-Type Algorithm for Attacking the Fresh Re-Keying Countermeasure
Qian Guo, Thomas Johansson
2016/224
CacheBleed: A Timing Attack on OpenSSL Constant Time RSA
Yuval Yarom, Daniel Genkin, Nadia Heninger
2016/223
Still Wrong Use of Pairings in Cryptography
Mehmet Sabır Kiraz, Osmanbey Uzunkol
2016/222
Time-Memory Trade-Off for Lattice Enumeration in a Ball
Paul Kirchner, Pierre-Alain Fouque
2016/221
Post-Compromise Security
Katriel Cohn-Gordon, Cas Cremers, Luke Garratt
2016/220
Algorithms on Ideal over Complex Multiplication order
Paul Kirchner
2016/219
Nonce-based Kerberos is a Secure Delegated AKE Protocol
Jörg Schwenk
2016/218
Semantic Security and Key-Privacy With Random Split of St-Gen Codes
Danilo Gligoroski, Simona Samardjiska
2016/217
Practical backward unlinkable revocation in FIDO, German e-ID, Idemix and U-Prove
Eric R. Verheul
2016/216
Fair mPSI and mPSI-CA: Efficient Constructions in Prime Order Groups with Security in the Standard Model against Malicious Adversary
Sumit Kumar Debnath, Ratna Dutta
2016/215
Algorithms for the Approximate Common Divisor Problem
Steven D. Galbraith, Shishay W. Gebregiyorgis, Sean Murphy
2016/214
An Improvement of Both Security and Reliability for Keccak Implementations on Smart Card
Pei Luo, Liwei Zhang, Yunsi Fei, A. Adam Ding
2016/213
3-Message Zero Knowledge Against Human Ignorance
Nir Bitansky, Zvika Brakerski, Yael Kalai, Omer Paneth, Vinod Vaikuntanathan
2016/212
Low Linear Complexity Estimates for Coordinate Sequences of Linear Recurrences of Maximal Period over Galois Ring
Vadim N. Tsypyschev
2016/211
Randomness Complexity of Private Circuits for Multiplication
Sonia Belaïd, Fabrice Benhamouda, Alain Passelègue, Emmanuel Prouff, Adrian Thillard, Damien Vergnaud
2016/210
Hopes, Fears and Software Obfuscation: A Survey
Boaz Barak
2016/209
Automatic Differential Analysis of ARX Block Ciphers with Application to SPECK and LEA
Ling Song, Zhangjie Huang, Qianqian Yang
2016/208
Constant-Round Asynchronous Multi-Party Computation Based on One-Way Functions
Sandro Coretti, Juan Garay, Martin Hirt, Vassilis Zikas
2016/207
Fault analysis and weak key-IV attack on Sprout
Dibyendu Roy, Sourav Mukhopadhyay
2016/206
Construction of Fully CCA-Secure Predicate Encryptions from Pair Encoding Schemes
Johannes Blömer, Gennadij Liske
2016/205
Addressing the Algebraic Eraser Diffie--Hellman Over-the-Air Protocol
Derek Atkins, Dorian Goldfeld
2016/204
A Memory Encryption Engine Suitable for General Purpose Processors
Shay Gueron
2016/203
White-Box Cryptography in the Gray Box - A Hardware Implementation and its Side Channels
Pascal Sasdrich, Amir Moradi, Tim Güneysu
2016/202
An Encryption Scheme based on Random Split of St-Gen Codes
Simona Samardjiska, Danilo Gligoroski
2016/201
From Stateful Hardware to Resettable Hardware Using Symmetric Assumptions
Nico Doettling, Daniel Kraschewski, Joern Mueller-Quade, Tobias Nilges
2016/200
An Alternative View of the Graph-Induced Multilinear Maps
Yilei Chen
2016/199
The Honey Badger of BFT Protocols
Andrew Miller, Yu Xia, Kyle Croman, Elaine Shi, Dawn Song
2016/198
Optimizing S-box Implementations for Several Criteria using SAT Solvers
Ko Stoffelen
2016/197
Post-quantum Security of the CBC, CFB, OFB, CTR, and XTS Modes of Operation
Mayuresh Vivekanand Anand, Ehsan Ebrahimi Targhi, Gelo Noel Tabia, Dominique Unruh
2016/196
Multi-Key FHE from LWE, Revisited
Chris Peikert, Sina Shiehian
2016/195
How to Generalize RSA Cryptanalyses
Atsushi Takayasu, Noboru Kunihiro
2016/194
How to Share a Secret, Infinitely
Ilan Komargodski, Moni Naor, Eylon Yogev
2016/193
Security considerations for Galois non-dual RLWE families
Hao Chen, Kristin Lauter, Katherine E. Stange
2016/192
On Negation Complexity of Injections, Surjections and Collision-Resistance in Cryptography
Douglas Miller, Adam Scrivener, Jesse Stern, Muthuramakrishnan Venkitasubramaniam
2016/191
Optimal Security Proofs for Signatures from Identification Schemes
Eike Kiltz, Daniel Masny, Jiaxin Pan
2016/190
A MAC Mode for Lightweight Block Ciphers
Atul Luykx, Bart Preneel, Elmar Tischhauser, Kan Yasuda
2016/189
Yao's millionaires' problem and public-key encryption without computational assumptions
Dima Grigoriev, Laszlo B. Kish, Vladimir Shpilrain
2016/188
On the division property of S-boxes
Faruk Göloğlu, Vincent Rijmen, Qingju Wang
2016/187
Efficient Secure Multiparty Computation with Identifiable Abort
Carsten Baum, Emmanuela Orsini, Peter Scholl
2016/186
Lightweight MDS Generalized Circulant Matrices (Full Version)
Meicheng Liu, Siang Meng Sim
2016/185
On the Influence of Message Length in PMAC's Security Bounds
Atul Luykx, Bart Preneel, Alan Szepieniec, Kan Yasuda
2016/184
Efficiently Enforcing Input Validity in Secure Two-party Computation
Jonathan Katz, Alex J. Malozemoff, Xiao Wang
2016/183
There is Wisdom in Harnessing the Strengths of your Enemy: Customized Encoding to Thwart Side-Channel Attacks -- Extended Version --
Houssem Maghrebi, Victor Servant, Julien Bringer
2016/182
Side-Channel Watchdog: Run-Time Evaluation of Side-Channel Vulnerability in FPGA-Based Crypto-systems
Souvik Sonar, Debapriya Basu Roy, Rajat Subhra Chakraborty, Debdeep Mukhopadhyay
2016/181
Cryptographic Properties of Addition Modulo $2^n$
S. M. Dehnavi, A. Mahmoodi Rishakani, M. R. Mirzaee Shamsabad, Hamidreza Maimani, Einollah Pasha
2016/180
Public-Key Encryption with Simulation-Based Selective-Opening Security and Compact Ciphertexts
Dennis Hofheinz, Tibor Jager, Andy Rupp
2016/179
Computing theta functions in quasi-linear time in genus 2 and above
Hugo Labrande, Emmanuel Thomé
2016/178
Integrals go Statistical: Cryptanalysis of Full Skipjack Variants
Meiqin Wang, Tingting Cui, Huaifeng Chen, Ling Sun, Long Wen, Andrey Bogdanov
2016/177
Reduced Memory Meet-in-the-Middle Attack against the NTRU Private Key
Christine van Vredendaal
2016/176
Anonymous Role-Based Access Control on E-Health Records
Xingguang Zhou, Jianwei Liu, Weiran Liu, Qianhong Wu
2016/175
Online/Offline OR Composition of Sigma Protocols
Michele Ciampi, Giuseppe Persiano, Alessandra Scafuro, Luisa Siniscalchi, Ivan Visconti
2016/174
Honey Encryption Beyond Message Recovery Security
Joseph Jaeger, Thomas Ristenpart, Qiang Tang
2016/173
Circuit Compilers with O(1/ log(n)) Leakage Rate
Marcin Andrychowicz, Stefan Dziembowski, Sebastian Faust
2016/172
All Your Queries Are Belong to Us: The Power of File-Injection Attacks on Searchable Encryption
Yupeng Zhang, Jonathan Katz, Charalampos Papamanthou
2016/171
Commutativity, Associativity, and Public Key Cryptography
Jacques Patarin, Valérie Nachef
2016/170
Fast Learning Requires Good Memory: A Time-Space Lower Bound for Parity Learning
Ran Raz
2016/169
Provably Robust Sponge-Based PRNGs and KDFs
Peter Gaži, Stefano Tessaro
2016/168
Town Crier: An Authenticated Data Feed for Smart Contracts
Fan Zhang, Ethan Cecchetti, Kyle Croman, Ari Juels, Elaine Shi
2016/167
On Bitcoin Security in the Presence of Broken Crypto Primitives
Ilias Giechaskiel, Cas Cremers, Kasper Rasmussen
2016/166
Per-Session Security: Password-Based Cryptography Revisited
Grégory Demay, Peter Gaži, Ueli Maurer, Björn Tackmann
2016/165
PrAd: Enabling Privacy-Aware Location based Advertising
Hung Dang, Ee-Chien Chang
2016/164
Sanitization of FHE Ciphertexts
Léo Ducas, Damien Stehle
2016/163
ZKBoo: Faster Zero-Knowledge for Boolean Circuits
Irene Giacomelli, Jesper Madsen, Claudio Orlandi
2016/162
New Negative Results on Differing-Inputs Obfuscation
Mihir Bellare, Igors Stepanovs, Brent Waters
2016/161
Revisiting Structure Graphs: Applications to CBC-MAC and EMAC
Ashwin Jha, Mridul Nandi
2016/160
Polytopic Cryptanalysis
Tyge Tiessen
2016/159
Pseudoentropy: Lower-bounds for Chain rules and Transformations
Krzysztof Pietrzak, Maciej Skorski
2016/158
A Subgradient Algorithm For Computational Distances and Applications to Cryptography
Maciej Skórski
2016/157
Key Derivation for Squared-Friendly Applications: Lower Bounds
Maciej Skorski
2016/156
More Efficient Constant-Round Multi-Party Computation from BMR and SHE
Yehuda Lindell, Nigel P. Smart, Eduardo Soria-Vazquez
2016/155
Cryptanalysis of Multi-Prime $\Phi$-Hiding Assumption
Jun Xu, Lei Hu, Santanu Sarkar, Xiaona Zhang, Zhangjie Huang, Liqiang Peng
2016/154
Highly-Efficient Fully-Anonymous Dynamic Group Signatures
David Derler, Daniel Slamanig
2016/153
Differentially Private Password Frequency Lists
Jeremiah Blocki, Anupam Datta, Joseph Bonneau
2016/152
Attacks and parameter choices in HIMMO
Oscar Garcia-Morchon, Ronald Rietman, Ludo Tolhuizen, Jose-Luis Torre-Arce, Moon Sung Lee, Domingo Gomez-Perez, Jaime Gutierrez, Berry Schoenmakers
2016/151
Pseudorandom Functions in Almost Constant Depth from Low-Noise LPN
Yu Yu, John Steinberger
2016/150
On Garbling Schemes with and without Privacy
Carsten Baum
2016/149
Improved Integral and Zero-correlation Linear Cryptanalysis of Reduced-round CLEFIA Block Cipher
Wentan Yi, Shaozhen Chen
2016/148
Isogeny-based Quantum-resistant Undeniable Blind Signature Scheme
Srinath M. S., V. Chandrasekaran
2016/147
Annihilation Attacks for Multilinear Maps: Cryptanalysis of Indistinguishability Obfuscation over GGH13
Eric Miles, Amit Sahai, Mark Zhandry
2016/146
Improved Progressive BKZ Algorithms and their Precise Cost Estimation by Sharp Simulator
Yoshinori Aono, Yuntao Wang, Takuya Hayashi, Tsuyoshi Takagi
2016/145
Designing Proof of Human-work Puzzles for Cryptocurrency and Beyond
Jeremiah Blocki, Hong-Sheng Zhou
2016/144
Highly-Efficient and Composable Password-Protected Secret Sharing (Or: How to Protect Your Bitcoin Wallet Online)
Stanislaw Jarecki, Aggelos Kiayias, Hugo Krawczyk, Jiayu Xu
2016/143
On upper bounds for algebraic degrees of APN functions
Lilya Budaghyan, Claude Carlet, Tor Helleseth, Nian Li, Bo Sun
2016/142
Hash-Function based PRFs: AMAC and its Multi-User Security
Mihir Bellare, Daniel J. Bernstein, Stefano Tessaro
2016/141
On low degree polynomials in 2-round AES
Igor Semaev
2016/140
Adaptively Secure Identity-Based Encryption from Lattices with Asymptotically Shorter Public Parameters
Shota Yamada
2016/139
An Algorithm for NTRU Problems and Cryptanalysis of the GGH Multilinear Map without a Low Level Encoding of Zero
Jung Hee Cheon, Jinhyuck Jeong, Changmin Lee
2016/138
A new algorithm for residue multiplication modulo $2^{521}-1$
Shoukat Ali, Murat Cenk
2016/137
Rate-1, Linear Time and Additively Homomorphic UC Commitments
Ignacio Cascudo, Ivan Damgård, Bernardo David, Nico Döttling, Jesper Buus Nielsen
2016/136
Automatic Expectation and Variance Computing for Attacks on Feistel Schemes
Emmanuel Volte, Valérie Nachef, Nicolas Marrière
2016/135
Cryptanalysis of the New CLT Multilinear Map over the Integers
Jung Hee Cheon, Pierre-Alain Fouque, Changmin Lee, Brice Minaud, Hansol Ryu
2016/134
More Practical and Secure History-Independent Hash Tables
Michael T. Goodrich, Evgenios M. Kornaropoulos, Michael Mitzenmacher, Roberto Tamassia
2016/133
On the nonlinearity of monotone Boolean functions
Claude Carlet
2016/132
Cryptanalysis of 6-round PRINCE using 2 Known Plaintexts
Shahram Rasoolzadeh, Håvard Raddum
2016/131
New Attacks on the Concatenation and XOR Hash Combiners
Itai Dinur
2016/130
On the Computation of the Optimal Ate Pairing at the 192-bit Security Level
Loubna Ghammam, Emmanuel Fouotsa
2016/129
ECDH Key-Extraction via Low-Bandwidth Electromagnetic Attacks on PCs
Daniel Genkin, Lev Pachmanov, Itamar Pipman, Eran Tromer
2016/128
Removing the Strong RSA Assumption from Arguments over the Integers
Geoffroy Couteau, Thomas Peters, David Pointcheval
2016/127
A subfield lattice attack on overstretched NTRU assumptions: Cryptanalysis of some FHE and Graded Encoding Schemes
Martin Albrecht, Shi Bai, Léo Ducas
2016/126
Server Notaries: A Complementary Approach to the Web PKI Trust Model
Emre Yüce, Ali Aydın Selçuk
2016/125
Compact Identity Based Encryption from LWE
Daniel Apon, Xiong Fan, Feng-Hao Liu
2016/124
Collecting relations for the Number Field Sieve in $GF(p^6)$
Pierrick Gaudry, Laurent Grémy, Marion Videau
2016/123
Robust Password-Protected Secret Sharing
Michel Abdalla, Mario Cornejo, Anca Nitulescu, David Pointcheval
2016/122
Simpira v2: A Family of Efficient Permutations Using the AES Round Function
Shay Gueron, Nicky Mouha
2016/121
Tightly-Secure Pseudorandom Functions via Work Factor Partitioning
Tibor Jager
2016/120
Oblivious Transfer from Any Non-Trivial Elastic Noisy Channels via Secret Key Agreement
Ignacio Cascudo, Ivan Damgård, Felipe Lacerda, Samuel Ranellucci
2016/119
Lightweight Multiplication in GF(2^n) with Applications to MDS Matrices
Christof Beierle, Thorsten Kranz, Gregor Leander
2016/118
Circuit-ABE from LWE: Unbounded Attributes and Semi-Adaptive Security
Zvika Brakerski, Vinod Vaikuntanathan
2016/117
Circular Security Separations for Arbitrary Length Cycles from LWE
Venkata Koppula, Brent Waters
2016/116
Interactive Oracle Proofs
Eli Ben-Sasson, Alessandro Chiesa, Nicholas Spooner
2016/115
Efficiently Computing Data-Independent Memory-Hard Functions
Joel Alwen, Jeremiah Blocki
2016/114
The Magic of ELFs
Mark Zhandry
2016/113
On the Composition of Two-Prover Commitments, and Applications to Multi-Round Relativistic Commitments
Serge Fehr, Max Fillinger
2016/112
On the (In)security of SNARKs in the Presence of Oracles
Dario Fiore, Anca Nitulescu
2016/111
Scalable and Secure Logistic Regression via Homomorphic Encryption
Yoshinori Aono, Takuya Hayashi, Le Trieu Phong, Lihua Wang
2016/110
Three's Compromised Too: Circular Insecurity for Any Cycle Length from (Ring-)LWE
Navid Alamati, Chris Peikert
2016/109
Fast Multiparty Multiplications from shared bits
Ivan Damgård, Tomas Toft, Rasmus Winther Zakarias
2016/108
An Efficient Toolkit for Computing Private Set Operations
Alex Davidson, Carlos Cid
2016/107
Fully Anonymous Transferable Ecash
Hitesh Tewari, Arthur Hughes
2016/106
Access Control Encryption: Enforcing Information Flow with Cryptography
Ivan Damgård, Helene Haagh, Claudio Orlandi
2016/105
Can there be efficient and natural FHE schemes?
Kristian Gjøsteen, Martin Strand
2016/104
Open Sesame: The Password Hashing Competition and Argon2
Jos Wetzels
2016/103
Speed Optimizations in Bitcoin Key Recovery Attacks
Nicolas Courtois, Guangyan Song, Ryan Castellucci
2016/102
Breaking the Sub-Exponential Barrier in Obfustopia
Sanjam Garg, Omkant Pandey, Akshayaram Srinivasan, Mark Zhandry
2016/101
Signature Schemes with Efficient Protocols and Dynamic Group Signatures from Lattice Assumptions
Benoit Libert, San Ling, Fabrice Mouhartem, Khoa Nguyen, Huaxiong Wang
2016/100
On the Complexity of Scrypt and Proofs of Space in the Parallel Random Oracle Model
Joël Alwen, Binyi Chen, Chethan Kamath, Vladimir Kolmogorov, Krzysztof Pietrzak, Stefano Tessaro
2016/099
Attribute-Based Fully Homomorphic Encryption with a Bounded Number of Inputs
Michael Clear, Ciaran McGoldrick
2016/098
Haraka v2 - Efficient Short-Input Hashing for Post-Quantum Applications
Stefan Kölbl, Martin M. Lauridsen, Florian Mendel, Christian Rechberger
2016/097
A Maiorana-McFarland Construction of a GBF on Galois ring
Shashi Kant Pandey, P. R. Mishra, B. K. Dass
2016/096
Provable Security Evaluation of Structures against Impossible Differential and Zero Correlation Linear Cryptanalysis
Bing Sun, Meicheng Liu, Jian Guo, Vincent Rijmen, Ruilin Li
2016/095
Obfuscation without Multilinear Maps
Dingfeng Ye, Peng Liu
2016/094
Tightly CCA-Secure Encryption without Pairings
Romain Gay, Dennis Hofheinz, Eike Kiltz, Hoeteck Wee
2016/093
Valiant's Universal Circuit is Practical
Ágnes Kiss, Thomas Schneider
2016/092
Cryptanalysis of the Full Spritz Stream Cipher
Subhadeep Banik, Takanori Isobe
2016/091
On the Security of the Algebraic Eraser Tag Authentication Protocol
Simon R. Blackburn, M. J. B. Robshaw
2016/090
Spectral characterization of iterating lossy mappings
Joan Daemen
2016/089
On the Hardness of LWE with Binary Error: Revisiting the Hybrid Lattice-Reduction and Meet-in-the-Middle Attack
Johannes Buchmann, Florian Göpfert, Rachel Player, Thomas Wunderer
2016/088
On Linear Hulls and Trails
Tomer Ashur, Vincent Rijmen
2016/087
Safely Exporting Keys from Secure Channels: On the Security of EAP-TLS and TLS Key Exporters
Chris Brzuska, Håkon Jacobsen, Douglas Stebila
2016/086
Intel SGX Explained
Victor Costan, Srinivas Devadas
2016/085
Cryptanalysis of ring-LWE based key exchange with key share reuse
Scott Fluhrer
2016/084
Truncated Differential Analysis of Round-Reduced RoadRunneR Block Cipher
Qianqian Yang, Lei Hu, Siwei Sun, Ling Song
2016/083
NSEC5 from Elliptic Curves: Provably Preventing DNSSEC Zone Enumeration with Shorter Responses
Sharon Goldberg, Moni Naor, Dimitrios Papadopoulos, Leonid Reyzin
2016/082
Non-Interactive Plaintext (In-)Equality Proofs and Group Signatures with Verifiable Controllable Linkability
Olivier Blazy, David Derler, Daniel Slamanig, Raphael Spreitzer
2016/081
A Cryptographic Analysis of the TLS 1.3 draft-10 Full and Pre-shared Key Handshake Protocol
Benjamin Dowling, Marc Fischlin, Felix Günther, Douglas Stebila
2016/080
Cryptanalysis of PRINCE with Minimal Data
Shahram Rasoolzadeh, Håvard Raddum
2016/079
Protect both Integrity and Confidentiality in Outsourcing Collaborative Filtering Computations
Qiang Tang, Balazs Pejo, Husen Wang
2016/078
Non-Interactive Verifiable Secret Sharing For Monotone Circuits
Ge Bai, Ivan Damgård, Claudio Orlandi, Yu Xia
2016/077
Improved Multi-Dimensional Meet-in-the-Middle Cryptanalysis of KATAN
Shahram Rasoolzadeh, Håvard Raddum
2016/076
New Efficient and Flexible Algorithms for Secure Outsourcing of Bilinear Pairings
Xi-Jun Lin, Haipeng Qu, Xiaoshuai Zhang
2016/075
Weaknesses in Hadamard Based Symmetric Key Encryption Schemes
Gajraj Kuldeep, Devendra Kumar Yadav, A. K. Sharma
2016/074
On the Power of Secure Two-Party Computation
Carmit Hazay, Muthuramakrishnan Venkitasubramaniam
2016/073
MU-ORAM: Dealing with Stealthy Privacy Attacks in Multi-User Data Outsourcing Services
Jinsheng Zhang, Wensheng Zhang, Daji Qiao
2016/072
Downgrade Resilience in Key-Exchange Protocols
Karthikeyan Bhargavan, Chris Brzuska, Cédric Fournet, Matthew Green, Markulf Kohlweiss, Santiago Zanella-Béguelin
2016/071
Reverse-Engineering the S-Box of Streebog, Kuznyechik and STRIBOBr1 (Full Version)
Alex Biryukov, Léo Perrin, Aleksei Udovenko
2016/070
Domain-Specific Pseudonymous Signatures Revisited
Kamil Kluczniak
2016/069
Verification Methods for the Computationally Complete Symbolic Attacker Based on Indistinguishability
Gergei Bana, Rohit Chadha
2016/068
Octonion Algebra and Noise-Free Fully Homomorphic Encryption (FHE) Schemes
Yongge Wang
2016/067
OPFE: Outsourcing Computation for Private Function Evaluation
Henry Carter, Patrick Traynor
2016/066
Linear Hull Attack on Round-Reduced Simeck with Dynamic Key-guessing Techniques
Lingyue Qin, Huaifeng Chen, Xiaoyun Wang
2016/065
A note on Tensor Simple Matrix Encryption Scheme
Yasufumi Hashimoto
2016/064
Unconditionally Secure Revocable Storage: Tight Bounds, Optimal Construction, and Robustness
Yohei Watanabe, Goichiro Hanaoka, Junji Shikata
2016/063
Analysing and Exploiting the Mantin Biases in RC4
Remi Bricout, Sean Murphy, Kenneth G. Paterson, Thyla van der Merwe
2016/062
Verifiable Dynamic Symmetric Searchable Encryption: Optimality and Forward Security
Raphael Bost, Pierre-Alain Fouque, David Pointcheval
2016/061
Accountable Privacy for Decentralized Anonymous Payments
Christina Garman, Matthew Green, Ian Miers
2016/060
Automated key setup and recovery from key exposure for power networks
Amir Herzberg, Yehonatan Kfir
2016/059
Secure positioning and quantum non-local correlations
Muhammad Nadeem
2016/058
New Lattice Attacks on DSA Schemes
Dimitrios Poulakis
2016/057
On the Architectural Analysis of Arbiter Delay PUF Variants
DURGA PRASAD SAHOO, PHUONG HA NGUYEN, RAJAT SUBHRA CHAKRABORTY, DEBDEEP MUKHOPADHYA
2016/056
Blindly Signed Contracts: Anonymous On-Blockchain and Off-Blockchain Bitcoin Transactions
Ethan Heilman, Foteini Baldimtsi, Sharon Goldberg
2016/055
Attacking NTP's Authenticated Broadcast Mode
Aanchal Malhotra, Sharon Goldberg
2016/054
Fully Homomorphic Public-Key Encryption with Two Ciphertexts based on Discrete Logarithm Problem
Masahiro Yagisawa
2016/053
Speed and Area Optimized Parallel Higher-Radix Modular Multipliers
khalid Javeed, Xiaojun Wang
2016/052
Fault-Tolerant Aggregate Signatures
Gunnar Hartung, Björn Kaidel, Alexander Koch, Jessica Koch, Andy Rupp
2016/051
Capacity and Data Complexity in Multidimensional Linear Attack
Jialin Huang, Serge Vaudenay, Xuejia Lai, Kaisa Nyberg
2016/050
Improved Fully Homomorphic Encryption with Composite Number Modulus
Masahiro Yagisawa
2016/049
Implementing a Toolkit for Ring-LWE Based Cryptography in Arbitrary Cyclotomic Number Fields
Christoph M. Mayer
2016/048
Better Preprocessing for Secure Multiparty Computation
Carsten Baum, Ivan Damgård, Tomas Toft, Rasmus Zakarias
2016/047
Comb to Pipeline: Fast Software Encryption Revisited
Andrey Bogdanov, Martin M. Lauridsen, Elmar Tischhauser
2016/046
How To Simulate It - A Tutorial on the Simulation Proof Technique
Yehuda Lindell
2016/045
New Approaches for Secure Outsourcing Algorithm for Modular Exponentiations
Xi-Jun Lin, Lin Sun, Haipeng Qu, Xiaoshuai Zhang
2016/044
Defeating the Ben-Zvi, Blackburn, and Tsaban Attack on the Algebraic Eraser
Iris Anshel, Derek Atkins, Dorian Goldfeld, Paul E. Gunnells
2016/043
Strong Continuous Non-malleable Encoding Schemes with Tamper-Detection
Amir S. Mortazavi, Mahmoud Salmasizadeh, Amir Daneshgar
2016/042
Neeva: A Lightweight Hash Function
Khushboo Bussi, Dhananjoy Dey, Manoj Kumar, B. K. Dass
2016/041
A NEW UNLINKABLE SECRET HANDSHAKES SCHEME BASED ON ZSS
Preeti Kulshrestha, Arun Kumar
2016/040
Packet Header Anomaly Detection Using Bayesian Topic Models
Xuefei Cao, Bo Chen, Hui Li, Yulong Fu
2016/039
Standard quantum bit commitment – an indefinite commitment time
Muhammad Nadeem
2016/038
Collateral Damage in Online Social Networks: computing the significance of information collection
Iraklis Symeonids, Bart Preneel
2016/037
A Framework for Outsourcing of Secure Computation
Thomas P. Jakobsen, Jesper Buus Nielsen, Claudio Orlandi
2016/036
Characterizations of the Degraded Boolean Function and Cryptanalysis of the SAFER Family
wentan Yi, Shaozhen Chen
2016/035
Simple Proofs of Space-Time and Rational Proofs of Storage
Tal Moran, Ilan Orlov
2016/034
Universal Composition with Responsive Environments
Jan Camenisch, Robert R. Enderlein, Stephan Krenn, Ralf Kuesters, Daniel Rausch
2016/033
Towards a Unified Security Model for Physically Unclonable Functions
Frederik Armknecht, Daisuke Moriyama, Ahmad-Reza Sadeghi, Moti Yung
2016/032
On the Leakage-Resilient Key Exchange
Janaka Alawatugoda
2016/031
Beyond the selective disclosure of ABCs on RAM-constrained devices
Antonio de la Piedra
2016/030
An Efficient Lattice-Based Signature Scheme with Provably Secure Instantiation
Sedat Akleylek, Nina Bindel, Johannes Buchmann, Juliane Krämer, Giorgia Azzurra Marson
2016/029
Simple SIMON: FPGA implementations of the SIMON 64/128 Block Cipher
Jos Wetzels, Wouter Bokslag
2016/028
Sponges and Engines: An introduction to Keccak and Keyak
Jos Wetzels, Wouter Bokslag
2016/027
Balloon Hashing: A Memory-Hard Function Providing Provable Protection Against Sequential Attacks
Dan Boneh, Henry Corrigan-Gibbs, Stuart Schechter
2016/026
A Practical Template Attack on MICKEY-128 2.0 Using PSO Generated IVs and LS-SVM
Abhishek Chakraborty, Debdeep Mukhopadhyay
2016/025
Human-readable Proof of the Related-Key Security of AES-128
Khoongming Khoo, Eugene Lee, Thomas Peyrin, Siang Meng Sim
2016/024
Refund attacks on Bitcoin’s Payment Protocol
Patrick McCorry, Siamak F. Shahandashti, Feng Hao
2016/023
Improved on an improved remote user authentication scheme with key agreement
Yalin Chen, Jue-Sam Chou, I - Chiung Liao
2016/022
On derivatives of polynomials over finite fields through integration
Enes Pasalic, Amela Muratovic-Ribic, Samir Hodzic, Sugata Gangopadhyay
2016/021
Quasi-Linear Size Zero Knowledge from Linear-Algebraic PCPs
Eli Ben-Sasson, Alessandro Chiesa, Ariel Gabizon, Madars Virza
2016/020
Truncated Differential Based Known-Key Attacks on Round-Reduced Simon
Yonglin Hao, Willi Meier
2016/019
Analysis of Gong et al.'s CCA2-Secure Homomorphic Encryption
Hyung Tae Lee, San Ling, Huaxiong Wang
2016/018
Private Functional Encryption: Indistinguishability-Based Definitions and Constructions from Obfuscation
Afonso Arriaga, Manuel Barbosa, Pooya Farshim
2016/017
Valiant's Universal Circuit: Improvements, Implementation, and Applications
Helger Lipmaa, Payman Mohassel, Saeed Sadeghian
2016/016
A trustless privacy-preserving reputation system
Alexander Schaub, Rémi Bazin, Omar Hasan, Lionel Brunie
2016/015
Quantum Collision-Resistance of Non-Uniformly Distributed Functions
Ehsan Ebrahimi Targhi, Gelo Noel Tabia, Dominique Unruh
2016/014
Foundations of Hardware-Based Attested Computation and Application to SGX
Manuel Barbosa, Bernardo Portela, Guillaume Scerri, Bogdan Warinschi
2016/013
Threshold-optimal DSA/ECDSA signatures and an application to Bitcoin wallet security
Rosario Gennaro, Steven Goldfeder, Arvind Narayanan
2016/012
Cryptography for Big Data Security
Ariel Hamlin, Nabil Schear, Emily Shen, Mayank Varia, Sophia Yakoubov, Arkady Yerukhimovich
2016/011
Better Security for Functional Encryption for Inner Product Evaluations
Michel Abdalla, Florian Bourse, Angelo De Caro, David Pointcheval
2016/010
Eliminating Decryption Failures from the Simple Matrix Encryption Scheme
Albrecht Petzoldt, Jintai Ding, Lih-Chung Wang
2016/009
PUF-BASED SOLUTIONS FOR SECURE COMMUNICATIONS IN ADVANCED METERING INFRASTRUCTURE (AMI)
Mahshid Delavar, Sattar Mirzakuchaki, Mohammad Hassan Ameri, Javad Mohajeri
2016/008
cMix: Mixing with Minimal Real-Time Asymmetric Cryptographic Operations
David Chaum, Debajyoti Das, Farid Javani, Aniket Kate, Anna Krasnova, Joeri de Ruiter, Alan T. Sherman
2016/007
Easing Coppersmith Methods using Analytic Combinatorics: Applications to Public-Key Cryptography with Weak Pseudorandomness
Fabrice Benhamouda, Céline Chevalier, Adrian Thillard, Damien Vergnaud
2016/006
Indistinguishability Obfuscation with Non-trivial Efficiency
Huijia Lin, Rafael Pass, Karn Seth, Sidharth Telang
2016/005
A Columnar Transposition cipher in a contemporary setting.
John Jones
2016/004
Bounding basis reduction properties
Arnold Neumaier
2016/003
On Splitting a Point with Summation Polynomials in Binary Elliptic Curves
Nicolas T. Courtois
2016/002
Remote Cache-Timing Attack without Learning Phase
Ali Can Atici, Cemal Yilmaz, Erkay Savas
2016/001
Improved on an efficient user authentication scheme for heterogeneous wireless sensor network tailored for the Internet of Things environment
Yalin Chen, Jue-Sam Chou, Hung-Sheng Wu
2015/1257
Security Attack on CloudBI: Practical privacy-preserving outsourcing of biometric identification in the cloud
Jiawei Yuan
2015/1256
Mitigating Multi-Target Attacks in Hash-based Signatures
Andreas Hülsing, Joost Rijneveld, Fang Song
2015/1255
Functional Encryption for Inner Product with Full Function Privacy
Pratish Datta, Ratna Dutta, Sourav Mukhopadhyay
2015/1254
Identity-based Hierarchical Key-insulated Encryption without Random Oracles
Yohei Watanabe, Junji Shikata
2015/1253
Non-Malleable Functions and Their Applications
Yu Chen, Baodong Qin, Jiang Zhang, Yi Deng, Sherman S. M. Chow
2015/1252
Improved Test Pattern Generation for Hardware Trojan Detection using Genetic Algorithm and Boolean Satisfiability
Sayandeep Saha, Rajat Subhra Chakraborty, Srinivasa Shashank Nuthakki, Anshul, Debdeep Mukhopadhyay
2015/1251
Comment on Quantum Cryptography---Which is More Important, Signal Security, Information Security or Communication Reliability
Zhengjun Cao, Zhenfu Cao
2015/1250
Adaptively Secure Garbled Circuits from One-Way Functions
Brett Hemenway, Zahra Jafargholi, Rafail Ostrovsky, Alessandra Scafuro, Daniel Wichs
2015/1249
Trap Me If You Can -- Million Dollar Curve
Thomas Baignères, Cécile Delerablée, Matthieu Finiasz, Louis Goubin, Tancrède Lepoint, Matthieu Rivain
2015/1248
Generic Transformation of a CCA2-Secure Public-Key Encryption Scheme to an eCK-Secure Key Exchange Protocol in the Standard Model
Janaka Alawatugoda
2015/1247
Missing a trick: Karatsuba variations
Mike Scott
2015/1246
Universally Composable Direct Anonymous Attestation
Jan Camenisch, Manu Drijvers, Anja Lehmann
2015/1245
Variation of GGH15 Multilinear Maps
Gu Chunsheng
2015/1244
On values of vectorial Boolean functions and related problems in APN functions
George Shushuev
2015/1243
Verifiable ASICs
Riad S. Wahby, Max Howald, Siddharth Garg, abhi shelat, Michael Walfish
2015/1242
Quantum Cryptography Beyond Quantum Key Distribution
Anne Broadbent, Christian Schaffner
2015/1241
Verifiable side-channel security of cryptographic implementations: constant-time MEE-CBC
José Bacelar Almeida, Manuel Barbosa, Gilles Barthe, François Dupressoir
2015/1240
Exploiting PUF Unreliability to Secure Wireless Sensing
Yansong Gao, Hua Ma, Damith C. Ranasinghe, Said F. Al-Sarawi, Derek Abbott
2015/1239
Secure Goods Supply Chain and Key Exchange with Virtual Proof of Reality
Yansong Gao, Damith C. Ranasinghe, Said F. Al-Sarawi, Derek Abbott
2015/1238
Asynchronous Secure Multiparty Computation in Constant Time
Ran Cohen
2015/1237
On the Security of One Password Authenticated Key Exchange Protocol
Stanislav V. Smyshlyaev, Igor B. Oshkin, Evgeniy K. Alekseev, Liliya R. Ahmetzyanova
2015/1236
A Bounded-Space Near-Optimal Key Enumeration Algorithm for Multi-Dimensional Side-Channel Attacks
Liron David, Avishai Wool
2015/1235
Constant-round Leakage-resilient Zero-knowledge from Collision Resistance
Susumu Kiyoshima
2015/1234
On Cryptographic Anonimity and Unpredicatbility in Secret Sharing
Ruxandra Olimid, Anat Paskin-Cherniavsky
2015/1233
Degenerate Curve Attacks
Samuel Neves, Mehdi Tibouchi
2015/1232
Extend FHEW to General Case
Zhou Tanping, Liu Longfei, Yang Xiaoyuan, Han Yiliang
2015/1231
When are Identification Protocols with Sparse Challenges Safe? The Case of the Coskun and Herley Attack
Hassan Jameel Asghar, Mohamed Ali Kaafar
2015/1230
Indistinguishable Proofs of Work or Knowledge
Foteini Baldimtsi, Aggelos Kiayias, Thomas Zacharias, Bingsheng Zhang
2015/1229
Cryptanalysis of a public key cryptosystem based on Diophantine equations via weighted LLL reduction
Jintai Ding, Momonari Kudo, Shinya Okumura, Tsuyoshi Takagi, Chengdong Tao
2015/1228
Privacy protection in electronic education based on polymorphic pseudonymization
Eric R. Verheul
2015/1227
Single Key Recovery Attacks on 9-round Kalyna-128/256 and Kalyna-256/512
Akshima, Donghoon Chang, Mohona Ghosh, Aarushi Goel, Somitra Kumar Sanadhya
2015/1226
Cryptoleq: A Heterogeneous Abstract Machine for Encrypted and Unencrypted Computation
Oleg Mazonka, Nektarios Georgios Tsoutsos, Michail Maniatakos
2015/1225
ECC on Your Fingertips: A Single Instruction Approach for Lightweight ECC Design in GF (p)
Debapriya Basu Roy, Poulami Das, Debdeep Mukhopadhyay
2015/1224
Twisted Polynomials and Forgery Attacks on GCM
Mohamed Ahmed Abdelraheem, Peter Beelen, Andrey Bogdanov, Elmar Tischhauser
2015/1223
Chosen-Ciphertext Security from Subset Sum
Sebastian Faust, Daniel Masny, Daniele Venturi
2015/1222
On the Asymptotic Complexity of Solving LWE
Gottfried Herold, Elena Kirshanova, Alexander May
2015/1221
Unclonable encryption revisited ($4 \times 2 = 8$)
Boris Skoric
2015/1220
Two-Round Man-in-the-Middle Security from LPN
David Cash, Eike Kiltz, Stefano Tessaro
2015/1219
Robust Pseudo-Random Number Generators with Input Secure Against Side-Channel Attacks
Michel Abdalla, Sonia Belaïd, David Pointcheval, Sylvain Ruhault, Damien Vergnaud
2015/1218
$Area-Time$ Efficient Hardware Implementation of Elliptic Curve Cryptosystem
Anissa Sghaier, Medien Zeghid, Belgacem Bouallegue, Adel Baganne, Mohsen Machhout
2015/1217
Two-faced processes and existence of RNG with proven properties
Boris Ryabko
2015/1216
Non-Transferable Proxy Re-Encryption
Hui Guo, Zhenfeng Zhang, Jing Xu
2015/1215
Simpler, Faster, and More Robust T-test Based Leakage Detection
A. Adam Ding, Cong Chen, Thomas Eisenbarth
2015/1214
Simple Security Definitions for and Constructions of 0-RTT Key Exchange
Britta Hale, Tibor Jager, Sebastian Lauer, Jörg Schwenk
2015/1213
Footprint scheduling for Dining-Cryptographer networks
Anna Krasnova, Moritz Neikes, Peter Schwabe
2015/1212
Choosing and generating parameters for low level pairing implementation on BN curves
Sylvain Duquesne, Nadia El Mrabet, Safia Haloui, Franck Rondepierre
2015/1211
Log Analysis of Estonian Internet Voting 2013--2015
Sven Heiberg, Arnis Parsovs, Jan Willemson
2015/1210
Quantum Security of the Fujisaki-Okamoto and OAEP Transforms
Ehsan Ebrahimi Targhi, Dominique Unruh
2015/1209
Fast Optimistically Fair Cut-and-Choose 2PC
Alptekin Kupcu, Payman Mohassel
2015/1208
Two Kinds of Biclique Attacks on Lightweight Block Cipher PRINCE
Zheng Yuan, Zhen Peng, Haiwen Ou
2015/1207
Comment on Demonstrations of Shor's Algorithm in the Past Decades
Zhengjun Cao, Zhenfu Cao, Lihua Liu
2015/1206
Simple Photonic Emission Attack with Reduced Data Complexity
Elad Carmon, Jean-Pierre Seifert, Avishai Wool
2015/1205
Deniable Functional Encryption
Angelo De Caro, Vincenzo Iovino, Adam O'Neill
2015/1204
Secret, verifiable auctions from elections
Elizabeth A. Quaglia, Ben Smyth
2015/1203
The graph of minimal distances of bent functions and its properties
Nikolay Kolomeec
2015/1202
CCA Security for Self-Updatable Encryption: Protecting Cloud Data When Clients Read/Write Ciphertexts
Kwangsu Lee, Dong Hoon Lee, Jong Hwan Park, Moti Yung
2015/1201
A Star-based Independent Biclique Attack on Full Rounds SQUARE
Zheng Yuan, Zhen Peng, Ming Mao
2015/1200
Heuristic Tool for Linear Cryptanalysis with Applications to CAESAR Candidates
Christoph Dobraunig, Maria Eichlseder, Florian Mendel
2015/1199
A compression method for homomorphic ciphertexts
S. Carpov, R. Sirdey
2015/1198
Symmetric and Dual PRFs from Standard Assumptions: A Generic Validation of a Prevailing Assumption
Mihir Bellare and Anna Lysyanskaya
2015/1197
On-the-fly Homomorphic Batching/Unbatching
Yarkın Doröz, Berk Sunar, Gizem S. Çetin
2015/1196
Secure Distributed Computation on Private Inputs
Geoffroy Couteau, Thomas Peters, David Pointcheval
2015/1195
ARITHMETIC USING WORD-WISE HOMOMORPHIC ENCRYPTION
Gizem S. Cetin, Yarkin Doroz, Berk Sunar, William J. Martin
2015/1194
HOMOMORPHIC AUTOCOMPLETE
Gizem S. Çetin, Wei Dai, Yarkın Doröz, Berk Sunar
2015/1193
Collision Attacks against CAESAR Candidates -- Forgery and Key-Recovery against AEZ and Marble
Thomas Fuhr, Gaëtan Leurent, Valentin Suder
2015/1192
A Guide to Fully Homomorphic Encryption
Frederik Armknecht, Colin Boyd, Christopher Carr, Kristian Gjøsteen, Angela Jäschke, Christian A. Reuter, Martin Strand
2015/1191
A Formal Analysis of Prefetching in Profiled Cache-Timing Attacks on Block Ciphers
Chester Rebeiro, Debdeep Mukhopadhyay
2015/1190
Private Large-Scale Databases with Distributed Searchable Symmetric Encryption
Yuval Ishal, Eyal Kushilevitz, Steve Lu, Rafail Ostrovsky
2015/1189
Invariant Subspace Attack Against Full Midori64
Jian Guo, Jérémy Jean, Ivica Nikolić, Kexin Qiao, Yu Sasaki, Siang Meng Sim
2015/1188
Compact Attribute-Based Encryption and Signcryption for General Circuits from Multilinear Maps
Pratish Datta, Ratna Dutta, Sourav Mukhopadhyay
2015/1187
On an almost-universal hash function family with applications to authentication and secrecy codes
Khodakhast Bibak, Bruce M. Kapron, Venkatesh Srinivasan, László Tóth
2015/1186
Restricted linear congruences
Khodakhast Bibak, Bruce M. Kapron, Venkatesh Srinivasan, Roberto Tauraso, László Tóth
2015/1185
Efficient Pseudorandom Functions via On-the-Fly Adaptation
Nico Doettling, Dominique Schröder
2015/1184
Extension Field Cancellation: a New Central Trapdoor for Multivariate Quadratic Systems
Alan Szepieniec, Jintai Ding, Bart Preneel
2015/1183
Authenticated Range \& Closest Point Queries in Zero-Knowledge
Esha Ghosh, Olga Ohrimenko, Roberto Tamassia
2015/1182
Chaskey: a MAC Algorithm for Microcontrollers -- Status Update and Proposal of Chaskey-12 --
Nicky Mouha
2015/1181
Construction of Transition Matrices for Binary FCSRs
Zhiqiang Lin, Dingyi Pei, Dongdai Lin
2015/1180
Secure Comparator: a ZKP-Based Authentication System
Ignat Korchagin, Eugene Pilyankevich
2015/1179
A construction of 3-dimensional lattice sieve for number field sieve over F_{p^n}
Kenichiro Hayasaka, Kazumaro Aoki, Tetsutaro Kobayashi, Tsuyoshi Takagi
2015/1178
Textbook Non-Malleable Commitments
Vipul Goyal, Omkant Pandey, Silas Richelson
2015/1177
On the CCA (in)security of MTProto
Jakob Jakobsen, Claudio Orlandi
2015/1176
On the Efficiency of FHE-based Private Queries
Myungsun Kim, Hyung Tae Lee, San Ling, Huaxiong Wang
2015/1175
Improved Data Confidentiality of Audit Trail Data in Multi-Tenant Cloud
Bhanu Prakash Gopularam, Nalini. N
2015/1174
On Data Complexity of Distinguishing Attacks vs. Message Recovery Attacks on Stream Ciphers
Goutam Paul, Souvik Ray
2015/1173
Secure Multiparty Computation with General Interaction Patterns
Shai Halevi, Yuval Ishai, Abhishek Jain, Eyal Kushilevitz, Tal Rabin
2015/1172
An Application Specific Instruction Set Processor (ASIP) for the Niederreiter Cryptosystem
Jingwei Hu, Ray C. C. Cheung
2015/1171
On the Security of a access polynomial based self-healing key management schemes in wireless sensor networks
Yandong Zheng, Hua Guo
2015/1170
Characterizing NTRU-Variants Using Group Ring and Evaluating their Lattice Security
Takanori Yasuda, Xavier Dahan, Kouichi Sakurai
2015/1169
Strength in Numbers: Threshold ECDSA to Protect Keys in the Cloud
Marc Green, Thomas Eisenbarth
2015/1168
SCP: A Computationally-Scalable Byzantine Consensus Protocol For Blockchains
Loi Luu, Viswesh Narayanan, Kunal Baweja, Chaodong Zheng, Seth Gilbert, Prateek Saxena
2015/1167
Constraining Pseudorandom Functions Privately
Dan Boneh, Kevin Lewi, David J. Wu
2015/1166
Ceremonies for End-to-End Verifiable Elections
Aggelos Kiayias, Thomas Zacharias, Bingsheng Zhang
2015/1165
Meet-in-the-Middle Attacks on Reduced-Round Midori-64
Li Lin, Wenling Wu
2015/1164
Beyond Bitcoin - Part I: A critical look at blockchain-based systems
Pasquale Forte, Diego Romano, Giovanni Schmid
2015/1163
A Guess-and-Determine Attack on Reduced-Round Khudra and Weak Keys of Full Cipher
Mehmet Özen, Mustafa Çoban, Ferhat Karakoç
2015/1162
The Moral Character of Cryptographic Work
Phillip Rogaway
2015/1161
Cyber and Physical Access Control in Legacy System Using Passwords
Jia Xu, Jianying Zhou, Liming Lu
2015/1160
Cryptanalysis of multi-HFE
Yasufumi Hashimoto
2015/1159
Students and Taxes: a Privacy-Preserving Social Study Using Secure Computation
Dan Bogdanov, Liina Kamm, Baldur Kubo, Reimo Rebane, Ville Sokk, Riivo Talviste
2015/1158
A note on the optimality of frequency analysis vs. $\ell_p$-optimization
Marie-Sarah Lacharité, Kenneth G. Paterson
2015/1157
From Identification to Signatures, Tightly: A Framework and Generic Transforms
Mihir Bellare, Bertram Poettering, Douglas Stebila
2015/1156
An Identity Based Encryption Scheme Resilient to RAM Scraper Like Malware Attacks
Dipanjan Das, Priyanka Bose, S. Sree Vivek, S. Sharmila Deva Selvi, C. Pandu Rangan
2015/1155
Cross Processor Cache Attacks
Gorka Irazoqui, Thomas Eisenbarth, Berk Sunar
2015/1154
NORX8 and NORX16: Authenticated Encryption for Low-End Systems
Jean-Philippe Aumasson, Philipp Jovanovic, Samuel Neves
2015/1153
Obliv-C: A Language for Extensible Data-Oblivious Computation
Samee Zahur, David Evans
2015/1152
Privacy-preserving Friendship-based Recommender Systems
Qiang Tang, Jun Wang
2015/1151
Fully Leakage-Resilient Codes
Antonio Faonio, Jesper Buus Nielsen
2015/1150
From Stateless to Stateful: Generic Authentication and Authenticated Encryption Constructions with Application to TLS
Colin Boyd, Britta Hale, Stig Frode Mjølsnes, Douglas Stebila
2015/1149
An Asymptotically Optimal Method for Converting Bit Encryption to Multi-Bit Encryption
Takahiro Matsuda, Goichiro Hanaoka
2015/1148
An Inverse-free Single-Keyed Tweakable Enciphering Scheme
Ritam Bhaumik, Mridul Nandi
2015/1147
Collusion Resistant Aggregation from Convertible Tags
Iraklis Leontiadis, Ming Li
2015/1146
libgroupsig: An extensible C library for group signatures
Jesus Diaz, David Arroyo, Francisco B. Rodriguez
2015/1145
Lattice Attacks on the DGHV Homomorphic Encryption Scheme
Abderrahmane Nitaj, Tajjeeddine Rachidi
2015/1144
Mitigating Server Breaches in Password-Based Authentication: Secure and Efficient Solutions
Olivier Blazy, Céline Chevalier, Damien Vergnaud
2015/1143
A Multi-Bit Fully Homomorphic Encryption with Shorter Public Key from LWE
Zhigang Chen, Xinxia Song
2015/1142
Midori: A Block Cipher for Low Energy (Extended Version)
Subhadeep Banik, Andrey Bogdanov, Takanori Isobe, Kyoji Shibutani, Harunaga Hiwatari, Toru Akishita, Francesco Regazzoni
2015/1141
Amplifying Side Channels Through Performance Degradation
Thomas Allan, Billy Bob Brumley, Katrina Falkner, Joop van de Pol, Yuval Yarom
2015/1140
Modular Inversion Hidden Number Problem- A Lattice Approach
Pranjal Dutta
2015/1139
Secret Sharing Schemes with General Access Structures (Full version)
Jian Liu, Sihem Mesnager, Lusheng Chen
2015/1138
Lightweight CRC-based Authentication
Elena Dubrova, Mats Näslund, Göran Selander, Fredrik Lindqvist
2015/1137
Improved Factoring Attacks on Multi-Prime RSA with Small Prime Difference
Mengce Zheng, Noboru Kunihiro, Honggang Hu
2015/1136
Multi-Input Functional Encryption for Unbounded Arity Functions
Saikrishna Badrinarayanan, Divya Gupta, Abhishek Jain, Amit Sahai
2015/1135
On the Security of the Schnorr Signature Scheme and DSA against Related-Key Attacks
Hiraku Morita, Jacob C. N. Schuldt, Takahiro Matsuda, Goichiro Hanaoka, Tetsu Iwata
2015/1134
$\Lambda \circ \lambda$: Functional Lattice Cryptography
Eric Crockett, Chris Peikert
2015/1133
Comment on ``Realization of a scalable Shor algorithm"
Zhengjun Cao, Lihua Liu
2015/1132
Tighter Security for Efficient Lattice Cryptography via the Rényi Divergence of Optimized Orders
Katsuyuki Takashima, Atsushi Takayasu
2015/1131
On the Usability of Two-Factor Authentication
Ding Wang, Ping Wang
2015/1130
A Note on Perfect Correctness by Derandomization
Nir Bitansky, Vinod Vaikuntanathan
2015/1129
Lucky Microseconds: A Timing Attack on Amazon's s2n Implementation of TLS
Martin R. Albrecht, Kenneth G. Paterson
2015/1128
New directions in nearest neighbor searching with applications to lattice sieving
Anja Becker, Léo Ducas, Nicolas Gama, Thijs Laarhoven
2015/1127
Pseudo-Free Families of Finite Computational Elementary Abelian $p$-Groups
Mikhail Anokhin
2015/1126
A Practical Oblivious Map Data Structure with Secure Deletion and History Independence
Daniel S. Roche, Adam J. Aviv, Seung Geol Choi
2015/1125
Practical Order-Revealing Encryption with Limited Leakage
Nathan Chenette, Kevin Lewi, Stephen A. Weis, David J. Wu
2015/1124
Secret Sharing Schemes Based on Resilient Boolean Maps
Juan Carlos Ku-Cauich, Guillermo Morales-Luna
2015/1123
Practical, Predictable Lattice Basis Reduction
Daniele Micciancio, Michael Walter
2015/1122
Schnorr Signatures in the Multi-User Setting
Eike Kiltz, Daniel Masny, Jiaxin Pan
2015/1121
On the First Fall Degree of Summation Polynomials
Stavros Kousidis, Andreas Wiemers
2015/1120
Even More Practical Key Exchanges for the Internet using Lattice Cryptography
Vikram Singh, Arjun Chopra
2015/1119
On the Possibility of Non-Interactive E-Voting in the Public-key Setting
Rosario Giustolisi, Vincenzo Iovino, Peter B. Rønne
2015/1118
Bitsliced Implementations of the PRINCE, LED and RECTANGLE Block Ciphers on AVR 8-bit Microcontrollers
Zhenzhen Bao, Peng Luo, Dongdai Lin
2015/1117
Efficient implementation of AND, OR and NOT operators for ABCs
Antonio de la Piedra
2015/1116
CHf-ORAM: A Constant Communication ORAM without Homomorphic Encryption
Tarik Moataz, Erik-Oliver Blass, Travis Mayberry
2015/1115
Efficient Threshold Secret Sharing Schemes Secure against Rushing Cheaters
Avishek Adhikari, Kirill Morozov, Satoshi Obana, Partha Sarathi Roy, Kouichi Sakurai, Rui Xu
2015/1114
Faster arithmetic on elliptic curves using Fp2. Application to GLV-GLS and NIST elliptic curves over Fp isomorphic to twisted Hessian curves over fields extension
Michał Wroński
2015/1113
Multi-Input Functional Encryption with Unbounded-Message Security
Vipul Goyal, Aayush Jain, Adam O' Neill
2015/1112
Efficient Culpably Sound NIZK Shuffle Argument without Random Oracles
Prastudy Fauzi, Helger Lipmaa
2015/1111
Comparison of TERO-cell implementations and characterisation on SRAM FPGAs
Cedric Marchand, Lilian Bossuet, AbdelKarim Cherkaoui
2015/1110
Privacy-Aware Authentication in the Internet of Things
Hannes Gross, Marko Hölbl, Daniel Slamanig, Raphael Spreitzer
2015/1109
Efficient and Low-complexity Hardware Architecture of Gaussian Normal Basis Multiplication over GF(2m) for Elliptic Curve Cryptosystems
Bahram Rashidi, Sayed Masoud Sayedi, Reza Rezaeian Farashahi
2015/1108
Recommender Systems and their Security Concerns
Jun Wang, Qiang Tang
2015/1107
Concurrent Secure Computation via Non-Black Box Simulation
Vipul Goyal, Divya Gupta, Amit Sahai
2015/1106
POPE: Partial Order Preserving Encoding
Daniel S. Roche, Daniel Apon, Seung Geol Choi, Arkady Yerukhimovich
2015/1105
Selene: Voting with Transparent Verifiability and Coercion-Mitigation
Peter Y A Ryan, Peter B Roenne, Vincenzo Iovino
2015/1104
Computing Jacobi's \theta in quasi-linear time
Hugo Labrande
2015/1103
Linear codes with few weights from weakly regular bent functions based on a generic construction
Sihem Mesnager
2015/1102
A Practical Cryptanalysis of the Algebraic Eraser
Adi Ben-Zvi, Simon R. Blackburn, Boaz Tsaban
2015/1101
Virtual Smart Cards: How to Sign with a Password and a Server
Jan Camenisch, Anja Lehmann, Gregory Neven, Kai Samelin
2015/1100
Area-Efficient Hardware Implementation of the Optimal Ate Pairing over BN curves.
Anissa Sghaier, Loubna Ghammam, Medyen Zeghid, Sylvain Duquesne, Mohsen Machhout
2015/1099
Device-Enhanced Password Protocols with Optimal Online-Offline Protection
Stanislaw Jarecki, Hugo Krawczyk, Maliheh Shirvanian, Nitesh Saxena
2015/1098
Ring Signature Confidential Transactions for Monero
Shen Noether
2015/1097
On the Communication required for Unconditionally Secure Multiplication
Ivan Damgård, Jesper Buus Nielsen, Antigoni Polychroniadou, Michael Raskin
2015/1096
Watermarking Cryptographic Capabilities
Aloni Cohen, Justin Holmgren, Ryo Nishimaki, Vinod Vaikuntanathan, Daniel Wichs
2015/1095
Non-Malleable Multi-Prover Interactive Proofs and Witness Signatures
Vipul Goyal, Aayush Jain, Dakshita Khurana
2015/1094
Affine-malleable Extractors, Spectrum Doubling, and Application to Privacy Amplification
Divesh Aggarwal, Kaave Hosseini, Shachar Lovett
2015/1093
C$\emptyset$C$\emptyset$: A Framework for Building Composable Zero-Knowledge Proofs
Ahmed Kosba, Zhichao Zhao, Andrew Miller, Yi Qian, Hubert Chan, Charalampos Papamanthou, Rafael Pass, abhi shelat, Elaine Shi
2015/1092
Post-quantum key exchange - a new hope
Erdem Alkim, Léo Ducas, Thomas Pöppelmann, Peter Schwabe
2015/1091
Construction for de Bruijn Sequences with Large Orders
Junwu Dong, Dingyi Pei
2015/1090
Do Distributed Differentially-Private Protocols Require Oblivious Transfer?
Vipul Goyal, Dakshita Khurana, Ilya Mironov, Omkant Pandey, Amit Sahai
2015/1089
Linear Secret Sharing Schemes from Error Correcting Codes and Universal Hash Functions
Ronald Cramer, Ivan Bjerre Damgård, Nico Döttling, Serge Fehr, Gabriele Spini
2015/1088
Note on the RKA security of Continuously Non-Malleable Key-Derivation Function from PKC 2015
Eiichiro Fujisaki, Keita Xagawa
2015/1087
Efficient Signature Schemes from R-LWE
Ting Wang, Jianping Yu, Guoqiang Han, Peng Zhang
2015/1086
Chicken or the Egg - Computational Data Attacks or Physical Attacks
Julien Allibert, Benoit Feix, Georges Gagnerot, Ismael Kane, Hugues Thiebeauld, Tiana Razafindralambo
2015/1085
Malicious Keccak
Pawel Morawiecki
2015/1084
Patchable Indistinguishability Obfuscation: iO for Evolving Software
Prabhanjan Ananth, Abhishek Jain, Amit Sahai
2015/1083
Implementation Attacks on Post-Quantum Cryptographic Schemes
Mostafa Taha, Thomas Eisenbarth
2015/1082
Delegating RAM Computations with Adaptive Soundness and Privacy
Prabhanjan Ananth, Yu-Chi Chen, Kai-Min Chung, Huijia Lin, Wei-Kai Lin
2015/1081
NEON PQCryto: Fast and Parallel Ring-LWE Encryption on ARM NEON Architecture
Reza Azarderakhsh, Zhe Liu, Hwajeong Seo, Howon Kim
2015/1080
Variations to the cryptographics algorithms AES and TWOFISH
P. Freyre, N. Díaz, O. Cuellar
2015/1079
De Bruijn Sequences from Symmetric Shift Registers
Ming Li, Mingxing Wang, Dongdai Lin
2015/1078
Revisiting the Cryptographic Hardness of Finding a Nash Equilibrium
Sanjam Garg, Omkant Pandey, Akshayaram Srinivasan
2015/1077
Fault Analysis on the Stream Ciphers LILI-128 and Achterbahn
Dibyendu Roy, Sourav Mukhopadhyay
2015/1076
An appendix for a recent paper of Kim
Razvan Barbulescu
2015/1075
Cybersecurity in an era with quantum computers: will we be ready?
Michele Mosca
2015/1074
Succinct Adaptive Garbled RAM
Ran Canetti, Yilei Chen, Justin Holmgren, Mariana Raykova
2015/1073
Practical Witness Encryption for Algebraic Languages Or How to Encrypt Under Groth-Sahai Proofs
David Derler, Daniel Slamanig
2015/1072
Quantum One-Time Memories from Stateless Hardware
Anne Broadbent, Sevag Gharibian, Hong-Sheng Zhou
2015/1071
Revisiting Secure Two-Party Computation with Rational Players
Arpita Maitra, Goutam Paul, Asim K. Pal
2015/1070
Barriers to Black-Box Constructions of Traitor Tracing Systems
Bo Tang, Jiapeng Zhang
2015/1069
Indifferentiability of 8-Round Feistel Networks
Yuanxi Dai, John Steinberger
2015/1068
Black-Box Parallel Garbled RAM
Steve Lu, Rafail Ostrovsky
2015/1067
Public Verifiability in the Covert Model (Almost) for Free
Vladimir Kolesnikov, Alex J. Malozemoff
2015/1066
Cryptanalysis of A Privacy-Preserving Smart Metering Scheme Using Linkable Anonymous Credential
Haipeng Qu, Peng Shang, Xi-Jun Lin, Lin Sun
2015/1065
Bucket ORAM: Single Online Roundtrip, Constant Bandwidth Oblivious RAM
Christopher Fletcher, Muhammad Naveed, Ling Ren, Elaine Shi, Emil Stefanov
2015/1064
Déjà Q: Encore! Un Petit IBE
Hoeteck Wee
2015/1063
Optimal Computational Split-state Non-malleable Codes
Divesh Aggarwal, Shashank Agrawal, Divya Gupta, Hemanta K. Maji, Omkant Pandey, Manoj Prabhakaran
2015/1062
Lower Bounds on Assumptions behind Indistinguishability Obfuscation
Mohammad Mahmoody, Ameer Mohammed, Soheil Nematihaji, Rafael Pass, abhi shelat
2015/1061
On Basing Private Information Retrieval on NP-Hardness
Tianren Liu, Vinod Vaikuntanathan
2015/1060
Complete addition formulas for prime order elliptic curves
Joost Renes, Craig Costello, Lejla Batina
2015/1059
A General Framework for Redactable Signatures and New Constructions
David Derler, Henrich C. Pöhls, Kai Samelin, Daniel Slamanig
2015/1058
Rational Sumchecks
Siyao Guo, Pavel Hubacek, Alon Rosen, Margarita Vald
2015/1057
The Complexity of Computing the Optimal Composition of Differential Privacy
Jack Murtagh, Salil Vadhan
2015/1056
Information-theoretic Local Non-malleable Codes and their Applications
Nishanth Chandran, Bhavana Kanukurthi, Srinivasan Raghuraman
2015/1055
Making the Best of a Leaky Situation: Zero-Knowledge PCPs from Leakage-Resilient Circuits
Yuval Ishai, Mor Weiss, Guang Yang
2015/1054
Computational Soundness of Uniformity Properties for Multi-party Computation based on LSSS
HUI ZHAO, Kouichi Sakurai
2015/1053
Oblivious Parallel RAM: Improved Efficiency and Generic Constructions
Binyi Chen, Huijia Lin, Stefano Tessaro
2015/1052
PLayPUF: Programmable Logically Erasable PUFs for Forward and Backward Secure Key Management
Chenglu Jin, Xiaolin Xu, Wayne Burleson, Ulrich Rührmair, Marten van Dijk
2015/1051
Cryptanalysis and Improvement of Identity-based Proxy Multi-signature scheme
Jayaprakash Kar
2015/1050
Comparison Between Irreducible and Separable Goppa Code in McEliece Cryptosystem
Thuraya M. Qaradaghi, Newroz N. Abdulrazaq
2015/1049
Counter-in-Tweak: Authenticated Encryption Modes for Tweakable Block Ciphers
Thomas Peyrin, Yannick Seurin
2015/1048
Verifiable Random Functions from Standard Assumptions
Dennis Hofheinz, Tibor Jager
2015/1047
Reconfigurable Cryptography: A flexible approach to long-term security
Julia Hesse, Dennis Hofheinz, Andy Rupp
2015/1046
From Private Simultaneous Messages to Zero-Information Arthur-Merlin Protocols and Back
Benny Applebaum, Pavel Raykov
2015/1045
Exploiting Transformations of the Galois Configuration to Improve Guess-and-Determine Attacks on NFSRs
Gefei Li, Yuval Yarom, Damith C. Ranasinghe
2015/1044
Homomorphic evaluation requires depth
Andrej Bogdanov, Chin Ho Lee
2015/1043
The Index j in RC4 is not Pseudo-random due to Non-existence of Finney Cycle
Subhamoy Maitra
2015/1042
ARMed SPHINCS -- Computing a 41KB signature in 16KB of RAM
Andreas Hülsing, Joost Rijneveld, Peter Schwabe
2015/1041
The Number of Boolean Functions with Multiplicative Complexity 2
Magnus Gausdal Find, Daniel Smith-Tone, Meltem Sonmez Turan
2015/1040
Fully Homomorphic Encryption with Composite Number Modulus
Masahiro Yagisawa
2015/1039
Maturity and Performance of Programmable Secure Computation
David W. Archer, Dan Bogdanov, Benny Pinkas, Pille Pullonen
2015/1038
Revisiting LEGOs: Optimizations, Analysis, and their Limit
Yan Huang, Ruiyu Zhu
2015/1037
Cryptanalysis of GGH15 Multilinear Maps
Jean-Sebastien Coron, Moon Sung Lee, Tancrede Lepoint, Mehdi Tibouchi
2015/1036
Patterson-Wiedemann type functions on 21 variables with Nonlinearity greater than Bent Concatenation bound
Selcuk Kavut, Subhamoy Maitra
2015/1035
CARIBE: Cascaded IBE for Maximum Flexibility and User-side Control
Britta Hale, Christopher Carr, Danilo Gligoroski
2015/1034
Real time detection of cache-based side-channel attacks using Hardware Performance Counters
Marco Chiappetta, Erkay Savas, Cemal Yilmaz
2015/1033
The Ultimate Transposition Cipher (UTC)
Gideon Samid
2015/1032
Essentially Optimal Robust Secret Sharing with Maximal Corruptions
Allison Bishop, Valerio Pastro, Rajmohan Rajaraman, Daniel Wichs
2015/1031
Secure Dating with Four or Fewer Cards
Antonio Marcedone, Zikai Wen, Elaine Shi
2015/1030
SECOND COORDINATE SEQUENCE OF MP-LRS OVER NONTRIVIAL GALOIS RING OF ODD CHARACTERISTIC
Vadim N. Tsypyschev
2015/1029
The Energy Budget for Wireless Security: Extended Version
Dave Singelée, Stefaan Seys, Lejla Batina, Ingrid Verbauwhede
2015/1028
Reviving the Idea of Incremental Cryptography for the Zettabyte era Use case: Incremental Hash Functions Based on SHA-3
Hristina Mihajloska, Danilo Gligoroski, Simona Samardjiska
2015/1027
Extended Tower Number Field Sieve: A New Complexity for the Medium Prime Case
Taechan Kim, Razvan Barbulescu
2015/1026
Hardness Estimation of LWE via Band Pruning
Yoshinori Aono, Le Trieu Phong, Lihua Wang
2015/1025
PAGES+,PAGES-, and PAGES-- - Three Families of Block Ciphers
Dieter Schmidt
2015/1024
Parallel Implementation of Number Theoretic Transform
Hwajeong Seo, Zhe Liu, Yasuyuki Nogami, Jongseok Choi, Taehwan Park, Howon Kim
2015/1023
Indistinguishability Obfuscation for Turing Machines: Constant Overhead and Amortization
Prabhanjan Ananth, Abhishek Jain, Amit Sahai
2015/1022
Recent progress on the elliptic curve discrete logarithm problem
Steven D. Galbraith, Pierrick Gaudry
2015/1021
New Proof Techniques for DLIN-Based Adaptively Secure Attribute-Based Encryption
Katsuyuki Takashima
2015/1020
Attacking the Network Time Protocol
Aanchal Malhotra, Isaac E. Cohen, Erik Brakke, Sharon Goldberg
2015/1019
Speed-Security Tradeoffs in Blockchain Protocols
Aggelos Kiayias, Giorgos Panagiotakos
2015/1018
A Riddle Wrapped in an Enigma
Neal Koblitz, Alfred J. Menezes
2015/1017
Functional Encryption: Decentralised and Delegatable
Nishanth Chandran, Vipul Goyal, Aayush Jain, Amit Sahai
2015/1016
One-Key Compression Function Based MAC with Security beyond Birthday Bound
Avijit Dutta, Mridul Nandi, Goutam Paul
2015/1015
On Bitcoin as a public randomness source
Joseph Bonneau, Jeremy Clark, Steven Goldfeder
2015/1014
Fast Fourier Orthogonalization
Léo Ducas, Thomas Prest
2015/1013
Inception Makes Non-malleable Codes Stronger
Divesh Aggarwal, Tomasz Kazana, Maciej Obremski
2015/1012
An Efficient Multiple PKG Compatible Identity Based Authenticated Key Agreement protocol
Harish Karthikeyan, Suvradip Chakraborty, Kunwar Singh, C. Pandu Rangan
2015/1011
Hierarchical Functional Encryption
Zvika Brakerski, Gil Segev
2015/1010
TWORAM: Round-Optimal Oblivious RAM with Applications to Searchable Encryption
Sanjam Garg, Payman Mohassel, Charalampos Papamanthou
2015/1009
Applications of Key Recovery Cube-attack-like
Pawel Morawiecki, Josef Pieprzyk, Michal Straus, Marian Srebrny
2015/1008
Provisions: Privacy-preserving proofs of solvency for Bitcoin exchanges
Gaby G. Dagher, Benedikt Buenz, Joseph Bonneau, Jeremy Clark, Dan Boneh
2015/1007
How to Vote Privately Using Bitcoin
Zhichao Zhao, T-H. Hubert Chan
2015/1006
Confidential Benchmarking based on Multiparty Computation
Ivan Damgård, Kasper Damgård, Kurt Nielsen, Peter Sebastian Nordholt, Tomas Toft
2015/1005
Cryptanalysis of Yasuda, Takagi and Sakurai's Signature Scheme Using Invariant Subspaces
Wenbin Zhang, Chik How Tan
2015/1004
Security Analysis of Cryptosystems Using Short Generators over Ideal Lattices
Shinya Okumura, Shingo Sugiyama, Masaya Yasuda, Tsuyoshi Takagi
2015/1003
Results on polynomial interpolation with mixed modular operations and unknown moduli
Oscar Garcia-Morchon, Ronald Rietman, Igor Shparlinski, Ludo Tolhuizen
2015/1002
got HW crypto? On the (in)security of a Self-Encrypting Drive series
Gunnar Alendal, Christian Kison, modg
2015/1001
Dismantling real-world ECC with Horizontal and Vertical Template Attacks
Margaux Dugardin, Louiza Papachristodoulou, Zakaria Najm, Lejla Batina, Jean-Luc Danger, Sylvain Guilley, Jean-Christophe Courrege, Carine Therond
2015/1000
Factoring as a Service
Luke Valenta, Shaanan Cohney, Alex Liao, Joshua Fried, Satya Bodduluri, Nadia Heninger
2015/999
Improved Masking for Tweakable Blockciphers with Applications to Authenticated Encryption
Robert Granger, Philipp Jovanovic, Bart Mennink, Samuel Neves
2015/998
All or Nothing at All
Paolo D'Arco, Navid Nasr Esfahani, Douglas R. Stinson
2015/997
Incremental Program Obfuscation
Sanjam Garg, Omkant Pandey
2015/996
Multi-user Schnorr security, revisited
Daniel J. Bernstein
2015/995
Updates on Sorting of Fully Homomorphic Encrypted Data
Nitesh Emmadi, Praveen Gauravaram, Harika Narumanchi, Habeeb Syed
2015/994
An Efficient Scheme to Reduce Side-Channel Leakage of MAC-Keccak for Smart Card
Pei Luo, Liwei Zhang, Yunsi Fei, A. Adam Ding
2015/993
Bi-Deniable Inner Product Encryption from LWE
Daniel Apon, Xiong Fan, Feng-Hao Liu
2015/992
Multilinear Map via Scale-Invariant FHE: Enhancing Security and Efficiency
Jinsu Kim, Sungwook Kim, Jae Hong Seo
2015/991
Ed3363 (HighFive) -- An alternative Elliptic Curve
Mike Scott
2015/990
Encryption Switching Protocols
Geoffroy Couteau, Thomas Peters, David Pointcheval
2015/989
Fast Oblivious AES\\A dedicated application of the MiniMac protocol
Ivan Damgård, Rasmus Winther Zakarias
2015/988
Improved Linear Cryptanalysis of reduced-round SIMON-32 and SIMON-48
Mohamed Ahmed Abdelraheem, Javad Alizadeh, Hoda A. Alkhzaimi, Mohammad Reza Aref, Nasour Bagheri, Praveen Gauravaram
2015/987
Blazing Fast 2PC in the Offline/Online Setting with Security for Malicious Adversaries
Yehuda Lindell, Ben Riva
2015/986
Bit Coincidence Mining Algorithm
Koh-ichi Nagao
2015/985
Polynomial time reduction from 3SAT to solving low first fall degree multivariable cubic equations system
Koh-ichi Nagao
2015/984
Complexity of ECDLP under the First Fall Degree Assumption
Koh-ichi Nagao
2015/983
Fast, uniform, and compact scalar multiplication for elliptic curves and genus 2 Jacobians with applications to signature schemes
Ping Ngai Chung, Craig Costello, Benjamin Smith
2015/982
A note on constructions of bent functions from involutions
Sihem Mesnager
2015/981
Searching and Sorting of Fully Homomorphic Encrypted Data on Cloud
Ayantika Chatterjee, Indranil Sengupta
2015/980
Analysis of an RFID Authentication Protocol in Accordance with EPC Standards
Behzad Abdolmaleki, Hamidreza Bakhshi, Karim Baghery, Mohammad Reza Aref
2015/979
Guidelines for Using the CryptDB System Securely
Raluca Ada Popa, Nickolai Zeldovich, Hari Balakrishnan
2015/978
The OPTLS Protocol and TLS 1.3
Hugo Krawczyk, Hoeteck Wee
2015/977
Faster point scalar multiplication on NIST elliptic curves over GF(p) using (twisted) Edwards curves over GF(p³)
Michał Wroński
2015/976
On Reverse-Engineering S-Boxes with Hidden Design Criteria or Structure
Alex Biryukov, Léo Perrin
2015/975
Extended Functionality in Verifiable Searchable Encryption
James Alderman, Christian Janson, Keith M. Martin, Sarah Louise Renwick
2015/974
The Conjoined Microprocessor
Ehsan Aerabi, A. Elhadi Amirouche, Houda Ferradi, Rémi Géraud, David Naccache, Jean Vuillemin
2015/973
Some Cryptanalytic Results on Zipper Hash and Concatenated Hash
Ashwin Jha, Mridul Nandi
2015/972
Cut Down the Tree to Achieve Constant Complexity in Divisible E-Cash
David Pointcheval, Olivier Sanders, Jacques Traoré
2015/971
Attacks on the Search-RLWE problem with small error
Hao Chen, Kristin E. Lauter, Katherine E. Stange
2015/970
Multilinear Maps over the Integers Using Modulus Switching
Gu Chunsheng
2015/969
Zero-Knowledge Interactive Proof Systems for New Lattice Problems
Claude Crepéau, Raza Ali Kazmi
2015/968
Improved Differential-Linear Cryptanalysis of 7-round Chaskey with Partitioning
Gaëtan Leurent
2015/967
Freestart collision for full SHA-1
Marc Stevens, Pierre Karpman, Thomas Peyrin
2015/966
Vulnerabilities of ``McEliece in the World of Escher"
Dustin Moody, Ray Perlner
2015/965
Private Genome Analysis through Homomorphic Encryption
Miran Kim, Kristin Lauter
2015/964
Improved Linear (hull) Cryptanalysis of Round-reduced Versions of KATAN
Danping Shi, Lei Hu, Siwei Sun, Ling Song
2015/963
When Organized Crime Applies Academic Results - A Forensic Analysis of an In-Card Listening Device
Houda Ferradi, Rémi Géraud, David Naccache, Assia Tria
2015/962
SOME REMARKS ON THE LOGARITHMIC SIGNATURES OF FINITE ABELIAN GROUPS
Thuong T. Dang, Tri T. Ton, Van H. Dang, Thuc D. Nguyen
2015/961
Short Structure-Preserving Signatures
Essam Ghadafi
2015/960
More Efficient Secure Outsourcing Methods for Bilinear Maps
Öznur Arabacı, Mehmet Sabir Kiraz, İsa Sertkaya, Osmanbey Uzunkol
2015/959
Cryptanalysis of the Round-Reduced Kupyna Hash Function
Jian Zou, Le Dong
2015/958
Building Single-Key Beyond Birthday Bound Message Authentication Code
Nilanjan Datta, Avijit Dutta, Mridul Nandi, Goutam Paul, Liting Zhang
2015/957
Delegating RAM Computations
Yael Tauman Kalai, Omer Paneth
2015/956
Analysis of the Kupyna-256 Hash Function
Christoph Dobraunig, Maria Eichlseder, Florian Mendel
2015/955
On the Power of Pair Encodings: Frameworks for Predicate Cryptographic Primitives
Mridul Nandi, Tapas Pandit
2015/954
Online-Offline Homomorphic Signatures for Polynomial Functions
Kaoutar Elkhiyaoui, Melek Önen, Refik Molva
2015/953
Gaussian Sampling Precision in Lattice Cryptography
Markku-Juhani O. Saarinen
2015/952
Commitment and Oblivious Transfer in the Bounded Storage Model with Errors
Rafael Dowsley, Felipe Lacerda, Anderson C. A. Nascimento
2015/951
Nearly Optimal Robust Secret Sharing
Mahdi Cheraghchi
2015/950
A Compiler of Two-Party Protocols for Composable and Game-Theoretic Security, and Its Application to Oblivious Transfer
Shota Goto, Junji Shikata
2015/949
Private Processing of Outsourced Network Functions: Feasibility and Constructions
Luca Melis, Hassan Jameel Asghar, Emiliano De Cristofaro, Mohamed Ali Kaafar
2015/948
A Provably Secure Short Signature Scheme from Coding Theory
Maryam Rajabzadeh Asaar, Mahmoud Salmasizadeh, Mohammad Reza Aref
2015/947
Weave ElGamal Encryption for Secure Outsourcing Algebraic Computations over Zp
Yi-Ruei Chen, Shiuan-Tzuo Shen, Wen-Guey Tzeng
2015/946
Equihash: Asymmetric Proof-of-Work Based on the Generalized Birthday Problem
Alex Biryukov, Dmitry Khovratovich
2015/945
Secure Set-based Policy Checking and Its Application to Password Registration
Changyu Dong, Franziskus Kiefer
2015/944
New Complexity Trade-Offs for the (Multiple) Number Field Sieve Algorithm in Non-Prime Fields
Palash Sarkar, Shashank Singh
2015/943
Sandy2x: New Curve25519 Speed Records
Tung Chou
2015/942
Ballot secrecy: Security definition, sufficient conditions, and analysis of Helios
Ben Smyth
2015/941
Cryptanalysis of the New Multilinear Map over the Integers
Brice Minaud, Pierre-Alain Fouque
2015/940
Secure Association for the Internet of Things
Almog Benin, Sivan Toledo, Eran Tromer
2015/939
A Decade of Lattice Cryptography
Chris Peikert
2015/938
Lattice Based Cryptography for Beginners
Dong Pyo Chi, Jeong Woon Choi, Jeong San Kim, Taewan Kim
2015/937
End-to-end Design of a PUF-based Privacy Preserving Authentication Protocol
Aydin Aysu, Ege Gulcan, Daisuke Moriyama, Patrick Schaumont, Moti Yung
2015/936
A Privacy Preserving Improvement for SRTA in Telecare Medicine Information System
Seyed salman Sajjadi GhaemMaghami, Mahtab Mirmohseni, Afrooz Haghbin
2015/935
Joint Data and Key Distribution of Simple, Multiple, and Multidimensional Linear Cryptanalysis Test Statistic and Its Impact to Data Complexity
Céline Blondeau, Kaisa Nyberg
2015/934
Cryptanalysis of the New CLT Multilinear Maps
Jung Hee Cheon, Changmin Lee, Hansol Ryu
2015/933
Cryptanalysis of Provably Secure Certicateless Short Signature Scheme
Jayaprakash Kar
2015/932
Using Tweaks To Design Fault Resistant Ciphers
Sikhar Patranabis, Debapriya Basu Roy, Debdeep Mukhopadhyay
2015/931
Fast and Secure Three-party Computation: The Garbled Circuit Approach
Payman Mohassel, Mike Rosulek, Ye Zhang
2015/930
Nearly Sparse Linear Algebra and application to Discrete Logarithms Computations
Antoine Joux, Cécile Pierrot
2015/929
Are you The One to Share? Secret Transfer with Access Structure
Yongjun Zhao, Sherman S. M. Chow
2015/928
HLDCA-WSN: Homomorphic Lightweight Data Confidentiality Algorithm for Wireless Sensor Network
Hassan Noura, Damien Couroussé
2015/927
Rich Queries on Encrypted Data: Beyond Exact Matches
Sky Faber, Stanislaw Jarecki, Hugo Krawczyk, Quan Nguyen, Marcel Rosu, Michael Steiner
2015/926
CRITERION OF MAXIMAL PERIOD OF A TRINOMIAL OVER NONTRIVIAL GALOIS RING OF ODD CHARACTERISTIC
Vadim N. Tsypyschev, Julia S. Vinogradova
2015/925
Exploiting the Order of Multiplier Operands: A Low Cost Approach for HCCA Resistance
Poulami Das, Debapriya Basu Roy, Debdeep Mukhopadhyay
2015/924
Masking Large Keys in Hardware: A Masked Implementation of McEliece
Cong Chen, Thomas Eisenbarth, Ingo von Maurich, Rainer Steinwandt
2015/923
DYNAMIC KEY-AGGREGATE CRYPTOSYSTEM ON ELLIPTIC CURVES FOR ONLINE DATA SHARING
Sikhar Patranabis, Yash Shrivastava, Debdeep Mukhopadhyay
2015/922
Localised Multisecret Sharing
Thalia M. Laing, Keith M. Martin, Maura B. Paterson, Douglas R. Stinson
2015/921
Identity-Based Revocation from Subset Difference Methods under Simple Assumptions
Kwangsu Lee, Jong Hwan Park
2015/920
Leakage-Resilient Identification Schemes from Zero-Knowledge Proofs of Storage
Giuseppe Ateniese, Antonio Faonio, Seny Kamara
2015/919
Privacy-preserving computation with trusted computing via Scramble-then-Compute
Hung Dang, Anh Dinh, Ee-Chien Chang, Beng Chin Ooi
2015/918
Finding State Collisions in the Authenticated Encryption Stream Cipher ACORN
Md Iftekhar Salam, Kenneth Koon-Ho Wong, Harry Bartlett, Leonie Simpson, Ed Dawson, Josef Pieprzyk
2015/917
Private Proximity Testing on Steroids: An NTRU-based Protocol
Constantinos Patsakis, Panayiotis Kotzanikolaou, M ́elanie Bouroche
2015/916
Rigorous Upper Bounds on Data Complexities of Block Cipher Cryptanalysis
Subhabrata Samajder, Palash Sarkar
2015/915
A Generic Construction for Verifiable Attribute-based Keyword Search Schemes
Mohammmad Hassan Ameri, Maryam Rajabzadeh Assar, Javad Mohajeri, Mahmoud Salmasizadeh
2015/914
A Cryptographic Analysis of the TLS 1.3 Handshake Protocol Candidates
Benjamin Dowling, Marc Fischlin, Felix Günther, Douglas Stebila
2015/913
Functional Signcryption: Notion, Construction, and Applications
Pratish Datta, Ratna Dutta, Sourav Mukhopadhyay
2015/912
Extraction of intrinsic structure for Hardware Trojan detection
Maxime Lecomte, Jacques Fournier, Philippe Maurine
2015/911
Security Evaluation on Simeck against Zero Correlation Linear Cryptanalysis
Kai Zhang, Jie Guan, Bin Hu, Dongdai Lin
2015/910
QA-NIZK Arguments in Asymmetric Groups: New Tools and New Constructions
Alonso González, Alejandro Hevia, Carla Ràfols
2015/909
On the Impact of Known-Key Attacks on Hash Functions
Bart Mennink, Bart Preneel
2015/908
Linear Distinguishers in the Key-less Setting: Application to PRESENT
Martin M. Lauridsen, Christian Rechberger
2015/907
Cryptographic Assumptions: A Position Paper
Shafi Goldwasser, Yael Tauman Kalai
2015/906
RoadRunneR: A Small And Fast Bitslice Block Cipher For Low Cost 8-bit Processors
Adnan Baysal, Suhap Sahin
2015/905
Mapping the Intel Last-Level Cache
Yuval Yarom, Qian Ge, Fangfei Liu, Ruby B. Lee, Gernot Heiser
2015/904
Almost-tight Identity Based Encryption against Selective Opening Attack
Junqing Gong, Xiaolei Dong, Zhenfu Cao, Jie Chen
2015/903
A Note on the Indifferentiability of the 10-Round Feistel Construction
Yannick Seurin
2015/902
Differential Analysis on Simeck and SIMON with Dynamic Key-guessing Techniques
Kexin Qiao, Lei Hu, Siwei Sun
2015/901
A Unified Approach to MPC with Preprocessing using OT
Tore Kasper Frederiksen, Marcel Keller, Emmanuela Orsini, Peter Scholl
2015/900
New Results on Identity-based Encryption from Quadratic Residuosity
Ferucio Laurentiu Tiplea, Emil Simion
2015/899
Privacy-preserving Attribute Based Searchable Encryption
Payal Chaudhari, Maniklal Das
2015/898
Seriously, get off my cloud! Cross-VM RSA Key Recovery in a Public Cloud
Mehmet Sinan Inci, Berk Gulmezoglu, Gorka Irazoqui, Thomas Eisenbarth, Berk Sunar
2015/897
Integrity-Aware Parallelizable Cipher Feedback Mode for Real-time Cryptography
Prosanta Gope
2015/896
Improved Attacks on Reduced-Round Camellia-128/192/256
Xiaoyang Dong, Leibo Li, Keting Jia, Xiaoyun Wang
2015/895
Rogue Decryption Failures: Reconciling AE Robustness Notions
Guy Barwell, Dan Page, Martijn Stam
2015/894
Comparison of cube attacks over different vector spaces
Richard Winter, Ana Salagean, Raphael C. -W. Phan
2015/893
Robust Authenticated Encryption and the Limits of Symmetric Cryptography
Christian Badertscher, Christian Matt, Ueli Maurer, Phillip Rogaway, Björn Tackmann
2015/892
Security Against Related Randomness Attacks via Reconstructive Extractors
Kenneth G. Paterson, Jacob C. N. Schuldt, Dale L. Sibborn, Hoeteck Wee
2015/891
Private Ciphertext-Policy Attribute-based Encryption Schemes With Constant-Size Ciphertext Supporting CNF Access Policy
Sébastien Canard, Viet Cuong Trinh
2015/890
MI-T-HFE, a New Multivariate Signature Scheme
Wenbin Zhang, Chik How Tan
2015/889
Which Ring Based Somewhat Homomorphic Encryption Scheme is Best?
Anamaria Costache, Nigel P. Smart
2015/888
Tweak-Length Extension for Tweakable Blockciphers
Kazuhiko Minematsu, Tetsu Iwata
2015/887
Composable Security in the Tamper Proof Hardware Model under Minimal Complexity
Carmit Hazay, Antigoni Polychroniadou, Muthuramakrishnan Venkitasubramaniam
2015/886
Applying Cryptographic Acceleration Techniques to Error Correction
Rémi Géraud, Diana-Stefania Maimut, David Naccache, Rodrigo Portella do Canto, Emil Simion
2015/885
A New Standard of Ukraine: The Kupyna Hash Function
Roman Oliynykov, Ivan Gorbenko, Oleksandr Kazymyrov, Victor Ruzhentsev, Oleksandr Kuznetsov, Yurii Gorbenko, Artem Boiko, Oleksandr Dyrda, Viktor Dolgov, Andrii Pushkaryov
2015/884
General Circuit Realizing Compact Revocable Attribute-Based Encryption from Multilinear Maps
Pratish Datta, Ratna Dutta, Sourav Mukhopadhyay
2015/883
Revisiting Sum of CBC-MACs and Extending NI2-MAC to Achieve Beyond-Birthday Security
Avijit Dutta, Goutam Paul
2015/882
Using Modular Extension to Provably Protect Edwards Curves Against Fault Attacks
Margaux Dugardin, Sylvain Guilley, Martin Moreau, Zakaria Najm, Pablo Rauzy
2015/881
Generic Security of NMAC and HMAC with Input Whitening
Peter Gaži, Krzysztof Pietrzak, Stefano Tessaro
2015/880
Generic Efficient Dynamic Proofs of Retrievability
Mohammad Etemad, Alptekin Küpçü
2015/879
Computing information on domain parameters from public keys selected uniformly at random
Martin Ekerå
2015/878
Making Existential-Unforgeable Signatures Strongly Unforgeable in the Quantum Random-Oracle Model
Edward Eaton, Fang Song
2015/877
Study of a Parity Check Based Fault-Detection Countermeasure for the AES Key Schedule
Christophe Clavier, Julien Francq, Antoine Wurcker
2015/876
10-Round Feistel is Indifferentiable from an Ideal Cipher
Dana Dachman-Soled, Jonathan Katz, Aishwarya Thiruvengadam
2015/875
Bent and Semi-bent Functions via Linear Translators
Neşe Koçak, Sihem Mesnager, Ferruh Özbudak
2015/874
Indifferentiability of 10-Round Feistel Networks
Yuanxi Dai, John Steinberger
2015/873
On the Diffusion Property of Iterated Functions
Jian Liu, Sihem Mesnager, Lusheng Chen
2015/872
Traceability Improvements of a New RFID Protocol Based On EPC C1G2
Seyed Salman Sajjadi GhaemMaghami, Afrooz Haghbin, Mahtab Mirmohseni
2015/871
Photonic Side Channel Analysis of Arbiter PUFs
Shahin Tajik, Enrico Dietz, Sven Frohmann, Helmar Dittrich, Dmitry Nedospasov, Clemens Helfmeier, Jean-Pierre Seifert, Christian Boit, Heinz-Wilhelm Hübers
2015/870
Gambling, Computational Information and Encryption Security
Mohammad Hajiabadi, Bruce M. Kapron
2015/869
New Realizations of Somewhere Statistically Binding Hashing and Positional Accumulators
Tatsuaki Okamoto, Krzysztof Pietrzak, Brent Waters, Daniel Wichs
2015/868
Optimally Secure Block Ciphers from Ideal Primitives
Stefano Tessaro
2015/867
Multilinear and Aggregate Pseudorandom Functions: New Constructions and Improved Security
Michel Abdalla, Fabrice Benhamouda, Alain Passelègue
2015/866
Graded Encoding, Variations on a Scheme
Shai Halevi
2015/865
Card-based Cryptographic Protocols Using a Minimal Number of Cards
Alexander Koch, Stefan Walzer, Kevin Härtel
2015/864
Encryption Performance Improvements of the Paillier Cryptosystem
Christine Jost, Ha Lam, Alexander Maximov, Ben Smeets
2015/863
Is There an Oblivious RAM Lower Bound?
Elette Boyle, Moni Naor
2015/862
Idealizing Identity-Based Encryption
Dennis Hofheinz, Christian Matt, Ueli Maurer
2015/861
A Synthetic Indifferentiability Analysis of Interleaved Double-Key Even-Mansour Ciphers
Chun Guo, Dongdai Lin
2015/860
Selective Opening Security for Receivers
Carmit Hazay, Arpita Patra, Bogdan Warinschi
2015/859
Factor Base Discrete Logarithms in Kummer Extensions
Dianyan Xiao, Jincheng Zhuang, Qi Cheng
2015/858
Skipping the $q$ in Group Signatures
Olivier Blazy, Saqib A. Kakvi
2015/857
Unifying Leakage Classes: Simulatable Leakage and Pseudoentropy
Benjamin Fuller, Ariel Hamlin
2015/856
MGR HASH FUNCTION
Khushboo Bussi, Dhananjoy Dey, P. R. Mishra, B. K. Dass
2015/855
A new framework for keystream generators against Correlation, Linear and Distinguishing Attacks
GANESH YELLAPU
2015/854
Efficient Fuzzy Extraction of PUF-Induced Secrets: Theory and Applications
Jeroen Delvaux, Dawu Gu, Ingrid Verbauwhede, Matthias Hiller, Meng-Day (Mandel) Yu
2015/853
Standard Security Does Imply Security Against Selective Opening for Markov Distributions
Georg Fuchsbauer, Felix Heuer, Eike Kiltz, Krzysztof Pietrzak
2015/852
Analysis of a key exchange protocol based on tropical matrix algebra
Matvei Kotov, Alexander Ushakov
2015/851
Beyond-Birthday-Bound Security for Tweakable Even-Mansour Ciphers with Linear Tweak and Key Mixing
Benoît Cogliati, Yannick Seurin
2015/850
Traceable CP-ABE on Prime Order Groups: Fully Secure and Fully Collusion-resistant Blackbox Traceable
Zhen Liu, Duncan S. Wong
2015/849
Regulating the Pace of von Neumann Correctors
Houda Ferradi, Rémi Géraud, Diana Maimuţ, David Naccache, Amaury de Wargny
2015/848
The Multiplicative Complexity of Boolean Functions on Four and Five Variables
Meltem Sonmez Turan, Rene Peralta
2015/847
Exploring Energy Efficiency of Lightweight Block Ciphers
Subhadeep Banik, Andrey Bogdanov, Francesco Regazzoni
2015/846
Characterization of Secure Multiparty Computation Without Broadcast
Ran Cohen, Iftach Haitner, Eran Omri, Lior Rotem
2015/845
Cryptanalysis of the Quadratic Zero-Testing of GGH
Zvika Brakerski, Craig Gentry, Shai Halevi, Tancrède Lepoint, Amit Sahai, Mehdi Tibouchi
2015/844
DA-Encrypt: Homomorphic Encryption via Non-Archimedean Diophantine Approximation --- Preliminary Report
Jeff Hoffstein, Jill Pipher, John M. Schanck, Joseph H. Silverman, William Whyte, Zhenfei Zhang
2015/843
Rethinking Privacy for Extended Sanitizable Signatures and a Black-Box Construction of Strongly Private Schemes
David Derler, Daniel Slamanig
2015/842
On Linkability and Malleability in Self-blindable Credentials
Jaap-Henk Hoepman, Wouter Lueks, Sietse Ringers
2015/841
An Efficient CP-ABE with Constant Size Secret Keys using ECC for Lightweight Devices
Vanga Odelu, Ashok Kumar Das, Adrijit Goswami
2015/840
Related-key Impossible Differential Analysis of Full Khudra
Qianqian Yang, Lei Hu, Siwei Sun, Ling Song
2015/839
Timing and Lattice Attacks on a Remote ECDSA OpenSSL Server: How Practical Are They Really?
David Wong
2015/838
Offline Witness Encryption
Hamza Abusalah, Georg Fuchsbauer, Krzysztof Pietrzak
2015/837
Multi-Variate High-Order Attacks of Shuffled Tables Recomputation
Nicolas BRUNEAU, Sylvain GUILLEY, Zakaria NAJM, Yannick TEGLIA
2015/836
Ciphertext-Policy Attribute-Based Broadcast Encryption with Small Keys
Benjamin Wesolowski, Pascal Junod
2015/835
On near prime-order elliptic curves with small embedding degrees (Full version)
Duc-Phong Le, Nadia El Mrabet, Chik How Tan
2015/834
Authentication Using Side-Channel Information
Kazuo Sakiyama, Takanori Machida, Arisa Matsubara, Yunfeng Kuai, Yu-ichi Hayashi, Takaaki Mizuki, Noriyuki Miura, Makoto Nagata
2015/833
Efficient Key Authentication Service for Secure End-to-end Communications
Mohammad Etemad, Alptekin Küpçü
2015/832
Characterising and Comparing the Energy Consumption of Side Channel Attack Countermeasures and Lightweight Cryptography on Embedded Devices
David McCann, Kerstin Eder, Elisabeth Oswald
2015/831
M-MAP: Multi-Factor Memory Authentication for Secure Embedded Processors
Syed Kamran Haider, Masab Ahmad, Farrukh Hijaz, Astha Patni, Ethan Johnson, Matthew Seita, Omer Khan, Marten van Dijk
2015/830
Unique Signature with Short Output from CDH Assumption
Shiuan-Tzuo Shen, Amir Rezapour, Wen-Guey Tzeng
2015/829
Reducing Depth in Constrained PRFs: From Bit-Fixing to NC1
Nishanth Chandran, Srinivasan Raghuraman, Dhinakaran Vinayagamurthy
2015/828
State-recovery analysis of Spritz
Ralph Ankele, Stefan Koelbl, Christian Rechberger
2015/827
Unbounded Hierarchical Identity-Based Encryption with Efficient Revocation
Geumsook Ryu, Kwangsu Lee, Seunghwan Park, Dong Hoon Lee
2015/826
Programmable Hash Functions go Private:Constructions and Applications to (Homomorphic) Signatures with Shorter Public Keys
Dario Catalano, Dario Fiore, Luca Nizzardo
2015/825
The Emperor's New Password Creation Policies
Ding Wang, Ping Wang
2015/824
Efficient Fully Structure-Preserving Signatures for Large Messages
Jens Groth
2015/823
Efficient (ideal) lattice sieving using cross-polytope LSH
Anja Becker, Thijs Laarhoven
2015/822
Efficiently Obfuscating Re-Encryption Program under DDH Assumption
Akshayaram Srinivasan, C. Pandu Rangan
2015/821
A general framework for building noise-free homomorphic cryptosystems
Gérald Gavin
2015/820
Extended Nested Dual System Groups, Revisited
Junqing Gong, Jie Chen, Xiaolei Dong, Zhenfu Cao, Shaohua Tang
2015/819
Improving the Big Mac Attack on Elliptic Curve Cryptography
Jean-Luc Danger, Sylvain Guilley, Philippe Hoogvorst, Cédric Murdica, David Naccache
2015/818
cuHE: A Homomorphic Encryption Accelerator Library
Wei Dai, Berk Sunar
2015/817
Secure Multiparty Computation of a Social Network
Varsha Bhat Kukkala, Jaspal Singh Saini, S. R. S. Iyengar
2015/816
Analysis of Keyless Massive MIMO-based Cryptosystem Security
Valery Korzhik, Guillermo Morales-Luna, Sergei Tikhonov, Victor Yakovlev
2015/815
On the Power of Hierarchical Identity-Based Encryption
Mohammad Mahmoody, Ameer Mohammed
2015/814
CLKS: Certificateless Keyword Search on Encrypted Data
Qingji Zheng, Xiangxue Li, Aytac Azgin
2015/813
Revisiting Turning Online Cipher Off
Ritam Bhaumik, Mridul Nandi
2015/812
The Secret Structure of the S-Box of Streebog, Kuznechik and Stribob
Alex Biryukov, Léo Perrin, Aleksei Udovenko
2015/811
Key-recovery attacks against the MAC algorithm Chaskey
Chrysanthi Mavromati
2015/810
Improved OR Composition of Sigma-Protocols
Michele Ciampi, Giuseppe Persiano, Alessandra Scafuro, Luisa Siniscalchi, Ivan Visconti
2015/809
New Techniques for Electronic Voting
Alan Szepieniec, Bart Preneel
2015/808
Mass-surveillance without the State: Strongly Undetectable Algorithm-Substitution Attacks
Mihir Bellare, Joseph Jaeger, Daniel Kane
2015/807
Fair Distributed Computation of Reactive Functions
Juan Garay, Björn Tackmann, Vassilis Zikas
2015/806
Fault Space Transformation: A Generic Approach to Counter Differential Fault Analysis and Differential Fault Intensity Analysis on AES-like Block Ciphers
Sikhar Patranabis, Abhishek Chakraborty, Debdeep Mukhopadhyay, P. P. Chakrabarti
2015/805
A classification of elliptic curves with respect to the GHS attack in odd characteristic
Tsutomu Iijima, Fumiyuki Momose, Jinhui Chao
2015/804
SECURE MULTI-PARTY COMPUTATION: HOW TO SOLVE THE CONFLICT BETWEEN SECURITY & BUSINESS INTELLIGENCE
Sumit Chakraborty
2015/803
Statistical and Algebraic Properties of DES
Stian Fauskanger, Igor Semaev
2015/802
Ciphertext-only attack on d*d Hill in O(d13^d)
Shahram Khazaei, Siavash Ahmadi
2015/801
Scalar Blinding on Elliptic Curves based on Primes with Special Structure
Scott Fluhrer
2015/800
Hybrid WBC: Secure and efficient encryption schemes using the White-Box Cryptography
Jihoon Cho, Kyu Young Choi, Dukjae Moon
2015/799
Secure Binary Field Multiplication
Hwajeong Seo, Chien-Ning Chen, Zhe Liu, Yasuyuki Nogami, Taehwan Park, Jongseok Choi, Howon Kim
2015/798
A Stateless Cryptographically-Secure Physical Unclonable Function
Charles Herder, Ling Ren, Marten van Dijk, Meng-Day (Mandel) Yu, Srinivas Devadas
2015/797
What Security Can We Achieve within 4 Rounds?
Carmit Hazay, Muthuramakrishnan Venkitasubramaniam
2015/796
Stubborn Mining: Generalizing Selfish Mining and Combining with an Eclipse Attack
Kartik Nayak, Srijan Kumar, Andrew Miller, Elaine Shi
2015/795
Fast and Memory-Efficient Key Recovery in Side-Channel Attacks
Andrey Bogdanov, Ilya Kizhvatov, Kamran Manzoor, Elmar Tischhauser, Marc Witteman
2015/794
Safe-Errors on SPA Protected implementations with the Atomicity Technique
Pierre-Alain Fouque, Sylvain Guilley, Cédric Murdica, David Naccache
2015/793
Algorithmic Information Theory for Obfuscation Security
Rabih Mohsen, Alexandre Miranda Pinto
2015/792
Standard Security Does Not Imply Indistinguishability Under Selective Opening
Dennis Hofheinz, Vanishree Rao, Daniel Wichs
2015/791
On the Equivalence of Obfuscation and Multilinear Maps
Omer Paneth, Amit Sahai
2015/790
On weak and strong 2^k-bent Boolean functions
Pantelimon Stanica
2015/789
Efficient Hardware Implementations of the Warbler Pseudorandom Number Generator
Gangqiang Yang, Mark D. Aagaard, Guang Gong
2015/788
Cracking-Resistant Password Vaults using Natural Language Encoders
Rahul Chatterjee, Joseph Bonneau, Ari Juels, Thomas Ristenpart
2015/787
Backtracking-Assisted Multiplication
Houda Ferradi, Rémi Géraud, Diana Maimut, David Naccache, Hang Zhou
2015/786
Buying AES Design Resistance with Speed and Energy
Jean-Michel Cioranesco, Roman Korkikian, David Naccache, Rodrigo Portella do Canto
2015/785
Double-Speed Barrett Moduli
Rémi Géraud, Diana Maimut, David Naccache
2015/784
Threshold FlipThem: When the winner does not need to take all
David Leslie, Chris Sherfield, Nigel P. Smart
2015/783
Cryptanalysis of the Authenticated Encryption Algorithm COFFE
Ivan Tjuawinata, Tao Huang, Hongjun Wu
2015/782
Secure two-party computation in applied pi-calculus: models and verification
Sergiu Bursuc
2015/781
Twisted Hessian curves
Daniel J. Bernstein, Chitchanok Chuengsatiansup, David Kohel, Tanja Lange
2015/780
Multilinear Maps from Obfuscation
Martin R. Albrecht, Pooya Farshim, Shuai Han, Dennis Hofheinz, Enrique Larraia, Kenneth G. Paterson
2015/779
A Simple Scheme, for Strengthening Product-sum Type PKC
Masao KASAHARA
2015/778
Modular Inversion Hidden Number Problem -- Correction and Improvements
Santanu Sarkar
2015/777
Arithmetic Walsh Transform of Boolean Functions with Linear Structures
Qinglan Zhao, Dong Zheng, Xiangxue Li, Xiaoli Dong
2015/776
Functional Encryption for Turing Machines
Prabhanjan Ananth, Amit Sahai
2015/775
Efficient MDS Diffusion Layers Through Decomposition of Matrices
S. M. Dehnavi, M. R. Mirzaee Shamsabad, A. Mahmoodi Rishakani, Y. Fekri Dabanloo
2015/774
Revisiting Prime Power RSA
Santanu Sarkar
2015/773
Distinguishing a truncated random permutation from a random function
Shoni Gilboa, Shay Gueron
2015/772
Non-Malleable Encryption: Simpler, Shorter, Stronger
Sandro Coretti, Yevgeniy Dodis, Björn Tackmann, Daniele Venturi
2015/771
A SAT-based Public Key Cryptography Scheme
Sebastian E. Schmittner
2015/770
A Transform for NIZK Almost as Efficient and General as the Fiat-Shamir Transform Without Programmable Random Oracles
Michele Ciampi, Giuseppe Persiano, Luisa Siniscalchi, Ivan Visconti
2015/769
On the Hardness of Learning with Rounding over Small Modulus
Andrej Bogdanov, Siyao Guo, Daniel Masny, Silas Richelson, Alon Rosen
2015/768
Interdiction in Practice – Hardware Trojan Against a High-Security USB Flash Drive
Pawel Swierczynski, Marc Fyrbiak, Philipp Koppe, Amir Moradi, Christof Paar
2015/767
Dual EC: A Standardized Back Door
Daniel J. Bernstein, Tanja Lange, Ruben Niederhagen
2015/766
Related-Key Almost Universal Hash Functions: Definitions, Constructions and Applications
Peng Wang, Yuling Li, Liting Zhang, Kaiyan Zheng
2015/765
Sanitizable Signcryption: Sanitization over Encrypted Data (Full Version)
Victoria Fehr, Marc Fischlin
2015/764
On Generating Coset Representatives of PGL_2(\F_q) in PGL_2(\F_{q^2})
Jincheng Zhuang, Qi Cheng
2015/763
Highly Efficient GF(2^8) Inversion Circuit Based on Redundant GF Arithmetic and Its Application to AES Design
Rei Ueno, Naofumi Homma, Yukihiro Sugawara, Yasuyuki Nogami, Takafumi Aoki
2015/762
A Meet-in-the-Middle Attack on Reduced-Round Kalyna-b/2b
Riham AlTawy, Ahmed Abdelkhalek, Amr M. Youssef
2015/761
Implementation of the SCREAM Tweakable Block Cipher in MSP430 Assembly Language
William Diehl
2015/760
Investigating SRAM PUFs in large CPUs and GPUs
Pol Van Aubel, Daniel J. Bernstein, Ruben Niederhagen
2015/759
Cryptanalysis of Gu's ideal multilinear map
Alice Pellet-Mary, Damien Stehle
2015/758
Ring-LWE Cryptography for the Number Theorist
Yara Elias, Kristin E. Lauter, Ekin Ozman, Katherine E. Stange
2015/757
Stream Cipher Operation Modes with Improved Security against Generic Collision Attacks
Matthias Hamann, Matthias Krause
2015/756
Cryptanalysis of an Improved One-Way Hash Chain Self-Healing Group Key Distribution Scheme
Yandong Zheng, Hua Guo
2015/755
Revisiting TESLA in the quantum random oracle model
Erdem Alkim, Nina Bindel, Johannes Buchmann, Özgür Dagdelen, Edward Eaton, Gus Gutoski, Juliane Krämer, Filip Pawlega
2015/754
Related-Key Attack on Full-Round PICARO
Anne Canteaut, Virginie Lallemand, María Naya-Plasencia
2015/753
Differential Computation Analysis: Hiding your White-Box Designs is Not Enough
Joppe W. Bos, Charles Hubain, Wil Michiels, Philippe Teuwen
2015/752
On Constructing One-Way Permutations from Indistinguishability Obfuscation
Gilad Asharov, Gil Segev
2015/751
Fast Garbling of Circuits Under Standard Assumptions
Shay Gueron, Yehuda Lindell, Ariel Nof, Benny Pinkas
2015/750
Anonymous Traitor Tracing: How to Embed Arbitrary Information in a Key
Ryo Nishimaki, Daniel Wichs, Mark Zhandry
2015/749
Affine Equivalence and its Application to Tightening Threshold Implementations
Pascal Sasdrich, Amir Moradi, Tim Güneysu
2015/748
A More Cautious Approach to Security Against Mass Surveillance
Jean Paul Degabriele, Pooya Farshim, Bertram Poettering
2015/747
Self-bilinear Map from One Way Encoding System and Indistinguishability Obfuscation
Huang Zhang, Fangguo Zhang, Baodian Wei, Yusong Du
2015/746
A 2^{70} Attack on the Full MISTY1
Achiya Bar-On
2015/745
Faster ECC over F2571 (feat. PMULL)
Hwajeong Seo
2015/744
BitCryptor: Bit-Serialized Compact Crypto Engine on Reconfigurable Hardware
Ege Gulcan, Aydin Aysu, Patrick Schaumont
2015/743
Short Group Signatures via Structure-Preserving Signatures: Standard Model Security from Simple Assumptions
Benoit Libert, Thomas Peters, Moti Yung
2015/742
A Matrix Decomposition Method for Optimal Normal Basis Multiplication
Can Kızılkale, Ömer Eǧecioǧlu, Çetin Kaya Koç
2015/741
On Generic Constructions of Circularly-Secure, Leakage-Resilient Public-Key Encryption Schemes
Mohammad Hajiabadi, Bruce M. Kapron, Venkatesh Srinivasan
2015/740
Predictable Arguments of Knowledge
Antonio Faonio, Jesper Buus Nielsen, Daniele Venturi
2015/739
Practical and Scalable Sharing of Encrypted Data in Cloud Storage with Key Aggregation
Hung Dang, Yun Long Chong, Francois Brun, Ee-Chien Chang
2015/738
Authenticated Encryption with Small Stretch (or, How to Accelerate AERO)
Kazuhiko Minematsu
2015/737
New multilinear maps from ideal lattices
Gu Chunsheng
2015/736
Solving LWE via List Decoding
Mingqiang Wang, Xiaoyun Wang, Kunxian Xia, Jincheng Zhuang
2015/735
Cutting-Edge Cryptography Through the Lens of Secret Sharing
Ilan Komargodski, Mark Zhandry
2015/734
On the Security of Extended Generalized Feistel Networks
Manoj Kumar, Saibal K. Pal, Anupama Panigrahi
2015/733
Fully Homomorphic Encryption on Octonion Ring
Masahiro Yagisawa
2015/732
Compact Implementations of LEA Block Cipher for Low-End Microprocessors
Hwajeong Seo, Zhe Liu, Jongseok Choi, Taehwan Park, Howon Kim
2015/731
Same Value Analysis on Edwards Curves
Rodrigo Abarzúa, Santi Martínez, Valeria Mendoza
2015/730
Indistinguishability Obfuscation from Functional Encryption for Simple Functions
Prabhanjan Ananth, Abhishek Jain, Amit Sahai
2015/729
Provably-Secure Remote Memory Attestation to Prevent Heap Overflow Attacks
Alexandra Boldyreva, Taesoo Kim, Richard Lipton, Bogdan Warinschi
2015/728
Provable Virus Detection: Using the Uncertainty Principle to Protect Against Malware
Richard J. Lipton, Rafail Ostrovsky, Vassilis Zikas
2015/727
DPA, Bitslicing and Masking at 1 GHz
Josep Balasch, Benedikt Gierlichs, Oscar Reparaz, Ingrid Verbauwhede
2015/726
Compositions of linear functions and applications to hashing
Vladimir Shpilrain, Bianca Sosnovski
2015/725
The self-blindable U-Prove scheme from FC'14 is forgeable
Eric Verheul, Sietse Ringers, Jaap-Henk Hoepman
2015/724
A masked ring-LWE implementation
Oscar Reparaz, Sujoy Sinha Roy, Frederik Vercauteren, Ingrid Verbauwhede
2015/723
Cryptanalysis of Feistel Networks with Secret Round Functions
Alex Biryukov, Gaëtan Leurent, Léo Perrin
2015/722
Oblivious Substring Search with Updates
Tarik Moataz, Erik-Oliver Blass
2015/721
KDM-Security via Homomorphic Smooth Projective Hashing
Hoeteck Wee
2015/720
Output-Compressing Randomized Encodings and Applications
Huijia Lin, Rafael Pass, Karn Seth, Sidharth Telang
2015/719
Consolidating masking schemes
Oscar Reparaz, Begül Bilgin, Svetla Nikova, Benedikt Gierlichs, Ingrid Verbauwhede
2015/718
Efficient Asynchronous Accumulators for Distributed PKI
Leonid Reyzin, Sophia Yakoubov
2015/717
Towards Secure Cryptographic Software Implementation Against Side-Channel Power Analysis Attacks
Pei Luo, Liwei Zhang, Yunsi Fei, A. Adam Ding
2015/716
Linear Cryptanalysis of Reduced-Round SIMECK Variants
Nasour Bagheri
2015/715
New Circular Security Counterexamples from Decision Linear and Learning with Errors
Allison Bishop, Susan Hohenberger, Brent Waters
2015/714
New classes of public key cryptosystem K(XVI)SE(1)PKC constructed based on Reed-Solomon code over extension field of m=8 and K(XVI)SE(2)PKC, based on binary cyclic code.
Masao KASAHARA
2015/713
Light-hHB: A New Version of hHB with Improved Session Key Exchange
Ka Ahmad Khoureich
2015/712
Adaptive Proofs have Straightline Extractors (in the Random Oracle Model)
David Bernhard, Bogdan Warinschi, Ngoc Khanh Nguyen
2015/711
Construction of Lightweight S-Boxes using Feistel and MISTY structures (Full Version)
Anne Canteaut, Sébastien Duval, Gaëtan Leurent
2015/710
Privacy-Preserving Content-Based Image Retrieval in the Cloud (Extended Version)
Bernardo Ferreira, João Rodrigues, João Leitão, Henrique Domingos
2015/709
Detecting Mobile Application Spoofing Attacks by Leveraging User Visual Similarity Perception
Luka Malisa, Kari Kostiainen, Srdjan Capkun
2015/708
Choosing Parameters for NTRUEncrypt
Jeff Hoffstein, Jill Pipher, John M. Schanck, Joseph H. Silverman, William Whyte, Zhenfei Zhang
2015/707
Reconciling User Privacy and Implicit Authentication for Mobile Devices
Siamak F. Shahandashti, Reihaneh Safavi-Naini, Nashad Ahmed Safa
2015/706
A Brief Comparison of Simon and Simeck
Stefan Kölbl, Arnab Roy
2015/705
Linear Overhead Optimally-resilient Robust MPC Using Preprocessing
Ashish Choudhury, Emmanuela Orsini, Arpita Patra, Nigel P. Smart
2015/704
Indistinguishability Obfuscation: from Approximate to Exact
Nir Bitansky, Vinod Vaikuntanathan
2015/703
Point-Function Obfuscation: A Framework and Generic Constructions
Mihir Bellare, Igors Stepanovs
2015/702
Demystifying incentives in the consensus computer
Loi Luu, Jason Teutsch, Raghav Kulkarni, Prateek Saxena
2015/701
Differentially private instance-based noise mechanisms in practice
Sébastien Canard, Baptiste Olivier, Tony Quertier
2015/700
Four Neighbourhood Cellular Automata as Better Cryptographic Primitives
Jimmy Jose, Dipanwita RoyChowdhury
2015/699
FURISC: FHE Encrypted URISC Design
Ayantika Chatterjee, Indranil Sengupta
2015/698
Chosen IV Cryptanalysis on Reduced Round ChaCha and Salsa
Subhamoy Maitra
2015/697
On the Security of a Self-healing Group Key Distribution Scheme
Yandong Zheng, Hua Guo
2015/696
Novel algorithms and hardware architectures for Montgomery Multiplication over GF(p)
Miguel Morales Sandoval, Arturo Diaz Perez
2015/695
Cliptography: Clipping the Power of Kleptographic Attacks
Alexander Russell, Qiang Tang, Moti Yung, Hong-Sheng Zhou
2015/694
On the Complexity of Additively Homomorphic UC Commitments
Tore Kasper Frederiksen, Thomas P. Jakobsen, Jesper Buus Nielsen, Roberto Trifiletti
2015/693
Foundations of Reactive Garbling Schemes
Jesper Buus Nielsen, Samuel Ranellucci
2015/692
Fast and Secure Linear Regression and Biometric Authentication with Security Update
Yoshinori Aono, Takuya Hayashi, Le Trieu Phong, Lihua Wang
2015/691
SpecTre: A Tiny Side-Channel Resistant Speck Core for FPGAs
Cong Chen, Mehmet Sinan Inci, Mostafa Taha, Thomas Eisenbarth
2015/690
Systematic Reverse Engineering of Cache Slice Selection in Intel Processors
Gorka Irazoqui, Thomas Eisenbarth, Berk Sunar
2015/689
Counting Keys in Parallel After a Side Channel Attack
Daniel P. Martin, Jonathan F. O'Connell, Elisabeth Oswald, Martijn Stam
2015/688
Binary Field Multiplication on ARMv8
Hwajeong Seo, Zhe Liu, Yasuyuki Nogami, Jongseok Choi, Howon Kim
2015/687
Classical Cryptographic Protocols in a Quantum World
Sean Hallgren, Adam Smith, Fang Song
2015/686
Cryptanalysis for Secure and Efficient Smart-Card-Based Remote User Authentication Scheme for Multi-server Environment
Azeem Irshad, Muhammad Sher, Shahzad Ashraf, Shahzad faisal, Mahmood Ul Hassan
2015/685
On the discrete logarithm problem in finite fields of fixed characteristic
Robert Granger, Thorsten Kleinjung, Jens Zumbrägel
2015/684
A One-time Stegosystem and Applications to Efficient Covert Communication
Aggelos Kiayias, Yona Raekow, Alexander Russell, Narasimha Shashidhar
2015/683
Security of Linear Secret-Sharing Schemes against Mass Surveillance
Irene Giacomelli, Ruxandra F. Olimid, Samuel Ranellucci
2015/682
Integral Cryptanalysis on Full MISTY1
Yosuke Todo
2015/681
ANONIZE: A Large-Scale Anonymous Survey System
Susan Hohenberger, Steven Myers, Rafael Pass, abhi shelat
2015/680
Indifferentiability of Confusion-Diffusion Networks
Yevgeniy Dodis, Tianren Liu, Martijn Stam, John Steinberger
2015/679
Another Look at Normal Approximations in Cryptanalysis
Subhabrata Samajder, Palash Sarkar
2015/678
Optimizing MAKWA on GPU and CPU
Thomas Pornin
2015/677
EdDSA for more curves
Daniel J. Bernstein, Simon Josefsson, Tanja Lange, Peter Schwabe, Bo-Yin Yang
2015/676
Quantum Cryptanalysis of NTRU
Scott Fluhrer
2015/675
Hawk: The Blockchain Model of Cryptography and Privacy-Preserving Smart Contracts
Ahmed Kosba, Andrew Miller, Elaine Shi, Zikai Wen, Charalampos Papamanthou
2015/674
Preprocessing-Based Verification of Multiparty Protocols with Honest Majority
Roman Jagomägis, Peeter Laud, Alisa Pankova
2015/673
Decaf: Eliminating cofactors through point compression
Mike Hamburg
2015/672
Function-Hiding Inner Product Encryption
Allison Bishop, Abhishek Jain, Lucas Kowalczyk
2015/671
Privacy-preserving Frequent Itemset Mining for Sparse and Dense Data
Peeter Laud, Alisa Pankova
2015/670
Smart Security Management in Secure Devices
Bruno Robisson, Michel Agoyan, Patrick Soquet, Sébastien Le Henaff, Franck Wajsbürt, Pirouz Bazargan-Sabet, Guillaume Phan
2015/669
GMU Hardware API for Authenticated Ciphers
Ekawat Homsirikamol, William Diehl, Ahmed Ferozpuri, Farnoud Farahmand, Malik Umar Sharif, Kris Gaj
2015/668
The Fallacy of Composition of Oblivious RAM and Searchable Encryption
Muhammad Naveed
2015/667
De Bruijn Sequences from Joining Cycles of Nonlinear Feedback Shift Registers
Ming Li, Cees J. A. Jansen, Dongdai Lin, Qiuyan Wang
2015/666
Improved Linear Hull Attack on Round-Reduced \textsc{Simon} with Dynamic Key-guessing Techniques
Huaifeng Chen, Xiaoyun Wang
2015/665
Communication Complexity of Conditional Disclosure of Secrets and Attribute-Based Encryption.
Romain Gay, Iordanis Kerenidis, Hoeteck Wee
2015/664
Secure Multi-Party Shuffling
Mahnush Movahedi, Jared Saia, Mahdi Zamani
2015/663
Analyzing the Efficiency of Biased-Fault Based Attacks
Nahid Farhady Ghalaty, Bilgiday Yuce, Patrick Schaumont
2015/662
Strong Security of the Strongly Multiplicative Ramp Secret Sharing based on Algebraic Curves
Ryutaroh Matsumoto
2015/661
Cryptanalysis of a modern rotor machine in a multicast setting
Shane Kepley, David Russo, Rainer Steinwandt
2015/660
A Hybrid Gaussian Sampler for Lattices over Rings
Léo Ducas, Thomas Prest
2015/659
Diversity and Transparency for ECC
Jean-Pierre Flori, Jérôme Plût, Jean-René Reinhard, Martin Ekerå
2015/658
Single-Cycle Implementations of Block Ciphers
Pieter Maene, Ingrid Verbauwhede
2015/657
Randomizing the Montgomery Powering Ladder
Duc-Phong Le, Chik How Tan, Michael Tunstall
2015/656
Cryptanalysis of a Markov Chain Based User Authentication Scheme
Ruhul Amin, G. P. Biswas
2015/655
An Efficient Multi-Message Multi-Receiver Signcryption Scheme with Forward Secrecy on Elliptic Curves
Nizamud Din, Arif Iqbal Umar, Abdul Waheed, Noor Ul Amin
2015/654
DAA-TZ: An Efficient DAA Scheme for Mobile Devices using ARM TrustZone
Bo Yang, Kang Yang, Yu Qin, Zhenfeng Zhang, Dengguo Feng
2015/653
Homomorphic Signature Schemes - A survey
Giulia Traverso, Denise Demirel, Johannes Buchmann
2015/652
Modelling ciphersuite and version negotiation in the TLS protocol
Benjamin Dowling, Douglas Stebila
2015/651
Secure Execution Architecture based on PUF-driven Instruction Level Code Encryption
Stephan Kleber, Florian Unterstein, Matthias Matousek, Frank Kargl, Frank Slomka, Matthias Hiller
2015/650
A New Encryption Standard of Ukraine: The Kalyna Block Cipher
Roman Oliynykov, Ivan Gorbenko, Oleksandr Kazymyrov, Victor Ruzhentsev, Oleksandr Kuznetsov, Yurii Gorbenko, Oleksandr Dyrda, Viktor Dolgov, Andrii Pushkaryov, Ruslan Mordvinov, Dmytro Kaidalov
2015/649
On the Hardness of Proving CCA-security of Signed ElGamal
David Bernhard, Marc Fischlin, Bogdan Warinschi
2015/648
Adaptive Proofs of Knowledge in the Random Oracle Model
David Bernhard, Marc Fischlin, Bogdan Warinschi
2015/647
Efficient ephemeral elliptic curve cryptographic keys
Andrea Miele, Arjen K. Lenstra
2015/646
Decomposition attack on SASASASAS
Alex Biryukov, Dmitry Khovratovich
2015/645
New Dynamic Provable Data Possession Protocols with Public Verifiability and Data Privacy
Clémentine Gritti, Rongmao Chen, Willy Susilo, Thomas Plantard
2015/644
The Pythia PRF Service
Adam Everspaugh, Rahul Chatterjee, Samuel Scott, Ari Juels, Thomas Ristenpart
2015/643
Short Accountable Ring Signatures Based on DDH
Jonathan Bootle, Andrea Cerulli, Pyrros Chaidos, Essam Ghadafi, Jens Groth, Christophe Petit
2015/642
A New Partial Key Exposure Attack on Multi-power RSA
Muhammed F. Esgin, Mehmet S. Kiraz, Osmanbey Uzunkol
2015/641
Noise-Free Symmetric Fully Homomorphic Encryption Based on Non-Commutative Rings
Jing Li, Licheng Wang
2015/640
Very-efficient simulatable flipping of many coins into a well
Luís T. A. N. Brandão
2015/639
Polynomial Time Reduction from Approximate Shortest Vector Problem to Principal Ideal Problem for Lattices in Some Cyclotomic Rings
Hao Chen
2015/638
An Efficient Many-Core Architecture for Elliptic Curve Cryptography Security Assessment
Marco Indaco, Fabio Lauri, Andrea Miele, Pascal Trotta
2015/637
A Novel Cyberspace-Oriented Access Control Model
Fenghua Li, Yanchao Wang, Rongna Xie, Jinbo Xiong, Fangfang Shan
2015/636
On Stream Ciphers with Provable Beyond-the-Birthday-Bound Security against Time-Memory-Data Tradeoff Attacks
Matthias Hamann, Matthias Krause
2015/635
Microcash: Efficient Off-Line Small Payments
Chris Pavlovski, Colin Boyd
2015/634
Phasing: Private Set Intersection using Permutation-based Hashing
Benny Pinkas, Thomas Schneider, Gil Segev, Michael Zohner
2015/633
An Efficient ID-Based Message Recoverable Privacy-Preserving Auditing Scheme
Mehmet Sabır Kiraz, İsa Sertkaya, Osmanbey Uzunkol
2015/632
On the Impossibility of Virtual Black-Box Obfuscation in Idealized Models
Mohammad Mahmoody, Ameer Mohammed, Soheil Nematihaji
2015/631
Accelerating Homomorphic Evaluation on Reconfigurable Hardware
Thomas Pöppelmann, Michael Naehrig, Andrew Putnam, Adrian Macias
2015/630
Unconditionally Secure Computation with Reduced Interaction
Ivan Damgård, Jesper Buus Nielsen, Rafail Ostovsky, Adi Rosen
2015/629
BeleniosRF: A Non-interactive Receipt-Free Electronic Voting Scheme
Pyrros Chaidos, Véronique Cortier, Georg Fuchsbauer, David Galindo
2015/628
An Unconditionally Hiding and Long-Term Binding Post-Quantum Commitment Scheme
Daniel Cabarcas, Denise Demirel, Florian Göpfert, Jean Lancrenon, Thomas Wunderer
2015/627
On Necessary Padding with IO
Justin Holmgren
2015/626
Practical Round-Optimal Blind Signatures in the Standard Model
Georg Fuchsbauer, Christian Hanser, Daniel Slamanig
2015/625
Ed448-Goldilocks, a new elliptic curve
Mike Hamburg
2015/624
Automated Analysis and Synthesis of Authenticated Encryption Schemes
Viet Tung Hoang, Jonathan Katz, Alex J. Malozemoff
2015/623
Design, Evaluation and Optimization of Physical Unclonable Functions based on Transient Effect Ring Oscillators
Abdelkarim Cherkaoui, Lilian Bossuet, Cédric Marchand
2015/622
Random Digit Representation of Integers
Nicolas Méloni, M. Anwar Hasan
2015/621
Who watches the watchmen? : Utilizing Performance Monitors for Compromising keys of RSA on Intel Platforms
Sarani Bhattacharya, Debdeep Mukhopadhyay
2015/620
Statistical Concurrent Non-malleable Zero-knowledge from One-way Functions
Susumu Kiyoshima
2015/619
Construction of Arithmetic Secret Sharing Schemes by Using Torsion Limits
Seher Tutdere, Osmanbey Uzunkol
2015/618
An Authentication Code over Galois Rings with Optimal Impersonation and Substitution Probabilities
Juan Carlos Ku-Cauich, Guillermo Morales-Luna, Horacio Tapia-Recillas
2015/617
Generalised tally-based decoders for traitor tracing and group testing
Boris Skoric, Wouter de Groot
2015/616
The leaking battery: A privacy analysis of the HTML5 Battery Status API
Lukasz Olejnik, Gunes Acar, Claude Castelluccia, Claudia Diaz
2015/615
Security Analysis of Niu et al. Authentication and Ownership Management Protocol
Nasour Bagheri, Masoumeh Safkhani, Hoda Jannati
2015/614
Bit Security of the Hyperelliptic Curves Diffie-Hellman Problem
Fangguo Zhang
2015/613
Accountable Authority Ciphertext-Policy Attribute-Based Encryption with White-Box Traceability and Public Auditing in the Cloud
Jianting Ning, Xiaolei Dong, Zhenfu Cao, Lifei Wei
2015/612
The Simeck Family of Lightweight Block Ciphers
Gangqiang Yang, Bo Zhu, Valentin Suder, Mark D. Aagaard, Guang Gong
2015/611
A Unified Security Analysis of Two-phase Key Exchange Protocols in TPM 2.0
Shijun Zhao, Qianying Zhang
2015/610
McBits: fast constant-time code-based cryptography
Daniel J. Bernstein, Tung Chou, Peter Schwabe
2015/609
Experimental Study of DIGIPASS GO3 and the Security of Authentication
Igor Semaev
2015/608
Fully Secure Functional Encryption for Inner Products, from Standard Assumptions
Shweta Agrawal, Benoit Libert, Damien Stehle
2015/607
Netcoin - A Traceable P2P Electronic Cash System
Hitesh Tewari, Eamon O Nuallain
2015/606
Constructing Efficient PAKE Protocols from Identity-Based KEM/DEM
Kyu Young Choi, Jihoon Cho, Jung Yeon Hwang, Taekyoung Kwon
2015/605
Computing Elliptic Curve Discrete Logarithms with Improved Baby-step Giant-step Algorithm
Steven D. Galbraith, Ping Wang, Fangguo Zhang
2015/604
Structure-Preserving Signatures from Standard Assumptions, Revisited
Eike Kiltz, Jiaxin Pan, Hoeteck Wee
2015/603
Complementary Dual Codes for Counter-measures to Side-Channel Attacks
Claude Carlet, Sylvain Guilley
2015/602
Combined Side-Channel and Fault Analysis Attack on Protected Grain Family of Stream Ciphers
Abhishek Chakraborty, Bodhisatwa Mazumdar, Debdeep Mukhopadhay
2015/601
A Secure Oblivious Transfer Protocol from Indistinguishing Obfuscation
Mei Wang, Zheng Yuan, Xiao Feng
2015/600
Predictive Models for Min-Entropy Estimation
John Kelsey, Kerry A. McKay, Meltem Sonmez Turan
2015/599
The Chain Rule for HILL Pseudoentropy, Revisited
Krzysztof Pietrzak, Maciej Skorski
2015/598
Combining Differential Privacy and Secure Multiparty Computation
Martin Pettai, Peeter Laud
2015/597
Assessment of Hiding the Higher-Order Leakages in Hardware - what are the achievements versus overheads?
Amir Moradi, Alexander Wild
2015/596
Zeroizing Without Low-Level Zeroes: New MMAP Attacks and Their Limitations
Jean-Sébastien Coron, Craig Gentry, Shai Halevi, Tancrède Lepoint, Hemanta K. Maji, Eric Miles, Mariana Raykova, Amit Sahai, Mehdi Tibouchi
2015/595
Differential Fault Intensity Analysis
Nahid Farhady Ghalaty, Bilgiday Yuce, Mostafa Taha, Patrick Schaumont
2015/594
Disk Encryption: Do We Need to Preserve Length?
Debrup Chakraborty, Cuauhtemoc Mancillas-Lopez, Palash Sarkar
2015/593
A Physical Approach for Stochastic Modeling of TERO-based TRNG
Patrick HADDAD, Viktor FISCHER, Florent BERNARD, Jean NICOLAI
2015/592
Oblivion: Mitigating Privacy Leaks by Controlling the Discoverability of Online Information
Milivoj Simeonovski, Fabian Bendun, Muhammad Rizwan Asghar, Michael Backes, Ninja Marnau, Peter Druschel
2015/591
How much randomness can be extracted from memoryless Shannon entropy sources?
Maciej Skorski
2015/590
TriviA: A Fast and Secure Authenticated Encryption Scheme
Avik Chakraborti, Anupam Chattopadhyay, Muhammad Hassan, Mridul Nandi
2015/589
Generating S-Box Multivariate Quadratic Equation Systems And Estimating Algebraic Attack Resistance Aided By SageMath
A. -M. Leventi-Peetz, J. -V. Peetz
2015/588
An analysis of the $C$ class of bent functions
Bimal Mandal, Pantelimon Stanica, Sugata Gangopadhyay, Enes Pasalic
2015/587
AN ENHANCED BIOMETRIC BASED REMOTE USER AUTHENTICATION SCHEME USING SMART CARD
Trupil Limbasiya, Nishant Doshi
2015/586
SCLPV: Secure Certificateless Public Verification for Cloud Storage in Cyber-physical-social System
Yuan Zhang, Chunxiang Xu, Shui Yu, Hongwei Li, Xiaojun Zhang
2015/585
SIMON and SPECK: Block Ciphers for the Internet of Things
Ray Beaulieu, Douglas Shors, Jason Smith, Stefan Treatman-Clark, Bryan Weeks, Louis Wingers
2015/584
How to Securely Prolong the Computational Bindingness of Pedersen Commitments
Denise Demirel, Jean Lancrenon
2015/583
Secure Key Generation from Biased PUFs
Roel Maes, Vincent van der Leest, Erik van der Sluis, Frans Willems
2015/582
How Secure and Quick is QUIC? Provable Security and Performance Analyses
Robert Lychev, Samuel Jero, Alexandra Boldyreva, Cristina Nita-Rotaru
2015/581
Universal Computational Extractors and the Superfluous Padding Assumption for Indistinguishability Obfuscation
Chris Brzuska, Arno Mittelbach
2015/580
Composable & Modular Anonymous Credentials: Definitions and Practical Constructions
Jan Camenisch, Maria Dubovitskaya, Kristiyan Haralambiev, Markulf Kohlweiss
2015/579
A Simple Proof of a Distinguishing Bound of Iterated Uniform Random Permutation
Mridul Nandi
2015/578
Tampering with the Delivery of Blocks and Transactions in Bitcoin
Arthur Gervais, Hubert Ritzdorf, Ghassan O. Karame, Srdjan Capkun
2015/577
Twist Insecurity
Manfred Lochter, Andreas Wiemers
2015/576
The Carnac protocol -- or how to read the contents of a sealed envelope
Michael Scott, Brian Spector
2015/575
Known-key Distinguisher on Full PRESENT
Céline Blondeau, Thomas Peyrin, Lei Wang
2015/574
Fair and Robust Multi-Party Computation using a Global Transaction Ledger
Aggelos Kiayias, Hong-Sheng Zhou, Vassilis Zikas
2015/573
Last fall degree, HFE, and Weil descent attacks on ECDLP
Ming-Deh A. Huang, Michiel Kosters, Sze Ling Yeo
2015/572
On Public Key Encryption from Noisy Codewords
Eli Ben-Sasson, Iddo Ben-Tov, Ivan Damgard, Yuval Ishai, Noga ron-Zewi
2015/571
Robust and One-Pass Parallel Computation of Correlation-Based Attacks at Arbitrary Order - Extended Version
Tobias Schneider, Amir Moradi, Tim Güneysu
2015/570
Constant Communication ORAM with Small Blocksize
Tarik Moataz, Travis Mayberry, Erik-Oliver Blass
2015/569
Improved (Pseudo) Preimage Attacks on Reduced-Round GOST and Grøstl-256 and Studies on Several Truncation Patterns for AES-like Compression Functions (Full Version)
Bingke Ma, Bao Li, Ronglin Hao, Xiaoqian Li
2015/568
Cryptanalysis of Reduced-Round Whirlwind (Full Version)
Bingke Ma, Bao Li, Ronglin Hao, Xiaoqian Li
2015/567
Key-Recovery Attack on the ASASA Cryptosystem with Expanding S-boxes
Henri Gilbert, Jérôme Plût, Joana Treger
2015/566
A Framework for Identity-Based Encryption with Almost Tight Security
Nuttapong Attrapadung, Goichiro Hanaoka, Shota Yamada
2015/565
FourQ: four-dimensional decompositions on a Q-curve over the Mersenne prime
Craig Costello, Patrick Longa
2015/564
Sanctum: Minimal Hardware Extensions for Strong Software Isolation
Victor Costan, Ilia Lebedev, Srinivas Devadas
2015/563
Privacy in the Genomic Era
Muhammad Naveed, Erman Ayday, Ellen W. Clayton, Jacques Fellay, Carl A. Gunter, Jean-Pierre Hubaux, Bradley A. Malin, XiaoFeng Wang
2015/562
PUDA – Privacy and Unforgeability for Data Aggregation
Iraklis Leontiadis, Kaoutar Elkhiyaoui, Melek Önen, Refik Molva
2015/561
SoC it to EM: electromagnetic side-channel attacks on a complex system-on-chip
J. Longo, E. De Mulder, D. Page, M. Tunstall
2015/560
Generic Construction of UC-Secure Oblivious Transfer
Olivier Blazy, Céline Chevalier
2015/559
Concurrent Secure Computation with Optimal Query Complexity
Ran Canetti, Vipul Goyal, Abhishek Jain
2015/558
Efficiency Evaluation of Cryptographic Protocols for Boardroom Voting
Oksana Kulyk, Stephan Neumann, Jurlind Budurushi, Melanie Volkamer, Rolf Haenni, Reto Koenig, Philemon von Bergen
2015/557
Improved All-Subkeys Recovery Attacks on FOX, KATAN and SHACAL-2 Block Ciphers
Takanori Isobe, Kyoji Shibutani
2015/556
Lightweight Coprocessor for Koblitz Curves: 283-bit ECC Including Scalar Conversion with only 4300 Gates
Sujoy Sinha Roy, Kimmo Järvinen, Ingrid Verbauwhede
2015/555
Attribute-Based Signcryption : Signer Privacy, Strong Unforgeability and IND-CCA2 Security in Adaptive-Predicates Attack
Tapas Pandit, Sumit Kumar Pandey, Rana Barua
2015/554
An Algebraic Framework for Pseudorandom Functions and Applications to Related-Key Security
Michel Abdalla, Fabrice Benhamouda, Alain Passelègue
2015/553
Round-Optimal Black-Box Two-Party Computation
Rafail Ostrovsky, Silas Richelson, Alessandra Scafuro
2015/552
An Improved BKW Algorithm for LWE with Applications to Cryptography and Lattices
Paul Kirchner, Pierre-Alain Fouque
2015/551
Quantum homomorphic encryption for circuits of low $T$-gate complexity
Anne Broadbent, Stacey Jeffery
2015/550
Upending Stock Market Structure Using Secure Multi-Party Computation
Charanjit S. Jutla
2015/549
ILTRU: An NTRU-Like Public Key Cryptosystem Over Ideal Lattices
Amir Hassani Karbasi, Reza Ebrahimi Atani
2015/548
Message Transmission with Reverse Firewalls---Secure Communication on Corrupted Machines
Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz
2015/547
Secure Computation of MIPS Machine Code
Xiao Wang, S. Dov Gordon, Allen McIntosh, Jonathan Katz
2015/546
Actively Secure OT Extension with Optimal Overhead
Marcel Keller, Emmanuela Orsini, Peter Scholl
2015/545
FROPUF: How to Extract More Entropy from Two Ring Oscillators in FPGA-Based PUFs
Qinglong Zhang, Zongbin Liu, Cunqing Ma, Changting Li, Jiwu Jing
2015/544
Alternative cubics' rules with an algebraic appeal
Daniel R. L. Brown
2015/543
Bloom Filters in Adversarial Environments
Moni Naor, Eylon Yogev
2015/542
Improved Side-Channel Analysis of Finite-Field Multiplication
Sonia Belaïd, Jean-Sébastien Coron, Pierre-Alain Fouque, Benoît Gérard, Jean-Gabriel Kammerer, Emmanuel Prouff
2015/541
Security of Full-State Keyed Sponge and Duplex: Applications to Authenticated Encryption
Bart Mennink, Reza Reyhanitabar, Damian Vizár
2015/540
PICO: An Ultra lightweight and Low power encryption design for pervasive computing
Gaurav Bansod, Narayan Pisharoty, Abhijit Patil
2015/539
Tweaking Even-Mansour Ciphers
Benoît Cogliati, Rodolphe Lampe, Yannick Seurin
2015/538
Pairing Based Mutual Healing in Wireless Sensor Networks
Sarita Agrawal, Jay Patel, Manik Lal Das
2015/537
Towards Easy Leakage Certification
François Durvaux, François-Xavier Standaert, Santos Merino Del Pozo
2015/536
From Improved Leakage Detection to the Detection of Points of Interests in Leakage Traces
François Durvaux, François-Xavier Standaert
2015/535
ASCA, SASCA and DPA with Enumeration: Which One Beats the Other and When?
Vincent Grosso, François-Xavier Standaert
2015/534
Problems, solutions and experience of the first international student's Olympiad in cryptography
Sergey Agievich, Anastasiya Gorodilova, Nikolay Kolomeec, Svetla Nikova, Bart Preneel, Vincent Rijmen, George Shushuev, Natalia Tokareva, Valeria Vitkup
2015/533
Related-Key Rectangle Attack on Round-reduced \textit{Khudra} Block Cipher
Xiaoshuang Ma, Kexin Qiao
2015/531
Reproducible Circularly-Secure Bit Encryption: Applications and Realizations
Mohammad Hajiabadi, Bruce M. Kapron
2015/530
Practical Free-Start Collision Attacks on 76-step SHA-1
Pierre Karpman, Thomas Peyrin, Marc Stevens
2015/529
Power Analysis Attacks against IEEE 802.15.4 Nodes
Colin O'Flynn, Zhizhang Chen
2015/528
SpaceMint: A Cryptocurrency Based on Proofs of Space
Sunoo Park, Albert Kwon, Georg Fuchsbauer, Peter Gaži, Joël Alwen, Krzysztof Pietrzak
2015/527
Robust Profiling for DPA-Style Attacks
Carolyn Whitnall, Elisabeth Oswald
2015/526
Generic Key Recovery Attack on Feistel Scheme
Takanori Isobe, Kyoji Shibutani
2015/525
Short Randomizable Signatures
David Pointcheval, Olivier Sanders
2015/524
Secure Key Exchange Protocol based on Virtual Proof of Reality
Yansong Gao
2015/523
Efficient Constant Round Multi-Party Computation Combining BMR and SPDZ
Yehuda Lindell, Benny Pinkas, Nigel P. Smart, Avishay Yanai
2015/522
Speeding-up lattice sieving without increasing the memory, using sub-quadratic nearest neighbor search
Anja Becker, Nicolas Gama, Antoine Joux
2015/521
Democoin: A Publicly Verifiable and Jointly Serviced Cryptocurrency
Sergey Gorbunov, Silvio Micali
2015/520
A Constant Time, Single Round Attribute-Based Authenticated Key Exchange in Random Oracle Model
Suvradip Chakraborty, Y. Sreenivasarao, C. Pandu Rangan, Srinivasan Raghuraman
2015/519
Notes on Two Fully Homomorphic Encryption Schemes Without Bootstrapping
Yongge Wang
2015/518
Broadcasting Intermediate Blocks as a Defense Mechanism Against Selfish-Mine in Bitcoin
Ren Zhang, Bart Preneel
2015/517
Subversion-Resilient Signatures: Definitions, Constructions and Applications
Giuseppe Ateniese, Bernardo Magri, Daniele Venturi
2015/516
Key-Recovery Attacks on ASASA
Brice Minaud, Patrick Derbez, Pierre-Alain Fouque, Pierre Karpman
2015/515
Higher-Order Differential Meet-in-The-Middle Preimage Attacks on SHA-1 and BLAKE
Thomas Espitau, Pierre-Alain Fouque, Pierre Karpman
2015/514
Time-Lock Puzzles from Randomized Encodings
Nir Bitansky, Shafi Goldwasser, Abhishek Jain, Omer Paneth, Vinod Vaikuntanathan, and Brent Waters
2015/513
Computing Individual Discrete Logarithms Faster in $GF(p^n)$
Aurore Guillevic
2015/512
Key Extraction from the Primary Side of a Switched-Mode Power Supply
Sami Saab, Andrew Leiserson, Michael Tunstall
2015/511
Near Collision Side Channel Attacks
Baris Ege, Thomas Eisenbarth, Lejla Batina
2015/510
Equivoe-T: Transposition Equivocation Cryptography
Gideon Samid
2015/509
A flaw in a theorem about Schnorr signatures
Daniel R. L. Brown
2015/508
Probabilistic Signature Based Framework for Differential Fault Analysis of Stream Ciphers
Santanu Sarkar, Prakash Dey, Avishek Adhikari, Subhamoy Maitra
2015/507
Decomposing the ASASA Block Cipher Construction
Itai Dinur, Orr Dunkelman, Thorsten Kranz, Gregor Leander
2015/506
Strong Non-Interference and Type-Directed Higher-Order Masking
Gilles Barthe, Sonia Belaïd, François Dupressoir, Pierre-Alain Fouque, Benjamin Grégoire, Pierre-Yves Strub, Rébecca Zucchini
2015/505
The Tower Number Field Sieve
Razvan Barbulescu, Pierrick Gaudry, Thorsten Kleinjung
2015/504
The Iterated Random Permutation Problem with Applications to Cascade Encryption
Brice Minaud, Yannick Seurin
2015/503
The Norwegian Internet Voting Protocol: A new Instantiation
Kristian Gjøsteen, Anders Smedstuen Lund
2015/502
Centrally Banked Cryptocurrencies
George Danezis, Sarah Meiklejohn
2015/501
Multi-Prover Commitments Against Non-Signaling Attacks
Serge Fehr, Max Fillinger
2015/500
Fault Cryptanalysis of CHES 2014 Symmetric Infective Countermeasure
Alberto Battistello, Christophe Giraud
2015/499
Algebraic partitioning: Fully compact and (almost) tightly secure cryptography
Dennis Hofheinz
2015/498
Low Space Complexity CRT-based Bit-Parallel GF(2^n) Polynomial Basis Multipliers for Irreducible Trinomials
Jiajun Zhang, Haining Fan
2015/497
Efficient Zero-Knowledge Proofs of Non-Algebraic Statements with Sublinear Amortized Cost
Zhangxiang Hu, Payman Mohassel, Mike Rosulek
2015/496
Quantifying Location Privacy Leakage from Transaction Prices
Arthur Gervais, Hubert Ritzdorf, Mario Lucic, Srdjan Capkun
2015/495
Improving algebraic attacks on stream ciphers based on linear feedback shifter registers over $F_{2^k}$
Sondre Rønjom
2015/494
Cryptanalysis of the LSH and SHA-V Hash Functions
Yonglin Hao, Hongbo Yu
2015/493
Fault Tolerant Infective Countermeasure for AES
Sikhar Patranabis, Abhishek Chakraborty, Debdeep Mukhopadhyay
2015/492
Masking vs. Multiparty Computation: How Large is the Gap for AES?
Vincent Grosso, François-Xavier Standaert, Sebastian Faust
2015/491
Re-encryption, functional re-encryption, and multi-hop re-encryption: A framework for achieving obfuscation-based security and instantiations from lattices
Nishanth Chandran, Melissa Chase, Feng-Hao Liu, Ryo Nishimaki, Keita Xagawa
2015/490
Cryptanalysis Of Dynamic ID Based Remote User Authentication Scheme With Key Agreement
Sonam Devgan Kaul, Amit K. Awasthi
2015/489
Scalable and private media consumption with Popcorn
Trinabh Gupta, Natacha Crooks, Whitney Mulhern, Srinath Setty, Lorenzo Alvisi, Michael Walfish
2015/488
On Black-Box Complexity of Universally Composable Security in the CRS model
Carmit Hazay, Muthuramakrishnan Venkitasubramaniam
2015/487
Contention in Cryptoland: Obfuscation, Leakage and UCE
Mihir Bellare, Igors Stepanovs, Stefano Tessaro
2015/486
DECIM: Detecting Endpoint Compromise In Messaging
Jiangshan Yu, Mark Ryan, Cas Cremers
2015/485
Turning Online Ciphers Off
Elena Andreeva, Guy Barwell, Ritam Bhaumik, Mridul Nandi, Dan Page, Martijn Stam
2015/484
More Rounds, Less Security?
Jian Guo, Jérémy Jean, Nicky Mouha, Ivica Nikolić
2015/483
Improved security proofs in lattice-based cryptography: using the Rényi divergence rather than the statistical distance
Shi Bai, Adeline Langlois, Tancrëde Lepoint, Amin Sakzad, Damien Stehle, Ron Steinfeld
2015/482
How to build time-lock encryption
Jia Liu, Tibor Jager, Saqib A. Kakvi, Bogdan Warinschi
2015/481
Advanced Differential Cryptanalysis of Reduced-Round SIMON64/128 Using Large-Round Statistical Distinguishers
Theodosis Mourouzis, Guangyan Song, Nicolas Courtois, Michalis Christofii
2015/480
Trinocchio: Privacy-Friendly Outsourcing by Distributed Verifiable Computation
Berry Schoenmakers, Meilof Veeningen, Niels de Vreede
2015/479
A Provably Secure Group Signature Scheme from Code-Based Assumptions
Martianus Frederic Ezerman, Hyung Tae Lee, San Ling, Khoa Nguyen, Huaxiong Wang
2015/478
How to Build Time-Lock Encryption
Tibor Jager
2015/477
Authentication Key Recovery on Galois Counter Mode (GCM)
John Mattsson and Magnus Westerlund
2015/476
XPX: Generalized Tweakable Even-Mansour with Improved Security Guarantees
Bart Mennink
2015/475
Randomizing scalar multiplication using exact covering systems of congruences
Eleonora Guerrini, Laurent Imbert, Théo Winterhalter
2015/474
Fully Homomorphic Encryption without bootstrapping
Masahiro Yagisawa
2015/473
VARIANTS OF DIFFERENTIAL AND LINEAR CRYPTANALYSIS
Mehak Khurana, Meena Kumari
2015/472
High Performance Multi-Party Computation for Binary Circuits Based on Oblivious Transfer
Sai Sheshank Burra, Enrique Larraia, Jesper Buus Nielsen, Peter Sebastian Nordholt, Claudio Orlandi, Emmanuela Orsini, Peter Scholl, Nigel P. Smart
2015/471
A Challenge Obfuscation Method for Thwarting Model Building Attacks on PUFs
Yansong Gao, Damith C. Ranasinghe, Gefei Li, Said F. Al-Sarawi, Omid Kavehei, Derek Abbott
2015/470
On the power of Public-key Functional Encryption with Function Privacy
Vincenzo Iovino, Qiang Tang, Karol Żebrowski
2015/469
Shadow-Bitcoin: Scalable Simulation via Direct Execution of Multi-threaded Applications
Andrew Miller, Rob Jansen
2015/468
Practical Fully Homomorphic Encryption without Noise Reduction
Dongxi Liu
2015/467
The Oblivious Machine - or: How to Put the C into MPC
Marcel Keller
2015/466
Efficient Fully Homomorphic Encryption with Circularly Secure Key Switching Process
Zhou Tanping, Yang Xiaoyuan, Zhang Wei, Wu Liqiang
2015/465
Efficient Arithmetic on ARM-NEON and Its Application for High-Speed RSA Implementation
Hwajeong Seo, Zhe Liu, Johann Groschadl, Howon Kim
2015/464
Bitcoin and Beyond: A Technical Survey on Decentralized Digital Currencies
Florian Tschorsch, Björn Scheuermann
2015/463
Multilinear Maps Using Random Matrix
Gu Chunsheng
2015/462
Accelerating SWHE based PIRs using GPUs
Wei Dai, Yarkın Doröz, Berk Sunar
2015/461
Approximate Algorithms on Lattices with Small Determinant
Jung Hee Cheon, Changmin Lee
2015/460
Step by Step Towards Creating a Safe Smart Contract: Lessons and Insights from a Cryptocurrency Lab
Kevin Delmolino, Mitchell Arnett, Ahmed Kosba, Andrew Miller, Elaine Shi
2015/459
New Observation on Division Property
Bing Sun, Xin Hai, Wenyu Zhang, Lei Cheng, Zhichao Yang
2015/458
A HYBRID APPROACH FOR THE SECURE TRANSMISSION OF H.264/AVC VIDEO STREAMS
Sheena Sathyan, Shaji R S
2015/457
Generic Conversions from CPA to CCA secure Functional Encryption
Mridul Nandi, Tapas Pandit
2015/456
Collateral damage of Facebook Apps: an enhanced privacy scoring model
Iraklis Symeonidis, Pagona Tsormpatzoudi, Bart Preneel
2015/455
Secure Deduplication of Encrypted Data without Additional Independent Servers
Jian Liu, N. Asokan, Benny Pinkas
2015/454
A comprehensive and lightweight security architecture to secure the IoT throughout the lifecycle of a device based on HIMMO
Oscar Garcia-Morchon, Ronald Rietman, Sahil Sharma, Ludo Tolhuizen, Jose Luis Torre-Arce
2015/453
An Optimization of Gu Map-1
Yupu Hu, Huiwen Jia
2015/452
Masks will Fall Off -- Higher-Order Optimal Distinguishers
Nicolas Bruneau, Sylvain Guilley, Annelie Heuser, Olivier Rioul
2015/451
On the Systematic Constructions of Rotation Symmetric Bent Functions with Any Possible Algebraic Degrees
Sihong Su, Xiaohu Tang
2015/450
Adaptively Secure Computation with Partial Erasures
Carmit Hazay, Yehuda Lindell, Arpita Patra
2015/449
On Constructions of a Sort of MDS Block Diffusion Matrices for Block Ciphers and Hash Functions
Ruoxin Zhao, Rui Zhang, Yongqiang Li, Baofeng Wu
2015/448
A Comment on Gu Map-1
Yupu Hu, Huiwen Jia
2015/447
A New Model for Error-Tolerant Side-Channel Cube Attacks
Zhenqi Li, Bin Zhang, Junfeng Fan, Ingrid Verbauwhede
2015/446
On the Amortized Complexity of Zero-knowledge Protocols
Ronald Cramer, Ivan Damgård, Marcel Keller
2015/445
XLS is not a Strong Pseudorandom Permutation
Mridul Nandi
2015/444
Revisiting Security Claims of XLS and COPA
Mridul Nandi
2015/443
Security Evaluation and Enhancement of Bistable Ring PUFs
Xiaolin Xu, Ulrich Rührmair, Daniel E. Holcomb, Wayne Burleson
2015/442
Individualizing Electrical Circuits of Cryptographic Devices as a Means to Hinder Tampering Attacks
Zoya Dyka, Thomas Basmer, Christian Wittke, Peter Langendoerfer
2015/441
FIDES: Enhancing Trust in Reconfigurable Based Hardware Systems
Devu Manikantan Shila, Vivek Venugopalan, Cameron D Patterson
2015/440
Message-Locked Encryption for Lock-Dependent Messages
Martín Abadi, Dan Boneh, Ilya Mironov, Ananth Raghunathan, Gil Segev
2015/439
On Concurrently Secure Computation in the Multiple Ideal Query Model
Vipul Goyal, Abhishek Jain
2015/438
A Hybrid Approach for Proving Noninterference of Java Programs
Ralf Kuesters, Tomasz Truderung, Bernhard Beckert, Daniel Bruns, Michael Kirsten, Martin Mohr
2015/437
A Note on the Unsoundness of vnTinyRAM's SNARK
Bryan Parno
2015/436
On the Resistance of Prime-variable Rotation Symmetric Boolean Functions against Fast Algebraic Attacks
Yusong Du, Baodian Wei, Fangguo Zhang, Huang Zhang
2015/435
On the (Fast) Algebraic Immunity of Boolean Power Functions
Yusong Du, Baodian Wei, Fangguo Zhang, Huang Zhang
2015/434
Dickson Polynomials that are Involutions
Pascale Charpin, Sihem Mesnager, Sumanta Sarkar
2015/433
A New Classification of 4-bit Optimal S-boxes and its Application to PRESENT, RECTANGLE and SPONGENT
Wentao Zhang, Zhenzhen Bao, Vincent Rijmen, Meicheng Liu
2015/432
Non-Repudiable Proofs of Storage in Cloud
Hongyuan Wang, Liehuang Zhu, Yijia Lilong, Chang Xu
2015/431
Conversions among Several Classes of Predicate Encryption and Applications to ABE with Various Compactness Tradeoffs
Nuttapong Attrapadung, Goichiro Hanaoka, Shota Yamada
2015/430
Fast and Tradeoff-Resilient Memory-Hard Functions for Cryptocurrencies and Password Hashing
Alex Biryukov, Daniel Dinu, Dmitry Khovratovich
2015/429
Cryptanalysis of Round-Reduced LED
Ivica Nikolić, Lei Wang, Shuang Wu
2015/428
Dumb Crypto in Smart Grids: Practical Cryptanalysis of the Open Smart Grid Protocol
Philipp Jovanovic, Samuel Neves
2015/427
A High Reliability PUF Using Hot Carrier Injection Based Response Reinforcement
Mudit Bhargava, Ken Mai
2015/426
Complementing Feistel Ciphers
Alex Biryukov, Ivica Nikolic
2015/425
Smaller Keys for Code-Based Cryptography: QC-MDPC McEliece Implementations on Embedded Devices
Stefan Heyse, Ingo von Maurich, Tim Güneysu
2015/424
FIDES: Lightweight Authenticated Cipher with Side-Channel Resistance for Constrained Hardware
Begül Bilgin, Andrey Bogdanov, Miroslav Knežević, Florian Mendel, Qingju Wang
2015/423
On the Implementation of Unified Arithmetic on Binary Huff Curves
Santosh Ghosh, Amit Kumar, Amitabh Das, Ingrid Verbauwhede
2015/422
Efficient Server-Aided Secure Two-Party Function Evaluation with Applications to Genomic Computation
Marina Blanton, Fattaneh Bayatbabolghani
2015/421
VLSI Implementation of Double-Base Scalar Multiplication on a Twisted Edwards Curve with an Efficiently Computable Endomorphism
Zhe Liu, Husen Wang, Johann Großschädl, Zhi Hu, Ingrid Verbauwhede
2015/420
What Information is Leaked under Concurrent Composition?
Vipul Goyal, Divya Gupta, Abhishek Jain
2015/419
Non-invasive Spoofing Attacks for Anti-lock Braking Systems
Yasser Shoukry, Paul Martin, Paulo Tabuada, Mani B. Srivastava
2015/418
Optimized Interpolation Attacks on LowMC
Itai Dinur, Yunwen Liu, Willi Meier, Qingju Wang
2015/417
Order-Revealing Encryption and the Hardness of Private Learning
Mark Bun, Mark Zhandry
2015/416
HETest: A Homomorphic Encryption Testing Framework
Mayank Varia, Sophia Yakoubov, Yang Yang
2015/415
STRIBOB / WHIRLBOB Security Analysis Addendum
Markku-Juhani O. Saarinen
2015/414
On the Optimality of Non-Linear Computations of Length-Preserving Encryption Schemes
Mridul Nandi
2015/413
A Study of Pair Encodings: Predicate Encryption in Prime Order Groups
Shashank Agrawal, Melissa Chase
2015/412
The Birth of Cryptographic Obfuscation -- A Survey
Máté Horváth, Levente Buttyán
2015/411
Side-Channel Analysis of MAC-Keccak Hardware Implementations
Pei Luo, Yunsi Fei, Xin Fang, A. Adam Ding, David R. Kaeli, Miriam Leeser
2015/410
Efficient Ring-LWE Encryption on 8-bit AVR Processors
Zhe Liu, Hwajeong Seo, Sujoy Sinha Roy, Johann Großschädl, Howon Kim, Ingrid Verbauwhede
2015/409
Improved Dual System ABE in Prime-Order Groups via Predicate Encodings
Jie Chen, Romain Gay, Hoeteck Wee
2015/408
Revisiting Atomic Patterns for Scalar Multiplications on Elliptic Curves
Franck Rondepierre
2015/407
Higher-Order Cryptanalysis of LowMC
Christoph Dobraunig, Maria Eichlseder, Florian Mendel
2015/406
Cryptography for Parallel RAM from Indistinguishability Obfuscation
Yu-Chi Chen, Sherman S. M. Chow, Kai-Min Chung, Russell W. F. Lai, Wei-Kai Lin, Hong-Sheng Zhou
2015/405
Feasibility and Infeasibility of Secure Computation with Malicious PUFs
Dana Dachman-Soled, Nils Fleischhacker, Jonathan Katz, Anna Lysyanskaya, Dominique Schröder
2015/404
Zero-Knowledge Accumulators and Set Operations
Esha Ghosh, Olga Ohrimenko, Dimitrios Papadopoulos, Roberto Tamassia, Nikos Triandopoulos
2015/403
Sequential Secret Sharing as a New Hierarchical Access Structure
Mehrdad Nojoumian, Douglas R. Stinson
2015/402
Success through confidence: Evaluating the effectiveness of a side-channel attack
Adrian Thillard, Emmanuel Prouff, Thomas Roche
2015/401
Simple Chosen-Ciphertext Security from Low-Noise LPN
Eike Kiltz, Daniel Masny, Krzysztof Pietrzak
2015/400
Expiration and Revocation of Keys for Attribute-based Signatures (Full Version)
Stephen R. Tate, Roopa Vishwanathan
2015/399
New attacks on RSA with Moduli $N=p^rq$
Abderrahmane Nitaj, Tajjeeddine Rachidi
2015/398
Factoring RSA moduli with weak prime factors
Abderrahmane Nitaj, Tajjeeddine Rachidi
2015/397
Relaxing Full-Codebook Security: A Refined Analysis of Key-Length Extension Schemes
Peter Gazi, Jooyoung Lee, Yannick Seurin, John Steinberger, Stefano Tessaro
2015/396
Generalizing Homomorphic MACs for Arithmetic Circuits
Dario Catalano, Dario Fiore, Rosario Gennaro, Luca Nizzardo
2015/395
Efficient Unlinkable Sanitizable Signatures from Signatures with Re-Randomizable Keys
Nils Fleischhacker, Johannes Krupp, Giulio Malavolta, Jonas Schneider, Dominique Schröder, Mark Simkin
2015/394
Augmented Secure Channels and the Goal of the TLS 1.3 Record Layer
Christian Badertscher, Christian Matt, Ueli Maurer, Phillip Rogaway, Björn Tackmann
2015/393
Biclique cryptanalysis of MIBS-80 and PRESENT-80
Mohammad Hossein Faghihi Sereshgi, Mohammad Dakhilalian, Mohsen Shakiba
2015/392
Forgery Attacks on round-reduced ICEPOLE-128
Christoph Dobraunig, Maria Eichlseder, Florian Mendel
2015/391
On the Communication Complexity of Secure Computation
Deepesh Data, Manoj M. Prabhakaran, Vinod M. Prabhakaran
2015/390
Dual System Encryption Framework in Prime-Order Groups
Nuttapong Attrapadung
2015/389
Keccak
Guido Bertoni, Joan Daemen, Michael Peeters, Gilles Van Assche
2015/388
Succinct Garbled RAM
Ran Canetti, Justin Holmgren
2015/387
Method to Protect Passwords in Databases for Web Applications
Scott Contini
2015/386
Privately Evaluating Decision Trees and Random Forests
David J. Wu, Tony Feng, Michael Naehrig, Kristin Lauter
2015/385
Feasibility and Completeness of Cryptographic Tasks in the Quantum World
Serge Fehr, Jonathan Katz, Fang Song, Hong-Sheng Zhou, Vassilis Zikas
2015/384
Condensed Unpredictability
Maciej Skorski, Alexander Golovnev, Krzysztof Pietrzak
2015/383
Impossibility of VBB Obfuscation with Ideal Constant-Degree Graded Encodings
Rafael Pass, abhi shelat
2015/382
High-Performance Ideal Lattice-Based Cryptography on 8-bit ATxmega Microcontrollers
Thomas Pöppelmann, Tobias Oder, Tim Güneysu
2015/381
Financial Cryptography: Algorithmic Mechanisms for a Hedonic Game
Sumit Chakraborty
2015/380
Protecting against Multidimensional Linear and Truncated Differential Cryptanalysis by Decorrelation
Céline Blondeau, Aslí Bay, Serge Vaudenay
2015/379
MMBcloud-tree: Authenticated Index for Verifiable Cloud Service Selection
Jingwei Li, Anna Squicciarini, Dan Lin, Smitha Sundareswaran, Chunfu Jia
2015/378
PAC Learning of Arbiter PUFs
Fatemeh Ganji, Shahin Tajik, Jean-Pierre Seifert
2015/377
Cluster Computing in Zero Knowledge
Alessandro Chiesa, Eran Tromer, Madars Virza
2015/376
Cryptography from Post-Quantum Assumptions
Raza Ali Kazmi
2015/375
Bounds on surmising remixed keys
Daniel R. L. Brown
2015/374
On the Impossibility of Tight Cryptographic Reductions
Christoph Bader, Tibor Jager, Yong Li, Sven Schäge
2015/373
Publicly Verifiable Software Watermarking
Aloni Cohen, Justin Holmgren, Vinod Vaikuntanathan
2015/372
Security Analysis of PRINCE
Jeremy Jean, Ivica Nikolic, Thomas Peyrin, Lei Wang, Shuang Wu
2015/371
Constant-Round MPC with Fairness and Guarantee of Output Delivery
S. Dov Gordon, Feng-Hao Liu, Elaine Shi
2015/370
Financial Cryptography: Discriminatory Pricing Mechanism
Sumit Chakraborty
2015/369
On Non-Black-Box Simulation and the Impossibility of Approximate Obfuscation
Nir Bitansky, Omer Paneth
2015/368
Breaking the Rabin-Williams digital signature system implementation in the Crypto++ library
Evgeny Sidorov
2015/367
Improved Higher-Order Differential Attacks on MISTY1
Achiya Bar-On
2015/366
A random zoo: sloth, unicorn, and trx
Arjen K. Lenstra, Benjamin Wesolowski
2015/365
On the (im)possibility of receiving security beyond 2^l using an l-bit PRNG: the case of Wang et. al. protocol
Masoumeh Safkhani, Mehdi Hosseinzadeh, Mojtaba Eslamnezhad Namin, Samad Rostampour, Nasour Bagheri
2015/364
Privacy-preserving Context-aware Recommender Systems: Analysis and New Solutions
Qiang Tang, Jun Wang
2015/363
Optimally Secure Tweakable Blockciphers
Bart Mennink
2015/362
Oblivious Transfer from weakly Random Self-Reducible Public-Key Cryptosystem
Claude Crepeau, Raza Ali Kazmi
2015/361
Computationally binding quantum commitments
Dominique Unruh
2015/360
Achieving Differential Privacy with Bias-Control Limited Source
Yanqing Yao, Zhoujun Li
2015/359
Higher-Order Side Channel Security and Mask Refreshing
Jean-Sebastien Coron, Emmanuel Prouff, Matthieu Rivain, Thomas Roche
2015/358
On Generalized First Fall Degree Assumptions
Yun-Ju Huang, Christophe Petit, Naoyuki Shinohara, Tsuyoshi Takagi
2015/357
A Group-theory Method to The Cycle Structures of Feedback Shift Registers
Ming Li, Yupeng Jiang, Dongdai Lin
2015/356
Succinct Randomized Encodings and their Applications
Nir Bitansky, Sanjam Garg, Huijia Lin, Rafael Pass, Sidharth Telang
2015/355
Semantic Security and Indistinguishability in the Quantum World
Tommaso Gagliardoni, Andreas Hülsing, Christian Schaffner
2015/354
SEMA and MESD Leakage of TinyECC 2.0 on a LOTUS Sensor Node
Jacek Samotyja, Kerstin Lemke-Rust, Markus Ullmann
2015/353
Matrix Computational Assumptions in Multilinear Groups
Paz Morillo, Carla Ràfols, Jorge L. Villar
2015/352
Broadcast from Minicast Secure Against General Adversaries
Pavel Raykov
2015/351
Database Outsourcing with Hierarchical Authenticated Data Structures
Mohammad Etemad, Alptekin Küpçü
2015/350
Improving Local Collisions: New Attacks on Reduced SHA-256
Florian Mendel, Tomislav Nad, Martin Schläffer
2015/349
Efficient Searchable Symmetric Encryption for Storing Multiple Source Data on Cloud
Chang Liu, Liehuang Zhu, Jinjun Chen
2015/348
A Hardware-based Countermeasure to Reduce Side-Channel Leakage - Design, Implementation, and Evaluation
An­dre­as Gor­nik, Amir Mo­ra­di, Jür­gen Oehm, Chris­tof Paar
2015/347
Fault Analysis of Kuznyechik
Riham AlTawy, Onur Duman, Amr M. Youssef
2015/346
End-to-End Verifiable Elections in the Standard Model∗
Aggelos Kiayias, Thomas Zacharias, Bingsheng Zhang
2015/345
Two Round Multiparty Computation via Multi-Key FHE
Pratyay Mukherjee, Daniel Wichs
2015/344
Watermarking Cryptographic Programs Against Arbitrary Removal Strategies
Ryo Nishimaki, Daniel Wichs
2015/343
High-speed Curve25519 on 8-bit, 16-bit, and 32-bit microcontrollers
Michael Düll, Björn Haase, Gesine Hinterwälder, Michael Hutter, Christof Paar, Ana Helena Sánchez, Peter Schwabe
2015/342
Identity-Set-based Broadcast Encryption supporting “Cut-or-Select” with Short Ciphertext
Yan Zhu, Xin Wang, Di Ma, Ruiqi Guo
2015/341
Limits on the Power of Indistinguishability Obfuscation and Functional Encryption
Gilad Asharov, Gil Segev
2015/340
A New Distinguisher on Grain v1 for 106 rounds
Santanu Sarkar
2015/339
Certificate Validation in Secure Computation and Its Use in Verifiable Linear Programming
Sebastiaan de Hoogh, Berry Schoenmakers, Meilof Veeningen
2015/338
Cryptanalysis of a fair anonymity for the tor network
Amadou Moctar Kane
2015/337
Modular Hardware Architecture for Somewhat Homomorphic Function Evaluation
Sujoy Sinha Roy, Kimmo Järvinen, Frederik Vercauteren, Vassil Dimitrov, Ingrid Verbauwhede
2015/336
Arithmetic Cryptography
Benny Applebaum, Jonathan Avron, Chris Brzuska
2015/335
Continuous After-the-fact Leakage-Resilient eCK-secure Key Exchange
Janaka Alawatugoda, Douglas Stebila, Colin Boyd
2015/334
On the Correlation Intractability of Obfuscated Pseudorandom Functions
Ran Canetti, Yilei Chen, Leonid Reyzin
2015/333
Nearly Optimal Verifiable Data Streaming (Full Version)
Johannes Krupp, Dominique Schröder, Mark Simkin, Dario Fiore, Giuseppe Ateniese, Stefan Nuernberger
2015/332
Security Intelligence for Broadcast : Threat Analytics
Sumit Chakraborty
2015/331
A New Authenticated Encryption Technique for Handling Long Ciphertexts in Memory Constrained Devices
Megha Agrawal, Donghoon Chang, Somitra Sanadhya
2015/330
Sponge based CCA2 secure asymmetric encryption for arbitrary length message
Tarun Kumar Bansal, Donghoon Chang, Somitra Kumar Sanadhya
2015/329
PAGES - A Family of Block Ciiphers
Dieter Schmidt
2015/328
Strongly Secure Authenticated Key Exchange from Ideal Lattices
Xiaopeng Yang, Wenping Ma
2015/327
Some results on Sprout
Subhadeep Banik
2015/326
Cryptanalysis of an Authenticated Image Encryption Scheme Based on Chaotic Maps and Memory Cellular Automata
Saeideh Kabirirad, Hamideh Hajiabadi
2015/325
Secure Multi-Party Computation with Identifiable Abort
Yuval Ishai, Rafail Ostrovsky, Vassilis Zikas
2015/324
A Note on Lower Bounds for Non-interactive Message Authentication Using Weak Keys
Divesh Aggarwal, Alexander Golovnev
2015/323
Efficient, Pairing-Free, One Round Attribute-Based Authenticated Key Exchange
Suvradip Chakraborty, Srinivasan Raghuraman, C. Pandu Rangan
2015/322
Transformation-Based Outsourcing of Linear Equation Systems over Real Numbers
Peeter Laud, Alisa Pankova
2015/321
Size-Hiding in Private Set Intersection: what can be done and how to do it without random oracles
Paolo D'Arco, Maria Isabel Gonzalez Vasco, Angel L. Perez del Pozo, Clauido Soriente
2015/320
Hybrid Publicly Verifiable Computation
James Alderman, Christian Janson, Carlos Cid, Jason Crampton
2015/319
Point Decomposition Problem in Binary Elliptic Curves
Koray Karabina
2015/318
Practical Divisible E-Cash
Patrick Märtens
2015/317
Leakage-Resilient Cryptography over Large Finite Fields: Theory and Practice
Marcin Andrychowicz, Daniel Masny, Edoardo Persichetti
2015/316
Non-malleability under Selective Opening Attacks: Implication and Separation
Zhengan Huang, Shengli Liu, Xianping Mao, Kefei Chen
2015/315
Query-Complexity Amplification for Random Oracles
Grégory Demay, Peter Gaži, Ueli Maurer, Björn Tackmann
2015/314
Certificate-Based Encryption Resilient to Key Leakage
Qihong Yu, Jiguo Li, Yichen Zhang, Wei Wu, Xinyi Huang, Yang Xiang
2015/313
Recovering Short Generators of Principal Ideals in Cyclotomic Rings
Ronald Cramer, Léo Ducas, Chris Peikert, Oded Regev
2015/312
Improving Key Recovery to 784 and 799 rounds of Trivium using Optimized Cube Attacks
Pierre-Alain Fouque, Thomas Vannet
2015/311
Tagged One-Time Signatures: Tight Security and Optimal Tag Size
Masayuki Abe, Bernardo David, Markulf Kohlweiss, Ryo Nishimaki, Miyako Ohkubo
2015/310
New algorithm for the discrete logarithm problem on elliptic curves
Igor Semaev
2015/309
TinyLEGO: An Interactive Garbling Scheme for Maliciously Secure Two-Party Computation
Tore Kasper Frederiksen, Thomas P. Jakobsen, Jesper Buus Nielsen, Roberto Trifiletti
2015/308
Authenticated Key Exchange over Bitcoin
Patrick McCorry, Siamak F. Shahandashti, Dylan Clarke, Feng Hao
2015/307
Black-Box Garbled RAM
Sanjam Garg, Steve Lu, Rafail Ostrovsky
2015/306
Analysis of VAES3 (FF2)
Morris Dworkin, Ray Perlner
2015/305
Foundations of Reconfigurable PUFs (Full Version)
Jonas Schneider, Dominique Schröder
2015/304
Communication-Optimal Proactive Secret Sharing for Dynamic Groups
Joshua Baron, Karim El Defrawy, Joshua Lampkins, Rafail Ostrovsky
2015/303
The Design Space of Lightweight Cryptography
Nicky Mouha
2015/302
Boosting OMD for Almost Free Authentication of Associated Data
Reza Reyhanitabar, Serge Vaudenay, Damian Vizár
2015/301
Cryptanalysis of GGH Map
Yupu Hu, Huiwen Jia
2015/300
Scalable Divisible E-cash
Sébastien Canard, David Pointcheval, Olivier Sanders, Jacques Traoré
2015/299
A Note on the Lindell-Waisbard Private Web Search Scheme
Zhengjun Cao, Lihua Liu
2015/298
Quantum Resistant Random Linear Code Based Public Key Encryption Scheme RLCE
Yongge Wang
2015/297
Identity-Based Encryption Secure Against Selective Opening Chosen-Ciphertext Attack
Junzuo Lai, Robert H. Deng, Shengli Liu, Jian Weng, Yunlei Zhao
2015/296
The Uniform Distribution of Sequences Generated by Iteration of Polynomials
Emil Lerner
2015/295
Security Analysis of Re-Encryption RPC Mix Nets
Ralf Kuesters, Tomasz Truderung
2015/294
Accelerating Somewhat Homomorphic Evaluation using FPGAs
Erdi̇̀nç Öztürk, Yarkın Doröz, Berk Sunar, Erkay Savaş
2015/293
Adaptively Secure Unrestricted Attribute-Based Encryption with Subset Difference Revocation in Bilinear Groups of Prime Order
Pratish Datta, Ratna Dutta, Sourav Mukhopadhyay
2015/292
Secret Shared Random Access Machine
Shlomi Dolev, Yin Li
2015/291
Two Operands of Multipliers in Side-Channel Attack
Takeshi Sugawara, Daisuke Suzuki, Minoru Saeki
2015/290
Automating Fast and Secure Translations from Type-I to Type-III Pairing Schemes
Joseph A. Akinyele, Christina Garman, Susan Hohenberger
2015/289
Practical Cryptanalysis of Full Sprout with TMD Tradeoff Attacks
Muhammed F. Esgin, Orhun Kara
2015/288
Precomputation Methods for Faster and Greener Post-Quantum Cryptography on Emerging Embedded Platforms
Aydin Aysu, Patrick Schaumont
2015/287
Circuit-extension handshakes for Tor achieving forward secrecy in a quantum world
John M. Schanck, William Whyte, Zhenfei Zhang
2015/286
Impossible Differential Cryptanalysis of Reduced Round SIMON
Zhan Chen, Ning Wang, Xiaoyun Wang
2015/285
Improved Linear Trails for the Block Cipher Simon
Tomer Ashur
2015/284
A Note on Scalar Multiplication Using Division Polynomials
Binglong Chen, Chuangqiang Hu, Chang-An Zhao
2015/283
Fully-Dynamic Verifiable Zero-Knowledge Order Queries for Network Data
Esha Ghosh, Michael T. Goodrich, Olga Ohrimenko, Roberto Tamassia
2015/282
Non-Interactive Secure Computation Based on Cut-and-Choose
Arash Afshar, Payman Mohassel, Benny Pinkas, Ben Riva
2015/281
Secret Sharing and Statistical Zero Knowledge
Vinod Vaikuntanathan, Prashant Nalini Vasudevan
2015/280
Feasibility and Infeasibility of Adaptively Secure Fully Homomorphic Encryption
Jonathan Katz, Aishwarya Thiruvengadam, Hong-Sheng Zhou
2015/279
Improved Cryptanalysis of AES-like Permutations
Jérémy Jean, Maria Naya-Plasencia, Thomas Peyrin
2015/278
Efficient Delegation of Zero-Knowledge Proofs of Knowledge in a Pairing-Friendly Setting
Sébastien Canard, David Pointcheval, Olivier Sanders
2015/277
One-Sided Device-Independent QKD and Position-based Cryptography from Monogamy Games
Marco Tomamichel, Serge Fehr, Jędrzej Kaniewski, Stephanie Wehner
2015/276
An Improvment of the Elliptic Net Algorithm
Binglong Chen, Chang-An Zhao
2015/275
MQ Challenge: Hardness Evaluation of Solving Multivariate Quadratic Problems
Takanori Yasuda, Xavier Dahan, Yun-Ju Huang, Tsuyoshi Takagi, Kouichi Sakurai
2015/274
Low Depth Circuits for Efficient Homomorphic Sorting
Gizem S. Çetin, Yarkın Doröz, Berk Sunar, Erkay Savaş
2015/273
Dual System Encryption via Predicate Encodings
Hoeteck Wee
2015/272
Leakage-Flexible CCA-secure Public-Key Encryption: Simple Construction and Free of Pairing
Baodong Qin, Shengli Liu
2015/271
Toward Secure Implementation of McEliece Decryption
Mariya Georgieva, Frédéric de Portzamparc
2015/270
Fibonacci Ring Oscillators as True Random Number Generators - A Security Risk
Markus Dichtl
2015/269
Ideal Multilinear Maps Based on Ideal Lattices
Gu Chunsheng
2015/268
Improved Top-Down Techniques in Differential Cryptanalysis
Itai Dinur, Orr Dunkelman, Masha Gutman, Adi Shamir
2015/267
The Simplest Protocol for Oblivious Transfer
Tung Chou, Claudio Orlandi
2015/266
GRECS: Graph Encryption for Approximate Shortest Distance Queries
Xianrui Meng, Seny Kamara, Kobbi Nissim, George Kollios
2015/265
Password Hashing Competition - Survey and Benchmark
George Hatzivasilis, Ioannis Papaefstathiou, Charalampos Manifavas
2015/264
BlindBox: Deep Packet Inspection over Encrypted Traffic
Justine Sherry, Chang Lan, Raluca Ada Popa, Sylvia Ratnasamy
2015/263
Eclipse Attacks on Bitcoin’s Peer-to-Peer Network
Ethan Heilman, Alison Kendler, Aviv Zohar, Sharon Goldberg
2015/262
A look at the PGP ecosystem through the key server data
Hanno Böck
2015/261
Research Perspectives and Challenges for Bitcoin and Cryptocurrencies
Joseph Bonneau, Andrew Miler, Jeremy Clark, Arvind Narayanan, Joshua A. Kroll, Edward W. Felten
2015/260
Computational Aspects of Correlation Power Analysis
Paul Bottinelli, Joppe W. Bos
2015/259
Exhausting Demirci-Selçuk Meet-in-the-Middle Attacks against Reduced-Round AES
Patrick Derbez, Pierre-Alain Fouque
2015/258
Lightweight MDS Involution Matrices
Siang Meng Sim, Khoongming Khoo, Frédérique Oggier, Thomas Peyrin
2015/257
Quadratic Time, Linear Space Algorithms for Gram-Schmidt Orthogonalization and Gaussian Sampling in Structured Lattices
Vadim Lyubashevsky, Thomas Prest
2015/256
Cryptanalysis of Three Certificate-Based Authenticated Key Agreement Protocols and a Secure Construction
Yang Lu, Quanling Zhang, Jiguo Li
2015/255
A comprehensive analysis of game-based ballot privacy definitions
David Bernhard, Veronique Cortier, David Galindo, Olivier Pereira, Bogdan Warinschi
2015/254
Tornado Attack on RC4 with Applications to WEP and WPA
Pouyan Sepehrdad, Petr Susil, Serge Vaudenay, Martin Vuagnoux
2015/253
Stability and Linearization of Multi-valued Nonlinear Feedback Shift Registers
Haiyan Wang, Dongdai Lin
2015/252
Linearization of Multi-valued Nonlinear Feedback Shift Registers
Haiyan Wang, Jianghua Zhong, Dongdai Lin
2015/251
How to Construct UC-Secure Searchable Symmetric Encryption Scheme
Kaoru Kurosawa, Yasuhiro Ohtaki
2015/250
Design and Analysis of Information-Theoretically Secure Authentication Codes with Non-Uniformly Random Keys
Junji Shikata
2015/249
Improved (Hierarchical) Inner-Product Encryption from Lattices
Keita Xagawa
2015/248
Verifiably Encrypted Signatures with Short Keys based on the Decisional Linear Problem and Obfuscation for Encrypted VES
Ryo Nishimaki, Keita Xagawa
2015/247
Subgroup security in pairing-based cryptography
Paulo S. L. M. Barreto, Craig Costello, Rafael Misoczki, Michael Naehrig, Geovandro C. C. F. Pereira, Gustavo Zanon
2015/246
Implicit Zero-Knowledge Arguments and Applications to the Malicious Setting
Fabrice Benhamouda, Geoffroy Couteau, David Pointcheval, Hoeteck Wee
2015/245
Practical Attacks on the Round-reduced PRINCE
Pawel Morawiecki
2015/244
Internal Differential Boomerangs: Practical Analysis of the Round-Reduced Keccak-f Permutation
Jeremy Jean, Ivica Nikolic
2015/243
Reliable communication via semilattice properties of partial knowledge
Aris Pagourtzis, Giorgos Panagiotakos, Dimitris Sakavalas
2015/242
Compactly Hiding Linear Spans: Tightly Secure Constant-Size Simulation-Sound QA-NIZK Proofs and Applications
Benoit Libert, Thomas Peters, Marc Joye, Moti Yung
2015/241
Espresso: A Stream Cipher for 5G Wireless Communication Systems
Elena Dubrova, Martin Hell
2015/240
Differential Analysis and Meet-in-the-Middle Attack against Round-Reduced TWINE
Alex Biryukov, Patrick Derbez, Léo Perrin
2015/239
Meet-in-the-Middle Attacks and Structural Analysis of Round-Reduced PRINCE
Patrick Derbez, Léo Perrin
2015/238
One Time Programs with Limited Memory
Konrad Durnoga, Stefan Dziembowski, Tomasz Kazana, Michał Zając
2015/237
Fast Revocation of Attribute-Based Credentials for Both Users and Verifiers
Wouter Lueks, Gergely Alpár, Jaap-Henk Hoepman, Pim Vullers
2015/236
Key Recovery from State Information of Sprout: Application to Cryptanalysis and Fault Attack
Subhamoy Maitra, Santanu Sarkar, Anubhab Baksi, Pramit Dey
2015/235
Performance and Security Improvements for Tor: A Survey
Mashael AlSabah, Ian Goldberg
2015/234
Collision Attack on 4-branch, Type-2 GFN based Hash Functions using Sliced Biclique Cryptanalysis Technique
Megha Agrawal, Donghoon Chang, Mohona Ghosh, Somitra Kumar Sanadhya
2015/233
Election Verifiability: Cryptographic Definitions and an Analysis of Helios, Helios-C, and JCJ
Ben Smyth, Steven Frink, Michael R. Clarkson
2015/232
Cryptanalysis of Full Sprout
Virginie Lallemand, María Naya-Plasencia
2015/231
A Related-Key Chosen-IV Distinguishing Attack on Full Sprout Stream Cipher
Yonglin Hao
2015/230
W-SPS: Designing a Wide-Area Secure Positioning System
Der-Yeuan Yu, Aanjhan Ranganathan, Ramya Jayaram Masti, Claudio Soriente, Srdjan Capkun
2015/229
Improving GGH Public Key Scheme Using Low Density Lattice Codes
Reza Hooshmand
2015/228
Leakage-Resilient Cryptography with Key Derived from Sensitive Data
Konrad Durnoga, Tomasz Kazana, Michał Zając, Maciej Zdanowicz
2015/227
Tradeoff Cryptanalysis of Memory-Hard Functions
Alex Biryukov, Dmitry Khovratovich
2015/226
Secure Physical Computation using Disposable Circuits
Ben Fisch, Daniel Freund, Moni Naor
2015/225
Bitwise Linear Mappings with Good Cryptographic Properties and Efficient Implementation
S. M. Dehnavi, A. Mahmoodi Rishakani, M. R. Mirzaee Shamsabad
2015/224
GORAM -- Group ORAM for Privacy and Access Control in Outsourced Personal Records
Matteo Maffei, Giulio Malavolta, Manuel Reinert, Dominique Schröder
2015/223
New Distinguishers for Reduced Round Trivium and Trivia-SC using Cube Testers
Anubhab Baksi, Subhamoy Maitra, Santanu Sarkar
2015/222
Towards Understanding the Known-Key Security of Block Ciphers
Elena Andreeva, Andrey Bogdanov, Bart Mennink
2015/221
Tighter, faster, simpler side-channel security evaluations beyond computing power
Daniel J. Bernstein, Tanja Lange, Christine van Vredendaal
2015/220
Key Homomorphic PRFs and Their Applications
Dan Boneh, Kevin Lewi, Hart Montgomery, Ananth Raghunathan
2015/219
Efficient Format Preserving Encrypted Databases
Prakruti C, Sashank Dara, V. N. Muralidhara
2015/218
Efficient k-out-of-n oblivious transfer protocol
wang qinglong
2015/217
Salsa20 Cryptanalysis: New Moves and Revisiting Old Styles
Subhamoy Maitra, Goutam Paul, Willi Meier
2015/216
Quasi-Adaptive NIZK for Linear Subspaces Revisited
Eike Kiltz, Hoeteck Wee
2015/215
A revocable anonymity in Tor
Amadou Moctar Kane
2015/214
GCM Security Bounds Reconsidered
Yuichi Niwa, Keisuke Ohashi, Kazuhiko Minematsu, Tetsu Iwata
2015/213
Attribute-Based Versions of Schnorr and ElGamal
Javier Herranz
2015/212
Analyzing Permutations for AES-like Ciphers: Understanding ShiftRows
Christof Beierle, Philipp Jovanovic, Martin M. Lauridsen, Gregor Leander, Christian Rechberger
2015/211
Faster sieving for shortest lattice vectors using spherical locality-sensitive hashing
Thijs Laarhoven, Benne de Weger
2015/210
Secure and Efficient Initialization and Authentication Protocols for SHIELD
Chenglu Jin, Marten van Dijk
2015/209
Triathlon of Lightweight Block Ciphers for the Internet of Things
Daniel Dinu, Yann Le Corre, Dmitry Khovratovich, Léo Perrin, Johann Großschädl, Alex Biryukov
2015/208
Towards Secure Distance Bounding
Ioana Boureanu, Aikaterini Mitrokotsa, Serge Vaudenay
2015/207
Leakage Assessment Methodology - a clear roadmap for side-channel evaluations
Tobias Schneider, Amir Moradi
2015/206
Efficient and Secure Delegation of Group Exponentiation to a Single Server
Bren Cavallo, Giovanni Di Crescenzo, Delaram Kahrobaei, Vladimir Shpilrain
2015/205
Towards Key-Length Extension with Optimal Security: Cascade Encryption and Xor-cascade Encryption
Jooyoung Lee
2015/204
Leakage-Resilient Symmetric Encryption via Re-keying
Michel Abdalla, Sonia Belaïd, Pierre-Alain Fouque
2015/203
Achieving Side-Channel Protection with Dynamic Logic Reconfiguration on Modern FPGAs
Pascal Sasdrich, Amir Moradi, Oliver Mischke, Tim Güneysu
2015/202
Adaptively Secure Coin-Flipping, Revisited
Shafi Goldwasser, Yael Tauman Kalai, Sunoo Park
2015/201
Statistical Properties of Multiplication mod $2^n$
A. Mahmoodi Rishakani, S. M. Dehnavi, M. R. Mirzaee Shamsabad, Hamidreza Maimani, Einollah Pasha
2015/200
Evaluating the Duplication of Dual-Rail Precharge Logics on FPGAs
Alexander Wild, Amir Moradi, Tim Güneysu
2015/199
Side-Channel Security Analysis of Ultra-Low-Power FRAM-based MCUs
Amir Moradi, Gesine Hinterwälder
2015/198
Side-Channel Protection by Randomizing Look-Up Tables on Reconfigurable Hardware - Pitfalls of Memory Primitives
Pascal Sasdrich, Oliver Mischke, Amir Moradi, Tim Güneysu
2015/197
SCA Resistance Analysis on FPGA Implementations of Sponge based MAC-PHOTON
N. Nalla Anandakumar
2015/196
Tighter Reductions for Forward-Secure Signature Schemes
Michel Abdalla, Fabrice Benhamouda, David Pointcheval
2015/195
Zero-knowledge Argument for Polynomial Evaluation with Application to Blacklists
Stephanie Bayer, Jens Groth
2015/194
Practical Homomorphic MACs for Arithmetic Circuits
Dario Catalano, Dario Fiore
2015/193
Improving Modular Inversion in RNS using the Plus-Minus Method
Karim Bigou, Arnaud Tisserand
2015/192
Memory-saving computation of the pairing final exponentiation on BN curves
Sylvain DUQUESNE, Loubna GHAMMAM
2015/191
iDASH Secure Genome Analysis Competition Using ObliVM
Xiao Shaun Wang, Chang Liu, Kartik Nayak, Yan Huang, Elaine Shi
2015/190
Multi-Client Non-Interactive Verifiable Computation
Seung Geol Choi, Jonathan Katz, Ranjit Kumaresan, Carlos Cid
2015/189
Online Authenticated-Encryption and its Nonce-Reuse Misuse-Resistance
Viet Tung Hoang, Reza Reyhanitabar, Phillip Rogaway, Damian Vizár
2015/188
New Techniques for SPHFs and Efficient One-Round PAKE Protocols
Fabrice Benhamouda, Olivier Blazy, Céline Chevalier, David Pointcheval, Damien Vergnaud
2015/187
How Fair is Your Protocol? A Utility-based Approach to Protocol Optimality
Juan Garay, Jonathan Katz, Bjoern Tackmann, Vassilis Zikas
2015/186
Higher Order Differential Analysis of NORX
Sourav Das, Subhamoy Maitra, Willi Meier
2015/185
Remotely Managed Logic Built-In Self-Test for Secure M2M Communications
Elena Dubrova, Mats Näslund, Gunnar Carlsson, John Fornehed, Ben Smeets
2015/184
Links Between Truncated Differential and Multidimensional Linear Properties of Block Ciphers and Underlying Attack Complexities
Céline Blondeau, Kaisa Nyberg
2015/183
New Links Between Differential and Linear Cryptanalysis
Céline Blondeau, Kaisa Nyberg
2015/182
Tweakable Blockciphers with Asymptotically Optimal Security
Rodolphe Lampe, Yannick Seurin
2015/181
Links among Impossible Differential, Integral and Zero Correlation Linear Cryptanalysis
Bing Sun, Zhiqiang Liu, Vincent Rijmen, Ruilin Li, Lei Cheng, Qingju Wang, Hoda Alkhzaimi, Chao Li
2015/180
Key-Homomorphic Constrained Pseudorandom Functions
Abhishek Banerjee, Georg Fuchsbauer, Chris Peikert, Krzysztof Pietrzak, Sophie Stevens
2015/179
A Simple Method for Obtaining Relations Among Factor Basis Elements for Special Hyperelliptic Curves
Palash Sarkar, Shashank Singh
2015/178
How to Incentivize Data-Driven Collaboration Among Competing Parties
Pablo Daniel Azar, Shafi Goldwasser, Sunoo Park
2015/177
On the Security of an Efficient Group Key Agreement Scheme for MANETs
Purushothama B R, Nishat Koti
2015/176
Key Recovery for LWE in Polynomial Time
Kim Laine, Kristin Lauter
2015/175
Trivial Nonce-Misusing Attack on Pure OMD
Tomer Ashur, Bart Mennink
2015/174
A Practical Chosen Message Power Analysis Approach Against Ciphers with the Key Whitening Layers
Chenyang Tu, Lingchen Zhang, Zeyi Liu, Neng Gao, Yuan Ma
2015/173
Indistinguishability Obfuscation from Compact Functional Encryption
Prabhanjan Ananth, Abhishek Jain
2015/172
Silent Simon: A Threshold Implementation under 100 Slices
Aria Shahverdi, Mostafa Taha, Thomas Eisenbarth
2015/171
Authenticated Network Time Synchronization
Benjamin Dowling, Douglas Stebila, Greg Zaverucha
2015/170
Stealing Keys from PCs using a Radio: Cheap Electromagnetic Attacks on Windowed Exponentiation
Daniel Genkin, Lev Pachmanov, Itamar Pipman, Eran Tromer
2015/169
Short Schnorr signatures require a hash function with more than just random-prefix resistance
Daniel R. L. Brown
2015/168
More PS and H-like bent functions
C. Carlet
2015/167
Post-Zeroizing Obfuscation: The case of Evasive Circuits
Saikrishna Badrinarayanan, Eric Miles, Amit Sahai, Mark Zhandry
2015/166
Naturally Rehearsing Passwords
Jeremiah Blocki, Manuel Blum, Anupam Datta
2015/165
The Cryptographic Hardness of Random Local Functions -- Survey
Benny Applebaum
2015/164
Constant Size Ring Signature Without Random Oracle
Priyanka Bose, Dipanjan Das, C. Pandu Rangan
2015/163
Indistinguishability Obfuscation from Functional Encryption
Nir Bitansky, Vinod Vaikuntanathan
2015/162
New Multilinear Maps over the Integers
Jean-Sebastien Coron, Tancrede Lepoint, Mehdi Tibouchi
2015/161
Exploring the Resilience of Some Lightweight Ciphers Against Profiled Single Trace Attacks
Valentina Banciu, Elisabeth Oswald, Carolyn Whitnall
2015/160
Differential-Linear Cryptanalysis of ICEPOLE
Tao Huang, Ivan Tjuawinata, Hongjun Wu
2015/159
Leaked-State-Forgery Attack Against The Authenticated Encryption Algorithm ALE
Shengbao Wu, Hongjun Wu, Tao Huang, Mingsheng Wang, Wenling Wu
2015/158
Multi-Input Functional Encryption in the Private-Key Setting: Stronger Security from Weaker Assumptions
Zvika Brakerski, Ilan Komargodski, Gil Segev
2015/157
Duality in ABE: Converting Attribute Based Encryption for Dual Predicate and Dual Policy via Computational Encodings
Nuttapong Attrapadung, Shota Yamada
2015/156
Building Lossy Trapdoor Functions from Lossy Encryption
Brett Hemenway, Rafail Ostrovsky
2015/155
On Power Splitting Games in Distributed Computation: The Case of Bitcoin Pooled Mining
Loi Luu, Ratul Saha, Inian Parameshwaran, Prateek Saxena, Aquinas Hobor
2015/154
Circuits Resilient to Additive Attacks with Applications to Secure Computation
Daniel Genkin, Yuval Ishai, Manoj M. Prabhakaran, Amit Sahai, Eran Tromer
2015/153
Functional Encryption from (Small) Hardware Tokens
Kai-Min Chung, Jonathan Katz, Hong-Sheng Zhou
2015/152
Inverting the Final exponentiation of Tate pairings on ordinary elliptic curves using faults
Ronan Lashermes, Jacques Fournier, Louis Goubin
2015/151
Bad directions in cryptographic hash functions
Daniel J. Bernstein, Andreas Hülsing, Tanja Lange, Ruben Niederhagen
2015/150
Insynd: Improved Privacy-Preserving Transparency Logging
Roel Peeters, Tobias Pulls
2015/149
Cryptanalysis of HMAC/NMAC-Whirlpool
Jian Guo, Yu Sasaki, Lei Wang, Shuang Wu
2015/148
On the Effectiveness of the Remanence Decay Side-Channel to Clone Memory-based PUFs
Yossef Oren, Ahmad-Reza Sadeghi, Christian Wachsmann
2015/147
High Precision Fault Injections on the Instruction Cache of ARMv7-M Architectures
Lionel Rivière, Zakaria Najm, Pablo Rauzy, Jean-Luc Danger, Julien Bringer, Laurent Sauvage
2015/146
New Attacks on Feistel Structures with Improved Memory Complexities
Itai Dinur, Orr Dunkelman, Nathan Keller, Adi Shamir
2015/145
Observations on the SIMON block cipher family
Stefan Kölbl, Gregor Leander, Tyge Tiessen
2015/144
Security of the AES with a Secret S-box
Tyge Tiessen, Lars R. Knudsen, Stefan Kölbl, Martin M. Lauridsen
2015/143
Harder, Better, Faster, Stronger - Elliptic Curve Discrete Logarithm Computations on FPGAs
Erich Wenger, Paul Wolfger
2015/142
Multi-Client Verifiable Computation with Stronger Security Guarantees
S. Dov Gordon, Jonathan Katz, Feng-Hao Liu, Elaine Shi, Hong-Sheng Zhou
2015/141
Analysis of Impossible, Integral and Zero-Correlation Attacks on Type-II Generalized Feistel Networks using the Matrix Method
Céline Blondeau, Marine Minier
2015/140
The Random Oracle Model: A Twenty-Year Retrospective
Neal Koblitz, Alfred Menezes
2015/139
Performance Analysis of Some Password Hashing Schemes
Donghoon Chang, Arpan Jati, Sweta Mishra, Somitra Kumar Sanadhya
2015/138
A Practical Key Exchange for the Internet using Lattice Cryptography
Vikram Singh
2015/137
Multi-keyword Similarity Search Over Encrypted Cloud Data
Mikhail Strizhov, Indrajit Ray
2015/136
Lyra2: Efficient Password Hashing with High Security against Time-Memory Trade-Offs
Marcos A. Simplicio Jr., Leonardo C. Almeida, Ewerton R. Andrade, Paulo C. F. dos Santos, Paulo S. L. M. Barreto
2015/135
Generalizing Efficient Multiparty Computation
Bernardo David, Ryo Nishimaki, Samuel Ranellucci, Alain Tapp
2015/134
From Related-Key Distinguishers to Related-Key-Recovery on Even-Mansour Constructions
Pierre Karpman
2015/133
Private Computation on Encrypted Genomic Data
Kristin Lauter, Adriana Lopez-Alt, Michael Naehrig
2015/132
Homomorphic Computation of Edit Distance
Jung Hee Cheon, Miran Kim, Kristin Lauter
2015/131
On Lightweight Stream Ciphers with Shorter Internal States
Frederik Armknecht, Vasily Mikhalev
2015/130
How to Bootstrap Anonymous Communication
Sune K. Jakobsen, Claudio Orlandi
2015/129
Block-wise Non-Malleable Codes
Nishanth Chandran, Vipul Goyal, Pratyay Mukherjee, Omkant Pandey, Jalaj Upadhyay
2015/128
Self-bilinear Map on Unknown Order Groups from Indistinguishability Obfuscation and Its Applications
Takashi Yamakawa, Shota Yamada, Goichiro Hanaoka, Noboru Kunihiro
2015/127
Adaptive key recovery attacks on NTRU-based somewhat homomorphic encryption schemes
Ricardo Dahab, Steven Galbraith, Eduardo Morais
2015/126
Perfect Structure on the Edge of Chaos
Nir Bitansky, Omer Paneth, Daniel Wichs
2015/125
Multilinear Pseudorandom Functions
Aloni Cohen, Justin Holmgren
2015/124
GliFreD: Glitch-Free Duplication - Towards Power-Equalized Circuits on FPGAs
Alexander Wild, Amir Moradi, Tim Güneysu
2015/123
Identity-based encryption with (almost) tight security in the multi-instance, multi-ciphertext setting
Dennis Hofheinz, Jessica Koch, Christoph Striecks
2015/122
Constructing Mixed-integer Programming Models whose Feasible Region is Exactly the Set of All Valid Differential Characteristics of SIMON
Siwei Sun, Lei Hu, Meiqin Wang, Peng Wang, Kexin Qiao, Xiaoshuang Ma, Danping Shi, Ling Song, Kai Fu
2015/121
Multi-Client Oblivious RAM secure against Malicious Servers
Travis Mayberry, Erik-Oliver Blass, Guevara Noubir
2015/120
Reconfigurable LUT: A Double Edged Sword for Security-Critical Applications
Debapriya Basu Roy, Shivam Bhasin, Sylvain Guilley, Jean-Luc Danger, Debdeep Mukhopadhyay, Xuan Thuy Ngo, Zakaria Najm
2015/119
Making Masking Security Proofs Concrete or How to Evaluate the Security of any Leaking Device (Extended Version)
Alexandre Duc, Sebastian Faust, François-Xavier Standaert
2015/118
Constructing and Understanding Chosen Ciphertext Security via Puncturable Key Encapsulation Mechanisms
Takahiro Matsuda, Goichiro Hanaoka
2015/117
Nonuniform Indistinguishability and Unpredictability Hardcore Lemmas: New Proofs and Applications to Pseudoentropy
Maciej Skorski
2015/116
Efficient Hardware Design for Computing Pairings Using Few FPGA In-built DSPs
Riadh Brinci, Walid Khmiri, Mefteh Mbarek, Abdellatif Ben Rabâa, Ammar Bouallègue
2015/115
Comprehensive Efficient Implementations of ECC on C54xx Family of Low-cost Digital Signal Processors
Muhammad Yasir Malik
2015/114
Weak Ideal Functionalities for Designing Random Oracles with Applications to Fugue
Shai Halevi, William E. Hall, Charanjit S. Jutla, Arnab Roy
2015/113
Stream ciphers: A Practical Solution for Efficient Homomorphic-Ciphertext Compression
Anne Canteaut, Sergiu Carpov, Caroline Fontaine, Tancrède Lepoint, María Naya-Plasencia, Pascal Paillier, Renaud Sirdey
2015/112
Re-encryption Verifiability: How to Detect Malicious Activities of a Proxy in Proxy Re-encryption
Satsuya Ohata, Yutaka Kawai, Takahiro Matsuda, Goichiro Hanaoka, Kanta Matsuura
2015/111
The Multivariate Hidden Number Problem
Steven D. Galbraith, Barak Shani
2015/110
sHMQV: An Efficient Key Exchange Protocol for Power-limited Devices
Shijun Zhao, Qianying Zhang
2015/108
TRACING ATTACKS ON U-PROVE WITH REVOCATION MECHANISM
Lucjan Hanzlik, Przemysław Kubiak, Mirosław Kutyłowski
2015/107
Dynamic Searchable Symmetric Encryption with Minimal Leakage and Efficient Updates on Commodity Hardware
Attila A. Yavuz, Jorge Guajardo
2015/106
Provably weak instances of Ring-LWE
Yara Elias, Kristin E. Lauter, Ekin Ozman, Katherine E. Stange
2015/105
Inner Product Masking Revisited
Josep Balasch, Sebastian Faust, Benedikt Gierlichs
2015/104
Weakening the Isolation Assumption of Tamper-proof Hardware Tokens
Rafael Dowsley, Jörn Müller-Quade, Tobias Nilges
2015/103
Mergeable Functional Encryption
Vincenzo Iovino, Karol Zebrowski
2015/102
GCM-SIV: Full Nonce Misuse-Resistant Authenticated Encryption at Under One Cycle per Byte
Shay Gueron, Yehuda Lindell
2015/101
Multi-Key Security: The Even-Mansour Construction Revisited
Nicky Mouha, Atul Luykx
2015/100
Influence of Electrical Circuits of ECC Designs on Shape of Electromagnetic Traces measured on FPGA
Christian Wittke, Zoya Dyka, Peter Langendoerfer
2015/099
Universally Composable Firewall Architectures using Trusted Hardware
Dirk Achenbach, Jörn Müller-Quade, Jochen Rill
2015/098
Adaptive-ID Secure Revocable Identity-Based Encryption from Lattices via Subset Difference Method
Shantian Cheng, Juanyang Zhang
2015/097
Surreptitiously Weakening Cryptographic Systems
Bruce Schneier, Matthew Fredrikson, Tadayoshi Kohno, Thomas Ristenpart
2015/096
A Meet in the Middle Attack on Reduced Round Kuznyechik
Riham AlTawy, Amr M. Youssef
2015/095
Rotational Cryptanalysis of ARX Revisited
Dmitry Khovratovich, Ivica Nikolic, Josef Pieprzyk, Przemyslaw Sokolowski, Ron Steinfeld
2015/094
Some New Results on Binary Polynomial Multiplication
Murat Cenk, M. Anwar Hasan
2015/093
Generalization of Statistical Criteria for Sboxes
S. M. Dehnavi, A. Mahmoodi Rishakani, M. R. Mirzaee Shamsabad, Einollah Pasha
2015/092
TOWARDS THE GENERATION OF A DYNAMIC KEY-DEPENDENT S-BOX TO ENHANCE SECURITY
Grasha Jacob, Dr. A. Murugan, Irine Viola
2015/091
Related-Key Forgeries for Prøst-OTR
Christoph Dobraunig, Maria Eichlseder, and Florian Mendel
2015/090
Structural Evaluation by Generalized Integral Property
Yosuke Todo
2015/089
On the security margin of MAC striping
Thomas Eisenbarth, Aaron Meyerowitz, Rainer Steinwandt
2015/088
Structural Weaknesses in the Open Smart Grid Protocol
Klaus Kursawe, Christiane Peters
2015/087
Revisiting Cryptographic Accumulators, Additional Properties and Relations to other Primitives
David Derler, Christian Hanser, Daniel Slamanig
2015/086
Practical Compact E-Cash with Arbitrary Wallet Size
Patrick Märtens
2015/085
On the behaviors of affine equivalent Sboxes regarding differential and linear attacks
Anne Canteaut, Joëlle Roué
2015/084
On the Disadvantages of Pairing-based Cryptography
Zhengjun Cao, Lihua Liu
2015/083
Key Recovery Attacks against NTRU-based Somewhat Homomorphic Encryption Schemes
Massimo Chenal, Qiang Tang
2015/082
On the Difficulty of Securing Web Applications using CryptDB
İhsan Haluk AKIN, Berk Sunar
2015/081
Amortizing Garbled Circuits
Yan Huang, Jonathan Katz, Vladimir Kolesnikov, Ranjit Kumaresan, Alex J. Malozemoff
2015/080
The Fairy-Ring Dance: Password Authenticated Key Exchange in a Group
Feng Hao, Xun Yi, Liqun Chen, Siamak F. Shahandashti
2015/079
On the Security of the COPA and Marble Authenticated Encryption Algorithms against (Almost) Universal Forgery Attack
Jiqiang Lu
2015/078
Fully Homomorphic Encryption from Ring-LWE:Identity-Based,Arbitrary Cyclotomic,Tighter Parameters
GU Chun-xiang, Xin Dan, ZHENG Yong-hui, KANG Yuan-ji
2015/077
On the Primary Constructions of Vectorial Boolean Bent Functions
Yuwei Xu, Chuankun Wu
2015/076
Fully Structure-Preserving Signatures and Shrinking Commitments
Masayuki Abe, Markulf Kohlweiss, Miyako Ohkubo, Mehdi Tibouchi
2015/075
Equivalent Key Recovery Attacks against HMAC and NMAC with Whirlpool Reduced to 7 Rounds
Jian Guo, Yu Sasaki, Lei Wang, Meiqin Wang, Long Wen
2015/074
Mind the Gap: Modular Machine-checked Proofs of One-Round Key Exchange Protocols
Gilles Barthe, Juan Manuel Crespo, Yassine Lakhnech, Benedikt Schmidt
2015/073
Oblivious Network RAM and Leveraging Parallelism to Achieve Obliviousness
Dana Dachman-Soled, Chang Liu, Charalampos Papamanthou, Elaine Shi, Uzi Vishkin
2015/072
Non-Interactive Zero-Knowledge Proofs of Non-Membership
Olivier Blazy, Céline Chevalier, Damien Vergnaud
2015/071
Factoring N=p^r q^s for Large r and s
Jean-Sebastien Coron, Jean-Charles Faugere, Guenael Renault, Rina Zeitoun
2015/070
The Sum Can Be Weaker Than Each Part
Gaëtan Leurent, Lei Wang
2015/069
On the Provable Security of the Iterated Even-Mansour Cipher against Related-Key and Chosen-Key Attacks
Benoît Cogliati, Yannick Seurin
2015/068
A Generic Approach to Invariant Subspace Attacks: Cryptanalysis of Robin, iSCREAM and Zorro
Gregor Leander, Brice Minaud, Sondre Rønjom
2015/067
Non-black-box Simulation in the Fully Concurrent Setting, Revisited
Susumu Kiyoshima
2015/066
Arithmetic Addition over Boolean Masking - Towards First- and Second-Order Resistance in Hardware
Tobias Schneider, Amir Moradi, Tim Güneysu
2015/065
A lightweight-friendly modifcation of GOST block cipher
Andrey Dmukh, Denis Dygin, Grigory Marshalko
2015/064
Optimally Efficient Multi-Party Fair Exchange and Fair Secure Multi-Party Computation
Handan Kılınç, Alptekin Küpçü
2015/063
CamlCrush: A PKCS\#11 Filtering Proxy
R. Benadjila, T. Calderon, M. Daubignard
2015/062
Evaluation and Cryptanalysis of the Pandaka Lightweight Cipher
Yuval Yarom, Gefei Li, Damith C. Ranasinghe
2015/061
More Efficient Oblivious Transfer Extensions with Security for Malicious Adversaries
Gilad Asharov, Yehuda Lindell, Thomas Schneider, Michael Zohner
2015/060
Verified Proofs of Higher-Order Masking
Gilles Barthe, Sonia Belaïd, François Dupressoir, Pierre-Alain Fouque, Benjamin Grégoire, Pierre-Yves Strub
2015/059
Security of Symmetric Encryption in the Presence of Ciphertext Fragmentation
Alexandra Boldyreva, Jean Paul Degabriele, Kenneth G. Paterson, Martijn Stam
2015/058
Universally Verifiable Multiparty Computation from Threshold Homomorphic Cryptosystems
Berry Schoenmakers, Meilof Veeningen
2015/057
Cold Boot Attacks in the Discrete Logarithm Setting
Bertram Poettering, Dale L. Sibborn
2015/056
Better Algorithms for LWE and LWR
Alexandre Duc, Florian Tramèr, Serge Vaudenay
2015/055
Richer Efficiency/Security Trade-offs in 2PC
Vladimir Kolesnikov, Payman Mohassel, Ben Riva, Mike Rosulek
2015/054
Non-committing encryption from $\Phi$-hiding
Brett Hemenway, Rafail Ostrovsky, Alon Rosen
2015/053
Tight Bounds for Keyed Sponges and Truncated CBC
Peter Gaži, Krzysztof Pietrzak, Stefano Tessaro
2015/052
Interactive Message-Locked Encryption and Secure Deduplication
Mihir Bellare, Sriram Keelveedhi
2015/051
Improved Meet-in-the-Middle Distinguisher on Feistel Schemes
Li Lin, Wenling Wu
2015/050
Stretching Groth-Sahai: NIZK Proofs of Partial Satisfiability
Carla Ràfols
2015/049
On Solving Lpn using BKW and Variants
Sonia Bogos, Florian Tramer, Serge Vaudenay
2015/048
On Obfuscation with Random Oracles
Ran Canetti, Yael Tauman Kalai, Omer Paneth
2015/047
Linearly Homomorphic Encryption from DDH
Guilhem Castagnos, Fabien Laguillaumie
2015/046
On the concrete hardness of Learning with Errors
Martin R. Albrecht, Rachel Player, Sam Scott
2015/045
Reliable Information Extraction for Single Trace Attacks
Valentina Banciu, Elisabeth Oswald, Carolyn Whitnall
2015/044
Use of SIMD-Based Data Parallelism to Speed up Sieving in Integer-Factoring Algorithms
Binanda Sengupta, Abhijit Das
2015/043
Group Signature with Deniability: How to Disavow a Signature
Ai Ishida, Keita Emura, Goichiro Hanaoka, Yusuke Sakai, Keisuke Tanaka
2015/042
High Performance Lattice-based CCA-secure Encryption
Rachid El Bansarkhani, Johannes Buchmann
2015/041
Parallel (probable) lock-free HashSieve: a practical sieving algorithm for the SVP
Artur Mariano, Thijs Laarhoven, Christian Bischof
2015/040
Automated Dynamic Cube Attack on Block Ciphers: Cryptanalysis of SIMON and KATAN
Zahra Ahmadian, Shahram Rasoolzadeh, Mahmoud Salmasizadeh, Mohammad Reza Aref
2015/039
Type-Based Verification of Electronic Voting Protocols
Véronique Cortier, Fabienne Eigner, Steve Kremer, Matteo Maffei, Cyrille Wiedling
2015/038
Aggregate Pseudorandom Functions and Connections to Learning
Aloni Cohen, Shafi Goldwasser, Vinod Vaikuntanathan
2015/037
Analysis and Enhancement of Desynchronization Attack on an Ultralightweight RFID Authentication Protocol
Da-Zhi Sun, Zahra Ahmadian, Yue-Jiao Wang, Mahmoud Salmasizadeh, Mohammad Reza Aref
2015/036
Faster software for fast endomorphisms
Billy Bob Brumley
2015/035
Cryptographically Secure CRC for Lightweight Message Authentication
Elena Dubrova, Mats Näslund, Göran Selander, Fredrik Lindqvist
2015/034
Suit up! Made-to-Measure Hardware Implementations of Ascon
Hannes Groß, Erich Wenger, Christoph Dobraunig, Christoph Ehrenhöfer
2015/033
On the Security of Fresh Re-keying to Counteract Side-Channel and Fault Attacks
Christoph Dobraunig, Maria Eichlseder, Stefan Mangard, Florian Mendel
2015/032
Constrained Key-Homomorphic PRFs from Standard Lattice Assumptions Or: How to Secretly Embed a Circuit in Your PRF
Zvika Brakerski, Vinod Vaikuntanathan
2015/031
Tight Parallel Repetition Theorems for Public-Coin Arguments using KL-divergence
Kai-Min Chung, Rafael Pass
2015/030
Cryptanalysis of Ascon
Christoph Dobraunig, Maria Eichlseder, Florian Mendel, Martin Schläffer
2015/029
Predicate Encryption for Circuits from LWE
Sergey Gorbunov, Vinod Vaikuntanathan, Hoeteck Wee
2015/028
Optimal software-implemented Itoh--Tsujii inversion for GF($2^m$)
Jeremy Maitin-Shepard
2015/027
On the Regularity of Lossy RSA: Improved Bounds and Applications to Padding-Based Encryption
Adam Smith, Ye Zhang
2015/026
A More Explicit Formula for Linear Probabilities of Modular Addition Modulo a Power of Two
S. M. Dehnavi, A. Mahmoodi Rishakani, M. R. Mirzaee Shamsabad
2015/025
Obfuscating Circuits via Composite-Order Graded Encoding
Benny Applebaum, Zvika Brakerski
2015/024
Non-Abelian Analogs of Lattice Rounding
Evgeni Begelfor, Stephen D. Miller, Ramarathnam Venkatesan
2015/023
Multilinear Maps Using Ideal Lattices without Encodings of Zero
Gu Chunsheng
2015/022
TMSUI: A Trust Management Scheme of USB Storage Devices for Industrial Control Systems
Bo Yang, Dengguo Feng, Yu Qin, Yingjun Zhang, Weijin Wang
2015/021
Non-Malleable Condensers for Arbitrary Min-Entropy, and Almost Optimal Protocols for Privacy Amplification
Xin Li
2015/020
Simpler Efficient Group Signatures from Lattices
Phong Q. Nguyen, Jiang Zhang, Zhenfeng Zhang
2015/019
Strongly-Optimal Structure Preserving Signatures from Type II Pairings: Synthesis and Lower Bounds
Gilles Barthe, Edvard Fagerholm, Dario Fiore, Andre Scedrov, Benedikt Schmidt, Mehdi Tibouchi
2015/018
A LINEAR ATTACK ON A KEY EXCHANGE PROTOCOL USING EXTENSIONS OF MATRIX SEMIGROUPS
JINTAI DING, ALEXEI MIASNIKOV, ALEXANDER USHAKOV
2015/017
Simple Functional Encryption Schemes for Inner Products
Michel Abdalla, Florian Bourse, Angelo De Caro, David Pointcheval
2015/016
Efficient Statically-Secure Large-Universe Multi-Authority Attribute-Based Encryption
Yannis Rouselakis, Brent Waters
2015/015
One-Round Key Exchange with Strong Security: An Efficient and Generic Construction in the Standard Model
Florian Bergsma, Tibor Jager, Jörg Schwenk
2015/014
Group Signatures from Lattices: Simpler, Tighter, Shorter, Ring-based
San Ling, Khoa Nguyen, Huaxiong Wang
2015/013
Low Noise LPN: KDM Secure Public Key Encryption and Sample Amplification
Nico Döttling
2015/012
Cryptanalysis of a (Somewhat) Additively Homomorphic Encryption Scheme Used in PIR
Tancrède Lepoint, Mehdi Tibouchi
2015/011
Block Cipher Speed and Energy Efficiency Records on the MSP430: System Design Trade-Offs for 16-bit Embedded Applications
Benjamin Buhrow, Paul Riemer, Mike Shea, Barry Gilbert, Erik Daniel
2015/010
Simulation-based Selective Opening CCA Security for PKE from Key Encapsulation Mechanisms
Shengli Liu, Kenneth G. Paterson
2015/009
Rig: A simple, secure and flexible design for Password Hashing
Donghoon Chang, Arpan Jati, Sweta Mishra, Somitra Kumar Sanadhya
2015/008
Post-Quantum Forward-Secure Onion Routing (Future Anonymity in Today’s Budget)
Satrajit Ghosh, Aniket Kate
2015/007
Balloon: A Forward-Secure Append-Only Persistent Authenticated Data Structure
Tobias Pulls, Roel Peeters
2015/006
Two-Server Password-Authenticated Secret Sharing UC-Secure Against Transient Corruptions
Jan Camenisch, Robert R. Enderlein, Gregory Neven
2015/005
Onion ORAM: A Constant Bandwidth Blowup Oblivious RAM
Srinivas Devadas, Marten van Dijk, Christopher W. Fletcher, Ling Ren, Elaine Shi, Daniel Wichs
2015/004
Oblivious Polynomial Evaluation and Secure Set-Intersection from Algebraic PRFs
Carmit Hazay
2015/003
Continuous Non-Malleable Key Derivation and Its Application to Related-Key Security
Baodong Qin, Shengli Liu, Tsz Hon Yuen, Robert H. Deng, Kefei Chen
2015/002
Characterization of MDS mappings
S. M. Dehnavi, A. Mahmoodi Rishakani, M. R. Mirzaee Shamsabad
2015/001
A note on the security of Higher-Order Threshold Implementations
Oscar Reparaz
2014/1029
On the Cryptographic Hardness of Finding a Nash Equilibrium
Nir Bitansky, Omer Paneth, Alon Rosen
2014/1028
Security Weaknesses of an "Anonymous Attribute Based Encryption" appeared in ASIACCS'13
Payal Chaudhari, Manik Lal Das, Anish Mathuria
2014/1027
Simple Lattice Trapdoor Sampling from a Broad Class of Distributions
Vadim Lyubashevsky, Daniel Wichs
2014/1026
Lattices with Symmetry
H. W. Lenstra Jr., A. Silverberg
2014/1025
XPIR: Private Information Retrieval for Everyone
Carlos Aguilar-Melchor, Joris Barrier, Laurent Fousse, Marc-Olivier Killijian
2014/1024
Cryptanalysis of the Co-ACD Assumption
Pierre-Alain Fouque, Moon Sung Lee, Tancrède Lepoint, Mehdi Tibouchi
2014/1023
How to Generate Repeatable Keys Using Physical Unclonable Functions Correcting PUF Errors with Iteratively Broadening and Prioritized Search
Nathan E. Price, Alan T. Sherman
2014/1022
Topology-Hiding Computation
Tal Moran, Ilan Orlov, Silas Richelson
2014/1021
Tightly-Secure Signatures from Chameleon Hash Functions
Olivier Blazy, Saqib A. Kakvi, Eike Kiltz, Jiaxin Pan
2014/1020
Side-Channel Leakage and Trace Compression using Normalized Inter-Class Variance
Shivam Bhasin, Jean-Luc Danger, Sylvain Guilley, Zakaria Najm
2014/1019
Related-Key Differential Cryptanalysis of Reduced-Round ITUBee
Xiaoming Tang, Weidong Qiu, Zheng Gong, Zheng Huang, Jie Guo
2014/1018
Algebraic Algorithms for LWE
Martin R. Albrecht, Carlos Cid, Jean-Charles Faugère, Ludovic Perret
2014/1017
Sorting and Searching Behind the Curtain: Private Outsourced Sort and Frequency-Based Ranking of Search Results Over Encrypted Data
Foteini Baldimtsi, Olga Ohrimenko
2014/1016
Modified SIMON and SPECK: Lightweight Hybrid Design for Embedded Security
GAURAV BANSOD, NISHCHAL RAVAL, NARAYAN PISHAROTY, ABHIJIT PATIL
2014/1015
Compact Accumulator using Lattices
Mahabir Prasad Jhanwar, Reihaneh Safavi-Naini
2014/1014
Double-and-Add with Relative Jacobian Coordinates
Björn Fay
2014/1013
Computational Independence
Björn Fay
2014/1012
The Boomerang Attacks on BLAKE and BLAKE2
Yonglin Hao
2014/1011
Proof-of-Work as Anonymous Micropayment: Rewarding a Tor Relay
Alex Biryukov, Ivan Pustogarov
2014/1010
On Continuous After-the-Fact Leakage-Resilient Key Exchange
Mohsen Toorani
2014/1009
A Preliminary FPGA Implementation and Analysis of Phatak’s Quotient-First Scaling Algorithm in the Reduced-Precision Residue Number System
Christopher D. Nguyen, Dhananjay S. Phatak, Steven D. Houston, Alan T. Sherman
2014/1008
DTLS-HIMMO: Efficiently Securing a Post-Quantum World with a Fully-Collusion Resistant KPS
Oscar Garcia-Morchon, Ronald Rietman, Sahil Sharma, Ludo Tolhuizen, Jose Luis Torre-Arce
2014/1007
Fair Multiple-bank E-cash in the Standard Model
Jiangxiao Zhang, Yanwu Gao, Chunhui Feng, Hua Guo, Zhoujun Li
2014/1006
Simple composition theorems of one-way functions -- proofs and presentations
Jaime Gaspar, Eerke Boiten
2014/1005
A pure block chain based decentralized exchange.
Harsh Patel
2014/1004
CONIKS: Bringing Key Transparency to End Users
Marcela S. Melara, Aaron Blankstein, Joseph Bonneau, Edward W. Felten, Michael J. Freedman
2014/1003
COFFE: Ciphertext Output Feedback Faithful Encryption
Christian Forler, David McGrew, Stefan Lucks, Jakob Wenzel
2014/1002
Experiments in Encrypted and Searchable Network Audit Logs
Bhanu Prakash Gopularam, Sashank Dara, Nalini N
2014/1001
Robustly Secure Two-Party Authenticated Key Exchange from Ring-LWE
Xiaopeng Yang, Wenping Ma, Chengli Zhang
2014/1000
Complete Characterization of Fairness in Secure Two-Party Computation of Boolean Functions
Gilad Asharov, Amos Beimel, Nikolaos Makriyannis, Eran Omri
2014/999
First Experimental Result of Power Analysis Attacks on a FPGA Implementation of LEA
Yongdae Kim, Hyunsoo Yoon
2014/998
Hierarchical deterministic Bitcoin wallets that tolerate key leakage
Gus Gutoski, Douglas Stebila
2014/997
Constants Count: Practical Improvements to Oblivious RAM
Ling Ren, Christopher W. Fletcher, Albert Kwon, Emil Stefanov, Elaine Shi, Marten van Dijk, Srinivas Devadas
2014/996
Some experiments investigating a possible L(1/4) algorithm for the discrete logarithm problem in algebraic curves
Maike Massierer
2014/995
Partial Garbling Schemes and Their Applications
Yuval Ishai, Hoeteck Wee
2014/994
Key-Policy Multi-authority Attribute-Based Encryption
Riccardo Longo, Chiara Marcolla, Massimiliano Sala
2014/993
How Different Electrical Circuits of ECC Designs Influence the Shape of Power Traces measured on FPGA
Thomas Basmer, Christian Wittke, Zoya Dyka, Peter Langendoerfer
2014/992
Incentivized Outsourced Computation Resistant to Malicious Contractors
Alptekin Kupcu
2014/991
Constant-Round Concurrent Zero-knowledge from Indistinguishability Obfuscation
Kai-Min Chung, Huijia Lin, Rafael Pass
2014/990
Combining Secret Sharing and Garbled Circuits for Efficient Private IEEE 754 Floating-Point Computations
Pille Pullonen, Sander Siim
2014/989
Controlled Homomorphic Encryption: Definition and Construction
Yvo Desmedt, Vincenzo Iovino, Giuseppe Persiano, Ivan Visconti
2014/988
Armadillo: a compilation chain for privacy preserving applications
Sergiu Carpov, Paul Dubrulle, Renaud Sirdey
2014/987
Cryptanalysis of Full PRIDE Block Cipher
Yibin Dai, Shaozhen Chen
2014/986
Related-Key Differential Attack on Round Reduced RECTANGLE-80
Jinyong Shan, Lei Hu, Ling Song, Siwei Sun, Xiaoshuang Ma
2014/985
Statistical weakness in Spritz against VMPC-R: in search for the RC4 replacement
Bartosz Zoltak
2014/984
Undermining Isolation through Covert Channels in the Fiasco.OC Microkernel
Michael Peter, Jan Nordholz, Matthias Petschick, Janis Danisevskis, Julian Vetter, Jean-Pierre Seifert
2014/983
Public Verification of Private Effort
Giulia Alberini, Tal Moran, Alon Rosen
2014/982
Outlier Privacy
Edward Lui, Rafael Pass
2014/981
Publicly Verifiable Non-Interactive Arguments for Delegating Computation
Omer Paneth, Guy N. Rothblum
2014/980
A Fast Phase-Based Enumeration Algorithm for SVP Challenge through y-Sparse Representations of Short Lattice Vectors
Dan Ding, Guizhen Zhu, Yang Yu, Zhongxiang Zheng
2014/979
The Chaining Lemma and its application
Ivan Damgaard, Sebastian Faust, Pratyay Mukherjee, Daniele Venturi
2014/978
Improved Differential Analysis of Block Cipher PRIDE
Qianqian Yang, Lei Hu, Siwei Sun, Kexin Qiao, Ling Song, Jinyong Shan, Xiaoshuang Ma
2014/977
A Survey on Lightweight Entity Authentication with Strong PUFs
Jeroen Delvaux, Roel Peeters, Dawu Gu, Ingrid Verbauwhede
2014/976
Geppetto: Versatile Verifiable Computation
Craig Costello, Cédric Fournet, Jon Howell, Markulf Kohlweiss, Benjamin Kreuter, Michael Naehrig, Bryan Parno, Samee Zahur
2014/975
Cryptanalysis of Two Candidate Fixes of Multilinear Maps over the Integers
Jean-Sebastien Coron, Tancrede Lepoint, Mehdi Tibouchi
2014/974
Non-Linearity and Affine Equivalence of Permutations
P R Mishra, Indivar Gupta, N Rajesh Pillai
2014/973
Improved Linear (hull) Cryptanalysis of Round-reduced Versions of SIMON
Danping Shi, Lei Hu, Siwei Sun, Ling Song, Kexin Qiao, Xiaoshuang Ma
2014/972
A Chinese Remainder Theorem Approach to Bit-Parallel GF(2^n) Polynomial Basis Multipliers for Irreducible Trinomials
Haining Fan
2014/971
Key recovery attacks on Grain family using BSW sampling and certain weaknesses of the filtering function
Y. Wei, E. Pasalic, F. Zhang, W. Wu
2014/970
Jackpot Stealing Information From Large Caches via Huge Pages
Gorka Irazoqui, Thomas Eisenbarth, Berk Sunar
2014/969
Privacy-Preserving Face Recognition with Outsourced Computation
Can Xiang, Chunming Tang
2014/968
Attacks on Secure Ownership Transfer for Multi-Tag Multi-Owner Passive RFID Environments
Jorge Munilla, Mike Burmester, Albert Peinado
2014/967
A Comprehensive Comparison of Shannon Entropy and Smooth Renyi Entropy
Maciej Skorski
2014/966
Privacy-Preserving Data Publish-Subscribe Service on Cloud-based Platforms
Kan Yang, Xiaohua Jia, Kuan Zhang, Xuemin (Sherman) Shen
2014/965
Predicate Encryption for Multi-Dimensional Range Queries from Lattices
Romain Gay, Pierrick Méaux, Hoeteck Wee
2014/964
On two windows multivariate cryptosystem depending on random parameters
Urszula Romańczuk-Polubiec, Vasyl Ustimenko
2014/963
Malicious-Client Security in Blind Seer: A Scalable Private DBMS
Ben Fisch, Binh Vo, Fernando Krell, Abishek Kumarasubramanian, Vladimir Kolesnikov, Tal Malkin, Steven M. Bellovin
2014/962
Solving Polynomial Systems with Noise over F_2: Revisited
Zhenyu Huang, Dongdai Lin
2014/961
When are Fuzzy Extractors Possible?
Benjamin Fuller, Leonid Reyzin, Adam Smith
2014/960
Non-Interactive Secure Multiparty Computation
Amos Beimel, Ariel Gabizon, Yuval Ishai, Eyal Kushilevitz, Sigurd Meldgaard, Anat Paskin-Cherniavsky
2014/959
Attacking Suggest Boxes in Web Applications Over HTTPS Using Side-Channel Stochastic Algorithms
Alexander Schaub, Emmanuel Schneider, Alexandros Hollender, Vinicius Calasans, Laurent Jolie, Robin Touillon, Annelie Heuser, Sylvain Guilley, Olivier Rioul
2014/958
Authenticated Encryption: How Reordering can Impact Performance
Basel Alomair
2014/957
Black Box Separations for Differentially Private Protocols
Dakshita Khurana, Hemanta K. Maji, Amit Sahai
2014/956
Tamper Detection and Continuous Non-Malleable Codes
Zahra Jafargholi, Daniel Wichs
2014/955
On the Asymptotic Idealness of the Asmuth-Bloom Threshold Secret Sharing Scheme
Constantin Catalin Dragan, Ferucio Laurentiu Tiplea
2014/954
Algebraic Fault Analysis of Katan
Frank Quedenfeld
2014/953
The Related-Key Security of Iterated Even-Mansour Ciphers
Pooya Farshim, Gordon Procter
2014/952
Balanced Encoding to Mitigate Power Analysis: A Case Study
Cong Chen, Thomas Eisenbarth, Aria Shahverdi, Xin Ye
2014/951
Modified Alternating Step Generators with Non-Linear Scrambler
Robert Wicik, Tomasz Rachwalik, Rafał Gliwa
2014/950
Tree-Structured Composition of Homomorphic Encryption: How to Weaken Underlying Assumptions
Koji Nuida, Goichiro Hanaoka, Takahiro Matsuda
2014/949
Simplification/complication of the basis of prime Boolean ideal
Alexander Rostovtsev, Anna Shustrova
2014/948
Lattice Point Enumeration on Block Reduced Bases
Michael Walter
2014/947
The SIMON and SPECK Block Ciphers on AVR 8-bit Microcontrollers
Ray Beaulieu, Douglas Shors, Jason Smith, Stefan Treatman-Clark, Bryan Weeks, Louis Wingers
2014/946
On a new fast public key cryptosystem
Samir Bouftass, Abdelhak Azhari
2014/945
Boomerang Attack on Step-Reduced SHA-512
Hongbo Yu, Dongxia Bai
2014/944
Structure-Preserving Signatures on Equivalence Classes and Constant-Size Anonymous Credentials
Georg Fuchsbauer, Christian Hanser, Daniel Slamanig
2014/943
Advancing the State-of-the-Art in Hardware Trojans Detection
Syed Kamran Haider, Chenglu Jin, Masab Ahmad, Devu Manikantan Shila, Omer Khan, Marten van Dijk
2014/942
Public-Coin Differing-Inputs Obfuscation and Its Applications
Yuval Ishai, Omkant Pandey, Amit Sahai
2014/941
Garbled RAM From One-Way Functions
Sanjam Garg, Steve Lu, Rafail Ostrovsky, Alessandra Scafuro
2014/940
Fully Secure Self-Updatable Encryption in Prime Order Bilinear Groups
Pratish Datta, Ratna Dutta, Sourav Mukhopadhyay
2014/939
Security Analysis of an Authentication Scheme Using Smart Cards
Gaurav Tiwari, Amit K. Awasthi, Neha Shukla
2014/938
Trapdoor Computational Fuzzy Extractors and Stateless Cryptographically-Secure Physical Unclonable Functions
Charles Herder, Ling Ren, Marten van Dijk, Meng-Day (Mandel) Yu, Srinivas Devadas
2014/937
Analysis of Lewko-Sahai-Waters Revocation System
Zhengjun Cao, Lihua Liu
2014/936
Outsourcing Secure Two-Party Computation as a Black Box
Henry Carter, Benjamin Mood, Patrick Traynor, Kevin Butler
2014/935
Boosting Higher-Order Correlation Attacks by Dimensionality Reduction
Nicolas Bruneau, Jean-Luc Danger, Sylvain Guilley, Annelie Heuser, Yannick Teglia
2014/934
Efficient Generic Zero-Knowledge Proofs from Commitments
Samuel Ranellucci, Alain Tapp, Rasmus Winther Zakarias
2014/933
Certificateless Proxy Re-Encryption Without Pairing: Revisited
Akshayaram Srinivasan, C. Pandu Rangan
2014/932
Bicliques with Minimal Data and Time Complexity for AES (Extended Version)
Andrey Bogdanov, Donghoon Chang, Mohona Ghosh, Somitra Kumar Sanadhya
2014/931
Cryptanalysis of JAMBU
Thomas Peyrin, Siang Meng Sim, Lei Wang, Guoyan Zhang
2014/930
Immunizing Multilinear Maps Against Zeroizing Attacks
Dan Boneh, David J. Wu, Joe Zimmerman
2014/929
Zeroizing without zeroes: Cryptanalyzing multilinear maps without encodings of zero
Craig Gentry, Shai Halevi, Hemanta K. Maji, Amit Sahai
2014/928
Implementing Candidate Graded Encoding Schemes from Ideal Lattices
Martin R. Albrecht, Catalin Cocis, Fabien Laguillaumie, Adeline Langlois
2014/927
Physical functions : the common factor of side-channel and fault attacks ?
Bruno Robisson, Hélène Le Bouder
2014/926
Road-to-Vehicle Communications with Time-Dependent Anonymity: A Light Weight Construction and its Experimental Results
Keita Emura, Takuya Hayashi
2014/925
Indistinguishability Obfuscation for Turing Machines with Unbounded Memory
Venkata Koppula, Allison Bishop Lewko, Brent Waters
2014/924
Improving the Polynomial time Precomputation of Frobenius Representation Discrete Logarithm Algorithms - Simplified Setting for Small Characteristic Finite Fields
Antoine Joux, Cécile Pierrot
2014/923
New Cryptosystem Using The CRT And The Jordan Normal Form
Hemlata Nagesh, Birendra Kumar Sharma
2014/922
Differential Analysis of Block Ciphers SIMON and SPECK
Alex Biryukov, Arnab Roy, Vesselin Velichkov
2014/921
Batch NFS
Daniel J. Bernstein, Tanja Lange
2014/920
Simpler and More Efficient Rank Estimation for Side-Channel Security Assessment
Cezary Glowacz, Vincent Grosso, Romain Poussier, Joachim Schueth, François-Xavier Standaert
2014/919
Experimenting with Shuffle Block Cipher and SMT Solvers
Martin Stanek
2014/918
Web Tap Payment Authentication and Encryption With Zero Customer Effort
Henry Ng
2014/917
From Selective to Adaptive Security in Functional Encryption
Prabhanjan Ananth, Zvika Brakerski, Gil Segev, Vinod Vaikuntanathan
2014/916
Adaptively Secure Fully Homomorphic Signatures Based on Lattices
Xavier Boyen, Xiong Fan, Elaine Shi
2014/915
Cryptanalysis of the Structure-Preserving Signature Scheme on Equivalence Classes from Asiacrypt 2014
Yanbin Pan
2014/914
Cryptography with One-Way Communication
Sanjam Garg, Yuval Ishai, Eyal Kushilevitz, Rafail Ostrovsky, Amit Sahai
2014/913
Fully Leakage-Resilient Signatures Revisited: Graceful Degradation, Noisy Leakage, and Construction in the Bounded-Retrieval Model
Antonio Faonio, Jesper Buus Nielsen, Daniele Venturi
2014/912
Low-Cost Concurrent Error Detection for GCM and CCM
Xiaofei Guo, Ramesh Karri
2014/911
A Denial of Service Attack against Fair Computations using Bitcoin Deposits
Jethro Beekman
2014/910
Adaptive Multiparty Non-interactive Key Exchange Without Setup In The Standard Model
Vanishree Rao
2014/909
Robust Secret Sharing Schemes Against Local Adversaries
Allison Bishop Lewko, Valerio Pastro
2014/908
Practical UC security with a Global Random Oracle
Ran Canetti, Abhishek Jain, Alessandra Scafuro
2014/907
Finding shortest lattice vectors faster using quantum search
Thijs Laarhoven, Michele Mosca, Joop van de Pol
2014/906
Cryptanalysis on the Multilinear Map over the Integers and its Related Problems
Jung Hee Cheon, Kyoohyung Han, Changmin Lee, Hansol Ryu, Damien Stehle
2014/905
Primary-Secondary-Resolver Membership Proof Systems
Moni Naor, Asaf Ziv
2014/904
How Secure is TextSecure?
Tilman Frosch, Christian Mainka, Christoph Bader, Florian Bergsma, Joerg Schwenk, Thorsten Holz
2014/903
Falcon Codes: Fast, Authenticated LT Codes (Or: Making Rapid Tornadoes Unstoppable)
Ari Juels, James Kelley, Roberto Tamassia, Nikos Triandopoulos
2014/902
The Power of Negations in Cryptography
Siyao Guo, Tal Malkin, Igor C. Oliveira, Alon Rosen
2014/901
A Practical Attack Against the Use of RC4 in the HIVE Hidden Volume Encryption System
Kenneth G. Paterson, Mario Strefler
2014/900
Some Security Results of the RC4+ Stream Cipher
Subhadeep Banik, Sonu Jha
2014/899
Side Channel Power Analysis of an AES-256 Bootloader
Colin O'Flynn, Zhizhang Chen
2014/898
A key recovery attack to the scale-invariant NTRU-based somewhat homomorphic encryption scheme
Eduardo Morais, Ricardo Dahab
2014/897
Leveled Fully Homomorphic Signatures from Standard Lattices
Sergey Gorbunov, Vinod Vaikuntanathan, Daniel Wichs
2014/896
Efficiently Making Secure Two-Party Computation Fair
Handan Kılınç, Alptekin Küpçü
2014/895
Analysis of ARX Functions: Pseudo-linear Methods for Approximation, Differentials, and Evaluating Diffusion
Kerry A. McKay, Poorvi L. Vora
2014/894
THE UBERCRYPT FRAMEWORK: A NEW APPROACH IN CRYPTOSYSTEMS
Joe Chiarella, Greg Mosher, Dr. J. Robert Buchanan
2014/893
Advanced Algebraic Attack on Trivium
Frank Quedenfeld, Christopher Wolf
2014/892
Breaking Existential Unforgeability of a Signature Scheme from Asiacrypt 2014
Georg Fuchsbauer
2014/891
Conversion from Arithmetic to Boolean Masking with Logarithmic Complexity
Jean-Sebastien Coron, Johann Groszschaedl, Praveen Kumar Vadnala, Mehdi Tibouchi
2014/890
Fast Evaluation of Polynomials over Binary Finite Fields and Application to Side-channel Countermeasures
Jean-Sebastien Coron, Arnab Roy, Srinivas Vivek
2014/889
Efficient Zero-Knowledge Proofs for Commitments from Learning With Errors over Rings
Fabrice Benhamouda, Stephan Krenn, Vadim Lyubashevsky, Krzysztof Pietrzak
2014/888
Distance Lower Bounding
Xifan Zheng, Reihaneh Safavi-Naini, Hadi Ahmadi
2014/887
Hardware Implementation of Secure Shamir's Secret Sharing Scheme
Pei Luo, Yu-Lun Lin, Zhen Wang, Mark Karpovsky
2014/886
Accountable Storage
Giuseppe Ateniese, Michael T. Goodrich, Vassilios Lekakis, Charalampos Papamanthou, Evripidis Paraskevas, Roberto Tamassia
2014/885
Efficient Stochastic Methods: Profiled Attacks Beyond 8 Bits
Marios O. Choudary, Markus G. Kuhn
2014/884
Faulty Clock Detection for Crypto Circuits Against Differential Fault Analysis Attack
Pei Luo, Yunsi Fei
2014/883
Faulty Clock Detection for Crypto Circuits Against Differential Fault Analysis Attack
Pei Luo, Yunsi Fei
2014/882
Obfuscation of Probabilistic Circuits and Applications
Ran Canetti, Huijia Lin, Stefano Tessaro, Vinod Vaikuntanathan
2014/881
Overview of the Candidates for the Password Hashing Competition - And Their Resistance Against Garbage-Collector Attacks
Christian Forler, Eik List, Stefan Lucks, Jakob Wenzel
2014/880
Sieving for Shortest Vectors in Ideal Lattices: a Practical Perspective
Joppe W. Bos, Michael Naehrig, Joop van de Pol
2014/879
Watch your Constants: Malicious Streebog
Riham AlTawy, Amr M. Youssef
2014/878
Protecting obfuscation against arithmetic attacks
Eric Miles, Amit Sahai, Mor Weiss
2014/877
CM55: special prime-field elliptic curves almost optimizing den Boer's reduction between Diffie-Hellman and discrete logs
Daniel R. L. Brown
2014/876
Resisting Randomness Subversion: Fast Deterministic and Hedged Public-key Encryption in the Standard Model
Mihir Bellare, Viet Tung Hoang
2014/875
Side-channel Power Analysis of Different Protection Schemes Against Fault Attacks on AES
Pei Luo, Yunsi Fei, Liwei Zhang, A. Adam Ding
2014/874
Accelerating Bliss: the geometry of ternary polynomials
Léo Ducas
2014/873
Bootstrapping for HElib
Shai Halevi, Victor Shoup
2014/872
Recent Results in Scalable Multi-Party Computation
Jared Saia, Mahdi Zamani
2014/871
An algorithm for MD5 single-block collision attack using high-performance computing cluster
Anton A. Kuznetsov
2014/870
Dynamic Behavior of RS latches using FIB processing and probe connection
Naoya Torii, Dai Yamamoto, Masahiko Takenaka, Tsutomu Matsumoto
2014/869
Exclusive Exponent Blinding May Not Suffice to Prevent Timing Attacks on RSA
Werner Schindler
2014/868
Functional Encryption for Randomized Functionalities in the Private-Key Setting from Minimal Assumptions
Ilan Komargodski, Gil Segev, Eylon Yogev
2014/867
Random-Oracle Uninstantiability from Indistinguishability Obfuscation
Chris Brzuska, Pooya Farshim, Arno Mittelbach
2014/866
Self-Destruct Non-Malleability
Sandro Coretti, Yevgeniy Dodis, Björn Tackmann, Daniele Venturi
2014/865
Impossibility of Black-Box Simulation Against Leakage Attacks
Rafail Ostrovsky, Giuseppe Persiano, Ivan Visconti
2014/864
How to Choose Interesting Points for Template Attacks More Effectively
Guangjun Fan, Yongbin Zhou, Hailong Zhang, Dengguo Feng
2014/863
A Unified Approach to Idealized Model Separations via Indistinguishability Obfuscation
Matthew D. Green, Jonathan Katz, Alex J. Malozemoff, Hong-Sheng Zhou
2014/862
Low-Latency ECDSA Signature Verification - A Road Towards Safer Traffic -
Miroslav Knezevic, Ventzislav Nikov, Peter Rombouts
2014/861
Cats and Dogs An Integrity for Voting Systems Based on Paper Ballots
İhsan Haluk Akın
2014/860
Differential Factors: Improved Attacks on SERPENT
Cihangir Tezcan, Ferruh Özbudak
2014/859
Provably secure pairing-free identity-based partially blind signature scheme and its application in online e-cash system
SK Hafizul Islam, G. P. Biswas
2014/858
Adaptively Secure, Universally Composable, Multi-Party Computation in Constant Rounds
Dana Dachman-Soled, Jonathan Katz, Vanishree Rao
2014/857
Pseudonymous Broadcast and Secure Computation from Cryptographic Puzzles
Jonathan Katz, Andrew Miller, Elaine Shi
2014/856
Leakage-Resilient Circuits Revisited -- Optimal Number of Computing Components without Leak-free Hardware
Dana Dachman-Soled, Feng-Hao Liu, Hong-Sheng Zhou
2014/855
Relating Undisturbed Bits to Other Properties of Substitution Boxes
Rusydi H. Makarim, Cihangir Tezcan
2014/854
Power Analysis Attack on Hardware Implementation of MAC-Keccak on FPGAs
Pei Luo, Yunsi Fei, Xin Fang, A. Adam Ding, Miriam Leeser, David R. Kaeli
2014/853
Dynamic Searchable Encryption in Very-Large Databases: Data Structures and Implementation
David Cash, Joseph Jaeger, Stanislaw Jarecki, Charanjit Jutla, Hugo Krawczyk, Marcel-Cătălin Roşu, Michael Steiner
2014/852
Faster ECC over $\mathbb{F}_{2^{521}-1}$
Robert Granger, Michael Scott
2014/851
Near Optimal Rate Homomorphic Encryption for Branching Programs
Aggelos Kiayias, Nikos Leonardos, Helger Lipmaa, Kateryna Pavlyk, Qiang Tang
2014/850
The BRUTUS automatic cryptanalytic framework: Testing CAESAR authenticated encryption candidates for weaknesses
Markku-Juhani O. Saarinen
2014/849
A Proxy Re-Encryption Scheme with the Unforgeability of Re-Encryption Keys against Collusion Attacks
Ryotaro Hayashi, Tatsuyuki Matsushita
2014/848
Private Key Recovery Combination Attacks: On Extreme Fragility of Popular Bitcoin Key Management, Wallet and Cold Storage Solutions in Presence of Poor RNG Events
Nicolas T. Courtois, Pinar Emirdag, Filippo Valsorda
2014/847
Reflections on Slide with a Twist Attacks
Itai Dinur, Orr Dunkelman, Nathan Keller, Adi Shamir
2014/846
Verifiable computation using multiple provers
Andrew J. Blumberg, Justin Thaler, Victor Vu, Michael Walfish
2014/845
Adaptively secure two-party computation from indistinguishability obfuscation
Ran Canetti, Shafi Goldwasser, Oxana Poburinnaya
2014/844
Two-Round Adaptively Secure MPC from Indistinguishability Obfuscation
Sanjam Garg, Antigoni Polychroniadou
2014/843
Solving a Class of Modular Polynomial Equations and its Relation to Modular Inversion Hidden Number Problem and Inversive Congruential Generator
Jun Xu, Santanu Sarkar, Lei Hu, Zhangjie Huang, Liqiang Peng
2014/842
A Rate-Optimizing Compiler for Non-malleable Codes Against Bit-wise Tampering and Permutations
Shashank Agrawal, Divya Gupta, Hemanta K. Maji, Omkant Pandey, Manoj Prabhakaran
2014/841
Explicit Non-malleable Codes Resistant to Permutations and Perturbations
Shashank Agrawal, Divya Gupta, Hemanta K. Maji, Omkant Pandey, Manoj Prabhakaran
2014/840
Constrained PRFs for Unbounded Inputs
Hamza Abusalah, Georg Fuchsbauer, Krzysztof Pietrzak
2014/839
A Simple and Improved Algorithm for Integer Factorization with Implicit Hints
Koji Nuida, Naoto Itakura, Kaoru Kurosawa
2014/838
SHIELD: Scalable Homomorphic Implementation of Encrypted Data-Classifiers
Alhassan Khedr, Glenn Gulak, Vinod Vaikuntanathan
2014/837
True Random Number Generators Secure in a Changing Environment: Improved Security Bounds
Maciej Skorski
2014/836
A Tight Transformation between HILL and Metric Conditional Pseudoentropy
Maciej Skorski
2014/835
Implementation of a Leakage-Resilient ElGamal Key Encapsulation Mechanism
David Galindo, Johann Großschädl, Zhe Liu, Praveen Kumar Vadnala, Srinivas Vivek
2014/834
Semantically Secure Order-Revealing Encryption: Multi-Input Functional Encryption Without Obfuscation
Dan Boneh, Kevin Lewi, Mariana Raykova, Amit Sahai, Mark Zhandry, Joe Zimmerman
2014/833
Efficient Distributed Tag-Based Encryption and its Application to Group Signatures with Efficient Distributed Traceability
Essam Ghadafi
2014/832
Requirements for Standard Elliptic Curves
Manfred Lochter, Johannes Merkle, Jörn-Marc Schmidt, Torsten Schütze
2014/831
Tweaks and Keys for Block Ciphers: the TWEAKEY Framework
Jérémy Jean, Ivica Nikolić, Thomas Peyrin
2014/830
Adaptively Secure Multi-Party Computation from LWE (via Equivocal FHE)
Ivan Damgård, Antigoni Polychroniadou, Vanishree Rao
2014/829
Additively Homomorphic UC commitments with Optimal Amortized Overhead
Ignacio Cascudo, Ivan Damgård, Bernardo David, Irene Giacomelli, Jesper Buus Nielsen, Roberto Trifiletti
2014/828
Remarks on Quantum Modular Exponentiation and Some Experimental Demonstrations of Shor's Algorithm
Zhengjun Cao, Zhenfu Cao, Lihua Liu
2014/827
Interactive Coding for Interactive Proofs
Yevgeniy Dodis, Allison Bishop Lewko
2014/826
Learning with Errors in the Exponent
Ozgur Dagdelen, Sebastian Gajek, Florian Gopfert
2014/825
Towards Optimal Bounds for Implicit Factorization Problem
Yao Lu, Liqiang Peng, Rui Zhang, Dongdai Lin
2014/824
Accountable Tracing Signatures
Markulf Kohlweiss, Ian Miers
2014/823
On the Oblivious Transfer Capacity of Generalized Erasure Channels against Malicious Adversaries
Rafael Dowsley, Anderson C. A. Nascimento
2014/822
Ballot secrecy with malicious bulletin boards
David Bernhard, Ben Smyth
2014/821
Non-malleable Reductions and Applications
Divesh Aggarwal, Yevgeniy Dodis, Tomasz Kazana, Maciej Obremski
2014/820
Operational Signature Schemes
Michael Backes, Ozgur Dagdelen, Marc Fischlin, Sebastian Gajek, Sebastian Meiser, Dominique Schröder
2014/819
Riding on Asymmetry: Efficient ABE for Branching Programs
Sergey Gorbunov, Dhinakaran Vinayagamurthy
2014/818
Circulant Matrices and Differential Privacy
Jalaj Upadhyay
2014/817
Optimized Karatsuba Squaring on 8-bit AVR Processors
Hwajeong Seo, Zhe Liu, Jongseok Choi, Howon Kim
2014/816
FHEW: Bootstrapping Homomorphic Encryption in less than a second
Léo Ducas, Daniele Micciancio
2014/815
A New Method for Decomposition in the Jacobian of Small Genus Hyperelliptic Curves
Palash Sarkar, Shashank Singh
2014/814
Navigating in the Cayley graph of $SL_2(F_p)$ and applications to hashing
Lisa Bromberg, Vladimir Shpilrain, Alina Vdovina
2014/813
Boosting Linearly-Homomorphic Encryption to Evaluate Degree-2 Functions on Encrypted Data
Dario Catalano, Dario Fiore
2014/812
Search-and-compute on Encrypted Data
Jung Hee Cheon, Miran Kim, Myungsun Kim
2014/811
A Polynomial-Time Key-Recovery Attack on MQQ Cryptosystems
Jean-Charles Faugere, Danilo Gligoroski, Ludovic Perret, Simona Samardjiska, Enrico Thomae
2014/810
Simulation-Based Secure Functional Encryption in the Random Oracle Model
Vincenzo Iovino, Karol Zebrowski
2014/809
Server-Aided Two-Party Computation with Minimal Connectivity in the Simultaneous Corruption Model
Ignacio Cascudo, Ivan Damgård, Oriol Farràs, Samuel Ranellucci
2014/808
Online/Off-line Ring Signature Scheme with Provable Security
Jayaprakash Kar
2014/807
Leakage-resilient non-malleable codes
Divesh Aggarwal, Stefan Dziembowski, Tomasz Kazana, Maciej Obremski
2014/806
Summation polynomial algorithms for elliptic curves in characteristic two
Steven D. Galbraith, Shishay W. Gebregiyorgis
2014/805
Dual-System Simulation-Soundness with Applications to UC-PAKE and More
Charanjit S. Jutla, Arnab Roy
2014/804
Short Signatures With Short Public Keys From Homomorphic Trapdoor Functions
Jacob Alperin-Sheriff
2014/803
A Decentralized Public Key Infrastructure with Identity Retention
Conner Fromknecht, Dragos Velicanu, Sophia Yakoubov
2014/802
Physical Characterization of Arbiter PUFs
Shahin Tajik, Enrico Dietz, Sven Frohmann, Jean-Pierre Seifert, Dmitry Nedospasov, Clemens Helfmeier, Christian Boit, Helmar Dittrich
2014/801
Reversed Genetic Algorithms for Generation of Bijective S-boxes with Good Cryptographic Properties
Georgi Ivanov, Nikolay Nikolov, Svetla Nikova
2014/800
Efficient Pairings and ECC for Embedded Systems
Thomas Unterluggauer, Erich Wenger
2014/799
Verifiable Random Functions from Weaker Assumptions
Tibor Jager
2014/798
Multi-Identity and Multi-Key Leveled FHE from Learning with Errors
Michael Clear, Ciarán McGoldrick
2014/797
Tightly-Secure Authenticated Key Exchange
Christoph Bader, Dennis Hofheinz, Tibor Jager, Eike Kiltz, Yong Li
2014/796
Distributed Cryptography Based on the Proofs of Work
Marcin Andrychowicz, Stefan Dziembowski
2014/795
SPHINCS: practical stateless hash-based signatures
Daniel J. Bernstein, Daira Hopwood, Andreas Hülsing, Tanja Lange, Ruben Niederhagen, Louiza Papachristodoulou, Michael Schneider, Peter Schwabe, Zooko Wilcox-O'Hearn
2014/794
Efficient Identity-Based Encryption over NTRU Lattices
Léo Ducas, Vadim Lyubashevsky, Thomas Prest
2014/793
Robust Authenticated-Encryption: AEZ and the Problem that it Solves
Viet Tung Hoang, Ted Krovetz, Phillip Rogaway
2014/792
General Classification of the Authenticated Encryption Schemes for the CAESAR Competition
Farzaneh abed, Christian Forler, Stefan Lucks
2014/791
Quantum Bit Commitment with Application in Quantum Zero-Knowledge Proof
Dongdai Lin, Yujuan Quan, Jian Weng, Jun Yan
2014/790
Fault Attack revealing Secret Keys of Exponentiation Algorithms from Branch Prediction Misses
Sarani Bhattacharya, Debdeep Mukhopadhyay
2014/789
Statistical Properties of the Square Map Modulo a Power of Two
S. M. Dehnavi, A. Mahmoodi Rishakani, M. R. Mirzaee Shamsabad, Einollah Pasha
2014/788
Tuning GaussSieve for Speed
Robert Fitzpatrick, Christian Bischof, Johannes Buchmann, Ozgur Dagdelen, Florian Gopfert, Artur Mariano, Bo-Yin Yang
2014/787
Another Tor is possible
Amadou Moctar Kane
2014/786
On the Indifferentiability of Key-Alternating Feistel Ciphers with No Key Derivation
Chun Guo, Dongdai Lin
2014/785
Divisible E-Cash Made Practical
Sébastien Canard, David Pointcheval, Olivier Sanders, Jacques Traoré
2014/784
Weak Instances of PLWE
Kirsten Eisentraeger, Sean Hallgren, Kristin Lauter
2014/783
Parametric Trojans for Fault-Injection Attacks on Cryptographic Hardware
Raghavan Kumar, Philipp Jovanovic, Wayne Burleson, Ilia Polian
2014/782
Precise Fault-Injections using Voltage and Temperature Manipulation for Differential Cryptanalysis
Raghavan Kumar, Philipp Jovanovic, Ilia Polian
2014/781
Tally-based simple decoders for traitor tracing and group testing
Boris Skoric
2014/780
Deterministic Public-Key Encryption under Continual Leakage
Venkata Koppula, Omkant Pandey, Yannis Rouselakis, Brent Waters
2014/779
Implementing Cryptographic Program Obfuscation
Daniel Apon, Yan Huang, Jonathan Katz, Alex J. Malozemoff
2014/778
Anonymous IBE from Quadratic Residuosity with Improved Performance
Michael Clear, Hitesh Tewari, Ciarán McGoldrick
2014/777
(Batch) Fully Homomorphic Encryption over Integers for Non-Binary Message Spaces
Koji Nuida, Kaoru Kurosawa
2014/776
How to Obfuscate Programs Directly
Joe Zimmerman
2014/775
Lock-free GaussSieve for Linear Speedups in Parallel High Performance SVP Calculation
Artur Mariano, Shahar Timnat, Christian Bischof
2014/774
Automated Analysis and Synthesis of Block-Cipher Modes of Operation
Alex J. Malozemoff, Jonathan Katz, Matthew D. Green
2014/773
Obfuscating Low-Rank Matrix Branching Programs
Amit Sahai, Mark Zhandry
2014/772
Fully Secure and Succinct Attribute Based Encryption for Circuits from Multi-linear Maps
Nuttapong Attrapadung
2014/771
Succinct Randomized Encodings and their Applications
Nir Bitansky, Sanjam Garg, Sidharth Telang
2014/770
AES Cipher Keys Suitable for Efficient Side-Channel Vulnerability Evaluation
Takaaki Mizuki, Yu-ichi Hayashi
2014/769
Indistinguishability Obfuscation of Iterated Circuits and RAM Programs
Ran Canetti, Justin Holmgren, Abhishek Jain, Vinod Vaikuntanathan
2014/768
Cut-and-Choose Bilateral Oblivious Transfer and Its Application in Secure Two-party Computation
Han Jiang, Xiaochao Wei, Chuan Zhao, Qiuliang Xu
2014/767
Algebraic Attacks on Human Identification Protocols
Hassan Jameel Asghar, Ron Steinfeld, Shujun Li, Mohamed Ali Kaafar, Josef Pieprzyk
2014/766
Succinct Garbling Schemes and Applications
Huijia Lin, Rafael Pass
2014/765
The Bitcoin Backbone Protocol: Analysis and Applications
Juan Garay, Aggelos Kiayias, Nikos Leonardos
2014/764
One-out-of-Many Proofs: Or How to Leak a Secret and Spend a Coin
Jens Groth, Markulf Kohlweiss
2014/763
On the Privacy Provisions of Bloom Filters in Lightweight Bitcoin Clients
Arthur Gervais, Ghassan O. Karame, Damian Gruber, Srdjan Capkun
2014/762
Access Control in Publicly Verifiable Outsourced Computation
James Alderman, Christian Janson, Carlos Cid, Jason Crampton
2014/761
Cryptanalysis of Reduced-round SIMON32 and SIMON48
Qingju Wang, Zhiqiang Liu, Kerem Varici, Yu Sasaki, Vincent Rijmen, Yosuke Todo
2014/760
Montgomery Modular Multiplication on ARM-NEON Revisited
Hwajeong Seo, Zhe Liu, Johann Großschädl, Jongseok Choi, Howon Kim
2014/759
How to Efficiently Evaluate RAM Programs with Malicious Security
Arash Afshar, Zhangxiang Hu, Payman Mohassel, Mike Rosulek
2014/758
Cryptographic Reverse Firewalls
Ilya Mironov, Noah Stephens-Davidowitz
2014/757
Adaptively Secure Broadcast Encryption with Small System Parameters
Mark Zhandry
2014/756
Two Halves Make a Whole: Reducing Data Transfer in Garbled Circuits using Half Gates
Samee Zahur, Mike Rosulek, David Evans
2014/755
Computing Mod Without Mod
Mark A. Will, Ryan K. L. Ko
2014/754
Bilinear Entropy Expansion from the Decisional Linear Assumption
Lucas Kowalczyk, Allison Bishop Lewko
2014/753
Online Deniability for Multiparty Protocols with Applications to Externally Anonymous Authentication
Alonso Gonzalez-Ulloa, Alejandro Hevia
2014/752
Key Indistinguishability vs. Strong Key Indistinguishability for Hierarchical Key Assignment Schemes
Arcangelo Castiglione, Alfredo De Santis, Barbara Masucci
2014/751
Higher-Order Threshold Implementations
Begül Bilgin, Benedikt Gierlichs, Svetla Nikova, Ventzislav Nikov, Vincent Rijmen
2014/750
Hardware Trojan Horses in Cryptographic IP Cores
Shivam Bhasin, Jean-Luc Danger, Sylvain Guilley, Xuan Thuy Ngo, Laurent Sauvage
2014/749
Bitline PUF: Building Native Challenge-Response PUF Capability into Any SRAM
Daniel E. Holcomb, Kevin Fu
2014/748
Efficient and Verifiable Algorithms for Secure Outsourcing of Cryptographic Computations
Mehmet Sabır Kiraz, Osmanbey Uzunkol
2014/747
Towards Finding the Best Characteristics of Some Bit-oriented Block Ciphers and Automatic Enumeration of (Related-key) Differential and Linear Characteristics with Predefined Properties
Siwei Sun, Lei Hu, Meiqin Wang, Peng Wang, Kexin Qiao, Xiaoshuang Ma, Danping Shi, Ling Song, Kai Fu
2014/746
Decoy-based information security
Vladimir Shpilrain
2014/745
Universal Signature Aggregators
Susan Hohenberger, Venkata Koppula, Brent Waters
2014/744
Sieving for shortest vectors in lattices using angular locality-sensitive hashing
Thijs Laarhoven
2014/743
Concise Multi-Challenge CCA-Secure Encryption and Signatures with Almost Tight Security
Benoit Libert, Marc Joye, Moti Yung, Thomas Peters
2014/742
A survey of Fault Attacks in Pairing Based Cryptography
Nadia El Mrabet, Jacques J. A. Fournier, Louis Goubin, Ronan Lashermes
2014/741
Eliminating Leakage in Reverse Fuzzy Extractors
André Schaller, Taras Stanko, Boris Škorić, Stefan Katzenbeisser
2014/740
Non-existence of [n; 5] type Generalized Bent function.
Shashi Kant Pandey, P. R Mishra, B. K Dass
2014/739
SBIM(Q) - a Multivariate Polynomial Trapdoor Function over the Field of Rational Numbers
Smile Markovski, Aleksandra Mileva, Vesna Dimitrova
2014/738
A Very Compact FPGA Implementation of LED and PHOTON
N. Nalla Anandakumar, Thomas Peyrin, Axel Poschmann
2014/737
Design and analysis of one-round certificateless authenticated group key agreement protocol with bilinear pairings
SK Hafizul Islam, Abhishek Singh
2014/736
Cube Attacks and Cube-attack-like Cryptanalysis on the Round-reduced Keccak Sponge Function
Itai Dinur, Pawel Morawiecki, Josef Pieprzyk, Marian Srebrny, Michal Straus
2014/735
Dealer-Leakage Resilient Verifiable Secret Sharing
Ruxandra F. Olimid
2014/734
S-box pipelining using genetic algorithms for high-throughput AES implementations: How fast can we go?
Lejla Batina, Domagoj Jakobovic, Nele Mentens, Stjepan Picek, Antonio de la Piedra, Dominik Sisejkovic
2014/733
Augmented Learning with Errors: The Untapped Potential of the Error Term
Rachid El~Bansarkhani, Özgür Dagdelen, Johannes Buchmann
2014/732
Resizable Tree-Based Oblivious RAM
Tarik Moataz, Travis Mayberry, Erik-Oliver Blass, Agnes Hui Chan
2014/731
Secure modular password authentication for the web using channel bindings
Mark Manulis, Douglas Stebila, Franziskus Kiefer, Nick Denham
2014/730
Differentially Private Linear Algebra in the Streaming Model
Jalaj Upadhyay
2014/729
Faster Binary-Field Multiplication and Faster Binary-Field MACs
Daniel J. Bernstein, Tung Chou
2014/728
Unpicking PLAID - A Cryptographic Analysis of an ISO-standards-track Authentication Protocol
Jean Paul Degabriele, Victoria Fehr, Marc Fischlin, Tommaso Gagliardoni, Felix Günther, Giorgia Azzurra Marson, Arno Mittelbach, Kenneth G. Paterson
2014/727
The Q-curve Construction for Endomorphism-Accelerated Elliptic Curves
Benjamin Smith
2014/726
CIARP: A RISC Processor For Cryptography Applications
Nima Karimpour Darav, Reza Ebrahimi Atani, Erfan Aghaei, Ahmad Tahmasivand, Mahsa Rahmani, Mina Moazzam Jazi
2014/725
Efficient Software Implementation of Ring-LWE Encryption
Ruan de Clercq, Sujoy Sinha Roy, Frederik Vercauteren, Ingrid Verbauwhede
2014/724
Protecting Encrypted Cookies from Compression Side-Channel Attacks
Janaka Alawatugoda, Douglas Stebila, Colin Boyd
2014/723
Crypto-analyses on “secure and efficient privacy-preserving public auditing scheme for cloud storage”
Yalin Chen, Jue-Sam Chou
2014/722
Differential Cryptanalysis of SipHash
Christoph Dobraunig, Florian Mendel, Martin Schläffer
2014/721
On Shor's Factoring Algorithm with More Registers and the Problem to Certify Quantum Computers
Zhengjun Cao, Zhenfu Cao
2014/720
Adaptively Secure Constrained Pseudorandom Functions
Dennis Hofheinz, Akshay Kamath, Venkata Koppula, Brent Waters
2014/719
Bivariate Polynomials Modulo Composites and their Applications
Dan Boneh, Henry Corrigan-Gibbs
2014/718
Square Span Programs with Applications to Succinct NIZK Arguments
George Danezis, Cedric Fournet, Jens Groth, Markulf Kohlweiss
2014/717
How to Split a Secret into Unknown Shares
Ruxandra F. Olimid
2014/716
Wire-Tap Codes as Side-Channel Countermeasure - an FPGA-based experiment
Amir Moradi
2014/715
Cryptanalysis on `Robust Biometrics-Based Authentication Scheme for Multi-server Environment'
Vanga Odelu, Ashok Kumar Das, Adrijit Goswami
2014/714
A comprehensive empirical comparison of parallel ListSieve and GaussSieve
Artur Mariano, Ozgur Dagdelen, Christian Bischof
2014/713
Co-Location-Resistant Clouds
Yossi Azar, Seny Kamara, Ishai Menache, Mariana Raykova, Bruce Shepherd
2014/712
Hybrid Anomaly Detection using K-Means Clustering in Wireless Sensor Networks
Mohammad Wazid
2014/711
New Class of Multivariate Public Key Cryptosystem, K(XI)RSE(2)PKC, Constructed based on Reed-Solomon Code Along with K(X)RSE(2)PKC over $\mathbb{F}_2$
Masao KASAHARA
2014/710
An Efficient Transform from Sigma Protocols to NIZK with a CRS and Non-Programmable Random Oracle
Yehuda Lindell
2014/709
A Note on Quantum Security for Post-Quantum Cryptography
Fang Song
2014/708
Formal Treatment of Privacy-Enhancing Credential Systems
Jan Camenisch, Stephan Krenn, Anja Lehmann, Gert Læssøe Mikkelsen, Gregory Neven, Michael Østergaard Pedersen
2014/707
Analysis Of Variance and CPA in SCA
Sebastien Tiran, Guillaume Reymond, Jean-Baptiste Rigaud, Driss Aboulkassimi, Benedikt Gierlichs, Mathieu Carbone, Gilles Ducharme, Philippe Maurine
2014/706
The Feasibility of Outsourced Database Search in the Plain Model
Carmit Hazay, Hila Zarosim
2014/705
Structure-Preserving Signatures on Equivalence Classes and their Application to Anonymous Credentials
Christian Hanser, Daniel Slamanig
2014/704
A 128-bit Block Cipher Based on Three Group Arithmetics
Shenghui Su, Shuwang Lü, Daqiang Dong
2014/703
Linearity Measures for MQ Cryptography
Simona Samardjiska, Danilo Gligoroski
2014/702
Defeating ISO9797-1 MAC Algo 3 by Combining Side-Channel and Brute Force Techniques
Benoit Feix, Hugues Thiebeauld
2014/701
A Practical Iterative Side Channel Cube Attack on AES-128/256
Erfan Aghaee, Majid Rahimi, Hamed Yusefi
2014/700
Bounded Pre-Image Awareness and the Security of Hash-Tree Keyless Signatures
Ahto Buldas, Risto Laanoja, Peeter Laud, Ahto Truu
2014/699
Scrutinizing and Improving Impossible Differential Attacks: Applications to CLEFIA, Camellia, LBlock and Simon (Full Version)
Christina Boura, María Naya-Plasencia, Valentin Suder
2014/698
HIMMO - A lightweight collusion-resistant key predistribution scheme
Oscar Garcia-Morchon, Domingo Gomez-Perez, Jaime Gutierrez, Ronald Rietman, Berry Schoenmakers, Ludo Tolhuizen
2014/697
A Fully Homomorphic Encryption Scheme with Better Key Size
Zhigang Chen, Jian Wang, ZengNian Zhang, Xinxia Song
2014/696
Security Proofs for the BLT Signature Scheme
Ahto Buldas, Risto Laanoja, Ahto Truu
2014/695
Proof of Proximity of Knowledge
Serge Vaudenay
2014/694
Malicious Hashing: Eve's Variant of SHA-1
Ange Albertini, Jean-Philippe Aumasson, Maria Eichlseder, Florian Mendel, and Martin Schläffer
2014/693
Optimal Proximity Proofs
Ioana Boureanu, Serge Vaudenay
2014/692
Extending Oblivious Transfer Efficiently, or - How to get active security with constant cryptographic overhead
Enrique Larraia
2014/691
Integration of hardware tokens in the Idemix library
Antonio de la Piedra
2014/690
Efficient Interval Check in the Presence of Malicious Adversaries
Genqiang Wu, Yeping He, Yi Lu, Liping Ding
2014/689
Efficient Implementation of Keyless Signatures with Hash Sequence Authentication
Ahto Buldas, Risto Laanoja, Ahto Truu
2014/688
White-Box AES Implementation Revisited
Chung Hun Baek, Jung Hee Cheon, Hyunsook Hong
2014/687
Reducing the Complexity of Normal Basis Multiplication
Omer Egecioglu, Cetin Kaya Koc
2014/686
A Recursive Relation Between The Adjacency Graph of Some LFSRs and Its Applications
Ming Li, Dongdai Lin
2014/685
Bit Security of the CDH Problems over Finite Field
Mingqiang Wang, Tao Zhan, Haibin Zhang
2014/684
Towards a Full-Featured Implementation of Attribute Based Credentials on Smart Cards
Antonio de la Piedra, Jaap-Henk Hoepman, Pim Vullers
2014/683
Error-Tolerant Algebraic Side-Channel Attacks Using BEE
Ling Song, Lei Hu, Siwei Sun, Zhang Zhang, Danping Shi, Ronglin Hao
2014/682
A Unified Formalism for Physical Attacks
Hélène Le Bouder, Ronan Lashermes, Yanis Linge, Bruno Robisson, Assia Tria
2014/681
Improved Linear Cryptanalysis of Reduced-round SIMON
Mohamed Ahmed Abdelraheem, Javad Alizadeh, Hoda A. Alkhzaimi, Mohammad Reza Aref, Nasour Bagheri, Praveen Gauravaram, Martin M. Lauridsen
2014/680
Remarks on the Cryptographic Primitive of Attribute-based Encryption
Zhengjun Cao, Lihua Liu
2014/679
A Note on the Bellare-Rivest Protocol for Translucent Cryptography
Zhengjun Cao, Lihua Liu
2014/678
A Counterexample to the Chain Rule for Conditional HILL Entropy
Stephan Krenn, Krzysztof Pietrzak, Akshay Wadia, Daniel Wichs
2014/677
Attacks in Stream Ciphers: A Survey
Gustavo Banegas
2014/676
Fully Collusion-Resistant Traceable Key-Policy Attribute-Based Encryption with Sub-linear Size Ciphertexts
Zhen Liu, Zhenfu Cao, Duncan S. Wong
2014/675
The Usage of Counter Revisited: Second-Preimage Attack on New Russian Standardized Hash Function
Jian Guo, Jérémy Jean, Gaëtan Leurent, Thomas Peyrin, Lei Wang
2014/674
Efficient RAM and control flow in verifiable outsourced computation
Riad S. Wahby, Srinath Setty, Max Howald, Zuocheng Ren, Andrew J. Blumberg, Michael Walfish
2014/673
How to Estimate the Success Rate of Higher-Order Side-Channel Attacks
Victor Lomné, Emmanuel Prouff, Matthieu Rivain, Thomas Roche, Adrian Thillard
2014/672
Circuit ORAM: On Tightness of the Goldreich-Ostrovsky Lower Bound
Xiao Wang, Hubert Chan, Elaine Shi
2014/671
SCORAM: Oblivious RAM for Secure Computation
Xiao Shaun Wang, Yan Huang, T-H. Hubert Chan, abhi shelat, Elaine Shi
2014/670
DoubleMod and SingleMod: Simple Randomized Secret-Key Encryption with Bounded Homomorphicity
Dhananjay S. Phatak, Qiang Tang, Alan T. Sherman, Warren D. Smith, Peter Ryan, Kostas Kalpakis
2014/669
On the Communication Complexity of Secure Function Evaluation with Long Output
Pavel Hubacek, Daniel Wichs
2014/668
Fairness versus Guaranteed Output Delivery in Secure Multiparty Computation
Ran Cohen, Yehuda Lindell
2014/667
Cut-and-Choose Based Two-Party Computation in the Online/Offline and Batch Settings
Yehuda Lindell, Ben Riva
2014/666
Functional Encryption Without Obfuscation
Sanjam Garg, Craig Gentry, Shai Halevi, Mark Zhandry
2014/665
Orthogonal Direct Sum Masking: A Smartcard Friendly Computation Paradigm in a Code, with Builtin Protection against Side-Channel and Fault Attacks
Julien Bringer, Claude Carlet, Hervé Chabanne, Sylvain Guilley, Houssem Maghrebi
2014/664
On the Optimal Pre-Computation of Window $\tau$NAF for Koblitz Curves
William R. Trost, Guangwu Xu
2014/663
Locally Decodable and Updatable Non-Malleable Codes and Their Applications
Dana Dachman-Soled, Feng-Hao Liu, Elaine Shi, Hong-Sheng Zhou
2014/662
Outsourced Pattern Matching
Sebastian Faust, Carmit Hazay, Daniele Venturi
2014/661
One-Round Deniable Key Exchange with Perfect Forward Security
Weiqiang Wen, Libin Wang, Min Xie
2014/660
Interactive Proofs under Continual Memory Leakage
Prabhanjan Ananth, Vipul Goyal, Omkant Pandey
2014/659
On the Primitivity of Trinomials over Small Finite Fields
YUjuan Li, Jinhua Zhao, Huaifu Wang
2014/658
The Adjacency Graphs of Some Feedback Shift Registers
Ming Li, Yupeng Jiang, Dongdai Lin
2014/657
On the cycle decomposition of the WG-NLFSR
YUjuan Li, Wnehua Shen, Huaifu Wang, Peipei Zhou
2014/656
Cryptanalytic Time-Memory-Data Tradeoffs for FX-Constructions with Applications to PRINCE and PRIDE
Itai Dinur
2014/655
Pleco and Plectron -- Two Provably Secure Password Hashing Algorithms
Bo Zhu, Xinxin Fan, Guang Gong
2014/654
Multi-Bit Differential Fault Analysis of Grain-128 with Very Weak Assumptions
Prakash Dey, Abhishek Chakraborty, Avishek Adhikari, Debdeep Mukhopadhyay
2014/653
Mersenne factorization factory
Thorsten Kleinjung, Joppe W. Bos, Arjen K. Lenstra
2014/652
A Dynamic Cube Attack on $105$ round Grain v1
Subhadeep Banik
2014/651
A note on CCA2-protected McEliece Cryptosystem with a systematic public key
Pavol Zajac
2014/650
Round-Optimal Password-Protected Secret Sharing and T-PAKE in the Password-Only Model
Stanislaw Jarecki, Aggelos Kiayias, Hugo Krawczyk
2014/649
FPGA Trojans through Detecting and Weakening of Cryptographic Primitives
Pawel Swierczynski, Marc Fyrbiak, Philipp Koppe, Christof Paar
2014/648
An Equivalent Condition on the Switching Construction of Differentially $4$-uniform Permutations on $\gf_{2^{2k}}$ from the Inverse Function
Xi Chen, Yazhi Deng, Min Zhu, Longjiang Qu
2014/647
Universally Composable Secure Group Communication
Youliang Tian, Changgen Peng
2014/646
High-speed Polynomial Multiplication Architecture for Ring-LWE and SHE Cryptosystems
Donald Donglong Chen, Nele Mentens, Frederik Vercauteren, Sujoy Sinha Roy, Ray C. C. Cheung, Derek Pao, Ingrid Verbauwhede
2014/645
Graph-Induced Multilinear Maps from Lattices
Craig Gentry, Sergey Gorbunov, Shai Halevi
2014/644
Side Channel Attacks: Vulnerability Analysis of PRINCE and RECTANGLE using DPA
Ravikumar Selvam, Dillibabu Shanmugam, Suganya Annadurai
2014/643
On the Security of `An Efficient Biometric Authentication Protocol for Wireless Sensor Networks'
Ashok Kumar Das
2014/642
Balanced permutations Even-Mansour ciphers
Shoni Gilboa, Shay Gueron
2014/641
The Multiple Number Field Sieve with Conjugation Method
Cécile Pierrot
2014/640
Revocation in Publicly Verifiable Outsourced Computation
James Alderman, Christian Janson, Carlos Cid, Jason Crampton
2014/639
Automated Design, Implementation, and Evaluation of Arbiter-based PUF on FPGA using Programmable Delay Lines
Mehrdad Majzoobi, Akshat Kharaya, Farinaz Koushanfar, Srinivas Devadas
2014/638
Substring-Searchable Symmetric Encryption
Melissa Chase, Emily Shen
2014/637
Generic Hardness of the Multiple Discrete Logarithm Problem
Aaram Yun
2014/636
Improved Timing Attacks on ECDSA
Vikram Singh
2014/635
Type 2 Structure-Preserving Signature Schemes Revisited
Sanjit Chatterjee, Alfred Menezes
2014/634
Constant-Round Leakage-Resilient Zero-Knowledge Arguments of Knowledge for NP
Hongda Li, Qihua Niu, Guifang Huang
2014/633
Client-Server Concurrent Zero Knowledge with Constant Rounds and Guaranteed Complexity
Ran Canetti, Abhishek Jain, Omer Paneth
2014/632
Verifiable Order Queries and Order Statistics on a List in Zero-Knowledge
Esha Ghosh, Olga Ohrimenko, Roberto Tamassia
2014/631
Zipf’s Law in Passwords
Ding Wang, Gaopeng Jian, Xinyi Huang, Ping Wang
2014/630
Privacy-Preserving Minimum Spanning Trees through Oblivious Parallel RAM for Secure Multiparty Computation
Peeter Laud
2014/629
Two-factor authentication for the Bitcoin protocol
Christopher Mann, Daniel Loebenberger
2014/628
An Efficient $t$-Cheater Identifiable Secret Sharing Scheme with Optimal Cheater Resiliency
Partha Sarathi Roy, Avishek Adhikari, Rui Xu, Kirill Morozov, Kouichi Sakurai
2014/627
On Modes of Operations of a Block Cipher for Authentication and Authenticated Encryption
Debrup Chakraborty, Palash Sarkar
2014/626
Get Your Hands Off My Laptop: Physical Side-Channel Key-Extraction Attacks on PCs
Daniel Genkin, Itamar Pipman, Eran Tromer
2014/625
Pretty Understandable Democracy 2.0
Stephan Neumann, Christian Feier, Perihan Sahin, Sebastian Fach
2014/624
KT-ORAM: A Bandwidth-efficient ORAM Built on K-ary Tree of PIR Nodes
Jinsheng Zhang, Qiumao Ma, Wensheng Zhang, Daji Qiao
2014/623
Privacy with Imperfect Randomness
Yevgeniy Dodis, Yanqing Yao
2014/622
Fully Secure Attribute Based Encryption from Multilinear Maps
Sanjam Garg, Craig Gentry, Shai Halevi, Mark Zhandry
2014/621
(Nothing else) MATor(s): Monitoring the Anonymity of Tor's Path Selection
Michael Backes, Aniket Kate, Sebastian Meiser, Esfandiar Mohammadi
2014/620
The M3dcrypt Password Hashing Function
Isaiah Makwakwa
2014/619
THE NEW HEURISTIC GUESS AND DETERMINE ATTACK ON SNOW 2.0 STREAM CIPHER
Mohammad Sadegh Nemati Nia, Ali Payandeh
2014/618
Proving Correctness and Security of Two-Party Computation Implemented in Java in Presence of a Semi-Honest Sender
Florian Böhl, Simon Greiner, Patrik Scheidecker
2014/617
ADSNARK: Nearly Practical and Privacy-Preserving Proofs on Authenticated Data
Michael Backes, Manuel Barbosa, Dario Fiore, Raphael M. Reischuk
2014/616
Practical Attribute-Based Encryption: Traitor Tracing, Revocation, and Large Universe
Zhen Liu, Duncan S. Wong
2014/615
The Hidden Graph Model: Communication Locality and Optimal Resiliency with Adaptive Faults
Nishanth Chandran, Wutichai Chongchitmate, Juan A. Garay, Shafi Goldwasser, Rafail Ostrovsky, Vassilis Zikas
2014/614
Expressive and Secure Searchable Encryption in the Public Key Setting (Full Version)
Zhiquan Lv, Cheng Hong, Min Zhang, Dengguo Feng
2014/613
A Security Analysis of the Composition of ChaCha20 and Poly1305
Gordon Procter
2014/612
Attribute-Based Encryption Optimized for Cloud Computing
Máté Horváth
2014/611
Accumulating Automata and Cascaded Equations Automata for Communicationless Information Theoretically Secure Multi-Party Computation
Shlomi Dolev, Niv Gilboa, Ximing Li
2014/610
Computing on the Edge of Chaos: Structure and Randomness in Encrypted Computation
Craig Gentry
2014/609
Public-Key Encryption Indistinguishable Under Plaintext-Checkable Attacks
Michel Abdalla, Fabrice Benhamouda, David Pointcheval
2014/608
Key-policy Attribute-based Encryption for Boolean Circuits from Bilinear Maps
Ferucio Laurentiu Tiplea, Constantin Catalin Dragan
2014/607
Adding Controllable Linkability to Pairing-Based Group Signatures For Free
Daniel Slamanig, Raphael Spreitzer, Thomas Unterluggauer
2014/606
A Multi-Function Provable Data Possession Scheme in Cloud Computing
Xiaojun Yu, Qiaoyan Wen
2014/605
On the Limitations of Computational Fuzzy Extractors
Kenji Yasunaga, Kosuke Yuzawa
2014/604
Private Web Search with Constant Round Efficiency
Bolam Kang, Sung Cheol Goh, Myungsun Kim
2014/603
Recursive Trees for Practical ORAM
Tarik Moataz, Erik-Oliver Blass, Guevara Noubir
2014/602
A Cryptographic Study of Tokenization Systems
Sandra Diaz-Santiago, Lil Maria Rodriguez-Henriquez, Debrup Chakraborty
2014/601
Adaptive versus Static Security in the UC Model
Ivan Damgård, Jesper Buus Nielsen
2014/600
DTKI: a new formalized PKI with no trusted parties
Jiangshan Yu, Vincent Cheval, Mark Ryan
2014/599
Post-quantum key exchange for the TLS protocol from the ring learning with errors problem
Joppe W. Bos, Craig Costello, Michael Naehrig, Douglas Stebila
2014/598
Privacy-Free Garbled Circuits with Applications To Efficient Zero-Knowledge
Tore Kasper Frederiksen, Jesper Buus Nielsen, Claudio Orlandi
2014/597
Invisible Adaptive Attacks
Jesper Buus Nielsen, Mario Strefler
2014/596
Secure and Oblivious Maximum Bipartite Matching Size Algorithm with Applications to Secure Fingerprint Identification
Marina Blanton, Siddharth Saraph
2014/595
Scalable Zero Knowledge via Cycles of Elliptic Curves
Eli Ben-Sasson, Alessandro Chiesa, Eran Tromer, Madars Virza
2014/594
Oblivious Parallel RAM and Applications
Elette Boyle, Kai-Min Chung, Rafael Pass
2014/593
Improved Exponential-time Algorithms for Inhomogeneous-SIS
Shi Bai, Steven D. Galbraith, Liangze Li, Daniel Sheffield
2014/592
Multiprecision multiplication on AVR revisited
Michael Hutter, Peter Schwabe
2014/591
Compact and Side Channel Secure Discrete Gaussian Sampling
Sujoy Sinha Roy, Oscar Reparaz, Frederik Vercauteren, Ingrid Verbauwhede
2014/590
Automated algebraic analysis of structure-preserving signature schemes
Joeri de Ruiter
2014/589
Authenticated Key Exchange from Ideal Lattices
Jiang Zhang, Zhenfeng Zhang, Jintai Ding, Michael Snook, Özgür Dagdelen
2014/588
A Punctured Programming Approach to Adaptively Secure Functional Encryption
Brent Waters
2014/587
Non-interactive zero-knowledge proofs in the quantum random oracle model
Dominique Unruh
2014/586
An Algebraic Approach to Non-Malleability
Vipul Goyal, Silas Richelson, Alon Rosen, Margarita Vald
2014/585
The SPEKE Protocol Revisited
Feng Hao, Siamak F. Shahandashti
2014/584
Universally Composable Efficient Priced Oblivious Transfer from a Flexible Membership Encryption
Pratish Datta, Ratna Dutta, Sourav Mukhopadhyay
2014/583
Template Attacks Based On Priori Knowledge
Guangjun Fan, Yongbin Zhou, Hailong Zhang, Dengguo Feng
2014/582
NSEC5: Provably Preventing DNSSEC Zone Enumeration
Sharon Goldberg, Moni Naor, Dimitrios Papadopoulos, Leonid Reyzin, Sachin Vasant, Asaf Ziv
2014/581
(Hierarchical) Identity-Based Encryption from Affine Message Authentication
Olivier Blazy, Eike Kiltz, Jiaxin Pan
2014/580
The Hunting of the SNARK
Nir Bitansky, Ran Canetti, Alessandro Chiesa, Shafi Goldwasser, Huijia Lin, Aviad Rubinstein, Eran Tromer
2014/579
Scan Based Side Channel Attack on Grain v1
Sonu Kumar Jha
2014/578
The Exact PRF-Security of NMAC and HMAC
Peter Gaži, Krzysztof Pietrzak, Michal Rybár
2014/577
Reducing Communication Overhead of the Subset Difference Scheme
Sanjay Bhattacherjee, Palash Sarkar
2014/576
Vernam Two
Dan P. Milleville
2014/575
Simple AEAD Hardware Interface (SÆHI) in a SoC: Implementing an On-Chip Keyak/WhirlBob Coprocessor
Markku-Juhani O. Saarinen
2014/574
Security Analysis of Multilinear Maps over the Integers
Hyung Tae Lee, Jae Hong Seo
2014/573
A new public key system based on Polynomials over finite fields GF(2)
Gurgen Khachatrian
2014/572
On the Optimality of Differential Fault Analyses on CLEFIA
Juliane Krämer, Anke Stüber, Ágnes Kiss
2014/571
How to manipulate curve standards: a white paper for the black hat
Daniel J. Bernstein, Tung Chou, Chitchanok Chuengsatiansup, Andreas Hülsing, Tanja Lange, Ruben Niederhagen, Christine van Vredendaal
2014/570
Deja Q: Using Dual Systems to Revisit q-Type Assumptions
Melissa Chase, Sarah Meiklejohn
2014/569
Fast Lattice Point Enumeration with Minimal Overhead
Daniele Micciancio, Michael Walter
2014/568
New Classes of Public Key Cryptosystems over $F_2^8$ Constructed Based on Reed-Solomon Codes, K(XVII)SE(1)PKC and K(XVII)$\Sigma \Pi$PKC
Masao KASAHARA
2014/567
Attribute-Based Signatures without Pairings by the Fiat-Shamir Transformation
Hiroaki Anada, Seiko Arita, Kouichi Sakurai
2014/566
Direct Construction of Recursive MDS Diffusion Layers using Shortened BCH Codes
Daniel Augot, Matthieu Finiasz
2014/565
Kangaroos in Side-Channel Attacks
Tanja Lange, Christine van Vredendaal, Marnix Wakker
2014/564
A Security Definition for Multi Secret Sharing and a Scheme Based on LWE
Massoud Hadian Dehkordi, Reza Ghasemi
2014/563
Analysis of Boomerang Differential Trails via a SAT-Based Constraint Solver URSA
Aleksandar Kircanski
2014/562
hHB: a Harder HB+ Protocol
Ka Ahmad Khoureich
2014/561
Performance Increasing Approaches For Binary Field Inversion
Vladislav Kovtun, Maria Bulakh
2014/560
Towards Forward Security Properties for PEKS and IBE
Qiang Tang
2014/559
Countermeasures Against High-Order Fault-Injection Attacks on CRT-RSA
Pablo Rauzy, Sylvain Guilley
2014/558
Double shielded Public Key Cryptosystems
Xiaofeng Wang, Chen Xu, Guo Li, Hanling Lin, Weijian Wang
2014/557
Round-Efficient Black-Box Construction of Composable Multi-Party Computation
Susumu Kiyoshima
2014/556
Securing Cloud Data in the New Attacker Model
Ghassan O. Karame, Claudio Soriente, Krzysztof Lichota, Srdjan Capkun
2014/555
General Statistically Secure Computation with Bounded-Resettable Hardware Tokens
Nico Döttling, Daniel Kraschewski, Jörn Müller-Quade, Tobias Nilges
2014/554
On Virtual Grey Box Obfuscation for General Circuits
Nir Bitansky, Ran Canetti, Yael Tauman-Kalai, Omer Paneth
2014/553
A Simpler Variant of Universally Composable Security for Standard Multiparty Computation
Ran Canetti, Asaf Cohen, Yehuda Lindell
2014/552
Efficient Record-Level Keyless Signatures for Audit Logs
Ahto Buldas, Ahto Truu, Risto Laanoja, Rainer Gerhards
2014/551
Diffusion Matrices from Algebraic-Geometry Codes with Efficient SIMD Implementation
Daniel Augot, Pierre-Alain Fouque, Pierre Karpman
2014/550
Function-Private Functional Encryption in the Private-Key Setting
Zvika Brakerski, Gil Segev
2014/549
New Attacks on the RSA Cryptosystem
Abderrahmane Nitaj, Muhammad Rezal Kamel Ariffin, Dieaa I. Nassr, Hatem M. Bahig
2014/548
Implicit factorization of unbalanced RSA moduli
Abderrahmane Nitaj, Muhammad Rezal Kamel Ariffin
2014/547
Authentication Codes Based on Resilient Boolean Maps
Juan Carlos Ku-Cauich, Guillermo Morales-Luna
2014/546
Anonymous and Publicly Linkable Reputation Systems
Johannes Blömer, Jakob Juhnke, Christina Kolb
2014/545
Solving closest vector instances using an approximate shortest independent vectors oracle
Chengliang Tian, Wei Wei, Dongdai Lin
2014/544
Secure Mutual Testing Strategy for Cryptographic SoCs
Amitabh Das, Dusko Karaklajic, Ingrid Verbauwhede
2014/543
A Practical Second-Order Fault Attack against a Real-World Pairing Implementation
Johannes Blömer, Ricardo Gomes da Silva, Peter Günther, Juliane Krämer, Jean-Pierre Seifert
2014/542
On the Multi-output Filtering Model and Its Applications
Guang Gong, Kalikinkar Mandal, Yin Tan, Teng Wu
2014/541
EM Attack Is Non-Invasive? - Design Methodology and Validity Verification of EM Attack Sensor
Naofumi Homma, Yu-ichi Hayashi, Noriyuki Miura, Daisuke Fujimoto, Daichi Tanaka, Makoto Nagata, Takafumi Aoki
2014/540
Optimized Architecture for AES
Abhijith P. S, Dr. Manish Goswami, S. Tadi, Kamal Pandey
2014/539
Faster Secure Arithmetic Computation Using Switchable Homomorphic Encryption
Hoon Wei Lim, Shruti Tople, Prateek Saxena, Ee-Chien Chang
2014/538
A Secure Cloud-based NFC Mobile Payment Protocol
pardis pourghomi, muhammad qasim saeed, george ghinea
2014/537
Constrained Verifiable Random Functions
Georg Fuchsbauer
2014/536
A Survey and New Results on the Decomposition of an NFSR into a Cascade Connection of Two Smaller NFSRs
Tian Tian, Jia-Min Zhang, Chen-Dong Ye, Wen-Feng Qi
2014/535
On Key Recovery Attacks against Existing Somewhat Homomorphic Encryption Schemes
Massimo Chenal, Qiang Tang
2014/534
Differential Power Analysis of a McEliece Cryptosystem
Cong Chen, Thomas Eisenbarth, Ingo von Maurich, Rainer Steinwandt
2014/533
Indifferentiability Results and Proofs for Some Popular Cryptographic Constructions
Jaiganesh Balasundaram
2014/532
On the Pitfalls of using Arbiter-PUFs as Building Blocks
Georg T. Becker
2014/531
Spatial Bloom Filters: Enabling Privacy in Location-aware Applications
Paolo Palmieri, Luca Calderoni, Dario Maio
2014/530
FOAM: Searching for Hardware-Optimal SPN Structures and Components with a Fair Comparison
Khoongming Khoo, Thomas Peyrin, Axel Y. Poschmann, Huihui Yap
2014/529
Leakage-Resilient Signatures with Graceful Degradation
Jesper Buus Nielsen, Daniele Venturi, Angela Zottarel
2014/528
Groups With Two Generators Having Unsolvable Word Problem And Presentations of Mihailova Subgroups
Xiaofeng Wang, Chen Xu, Guo Li, Hanling Lin
2014/527
Good is Not Good Enough: Deriving Optimal Distinguishers from Communication Theory
Annelie Heuser, Olivier Rioul, Sylvain Guilley
2014/526
Curve41417: Karatsuba revisited
Daniel J. Bernstein, Chitchanok Chuengsatiansup, Tanja Lange
2014/525
Differential Analysis on Block Cipher PRIDE
Jingyuan Zhao, Xiaoyun Wang, Meiqin Wang, Xiaoyang Dong
2014/524
Constructing hyper-bent functions from Boolean functions with the Walsh spectrum taking the same value twice
Chunming Tang, Yanfeng Qi
2014/523
Fully Secure and Fast Signing from Obfuscation
Kim Ramchen, Brent Waters
2014/522
Constrained Pseudorandom Functions: Verifiable and Delegatable
Nishanth Chandran, Srinivasan Raghuraman, Dhinakaran Vinayagamurthy
2014/521
Adaptively Secure Puncturable Pseudorandom Functions in the Standard Model
Susan Hohenberger, Venkata Koppula, Brent Waters
2014/520
Squares of Random Linear Codes
Ignacio Cascudo, Ronald Cramer, Diego Mirandola, Gilles Zémor
2014/519
Realizing Pico: Finally No More Passwords!
Jens Hermans, Roel Peeters
2014/518
Cryptography from Compression Functions: The UCE Bridge to the ROM
Mihir Bellare, Viet Tung Hoang, Sriram Keelveedhi
2014/517
On the Connection between Leakage Tolerance and Adaptive Security
Jesper Buus Nielsen, Daniele Venturi, Angela Zottarel
2014/516
On the Classification of Finite Boolean Functions up to Fairness
Nikolaos Makriyannis
2014/515
Ideal Social Secret Sharing Using Birkhoff Interpolation Method
Nasrollah Pakniat, Ziba Eslami, Mehrdad Nojoumian
2014/514
On Constrained Implementation of Lattice-based Cryptographic Primitives and Schemes on Smart Cards
Ahmad Boorghany, Siavash Bayat Sarmadi, Rasool Jalili
2014/513
RSA meets DPA: Recovering RSA Secret Keys from Noisy Analog Data
Noboru Kunihiro, Junya Honda
2014/512
Rmind: a tool for cryptographically secure statistical analysis
Dan Bogdanov, Liina Kamm, Sven Laur, Ville Sokk
2014/511
Constructing CCA-secure predicate encapsulation schemes from CPA-secure schemes and universal one-way hash functions
Johannes Blömer, Gennadij Liske
2014/510
A Probabilistic Algebraic Attack on the Grain Family of Stream Cipher
Pratish Datta, Dibyendu Roy, Sourav Mukhopadhyay
2014/509
Privacy preserving delegated word search in the cloud
Kaoutar Elkhiyaoui, Melek Onen, Refik Molva
2014/508
Reversing Stealthy Dopant-Level Circuits
Takeshi Sugawara, Daisuke Suzuki, Ryoichi Fujii, Shigeaki Tawa, Ryohei Hori, Mitsuru Shiozaki, Takeshi Fujino
2014/507
How to Generate and use Universal Samplers
Dennis Hofheinz, Tibor Jager, Dakshita Khurana, Amit Sahai, Brent Waters, Mark Zhandry
2014/506
Finding Roots in GF(p^n) with the Successive Resultant Algorithm
Christophe Petit
2014/505
On the quaternion $\ell$-isogeny path problem
David Kohel, Kristin Lauter, Christophe Petit, Jean-Pierre Tignol
2014/504
A Provable Security Analysis of Intel's Secure Key RNG
Thomas Shrimpton, R. Seth Terashima
2014/503
Efficient Hidden Vector Encryption with Constant-Size Ciphertext
Tran Viet Xuan Phuong, Guomin Yang, Willy Susilo
2014/502
What's the Gist? Privacy-Preserving Aggregation of User Profiles
Igor Bilogrevic, Julien Freudiger, Emiliano De Cristofaro, Ersin Uzun
2014/501
WHIRLBOB, the Whirlpool based Variant of STRIBOB: Lighter, Faster, and Constant Time
Markku--Juhani O. Saarinen, Billy Bob Brumley
2014/500
Verifiable and Secure Outsourcing Schemes of Modular Exponentiations Using One Untrusted Cloud Server and Their Application
Can Xiang, Chunming Tang
2014/499
Security and Efficiency Analysis of The Hamming Distance Computation Protocol Based On Oblivious Transfer
Mehmet Sabır Kiraz, Ziya Alper Genç, Süleyman Kardaş
2014/498
Lightweight Diffusion Layer from the $k^{th}$ root of the MDS Matrix
Souvik Kolay, Debdeep Mukhopadhyay
2014/497
NREPO:Normal Basis Recomputing with Permuted Operands
Xiaofei Guo, Debdeep Mukhopadhyay, Chenglu Jin, Ramesh Karri
2014/496
Security Pitfalls of a Provably Secure Identity-based Multi-Proxy Signature Scheme
Maryam Rajabzadeh Asaar, Mahmoud Salmasizadeh, Willy Susilo
2014/495
Improved Short Lattice Signatures in the Standard Model
Léo Ducas, Daniele Micciancio
2014/494
Hardness of k-LWE and Applications in Traitor Tracing
San Ling, Duong Hieu Phan, Damien Stehle, Ron Steinfeld
2014/493
Arithmetic on Abelian and Kummer Varieties
David Lubicz, Damien Robert
2014/492
Fault attacks on pairing-based protocols revisited
Sanjit Chatterjee, Koray Karabina, Alfred Menezes
2014/491
Bootstrappable Identity-Based Fully Homomorphic Encryption
Michael Clear, Ciarán McGoldrick
2014/490
Universally Composable secure TNC protocol based on IF-T binding to TLS
Shijun Zhao, Qianying Zhang, Yu Qin, Dengguo Feng
2014/489
A Genetic Algorithm for Searching Shortest Lattice Vector of SVP Challenge
Dan Ding, Guizhen Zhu, Xiaoyun Wang
2014/488
Related-Key Security for Pseudorandom Functions Beyond the Linear Barrier
Michel Abdalla, Fabrice Benhamouda, Alain Passelègue, Kenneth G. Paterson
2014/487
GGHLite: More Efficient Multilinear Maps from Ideal Lattices
Adeline Langlois, Damien Stehle, Ron Steinfeld
2014/486
Binary Elligator Squared
Diego F. Aranha, Pierre-Alain Fouque, Chen Qian, Mehdi Tibouchi, Jean-Christophe Zapalowicz
2014/485
An Improved Truncated Differential Cryptanalysis of KLEIN
Shahram Rasoolzadeh, Zahra Ahmadian, Mahmood Salmasizadeh, Mohammad Reza Aref
2014/484
Sealing the Leak on Classical NTRU Signatures
Carlos Aguilar Melchor, Xavier Boyen, Jean-Christophe Deneuville, Philippe Gaborit
2014/483
Disjunctions for Hash Proof Systems: New Constructions and Applications
Michel Abdalla, Fabrice Benhamouda, David Pointcheval
2014/482
Differentially Private Data Aggregation with Optimal Utility
Fabienne Eigner, Aniket Kate, Matteo Maffei, Francesca Pampaloni, Ivan Pryvalov
2014/481
Universally Composable Non-Interactive Key Exchange
Eduarda S. V. Freire, Julia Hesse, Dennis Hofheinz
2014/480
Cryptographic Agents: Towards a Unified Theory of Computing on Encrypted Data
Shashank Agrawal, Shweta Agrawal, Manoj Prabhakaran
2014/479
Even more practical secure logging: Tree-based Seekable Sequential Key Generators
Giorgia Azzurra Marson, Bertram Poettering
2014/478
Related-Key Secure Pseudorandom Functions: The Case of Additive Attacks
Benny Applebaum, Eyal Widder
2014/477
Relaxed Two-to-one Recoding Schemes
Omkant Pandey, Kim Ramchen, Brent Waters
2014/476
Simon's Circuit
Paul Baecher
2014/475
A Key Recovery Attack on Error Correcting Code Based a Lightweight Security Protocol
Imran Erguler
2014/474
Cryptographic Schemes Based on the ASASA Structure: Black-box, White-box, and Public-key
Alex Biryukov, Charles Bouillaguet, Dmitry Khovratovich
2014/473
An Efficient Cloud-based Revocable Identity-based Proxy Re-encryption Scheme for Public Clouds Data Sharing
Kaitai Liang, Joseph K. Liu, Duncan S. Wong, Willy Susilo
2014/472
How to Watermark Cryptographic Functions
Ryo Nishimaki
2014/471
Large Universe Ciphertext-Policy Attribute-Based Encryption with White-Box Traceability
Jianting Ning, Zhenfu Cao, Xiaolei Dong, Lifei Wei, Xiaodong Lin
2014/470
PPDCP-ABE: Privacy-Preserving Decentralized Cipher-Policy Attribute-Based Encryption
Jinguang Han, Willy Susilo, Yi Mu, Jianying Zhou, Man Ho Au
2014/469
Homomorphic Signatures with Efficient Verification for Polynomial Functions
Dario Catalano, Dario Fiore, Bogdan Warinschi
2014/468
Privacy-Preserving Auditing for Attribute-Based Credentials
Jan Camenisch, Anja Lehmann, Gregory Neven, Alfredo Rial
2014/467
Ad-Hoc Secure Two-Party Computation on Mobile Devices using Hardware Tokens
Daniel Demmler, Thomas Schneider, Michael Zohner
2014/466
On a new properties of number sequences ,a randomness test and a new RC4's key scheduling algorithm.
Samir Bouftass, Abdelhak Azhari
2014/465
Semi-Adaptive Attribute-Based Encryption and Improved Delegation for Boolean Formula
Jie Chen, Hoeteck Wee
2014/464
Providing Root of Trust for ARM TrustZone using On-Chip SRAM
Shijun Zhao, Qianying Zhang, Guangyao Hu, Yu Qin, Dengguo Feng
2014/463
(Leveled) Fully Homomorphic Signatures from Lattices
Sergey Gorbunov, Vinod Vaikuntanathan
2014/462
Efficient Key-policy Attribute-based Encryption for General Boolean Circuits from Multilinear Maps
Constantin Catalin Dragan, Ferucio Laurentiu Tiplea
2014/461
Provably secure and efficient certificateless signature in the standard model
Lin Cheng, Qiaoyan Wen, Zhengping Jin, Hua Zhang
2014/460
FleXOR: Flexible garbling for XOR gates that beats free-XOR
Vladimir Kolesnikov, Payman Mohassel, Mike Rosulek
2014/459
Template Attacks on Different Devices
Omar Choudary, Markus G. Kuhn
2014/458
Automated Analysis of Cryptographic Assumptions in Generic Group Models
Gilles Barthe, Edvard Fagerholm, Dario Fiore, John Mitchell, Andre Scedrov, Benedikt Schmidt
2014/457
Transcript secure signatures based on modular lattices
Jeff Hoffstein, Jill Pipher, John M. Schanck, Joseph H. Silverman, William Whyte
2014/456
Verified Implementations for Secure and Verifiable Computation
José Bacelar Almeida, Manuel Barbosa, Gilles Barthe, Guillaume Davy, François Dupressoir, Benjamin Grégoire, Pierre-Yves Strub
2014/455
Single-shot security for one-time memories in the isolated qubits model
Yi-Kai Liu
2014/454
Early Propagation and Imbalanced Routing, How to Diminish in FPGAs
Amir Moradi, Vincent Immler
2014/453
Block Ciphers - Focus On The Linear Layer (feat. PRIDE): Full Version
Martin R. Albrecht, Benedikt Driessen, Elif Bilge Kavun, Gregor Leander, Christof Paar, Tolga Yalçın
2014/452
Proof of Activity: Extending Bitcoin’s Proof of Work via Proof of Stake
Iddo Bentov, Charles Lee, Alex Mizrahi, Meni Rosenfeld
2014/451
Leveled Fully Homomorphic Signatures from Standard Lattices
Daniel Wichs
2014/450
Optimized Implementation of General Secret Sharing Scheme
Lein Harn, Ching-Fang Hsu
2014/449
Related Key Secure PKE from Hash Proof Systems
Dingding Jia, Bao Li, Xianhui Lu, Qixiang Mei
2014/448
Differential Attacks on Reduced SIMON Versions with Dynamic Key-guessing Techniques
Ning Wang, Xiaoyun Wang, Keting Jia, Jingyuan Zhao
2014/447
Faster Private Set Intersection based on OT Extension
Benny Pinkas, Thomas Schneider, Michael Zohner
2014/446
4-point Attacks with Standard Deviation Analysis on A-Feistel Schemes
Valerie Nachef, Jacques Patarin, Emmanuel Volte
2014/445
Polynomial Spaces: A New Framework for Composite-to-Prime-Order Transformations
Gottfried Herold, Julia Hesse, Dennis Hofheinz, Carla Ràfols, Andy Rupp
2014/444
RPKI vs ROVER: Comparing the Risks of BGP Security Solutions
Aanchal Malhotra, Sharon Goldberg
2014/443
Minimizing the Two-Round Even-Mansour Cipher
Shan Chen, Rodolphe Lampe, Jooyoung Lee, Yannick Seurin, John P. Steinberger
2014/442
Secure Outsourced Computation of the Characteristic Polynomial and Eigenvalues of Matrix
Xing Hu, Chunming Tang
2014/441
Improved Generic Attacks Against Hash-based MACs and HAIFA
Itai Dinur, Gaëtan Leurent
2014/440
Double Level Montgomery Cox-Rower Architecture, New Bounds
Jean-Claude Bajard, Nabil Merkiche
2014/439
Efficient Non-Interactive Verifiable Outsourced Computation for Arbitrary Functions
Chunming Tang, Yuenai Chen
2014/438
Security of Symmetric Encryption against Mass Surveillance
Mihir Bellare, Kenneth Paterson, Phillip Rogaway
2014/437
Rounding and Chaining LLL: Finding Faster Small Roots of Univariate Polynomial Congruences
Jingguo Bi, Jean-Sébastien Coron, Jean-Charles Faugère, Phong Q. Nguyen, Guénaël Renault, Rina Zeitoun
2014/436
Synthesis of Fault Attacks on Cryptographic Implementations
Gilles Barthe, Francois Dupressoir, Pierre-Alain Fouque, Benjamin Gregoire, Jean-Christophe Zapalowicz
2014/435
Wait a minute! A fast, Cross-VM attack on AES
Gorka Irazoqui, Mehmet Sinan Inci, Thomas Eisenbarth, Berk Sunar
2014/434
Just a Little Bit More
Joop van de Pol, Nigel P. Smart, Yuval Yarom
2014/433
A Statistical Model for Higher Order DPA on Masked Devices
A. Adam Ding, Liwei Zhang, Yunsi Fei, Pei Luo
2014/432
Universally Composable Authentication and Key-exchange with Global PKI
Ran Canetti, Daniel Shahaf, Margarita Vald
2014/431
A Low-Latency, Low-Area Hardware Oblivious RAM Controller
Christopher W. Fletcher, Ling Ren, Albert Kwon, Marten van Dijk, Emil Stefanov, Dimitrios Serpanos, Srinivas Devadas
2014/430
Revisiting the Gentry-Szydlo Algorithm
H. W. Lenstra, A. Silverberg
2014/429
Memento: How to Reconstruct your Secrets from a Single Password in a Hostile Environment
Jan Camenisch, Anja Lehmann, Anna Lysyanskaya, Gregory Neven
2014/428
Dual System Encryption via Doubly Selective Security: Framework, Fully-secure Functional Encryption for Regular Languages, and More
Nuttapong Attrapadung
2014/427
Fast point multiplication algorithms for binary elliptic curves with and without precomputation
Thomaz Oliveira, Diego F. Aranha, Julio López, Francisco Rodríguez-Henríquez
2014/426
Towards Optimally Efficient Secret-Key Authentication from PRG
Ivan Damgård, Sunoo Park
2014/425
Note of Multidimensional MITM Attack on 25-Round TWINE-128
Long Wen, Meiqin Wang, Andrey Bogdanov, Huaifeng Chen
2014/424
Constructing Abelian Surfaces for Cryptography via Rosenhain Invariants
Craig Costello, Alyson Deines-Schartz, Kristin Lauter, Tonghai Yang
2014/423
The Hash Function "Fugue"
Shai Halevi, William E. Hall, Charanjit S. Jutla
2014/422
System-level non-interference for constant-time cryptography
Gilles Barthe, Gustavo Betarte, Juan Diego Campo, Carlos Luna, David Pichardie
2014/421
FNR : Arbitrary length small domain block cipher proposal
Sashank Dara, Scott Fluhrer
2014/420
Bounded Fully Homomorphic Signature Schemes
Xiang Xie, Rui Xue
2014/419
FFS Factory: Adapting Coppersmith's "Factorization Factory" to the Function Field Sieve
Jérémie Detrey
2014/418
A Simple Recursive Tree Oblivious RAM
Benny Pinkas, Tzachy Reinman
2014/417
Using Random Error Correcting Codes in Near-Collision Attacks on Generic Hash-Functions
Inna Polak, Adi Shamir
2014/416
Adaptive Security of Constrained PRFs
Georg Fuchsbauer, Momchil Konstantinov, Krzysztof Pietrzak, Vanishree Rao
2014/415
Virtual Proofs of Reality
Ulrich Rührmair
2014/414
A Security Proof of KCDSA using an extended Random Oracle Model
Vikram Singh
2014/413
On the Cost of Lazy Engineering for Masked Software Implementations
Josep Balasch, Benedikt Gierlichs, Vincent Grosso, Oscar Reparaz, François-Xavier Standaert
2014/412
Efficient Selection of Time Samples for Higher-Order DPA with Projection Pursuits
François Durvaux, François-Xavier Standaert, Nicolas Veyrat-Charvillon, Jean-Baptiste Mairy, Yves Deville
2014/411
Combining Leakage-Resilient PRFs and Shuffling (Towards Bounded Security for Small Embedded Devices)
Vincent Grosso, Romain Poussier, François-Xavier Standaert, Lubos Gaspar
2014/410
Soft Analytical Side-Channel Attacks
Nicolas Veyrat-Charvillon, Benoît Gérard, François-Xavier Standaert
2014/409
Moments-Correlating DPA
Amir Moradi, François-Xavier Standaert
2014/408
Bootstrapping BGV Ciphertexts with a Wider Choice of p and q
Emmanuela Orsini, Joop van de Pol, Nigel P. Smart
2014/407
Towards Symmetric Functional Encryption for Regular Languages with Predicate Privacy
Fu-Kuo Tseng, Rong-Jaye Chen, Bao-Shuh Paul Lin
2014/406
New Generic Attacks Against Hash-based MACs
Gaëtan Leurent, Thomas Peyrin, Lei Wang
2014/405
Indistinguishability Obfuscation versus Multi-Bit Point Obfuscation with Auxiliary Input
Chris Brzuska, Arno Mittelbach
2014/404
Large-Scale Secure Computation
Elette Boyle, Kai-Min Chung, Rafael Pass
2014/403
Generic Universal Forgery Attack on Iterative Hash-based MACs
Thomas Peyrin, Lei Wang
2014/402
On the Existence of Extractable One-Way Functions
Nir Bitansky, Ran Canetti, Omer Paneth, Alon Rosen
2014/401
Software implementation of an Attribute-Based Encryption scheme
Eric Zavattoni, Luis J. Dominguez Perez, Shigeo Mitsunari, Ana H. Sánchez-Ramírez, Tadanori Teruya, Francisco Rodríguez-Henríquez
2014/400
Composable Oblivious Extended Permutations
Peeter Laud, Jan Willemson
2014/399
An Asymptotically Optimal Structural Attack on the ABC Multivariate Encryption Scheme
Dustin Moody, Ray Perlner, Daniel Smith-Tone
2014/398
Differential Properties of the HFE Cryptosystem
Taylor Daniels, Daniel Smith-Tone
2014/397
Cofactorization on Graphics Processing Units
Andrea Miele, Joppe W. Bos, Thorsten Kleinjung, Arjen K. Lenstra
2014/396
Prover-Efficient Commit-And-Prove Zero-Knowledge SNARKs
Helger Lipmaa
2014/395
Lightweight and Privacy-Preserving Delegatable Proofs of Storage
Jia Xu, Anjia Yang, Jianying Zhou, Duncan S. Wong
2014/394
Relational Hash
Avradip Mandal, Arnab Roy
2014/393
(Almost) Optimal Constructions of UOWHFs from 1-to-1, Regular One-way Functions and Beyond
Yu Yu, Dawu Gu, Xiangxue Li, Jian Weng
2014/392
The Randomized Iterate Revisited - Almost Linear Seed Length PRGs from A Broader Class of One-way Functions
Yu Yu, Dawu Gu, Xiangxue Li, Jian Weng
2014/391
MuR-DPA: Top-down Levelled Multi-replica Merkle Hash Tree Based Secure Public Auditing for Dynamic Big Data Storage on Cloud
Chang Liu, Rajiv Ranjan, Chi Yang, Xuyun Zhang, Lizhe Wang, Jinjun Chen
2014/390
Black-Box Non-Black-Box Zero Knowledge
Vipul Goyal, Rafail Ostrovsky, Alessandra Scafuro, Ivan Visconti
2014/389
Accelerating NTRU based Homomorphic Encryption using GPUs
Wei Dai, Yarkın Doröz, Berk Sunar
2014/388
Finding collisions for MD4 hash algorithm using hybrid algorithm
Marko Carić
2014/387
New candidates for multivariate trapdoor functions
Jaiberth Porras, John B. Baena, Jintai Ding
2014/386
Chaskey: An Efficient MAC Algorithm for 32-bit Microcontrollers
Nicky Mouha, Bart Mennink, Anthony Van Herrewege, Dai Watanabe, Bart Preneel, Ingrid Verbauwhede
2014/385
Jacobian Coordinates on Genus 2 Curves
Huseyin Hisil, Craig Costello
2014/384
Yao's millionaires' problem and decoy-based public key encryption by classical physics
Dima Grigoriev, Vladimir Shpilrain
2014/383
Cryptanalysis of and Improvement on Biometric-based User Authentication Scheme for C/S System
Younsung Choi, Dongho Won
2014/382
Privacy-Enhanced Participatory Sensing with Collusion Resistance and Data Aggregation
Felix Günther, Mark Manulis, Andreas Peter
2014/381
Using Indistinguishability Obfuscation via UCEs
Chris Brzuska, Arno Mittelbach
2014/380
Efficient Adaptively Secure IBBE from Standard Assumptions
Somindu C. Ramanna, Palash Sarkar
2014/379
Hyper-and-elliptic-curve cryptography
Daniel J. Bernstein, Tanja Lange
2014/378
Attacks on Lin's Mobile Dynamic Identity-based Authenticated Key Agreement Scheme using Chebyshev Chaotic Maps
SK Hafizul Islam
2014/377
Logic Synthesis based Public Key Scheme
Boaz Shahar
2014/376
How Secure is Deterministic Encryption?
Mihir Bellare, Rafael Dowsley, Sriram Keelveedhi
2014/375
Improved Cryptanalysis on Reduced-Round GOST and Whirlpool Hash Function (Full Version)
Bingke Ma, Bao Li, Ronglin Hao, Xiaoqian Li
2014/374
Optimal Contracts for Outsourced Computation
Viet Pham, MHR. Khouzani, Carlos Cid
2014/373
Beyond 2^{c/2} Security in Sponge-Based Authenticated Encryption Modes
Philipp Jovanovic, Atul Luykx, Bart Mennink
2014/372
Fully secure constrained pseudorandom functions using random oracles
Dennis Hofheinz
2014/371
On the Enumeration of Double-Base Chains with Applications to Elliptic Curve Cryptography
Christophe Doche
2014/370
Compact VSS and Efficient Homomorphic UC Commitments
Ivan Damgård, Bernardo David, Irene Giacomelli, Jesper Buus Nielsen
2014/369
On the Limits of Authenticated Key Exchange Security with an Application to Bad Randomness
Michèle Feltz, Cas Cremers
2014/368
Solving the Discrete Logarithm of a 113-bit Koblitz Curve with an FPGA Cluster
Erich Wenger, Paul Wolfger
2014/367
Redefining the Transparency Order
Kaushik Chakraborty, Sumanta Sarkar, Subhamoy Maitra, Bodhisatwa Mazumdar, Debdeep Mukhopadhyay, Emmanuel Prouff
2014/366
Cryptanalysis and Improvement on Robust Three-Factor Remote User Authentication Scheme with Key Agreement for Multimedia System
Younsung Choi, Dongho Won
2014/365
Multi-target DPA attacks: Pushing DPA beyond the limits of a desktop computer
Luke Mather, Elisabeth Oswald, Carolyn Whitnall
2014/364
Deleting Secret Data with Public Verifiability
Feng Hao, Dylan Clarke, Avelino Francisco Zorzo
2014/363
Forging Attacks on two Authenticated Encryptions COBRA and POET
Mridul Nandi
2014/362
Nothing is for Free: Security in Searching Shared & Encrypted Data
Qiang Tang
2014/361
New Results in the Linear Cryptanalysis of DES
Igor Semaev
2014/360
McEliece in the world of Escher
Danilo Gligoroski, Simona Samardjiska, Håkon Jacobsen, Sergey Bezzateev
2014/359
Explicit endomorphism of the Jacobian of a hyperelliptic function field of genus 2 using base field operations
Eduardo Ruiz Duarte, Octavio Páez Osuna
2014/358
A mechanical approach to derive identity-based protocols from Diffie-Hellman-based protocols
Kim-Kwang Raymond Choo, Junghyun Nam, Dongho Won
2014/357
Simulatable Leakage: Analysis, Pitfalls, and new Constructions
J. Longo Galea, D. Martin, E. Oswald, D. Page, M. Stam, M. Tunstall
2014/356
Fully Key-Homomorphic Encryption, Arithmetic Circuit ABE, and Compact Garbled Circuits
Dan Boneh, Craig Gentry, Sergey Gorbunov, Shai Halevi, Valeria Nikolaenko, Gil Segev, Vinod Vaikuntanathan, Dhinakaran Vinayagamurthy
2014/355
Graph-theoretic design and analysis of key predistribution schemes
Michelle Kendall, Keith M. Martin
2014/354
Optimizing Information Set Decoding Algorithms to Attack Cyclosymmetric MDPC Codes
Ray Perlner
2014/353
Folding Alternant and Goppa Codes with Non-Trivial Automorphism Groups
Jean-Charles Faugère, Ayoub Otmani, Ludovic Perret, Frédéric de Portzamparc, Jean-Pierre Tillich
2014/352
Multi-Vendor PayWord with Payment Approval
Andrea Huszti
2014/351
Secret and Verifiable Delegated Voting for Wide Representation
Yefim Leifman
2014/350
Distributed Smooth Projective Hashing and its Application to Two-Server PAKE
Franziskus Kiefer, Mark Manulis
2014/349
Zerocash: Decentralized Anonymous Payments from Bitcoin
Eli Ben-Sasson, Alessandro Chiesa, Christina Garman, Matthew Green, Ian Miers, Eran Tromer, Madars Virza
2014/348
A Simple Cast-as-Intended E-Voting Protocol by Using Secure Smart Cards
Helger Lipmaa
2014/347
One-Way Functions and (Im)perfect Obfuscation
Ilan Komargodski, Tal Moran, Moni Naor, Rafael Pass, Alon Rosen, Eylon Yogev
2014/346
Time-Memory Trade-offs for Index Calculus in Genus 3
Kim Laine, Kristin Lauter
2014/345
Private Database Access With HE-over-ORAM Architecture
Craig Gentry, Shai Halevi, Charanjit Jutla, Mariana Raykova
2014/344
Toward Robust Hidden Volumes using Write-Only Oblivious RAM
Erik-Oliver Blass, Travis Mayberry, Guevara Noubir, Kaan Onarlioglu
2014/343
Solving Linear Equations Modulo Unknown Divisors: Revisited
Yao Lu, Rui Zhang, Liqiang Peng, Dongdai Lin
2014/342
Proposing Individualization of the design of cryptographic hardware accelerators as countermeasure against structure and side channel analysis
Zoya Dyka, Thomas Basmer, Christian Wittke, Peter Langendoerfer
2014/341
Formal Analysis of Chaumian Mix Nets with Randomized Partial Checking
Ralf Kuesters, Tomasz Truderung, Andreas Vogt
2014/340
A Strong and Efficient Certificateless Digital Signature Scheme
Mohammed Alfateh Hassouna, Mohsin Hashim
2014/339
Public-Coin Concurrent Zero-Knowledge in Logarithmic Rounds
Yi Deng
2014/338
A Tamper and Leakage Resilient von Neumann Architecture
Sebastian Faust, Pratyay Mukherjee, Jesper Buus Nielsen, Daniele Venturi
2014/337
Related Randomness Attacks for Public Key Encryption
Kenneth G. Paterson, Jacob C. N. Schuldt, Dale L. Sibborn
2014/336
Private Predictive Analysis on Encrypted Medical Data
Joppe W. Bos, Kristin Lauter, Michael Naehrig
2014/335
SHADOW NUMBERS PUBLIC KEY ENCRYPTION
John Almeida
2014/334
LCPR: High Performance Compression Algorithm for Lattice-Based Signatures
Rachid El Bansarkhani, Johannes Buchmann
2014/333
An optimal representation for the trace zero subgroup
Elisa Gorla, Maike Massierer
2014/332
How to Choose Interesting Points for Template Attacks?
Guangjun Fan, Yongbin Zhou, Hailong Zhang, Dengguo Feng
2014/331
Machine Learning Classification over Encrypted Data
Raphael Bost, Raluca Ada Popa, Stephen Tu, Shafi Goldwasser
2014/330
Noncentralized Cryptocurrency wtih No Blockchain
qianxiaochao
2014/329
Explicit Optimal Binary Pebbling for One-Way Hash Chain Reversal
Berry Schoenmakers
2014/328
Affine-evasive Sets Modulo a Prime
Divesh Aggarwal
2014/327
An Optimal Strong Password Authentication Protocol with USB Sticks
Vikram D
2014/326
FeW: A Lightweight Block Cipher
Manoj Kumar, Saibal K Pal, Anupama Panigrahi
2014/325
A practical forgery and state recovery attack on the authenticated cipher PANDA-s
Xiutao FENG, Fan ZHANG, Hui WANG
2014/324
From Single-Bit to Multi-Bit Public-Key Encryption via Non-Malleable Codes
Sandro Coretti, Ueli Maurer, Björn Tackmann, Daniele Venturi
2014/323
Some Remarks on Honeyword Based Password-Cracking Detection
Imran Erguler
2014/322
Coding Theoretic Construction of Quantum Ramp Secret Sharing
Ryutaroh Matsumoto
2014/321
Efficient Quantum-Immune Keyless Signatures with Identity
Ahto Buldas, Risto Laanoja, Ahto Truu
2014/320
Improved Differential Cryptanalysis of Round-Reduced Speck
Itai Dinur
2014/319
Preimage attacks on Reduced-round Stribog
Riham AlTawy, Amr M. Youssef
2014/318
Index calculus in the trace zero variety
Elisa Gorla, Maike Massierer
2014/317
Analysis of NORX: Investigating Differential and Rotational Properties
Jean-Philippe Aumasson, Philipp Jovanovic, Samuel Neves
2014/316
Explicit Non-Malleable Codes Resistant to Permutations
Shashank Agrawal, Divya Gupta, Hemanta K. Maji, Omkant Pandey, Manoj Prabhakaran
2014/315
Statistical weaknesses in 20 RC4-like algorithms and (probably) the simplest algorithm free from these weaknesses - VMPC-R
Bartosz Zoltak
2014/314
Improved Leakage Model Based on Genetic Algorithm
Zhenbin Zhang, Liji Wu, An Wang, Zhaoli Mu
2014/313
On the Complexity of Finding Low-Level Solutions
Bjoern Grohmann
2014/312
Structure-Preserving Signatures from Type II Pairings
Masayuki Abe, Jens Groth, Miyako Ohkubo, Mehdi Tibouchi
2014/311
Exponent-inversion Signatures and IBE under Static Assumptions
Tsz Hon Yuen, Sherman S. M. Chow, Cong Zhang, Siu Ming Yiu
2014/310
Sakai-Ohgishi-Kasahara Identity-Based Non-Interactive Key Exchange Revisited and More
Yu Chen, Qiong Huang, Zongyang Zhang
2014/309
Indistinguishability Obfuscation from the Multilinear Subgroup Elimination Assumption
Craig Gentry, Allison Lewko, Amit Sahai, Brent Waters
2014/308
The Locality of Searchable Symmetric Encryption
David Cash, Stefano Tessaro
2014/307
Simulation-Time Security Margin Assessment against Power-Based Side Channel Attacks
Alessandro Barenghi, Gerardo Pelosi, Francesco Regazzoni
2014/306
Publicly Evaluable Pseudorandom Functions and Their Applications
Yu Chen, Zongyang Zhang
2014/305
Collision Attack on 5 Rounds of Grøstl
Florian Mendel, Vincent Rijmen, Martin Schläffer
2014/304
Actively Private and Correct MPC Scheme in $t < n/2$ from Passively Secure Schemes with Small Overhead
Dai Ikarashi, Ryo Kikuchi, Koki Hamada, Koji Chida
2014/303
On the security of Xu et al.'s authentication and key agreement scheme for telecare medicine information systems
SK Hafizul Islam
2014/302
Branching Heuristics in Differential Collision Search with Applications to SHA-512
Maria Eichlseder, Florian Mendel, and Martin Schläffer
2014/301
How to Avoid Obfuscation Using Witness PRFs
Mark Zhandry
2014/300
On the Powers of 2
Robert Granger, Thorsten Kleinjung, Jens Zumbrägel
2014/299
Optimality of Non-Adaptive Strategies: The Case of Parallel Games
Grégory Demay, Peter Gaži, Ueli Maurer, Björn Tackmann
2014/298
Torsion Limits and Riemann-Roch Systems for Function Fields and Applications
Ignacio Cascudo, Ronald Cramer, Chaoping Xing
2014/297
Pipelineable On-Line Encryption
Farzaneh Abed, Scott Fluhrer, Christian Forler, Eik List, Stefan Lucks, David McGrew, Jakob Wenzel
2014/296
Quantum Attacks on Classical Proof Systems - The Hardness of Quantum Rewinding
Andris Ambainis, Ansis Rosmanis, Dominique Unruh
2014/295
ZAPs and Non-Interactive Witness Indistinguishability from Indistinguishability Obfuscation
Nir Bitansky, Omer Paneth
2014/294
The M3lcrypt Password Based Key Derivation Function
Isaiah Makwakwa
2014/293
An Efficient Abuse-Free Fair Contract-Signing Protocol Based on RSA Signature and Σ-protocol
Xi-Jun Lin, Lin Sun
2014/292
Improved Meet-in-the-Middle Attacks on Reduced-Round Camellia-192/256
Leibo Li, Keting Jia
2014/291
Trial multiplication is not optimal but... On the symmetry of finite cyclic groups (Z/pZ)∗
Antonio Sanso
2014/290
Reliable Broadcast with Respect to Topology Knowledge
Aris Pagourtzis, Giorgos Panagiotakos, Dimitris Sakavalas
2014/289
An Empirical Study and some Improvements of the MiniMac Protocol for Secure Computation
Ivan Damgaard, Rasmus Lauritsen, Tomas Toft
2014/288
Resilient Aggregation in Simple Linear Sensor Networks
Kevin J. Henry, Douglas R. Stinson
2014/287
Active and Passive Side-Channel Attacks on Delay Based PUF Designs
Georg T. Becker, Raghavan Kumar
2014/286
Weaknesses of Password Authentication Scheme Based on Geometric Hashing
Martin Stanek
2014/285
Privacy-Enhancing Proxy Signatures from Non-Interactive Anonymous Credentials
David Derler, Christian Hanser, Daniel Slamanig
2014/284
Resettably Sound Zero-Knoweldge Arguments from OWFs - the (semi) Black-Box way
Rafail Ostrovsky, Alessandra Scafuro, Muthuramakrishnan Venkitasubramaniam
2014/283
Structural Lattice Reduction: Generalized Worst-Case to Average-Case Reductions and Homomorphic Cryptosystems
Nicolas Gama, Malika Izabachene, Phong Q. Nguyen, Xiang Xie
2014/282
On The Orthogonal Vector Problem and The Feasibility of Unconditionally Secure Leakage Resilient Computation
Ivan Damgård, Frédéric Dupuis, Jesper Buus Nielsen
2014/281
WCFB: a tweakable wide block cipher
Andrey Jivsov
2014/280
MSEA: Modified Symmetric Encryption Algorithm
Rajul Kumar, K. K. Mishra, Ashish Tripathi, Abhinav Tomar, Surendra Singh
2014/279
Improved Impossible Differential Attacks against Round-Reduced LBlock
Christina Boura, Marine Minier, María Naya-Plasencia, Valentin Suder
2014/278
Stronger Security Notions for Decentralized Traceable Attribute-Based Signatures and More Efficient Constructions
Essam Ghadafi
2014/277
New Treatment of the BSW Sampling and Its Applications to Stream Ciphers
Lin Ding, Chenhui Jin, Jie Guan, Chuanda Qi
2014/276
Design of identity-based digital signature schemes using extended chaotic maps
SK Hafizul Islam
2014/275
Identity-based encryption and digital signature schemes using extended chaotic maps
SK Hafizul Islam
2014/274
A note on the construction of pairing-friendly elliptic curves for composite order protocols
Sorina Ionica, Malika Izabachène
2014/273
Witness Encryption from Instance Independent Assumptions
Craig Gentry, Allison Bishop Lewko, Brent Waters
2014/272
Impossible differential cryptanalysis of LBlock with concrete investigation of key scheduling algorithm
Jiageng Chen, Yuichi Futa, Atsuko Miyaji, Chunhua Su
2014/271
STRIBOB: Authenticated Encryption from GOST R 34.11-2012 LPS Permutation
Markku-Juhani O. Saarinen
2014/270
Faster Maliciously Secure Two-Party Computation Using the GPU
Tore Kasper Frederiksen, Thomas Pelle Jakobsen, Jesper Buus Nielsen
2014/269
Chosen Ciphertext Security via Point Obfuscation
Takahiro Matsuda, Goichiro Hanaoka
2014/268
New bit-parallel Montgomery multiplier for trinomials using squaring operation
Yin Li, Yiyang Chen
2014/267
Differential Fault Analysis on the families of SIMON and SPECK ciphers
Harshal Tupsamudre, Shikha Bisht, Debdeep Mukhopadhyay
2014/266
ICEPOLE: High-speed, Hardware-oriented Authenticated Encryption
Pawel Morawiecki, Kris Gaj, Ekawat Homsirikamol, Krystian Matusiewicz, Josef Pieprzyk, Marcin Rogawski, Marian Srebrny, Marcin Wojcik
2014/265
Dual System Groups and its Applications --- Compact HIBE and More
Jie Chen, Hoeteck Wee
2014/264
Continuous After-the-fact Leakage-Resilient Key Exchange (full version)
Janaka Alawatugoda, Colin Boyd, Douglas Stebila
2014/263
A Generic Scan Attack on Hardware based eStream Winners
Sandip Karmakar, Dipanwita Roy Chowdhury
2014/262
Differential Fault Analysis of MICKEY Family of Stream Ciphers
Sandip Karmakar, Dipanwita Roy Chowdhury
2014/261
Fault Analysis of Grain Family of Stream Ciphers
Sandip Karmakar, Dipanwita Roy Chowdhury
2014/260
Locally Decodable Codes for edit distance
Rafail Ostrovsky, Anat Paskin-Cherniavsky
2014/259
Practical Complexity Cube Attacks on Round-Reduced Keccak Sponge Function
Itai Dinur, Pawel Morawiecki, Josef Pieprzyk, Marian Srebrny, Michal Straus
2014/258
A realtime key recovery attack on the authenticated cipher FASER128
Xiutao FENG, Fan ZHANG
2014/257
Handycipher: a Low-tech, Randomized, Symmetric-key Cryptosystem
Bruce Kallick
2014/256
Private and Dynamic Time-Series Data Aggregation with Trust Relaxation
Iraklis Leontiadis, Kaoutar Elkhiyaoui, Refik Molva
2014/255
Certification and Efficient Proofs of Committed Topology Graphs
Thomas Gross
2014/254
Enhanced Lattice-Based Signatures on Reconfigurable Hardware
Thomas Pöppelmann, Lëo Ducas, Tim Güneysu
2014/253
Practical and Secure Query Processing for Large-scale Encrypted Cloud Storage Systems
Fangquan Cheng, Qian Wang, Kui Ren, Zhiyong Peng
2014/252
Making RSA-PSS Provably Secure Against Non-Random Faults
Gilles Barthe, François Dupressoir, Pierre-Alain Fouque, Benjamin Grégoire, Mehdi Tibouchi, Jean-Christophe Zapalowicz
2014/251
Forgery on Stateless CMCC
Guy Barwell
2014/250
Cryptanalysis of the MORE symmetric key fully homomorphic encryption scheme
Boaz Tsaban, Noam Lifshitz
2014/249
Linear Extension Cube Attack on Stream Ciphers
Liren Ding, Yongjuan Wang, Zhufeng Li
2014/248
Fine grain Cross-VM Attacks on Xen and VMware are possible!
Gorka Irazoqui Apecechea, Mehmet Sinan Inci, Thomas Eisenbarth, Berk Sunar
2014/247
Introducing Fault Tolerance into Threshold Password-Authenticated Key Exchange
Ivan Pryvalov, Aniket Kate
2014/246
Security Analysis of an Identity-Based Strongly Unforgeable Signature Scheme
Kwangsu Lee, Dong Hoon Lee
2014/245
A practical state recovery attack on the stream cipher Sablier v1
Xiutao FENG, Fan ZHANG
2014/244
bitcoin.BitMint: Reconciling Bitcoin with Central Banks
Gideon Samid
2014/243
Reusable Fuzzy Extractors for Low-Entropy Distributions
Ran Canetti, Benjamin Fuller, Omer Paneth, Leonid Reyzin, Adam Smith
2014/242
Zero-Knowledge Password Policy Checks and Verifier-Based PAKE
Franziskus Kiefer, Mark Manulis
2014/241
A New Way to Prevent UKS Attacks Using Trusted Computing
Qianying Zhang, Shijun Zhao, Dengguo Feng
2014/240
Automatic Proofs of Privacy of Secure Multi-Party Computation Protocols Against Active Adversaries
Martin Pettai, Peeter Laud
2014/239
Logical Reasoning to Detect Weaknesses About SHA-1 and MD4/5
Florian Legendre, Gilles Dequen, Michaël Krajecki
2014/238
High Parallel Complexity Graphs and Memory-Hard Functions
Joël Alwen, Vladimir Serbinenko
2014/237
SIMON Says, Break the Area Records for Symmetric Key Block Ciphers on FPGAs
Aydin Aysu, Ege Gulcan, Patrick Schaumont
2014/236
Linear Sequential Circuit Approximation of Acterbahn Stream Cipher
Shazia Afreen
2014/235
Efficient Fuzzy Search on Encrypted Data
Alexandra Boldyreva, Nathan Chenette
2014/234
Enhancing Oblivious RAM Performance Using Dynamic Prefetching
Xiangyao Yu, Ling Ren, Christopher Fletcher, Albert Kwon, Marten van Dijk, Srinivas Devadas
2014/233
Toward Practical Homomorphic Evaluation of Block Ciphers Using Prince
Yarkın Doröz, Aria Shahverdi, Thomas Eisenbarth, Berk Sunar
2014/232
Bandwidth Efficient PIR from NTRU
Yarkın Doröz, Berk Sunar, Ghaith Hammouri
2014/231
Self-Updatable Encryption with Short Public Parameters and Its Extensions
Kwangsu Lee
2014/230
Isogeny graphs with maximal real multiplication
Sorina Ionica, Emmanuel Thomé
2014/229
Investigating the Feasibility of LEAP+ in ZigBee Specification
Mohammad Rezaeirad, Muhammad Aamir Iqbal, Dmitri Perkins, Magdy Bayoumi
2014/228
Cryptanalysis of SP Networks with Partial Non-Linear Layers
Achiya Bar-On, Itai Dinur, Orr Dunkelman, Virginie Lallemand, Nathan Keller, Boaz Tsaban
2014/227
CKEF: A Cluster-based Key Establishment Framework for homogenous mobile and static wireless sensor networks
Mohammad Rezaeirad, Sahar Mazloom, Mahdi Orooji, Miao Jin, Magdy Bayoumi
2014/226
Weak-Key Analysis of POET
Mohamed Ahmed Abdelraheem, Andrey Bogdanov, Elmar Tischhauser
2014/225
Adaptively Secure Functional Encryption for Finite Languages from DLIN Assumption
Tapas Pandit and Rana Barua
2014/224
Whitewash: Outsourcing Garbled Circuit Generation for Mobile Devices
Henry Carter, Charles Lever, Patrick Traynor
2014/223
Collision Spectrum, Entropy Loss, T-Sponges, and Cryptanalysis of GLUON-64
Léo Perrin, Dmitry Khovratovich
2014/222
Optimizing Obfuscation: Avoiding Barrington's Theorem
Prabhanjan Ananth, Divya Gupta, Yuval Ishai, Amit Sahai
2014/221
Hybrid Model of Fixed and Floating Point Numbers in Secure Multiparty Computations
Toomas Krips, Jan Willemson
2014/220
Total Break of Zorro using Linear and Differential Attacks
Shahram Rasoolzadeh, Zahra Ahmadian, Mahmoud Salmasizadeh, Mohammad Reza Aref
2014/219
Dynamic Searchable Encryption via Blind Storage
Muhammad Naveed, Manoj Prabhakaran, Carl A. Gunter
2014/218
A Practical Universal Forgery Attack against PAES-8
Yu Sasaki, Lei Wang
2014/217
A Forgery Attack against PANDA-s
Yu Sasaki, Lei Wang
2014/216
Implementation and Improvement of the Partial Sum Attack on 6-round AES
Francesco Aldà, Riccardo Aragona, Lorenzo Nicolodi, Massimiliano Sala
2014/215
Attack On the Markov Problem
James L. Adams
2014/214
Squaring Algorithms with Delayed Carry Method and Efficient Parallelization
Vladislav Kovtun, Andrew Okhrimenko
2014/213
Secret-Sharing for NP
Ilan Komargodski, Moni Naor, Eylon Yogev
2014/212
Remarks on the Pocklington and Padró-Sáez Cube Root Algorithm in $\mathbb F_q$
Geon Heo, Seokhwan Choi, Kwang Ho Lee, Namhun Koo, Soonhak Kwon
2014/211
Some Randomness Experiments on TRIVIUM
Subhabrata Samajder, Palash Sarkar
2014/210
Structural Cryptanalysis of McEliece Schemes with Compact Keys
Jean-Charles Faugère, Ayoub Otmani, Ludovic Perret, Frédéric de Portzamparc, Jean-Pierre Tillich
2014/209
A Little Honesty Goes a Long Way: The Two-Tier Model for Secure Multiparty Computation
Juan A. Garay, Ran Gelles, David S. Johnson, Aggelos Kiayias, Moti Yung
2014/208
Offline Dictionary Attack on Password Authentication Schemes using Smart Cards
Ding Wang, Ping Wang
2014/207
Expressive Attribute-Based Encryption with Constant-Size Ciphertexts from the Decisional Linear Assumption
Katsuyuki Takashima
2014/206
Reconsidering Generic Composition
Chanathip Namprempre, Phillip Rogaway, Thomas Shrimpton
2014/205
Unified Oblivious-RAM: Improving Recursive ORAM with Locality and Pseudorandomness
Ling Ren, Christopher Fletcher, Xiangyao Yu, Albert Kwon, Marten van Dijk, Srinivas Devadas
2014/204
ChipWhisperer: An Open-Source Platform for Hardware Embedded Security Research
Colin O'Flynn, Zhizhang (David) Chen
2014/203
Privacy-Preserving Implicit Authentication
Nashad Ahmed Safa, Reihaneh Safavi-Naini, Siamak F. Shahandashti
2014/202
Efficiently Verifiable Computation on Encrypted Data
Dario Fiore, Rosario Gennaro, Valerio Pastro
2014/201
From Input Private to Universally Composable Secure Multiparty Computation Primitives
Dan Bogdanov, Peeter Laud, Sven Laur, Pille Pullonen
2014/200
Automatic Protocol Selection in Secure Two-Party Computations
Florian Kerschbaum, Thomas Schneider, Axel Schröpfer
2014/199
Doubly Spatial Encryption from DBDH
Jie Chen, Hoeteck Wee
2014/198
Fast GPGPU-Based Elliptic Curve Scalar Multiplication
Eric M. Mahé, Jean-Marie Chauvet
2014/197
Breaking POET Authentication with a Single Query
Jian Guo, Jérémy Jean, Thomas Peyrin, Wang Lei
2014/196
Crypto-Multimedia
Benlcouiri Younes, Azizi Abdelmalek, Moulay Chrif Ismaili
2014/195
Low Overhead Broadcast Encryption from Multilinear Maps
Dan Boneh, Brent Waters, Mark Zhandry
2014/194
Cryptanalysis and Security Enhancement of Two Advanced Authentication Protocols
Sai Raghu Talluri, Swapnoneel Roy
2014/193
JHAE: A Novel Permutation-Based Authenticated Encryption Mode Based on the Hash Mode JH
Javad Alizadeh, Mohammad Reza Aref, Nasour Bagheri
2014/192
Two-sources Randomness Extractors for Elliptic Curves
Abdoul Aziz Ciss
2014/191
Side-Channel Analysis on Blinded Regular Scalar Multiplications
Benoit Feix, Mylène Roussellet, Alexandre Venelli
2014/190
The Temperature Side Channel and Heating Fault Attacks
Michael Hutter, Jörn-Marc Schmidt
2014/189
Practical Receipt-Free Sealed-Bid Auction in the Coercive Environment
Jaydeep Howlader, Sanjit Kumar Roy, Ashis Kumar Mal
2014/188
A Second Look at Fischlin's Transformation
Özgür Dagdelen, Daniele Venturi
2014/187
FFT-Based Key Recovery for the Integral Attack
Yosuke Todo
2014/186
AES-Based Authenticated Encryption Modes in Parallel High-Performance Software
Andrey Bogdanov, Martin M. Lauridsen, Elmar Tischhauser
2014/185
Oblivious Data Structures
Xiao Shaun Wang, Kartik Nayak, Chang Liu, T-H. Hubert Chan, Elaine Shi, Emil Stefanov, Yan Huang
2014/184
SETUP in Secret Sharing Schemes using Random Values
Ruxandra F. Olimid
2014/183
Impact of ANSI X9.24-1:2009 Key Check Value on ISO/IEC 9797-1:2011 MACs
Tetsu Iwata, Lei Wang
2014/182
Proving the TLS Handshake Secure (as it is)
Karthikeyan Bhargavan, Cédric Fournet, Markulf Kohlweiss, Alfredo Pironti, Pierre-Yves Strub, Santiago Zanella-Béguelin
2014/181
A Framework and Compact Constructions for Non-monotonic Attribute-Based Encryption
Shota Yamada, Nuttapong Attrapadung, Goichiro Hanaoka, Noboru Kunihiro
2014/180
Improving throughput of RC4 algorithm using multithreading techniques in multicore processors
T. D. B Weerasinghe
2014/179
Optimal constructions for ID-based one-way-function key predistribution schemes realizing specified communication graphs
Maura B. Paterson, Douglas R. Stinson
2014/178
Verifiable Delegated Set Intersection Operations on Outsourced Encrypted Data
Qingji Zheng, Shouhuai Xu
2014/177
Pragmatism vs. Elegance: comparing two approaches to Simple Power Attacks on AES
Valentina Banciu, Elisabeth Oswald
2014/176
One-Round Witness Indistinguishability from Indistinguishability Obfuscation
Qihua Niu, Hongda Li, Bei Liang, Fei Tang
2014/175
Secrecy and Performance Analysis of Symmetric Key Encryption Algorithms
T. D. B Weerasinghe
2014/174
Analysis of a Modified RC4 Algorithm
T. D. B Weerasinghe
2014/173
Continuous Non-malleable Codes
Sebastian Faust, Pratyay Mukherjee, Jesper Buus Nielsen, Daniele Venturi
2014/172
A novel PUF Scheme
Jeroen Delvaux
2014/171
An Effective RC4 Stream Cipher
T. D. B Weerasinghe
2014/170
Parallelized hashing via j-lanes and j-pointers tree modes, with applications to SHA-256
Shay Gueron
2014/169
Encryption Quality Analysis of the RCBC Block Cipher Compared with RC6 and RC5 Algorithms
Abdul Hamid M. Ragab, Osama S. Farag Alla, Amin Y. Noaman
2014/168
Privacy Failures in Encrypted Messaging Services: Apple iMessage and Beyond
Scott Coull, Kevin Dyer
2014/167
How to Eat Your Entropy and Have it Too -- Optimal Recovery Strategies for Compromised RNGs
Yevgeniy Dodis, Adi Shamir, Noah Stephens-Davidowitz, Daniel Wichs
2014/166
Tuple decoders for traitor tracing schemes
Jan-Jaap Oosterwijk, Jeroen Doumen, Thijs Laarhoven
2014/165
A NEW SCALAR POINT MULTIPLICATION SCHEME IN ECC BASED ON ZECKENDORF REPRESENTATION AND MULTIBASE CONCEPT
Kirti Chawla, Om Pal Yadav
2014/164
Generalized proper matrices and constructing of $m$-resilient Boolean functions with maximal nonlinearity for expanded range of parameters
Yuriy Tarannikov
2014/163
Improved Secure Implementation of Code-Based Signature Schemes on Embedded Devices
Arnaud Dambra, Philippe Gaborit, Mylène Roussellet, Julien Schrek, Nicolas Tafforeau
2014/162
TOWARD CERTIFICATELESS SIGNCRYPTION SCHEME WITHOUT RANDOM ORACLES
Hu Xiong
2014/161
``Ooh Aah... Just a Little Bit'' : A small amount of side channel can go a long way
Naomi Benger, Joop van de Pol, Nigel P. Smart, Yuval Yarom
2014/160
TrueSet: Faster Verifiable Set Computations
Ahmed E. Kosba, Dimitrios Papadopoulos, Charalampos Papamanthou, Mahmoud F. Sayed, Elaine Shi, Nikos Triandopoulos
2014/159
Weak-Key Leakage Resilient Cryptography
Zuoxia Yu, Qiuliang Xu, Yongbin Zhou, Chengyu Hu, Rupeng Yang, Guangjun Fan
2014/158
Point compression for the trace zero subgroup over a small degree extension field
Elisa Gorla, Maike Massierer
2014/157
CLOC: Authenticated Encryption for Short Input
Tetsu Iwata, Kazuhiko Minematsu, Jian Guo, Sumio Morioka
2014/156
Non-Malleable Extractors with Shorter Seeds and Their Applications
Yanqing Yao, Zhoujun Li
2014/155
Honey Encryption: Security Beyond the Brute-Force Bound
Ari Juels, Thomas Ristenpart
2014/154
Non-Interactive Cryptography in the RAM Model of Computation
Daniel Apon, Xiong Fan, Jonathan Katz, Feng-Hao Liu, Elaine Shi, Hong-Sheng Zhou
2014/153
Verifiable Oblivious Storage
Daniel Apon, Jonathan Katz, Elaine Shi, Aishwarya Thiruvengadam
2014/152
A Statistics-based Fundamental Model for Side-channel Attack Analysis
Yunsi Fei, A. Adam Ding, Jian Lao, Liwei Zhang
2014/151
Security Analysis of Key-Alternating Feistel Ciphers
Rodolphe Lampe, Yannick Seurin
2014/150
On the Effective Prevention of TLS Man-In-The-Middle Attacks in Web Applications
Nikolaos Karapanos, Srdjan Capkun
2014/149
Millions of Millionaires: Multiparty Computation in Large Networks
Mahdi Zamani, Mahnush Movahedi, Jared Saia
2014/148
Outsourcing Private RAM Computation
Craig Gentry, Shai Halevi, Mariana Raykova, Daniel Wichs
2014/147
The Multiple Number Field Sieve for Medium and High Characteristic > Finite Fields
Razvan Barbulescu, Cécile Pierrot
2014/146
Untappable communication channels over optical fibers from quantum-optical noise
Geraldo A. Barbosa, Jeroen van de Graaf
2014/145
Calculating Cryptographic Degree of an S-Box
Prasanna Raghaw Mishra
2014/144
How to Securely Release Unverified Plaintext in Authenticated Encryption
Elena Andreeva, Andrey Bogdanov, Atul Luykx, Bart Mennink, Nicky Mouha, Kan Yasuda
2014/143
Statistical Concurrent Non-Malleable Zero Knowledge
Claudio Orlandi, Rafail Ostrovsky, Vanishree Rao, Amit Sahai, Ivan Visconti
2014/142
FPGA-Based High Performance AES-GCM Using Efficient Karatsuba Ofman Algorithm
Karim M. Abdellatif, R. Chotin-Avot, H. Mehrez
2014/141
Unrestricted Identity-Based Aggregate Signcryption in the Standard Model from Multilinear Maps
Hao Wang
2014/140
Recovering OpenSSL ECDSA Nonces Using the FLUSH+RELOAD Cache Side-channel Attack
Yuval Yarom, Naomi Benger
2014/139
On the Phase Space of Block-Hiding Strategies
Assaf Shomer
2014/138
Short Signatures from Diffie-Hellman, Revisited: Sublinear Public Key, CMA Security, and Tighter Reduction
Jae Hong Seo
2014/137
Efficient, Oblivious Data Structures for MPC
Marcel Keller, Peter Scholl
2014/136
Isolated Execution on Many-core Architectures
Ramya Jayaram Masti, Devendra Rai, Claudio Marforio, Srdjan Capkun
2014/135
Anonymous Two-Factor Authentication in Distributed Systems: Certain Goals Are Beyond Attainment
Ding Wang, Debiao He, Ping Wang, Chao-Hsien Chu
2014/134
Kummer strikes back: new DH speed records
Daniel J. Bernstein, Chitchanok Chuengsatiansup, Tanja Lange, Peter Schwabe
2014/133
Efficient Secure and Verifiable Outsourcing of Matrix Multiplications
Yihua Zhang, Marina Blanton
2014/132
Efficient Revocable Identity-Based Encryption via Subset Difference Methods
Kwangsu Lee, Dong Hoon Lee, Jong Hwan Park
2014/131
Modelling After-the-fact Leakage for Key Exchange
Janaka Alawatugoda, Douglas Stebila, Colin Boyd
2014/130
Selecting Elliptic Curves for Cryptography: An Efficiency and Security Analysis
Joppe W. Bos, Craig Costello, Patrick Longa, Michael Naehrig
2014/129
How to Use Bitcoin to Design Fair Protocols
Iddo Bentov, Ranjit Kumaresan
2014/128
Efficient Three-Party Computation from Cut-and-Choose
Seung Geol Choi, Jonathan Katz, Alex J. Malozemoff, Vassilis Zikas
2014/127
Algebraic Properties of Modular Addition Modulo a Power of Two
S. M. Dehnavi, Alireza Rahimipour
2014/126
Public-Key Encryption Resilient Against Linear Related-Key Attacks Revisited
Hui Cui, Yi Mu, Man Ho Au
2014/125
Removing Erasures with Explainable Hash Proof Systems
Michel Abdalla, Fabrice Benhamouda, David Pointcheval
2014/124
On the Information Ratio of Non-Perfect Secret Sharing Schemes
Oriol Farràs, Torben Brandt Hansen, Tarik Kaced, Carles Padró
2014/123
FORSAKES: A Forward-Secure Authenticated Key Exchange Protocol Based on Symmetric Key-Evolving Schemes
Mohammad Sadeq Dousti, Rasool Jalili
2014/122
New Way to Construct Cryptographic Hash Function
WANG Yong
2014/121
Oblivious Radix Sort: An Efficient Sorting Algorithm for Practical Secure Multi-party Computation
Koki Hamada, Dai Ikarashi, Koji Chida, Katsumi Takahashi
2014/120
Automated Proof for Authorization Protocols of TPM 2.0 in Computational Model (full version)
Weijin Wang, Yu Qin, Dengguo Feng, Xiaobo Chu
2014/119
Breaking `128-bit Secure' Supersingular Binary Curves (or how to solve discrete logarithms in ${\mathbb F}_{2^{4 \cdot 1223}}$ and ${\mathbb F}_{2^{12 \cdot 367}}$)
Robert Granger, Thorsten Kleinjung, Jens Zumbrägel
2014/118
Quantum position verification in the random oracle model
Dominique Unruh
2014/117
An Applicable Public-Key-Cryptosystem Based on NP-Complete Problems
Bjoern Grohmann
2014/116
Optimal Algebraic Manipulation Detection Codes in the Constant-Error Model
Ronald Cramer, Carles Padrö, Chaoping Xing
2014/115
Comments on a novel user authentication and key agreement scheme
Jia-Lun Tsai
2014/114
Prover Anonymous and Deniable Distance-Bounding Authentication
Sebastien Gambs, Cristina Onete, Jean-Marc Robert
2014/113
Secure Compression: Theory \& Practice
James Kelley, Roberto Tamassia
2014/112
Polynomial Time Attack on Wild McEliece Over Quadratic Extensions
Alain Couvreur, Ayoub Otmani, Jean-Pierre Tillich
2014/111
A Note on the CLRW2 Tweakable Block Cipher Construction
Gordon Procter
2014/110
Halka: A Lightweight, Software Friendly Block Cipher Using Ultra-lightweight 8-bit S-box
Sourav Das
2014/109
Diffusion Programmable Device : The device to prevent reverse engineering
Mitsuru Shiozaki, Ryohei Hori, Takeshi Fujino
2014/108
MJH: A Faster Alternative to MDC-2
Jooyoung Lee, Martijn Stam
2014/107
Key-Indistinguishable Message Authentication Codes
Joel Alwen, Martin Hirt, Ueli Maurer, Arpita Patra, Pavel Raykov
2014/106
Algorithms in HElib
Shai Halevi, Victor Shoup
2014/105
Reducing the Overhead of MPC over a Large Population
Ashish Choudhury, Arpita Patra, Nigel P. Smart
2014/104
Space-efficient, byte-wise incremental and perfectly private encryption schemes
Kévin Atighehchi
2014/103
SHipher: Families of Block Ciphers based on SubSet-Sum Problem
Xiali Hei, Binheng Song
2014/102
Actively Secure Private Function Evaluation
Payman Mohassel, Saeed Sadeghian, Nigel P. Smart
2014/101
Dishonest Majority Multi-Party Computation for Binary Circuits
Enrique Larraia, Emmanuela Orsini, Nigel P. Smart
2014/100
Improved Slender-set Linear Cryptanalysis
Guo-Qiang Liu, Chen-Hui Jin, Chuan-Da Qi
2014/099
Indistinguishability Obfuscation and UCEs: The Case of Computationally Unpredictable Sources
Chris Brzuska, Pooya Farshim, Arno Mittelbach
2014/098
Towards Characterizing Complete Fairness in Secure Two-Party Computation
Gilad Asharov
2014/097
Towards Constructing Fully Homomorphic Encryption without Ciphertext Noise from Group Theory
Koji Nuida
2014/096
Tight security bounds for multiple encryption
Yuanxi Dai, John Steinberger
2014/095
Unified, Minimal and Selectively Randomizable Structure-Preserving Signatures
Masayuki Abe, Jens Groth, Miyako Ohkubo, Mehdi Tibouchi
2014/094
Faster Bootstrapping with Polynomial Error
Jacob Alperin-Sheriff, Chris Peikert
2014/093
The Related-Key Analysis of Feistel Constructions
Manuel Barbosa, Pooya Farshim
2014/092
A new class of system oriented PKC, K(I)SOPKC.
Masao KASAHARA
2014/091
On Cryptographic Applications of Matrices Acting on Finite Commutative Groups and Rings
S. M. Dehnavi, A. Mahmoodi Rishakani, M. R. Mirzaee Shamsabad
2014/090
Cryptanalysis of KLEIN (Full version)
Virginie Lallemand, María Naya-Plasencia
2014/089
Multiple Differential Cryptanalysis of Round-Reduced PRINCE (Full version)
Anne Canteaut, Thomas Fuhr, Henri Gilbert, María Naya-Plasencia, Jean-René Reinhard
2014/088
A Bound For Multiparty Secret Key Agreement And Implications For A Problem Of Secure Computing
Himanshu Tyagi, Shun Watanabe
2014/087
AnoA: A Framework For Analyzing Anonymous Communication Protocols
Michael Backes, Aniket Kate, Praveen Manoharan, Sebastian Meiser, Esfandiar Mohammadi
2014/086
Randomized and Efficient Authentication in Mobile Environments
Wei Jiang, Dan Lin, Feng Li, Elisa Bertino
2014/085
Multipermutations in Crypto World: Different Faces of the Perfect Diffusion Layer
Aleksandra Mileva
2014/084
RECTANGLE: A Bit-slice Lightweight Block Cipher Suitable for Multiple Platforms
Wentao Zhang, Zhenzhen Bao, Dongdai Lin, Vincent Rijmen, Bohan Yang, Ingrid Verbauwhede
2014/083
Garbled RAM Revisited, Part II
Steve Lu, Rafail Ostrovsky
2014/082
Garbled RAM Revisited, Part I
Craig Gentry, Shai Halevi, Mariana Raykova, Daniel Wichs
2014/081
Efficient Round Optimal Blind Signatures
Sanjam Garg, Divya Gupta
2014/080
A Full Characterization of Completeness for Two-party Randomized Function Evaluation
Daniel Kraschewski, Hemanta K. Maji, Manoj Prabhakaran, Amit Sahai
2014/079
Unifying Leakage Models: from Probing Attacks to Noisy Leakage
Alexandre Duc, Stefan Dziembowski, Sebastian Faust
2014/078
Implementation and Comparison of Lattice-based Identification Protocols on Smart Cards and Microcontrollers
Ahmad Boorghany, Rasool Jalili
2014/077
Mixcoin: Anonymity for Bitcoin with accountable mixes
Joseph Bonneau, Arvind Narayanan, Andrew Miller, Jeremy Clark, Joshua A. Kroll, Edward W. Felten
2014/076
Certified Bitcoins
Giuseppe Ateniese, Antonio Faonio, Bernardo Magri, Breno de Medeiros
2014/075
Publicly Auditable Secure Multi-Party Computation
Carsten Baum, Ivan Damgård, Claudio Orlandi
2014/074
New and Improved Key-Homomorphic Pseudorandom Functions
Abhishek Banerjee, Chris Peikert
2014/073
Anonymous Authentication with Shared Secrets
Joel Alwen, Martin Hirt, Ueli Maurer, Arpita Patra, Pavel Raykov
2014/072
Efficient Privacy-Preserving Big Data Processing through Proxy-Assisted ORAM
Nikolaos P. Karvelas, Andreas Peter, Stefan Katzenbeisser, Sebastian Biedermann
2014/071
Implementing Pairing-Based Cryptosystems in USB Tokens
Zhaohui Cheng
2014/070
Lattice Cryptography for the Internet
Chris Peikert
2014/069
One-Pass Authenticated Key Establishment Protocol on Bilinear Pairings for Wireless Sensor Networks
Manoj Ranjan Mishra, Jayaprakash Kar, Banshidhar Majhi
2014/068
Some security bounds for the DGHV scheme
Franca Marinelli, Riccardo Aragona, Chiara Marcolla, Massimiliano Sala
2014/067
Efficient and Strongly Secure Dynamic Domain-Specific Pseudonymous Signatures for ID Documents
Julien Bringer, Hervé Chabanne, Roch Lescuyer, Alain Patey
2014/066
A Subexponential Construction of Graph Coloring for Multiparty Computation
Hassan Jameel Asghar, Yvo Desmedt, Josef Pieprzyk, Ron Steinfeld
2014/065
Fine Tuning the Function Field Sieve Algorithm for the Medium Prime Case
Palash Sarkar, Shashank Singh
2014/064
A Polynomial Time Attack against Algebraic Geometry Code Based Public Key Cryptosystems
Alain Couvreur, Irene Márquez-Corbella, Ruud Pellikaan
2014/063
Cryptanalysis on “Secure untraceable off-line electronic cash system”
Yalin Chen, Jue-Sam Chou
2014/062
A Comparison of the Homomorphic Encryption Schemes FV and YASHE
Tancrède Lepoint, Michael Naehrig
2014/061
Bounded-Collusion Identity-Based Encryption from Semantically-Secure Public-Key Encryption: Generic Constructions with Short Ciphertexts
Stefano Tessaro, David A. Wilson
2014/060
Verifiable Computation in Multiparty Protocols with Honest Majority
Peeter Laud, Alisa Pankova
2014/059
Cuckoo Cycle: a memory bound graph-theoretic proof-of-work
John Tromp
2014/058
Cryptanalysis of FIDES
Itai Dinur, Jérémy Jean
2014/057
Computing Discrete Logarithms in F_{3^{6*137}} and F_{3^{6*163}} using Magma
Gora Adj, Alfred Menezes, Thomaz Oliveira, Francisco Rodríguez-Henríquez
2014/056
Low Probability Differentials and the Cryptanalysis of Full-Round CLEFIA-128
Sareh Emami, San Ling, Ivica Nikolic, Josef Pieprzyk, Huaxiong Wang
2014/055
Security Enhanced Anonymous Multi-Server Authenticated Key Agreement Scheme using Smart Card and Biometrics
Younsung Choi
2014/054
The Fourier Entropy-Influence conjecture holds for a log-density 1 class of cryptographic Boolean functions
Sugata Gangopadhyay, Pantelimon Stanica
2014/053
Masking and Leakage-Resilient Primitives: One, the Other(s) or Both?
Sonia Belaïd, Vincent Grosso, François-Xavier Standaert
2014/052
DAA-related APIs in TPM2.0 Revisited
Li Xi
2014/051
An Equivalence-Preserving Transformation of Shift Registers
Elena Dubrova
2014/050
Some Theoretical Conditions for Menezes--Qu--Vanstone Key Agreement to Provide Implicit Key Authentication
Daniel R. L. Brown
2014/049
Data Security in Cloud Architecture Based on Diffie Hellman and Elliptical Curve Cryptography
Neha tirthani, Ganesan R
2014/048
When a Boolean Function can be Expressed as the Sum of two Bent Functions
Longjiang Qu, Shaojing Fu, Qingping Dai, Chao Li
2014/047
Down the Rabbit Hole: Revisiting the Shrinking Method
Vivien Dubois
2014/046
Crypto-analyses on “user efficient recoverable off-line e-cashs scheme with fast anonymity revoking”
Yalin Chen, Jue-Sam Chou
2014/045
Human Assisted Randomness Generation Using Video Games
Mohsen Alimomeni, Reihaneh Safavi-Naini
2014/044
rPIR: Ramp Secret Sharing based Communication Efficient Private Information Retrieval
Lichun Li, Michael Militzer, Anwitaman Datta
2014/043
Elligator Squared: Uniform Points on Elliptic Curves of Prime Order as Uniform Random Strings
Mehdi Tibouchi
2014/042
A New Algorithm for Solving the General Approximate Common Divisors Problem and Cryptanalysis of the FHE Based on the GACD problem
Jintai Ding, Chengdong Tao
2014/041
Cryptanalysis via algebraic spans
Adi Ben-Zvi, Arkadius Kalka, Boaz Tsaban
2014/040
A Fast Modular Reduction Method
Zhengjun Cao, Ruizhong Wei, Xiaodong Lin
2014/039
Homomorphic AES Evaluation using NTRU
Yarkin Doroz, Yin Hu, Berk Sunar
2014/038
Extending and Applying a Framework for the Cryptographic Verification of Java Programs.
Ralf Kuesters, Enrico Scapin, Tomasz Truderung, Juergen Graf
2014/037
On the Security of the Pre-Shared Key Ciphersuites of TLS
Yong Li, Sven Schäge, Zheng Yang, Florian Kohlar, Jörg Schwenk
2014/036
A Secure Text Messaging Protocol
Gary Belvin
2014/035
A new attack on RSA with a composed decryption exponent
Abderrahmane Nitaj, Mohamed Ould Douh
2014/034
Authenticated Encryption with SPECK
Chase Manny
2014/033
Lattice-based Group Signature Scheme with Verier-local Revocation
Adeline Langlois, San Ling, Khoa Nguyen, Huaxiong Wang
2014/032
Scale-Invariant Fully Homomorphic Encryption over the Integers
Jean-Sébastien Coron, Tancrède Lepoint, Mehdi Tibouchi
2014/031
On the Design of LIL Tests for (Pseudo) Random Generators and Some Experimental Results
Yongge Wang
2014/030
Lyra: Password-Based Key Derivation with Tunable Memory and Processing Costs
Leonardo C. Almeida, Ewerton R. Andrade, Paulo S. L. M. Barreto, Marcos A. Simplicio Jr.
2014/029
General Impossibility of Group Homomorphic Encryption in the Quantum World
Frederik Armknecht, Tommaso Gagliardoni, Stefan Katzenbeisser, Andreas Peter
2014/028
Channel Equalization for Side Channel Attacks
Colin O'Flynn, Zhizhang (David) Chen
2014/027
Twisting Edwards curves with isogenies
Mike Hamburg
2014/026
Studying Potential Side Channel Leakages on an Embedded Biometric Comparison System
Maël Berthier, Yves Bocktaels, Julien Bringer, Hervé Chabanne, Taoufik Chouta, Jean-Luc Danger, Mélanie Favre, Tarik Graba
2014/025
Side-Channel Leakage through Static Power – Should We Care about in Practice? –
Amir Moradi
2014/024
An Efficient Pseudo-Random Generator with Applications to Public-Key Encryption and Constant-Round Multiparty Computation
Ivan Damgård, Jesper Buus Nielsen
2014/023
Solving Random Subset Sum Problem by $l_{p}$-norm SVP Oracle
Gengran Hu, Yanbin Pan, Feng Zhang
2014/022
Ultra-lightweight 8-bit Multiplicative Inverse Based S-box Using LFSR
Sourav Das
2014/021
Online/Offline Attribute-Based Encryption
Susan Hohenberger, Brent Waters
2014/020
(De-)Constructing TLS
Markulf Kohlweiss, Ueli Maurer, Cristina Onete, Bjoern Tackmann, Daniele Venturi
2014/019
Lazy Modulus Switching for the BKW Algorithm on LWE
Martin R. Albrecht, Jean-Charles Faugère, Robert Fitzpatrick, Ludovic Perret
2014/018
Completeness for Symmetric Two-Party Functionalities - Revisited
Yehuda Lindell, Eran Omri, Hila Zarosim
2014/017
Two-round password-only authenticated key exchange in the three-party setting
Junghyun Nam, Kim-Kwang Raymond Choo, Juryon Paik, Dongho Won
2014/016
Triple and Quadruple Encryption: Bridging the Gaps
Bart Mennink, Bart Preneel
2014/015
Tight Security Bounds for Triple Encryption
Jooyoung Lee
2014/014
Linkable Message Tagging: Solving the Key Distribution Problem of Signature Schemes
Felix Günther, Bertram Poettering
2014/013
A Novel Modular Adder for One Thousand Bits and More Using Fast Carry Chains of Modern FPGAs
Marcin Rogawski, Kris Gaj, Ekawat Homsirikamol
2014/012
Maximal Information Coefficient Analysis
Yanis Linge, Cecile Dumas, Sophie Lambert-Lacroix
2014/011
Construction of New Families of ‎MDS‎ Diffusion Layers
S. M. Dehnavi, A. Mahmoodi Rishakani, M. R. Mirzaee Shamsabad, Hamidreza Maimani, Einollah Pasha
2014/010
A Certificate-Based Proxy Signature with Message Recovery without Bilinear Pairing
Ali Mahmoodi, Javad Mohajeri, Mahmoud Salmasizadeh
2014/009
Characterization of EME with Linear Mixing
Nilanjan Datta, Mridul Nandi
2014/008
A Theoretical Study of Kolmogorov-Smirnov Distinguishers, Side-Channel Analysis vs. Differential Cryptanalysis
Annelie Heuser, Olivier Rioul, Sylvain Guilley
2014/007
One Weird Trick to Stop Selfish Miners: Fresh Bitcoins, A Solution for the Honest Miner.
Ethan Heilman
2014/006
Efficient Non-Interactive Zero Knowledge Arguments for Set Operations
Prastudy Fauzi, Helger Lipmaa, Bingsheng Zhang
2014/005
The analysis of the Keccak with the new method called parity
Ghanei yakhdan. mostafa
2014/004
MaxMinMax problem and sparse equations over finite fields
Igor Semaev
2014/003
$GF(2^n)$ Bit-Parallel Squarer Using Generalized Polynomial Basis For a New Class of Irreducible Pentanomials
Xi Xiong, Haining Fan
2014/002
Pseudorandom Generator Based on Hard Lattice Problem
Kuan Cheng
2014/001
Comments on: EIBAS - an efficient identity broadcast authentication scheme in wireless sensor networks
Yalin Chen, Jue-Sam Chou
2013/882
New Speed Records for Montgomery Modular Multiplication on 8-bit AVR Microcontrollers
Zhe Liu, Johann Großschädl
2013/881
Accelerating Bitcoin's Transaction Processing. Fast Money Grows on Trees, Not Chains
Yonatan Sompolinsky, Aviv Zohar
2013/880
New Constructions of Revocable Identity-Based Encryption from Multilinear Maps
Seunghwan Park, Kwangsu Lee, Dong Hoon Lee
2013/879
Succinct Non-Interactive Zero Knowledge for a von Neumann Architecture
Eli Ben-Sasson, Alessandro Chiesa, Eran Tromer, Madars Virza
2013/878
Efficient Hardware Implementation of MQ Asymmetric Cipher PMI+ on FPGAs
Shaohua Tang, Bo Lv, Guomin Chen, Zhiniang Peng
2013/877
MQ Signature and Proxy Signature Schemes with Exact Security Based on UOV Signature
Shaohua Tang, Jiahui Chen, Lingling Xu, Xiaoyu Li
2013/876
Public-Key Encryption with Lazy Parties
Kenji Yasunaga
2013/875
Policy-Based Non-interactive Outsourcing of Computation using multikey FHE and CP-ABE
Michael Clear, Ciaran McGoldrick
2013/874
General Constructions of Rational Secret Sharing with Expected Constant-Round Reconstruction
Akinori Kawachi, Yoshio Okamoto, Keisuke Tanaka, Kenji Yasunaga
2013/873
Poly-Many Hardcore Bits for Any One-Way Function and a Framework for Differing-Inputs Obfuscation
Mihir Bellare, Igors Stepanovs, Stefano Tessaro
2013/872
--Withdrawn--
Xu An Wang, Yunlong Ge, Xiaoyuan Yang
2013/871
A Unified Security Model of Authenticated Key Exchange with Specific Adversarial Capabilities
Weiqiang Wen, Libin Wang, Jiaxin Pan
2013/870
A new class of hyper-bent functions and Kloosterman sums
Chunming Tang, Yanfeng Qi
2013/869
How to Fake Auxiliary Input
Dimitar Jetchev, Krzysztof Pietrzak
2013/868
Theoretical Bitcoin Attacks with less than Half of the Computational Power (draft)
Lear Bahack
2013/867
LHash: A Lightweight Hash Function (Full Version)
Wenling Wu, Shuang Wu, Lei Zhang, Jian Zou, Le Dong
2013/866
Compact Ring-LWE based Cryptoprocessor
Sujoy Sinha Roy, Frederik Vercauteren, Nele Mentens, Donald Donglong Chen, Ingrid Verbauwhede
2013/865
SNR to Success Rate: Reaching the Limit of Non-Profiling DPA
Suvadeep Hajra, Debdeep Mukhopadhyay
2013/864
Near-linear time, Leakage-resilient Key Evolution Schemes from Expander Graphs
Adam Smith, Ye Zhang
2013/863
Formal Treatment of Distributed Trust in Electronic Voting
Stephan Neumann, Melanie Volkamer
2013/862
How to Delegate Computations: The Power of No-Signaling Proofs
Yael Tauman Kalai, Ran Raz, Ron D. Rothblum
2013/861
Privacy Preserving Enforcement of Sensitive Policies in Outsourced and Distributed Environments
Muhammad Rizwan Asghar
2013/860
On the Implausibility of Differing-Inputs Obfuscation and Extractable Witness Encryption with Auxiliary Input
Sanjam Garg, Craig Gentry, Shai Halevi, Daniel Wichs
2013/859
Using the Joint Distributions of a Cryptographic Function in Side Channel Analysis
Yanis Linge, Cecile Dumas, Sophie Lambert-Lacroix
2013/858
Practical Dual-Receiver Encryption---Soundness, Complete Non-Malleability, and Applications
Sherman S. M. Chow, Matthew Franklin, Haibin Zhang
2013/857
RSA Key Extraction via Low-Bandwidth Acoustic Cryptanalysis
Daniel Genkin, Adi Shamir, Eran Tromer
2013/856
Tightly-Secure Signatures From Lossy Identification Schemes
Michel Abdalla, Pierre-Alain Fouque, Vadim Lyubashevsky, Mehdi Tibouchi
2013/855
Weaknesses in a Recently Proposed RFID Authentication Protocol
Mete Akgün, M. Ufuk Çaǧlayan
2013/854
Multiple-Use Transferable E-Cash
Pratik Sarkar
2013/853
Automatic Search for Differential Trails in ARX Ciphers (Extended Version)
Alex Biryukov, Vesselin Velichkov
2013/852
Improved Boomerang Attacks on Round-Reduced SM3 and BLAKE-256
Dongxia Bai, Hongbo Yu, Gaoli Wang, Xiaoyun Wang
2013/851
Power and Timing Side Channels for PUFs and their Efficient Exploitation
Ulrich Rührmair, Xiaolin Xu, Jan Sölter, Ahmed Mahmoud, Farinaz Koushanfar, Wayne Burleson
2013/850
Secure Floating-Point Arithmetic and Private Satellite Collision Analysis
Liina Kamm, Jan Willemson
2013/849
Pushing the Limit of Non-Profiling DPA using Multivariate Leakage Model
Suvadeep Hajra, Debdeep Mukhopadhyay
2013/848
Weakness of Several Identity-based Tripartite Authenticated Key Agreement Protocols
Xi-Jun Lin, Lin Sun
2013/847
Ultralightweight cryptography for passive RFID system
Umar Mujahid, M. Najam-ul-islam, Jameel Ahmed
2013/846
A new attack on RSA with a composed decryption exponent
Abderrahmane Nitaj, Mohamed Ould Douh
2013/845
How to Keep a Secret: Leakage Deterring Public-key Cryptography
Aggelos Kiayias, Qiang Tang
2013/844
A generic view on trace-and-revoke broadcast encryption schemes
Dennis Hofheinz, Christoph Striecks
2013/843
A Study of Goldbach's conjecture and Polignac's conjecture equivalence issues
Jian Ye, Chenglian Liu
2013/842
Detecting Hidden Leakages
Amir Moradi, Sylvain Guilley, Annelie Heuser
2013/841
Trust Views for the Web PKI
Johannes Braun, Florian Volk, Johannes Buchmann, Max Mühlhäuser
2013/840
(Efficient) Universally Composable Oblivious Transfer Using a Minimal Number of Stateless Tokens
Seung Geol Choi, Jonathan Katz, Dominique Schröder, Arkady Yerukhimovich, Hong Sheng Zhou
2013/839
Lattice Decoding Attacks on Binary LWE
Shi Bai, Steven D. Galbraith
2013/838
An improved compression technique for signatures based on learning with errors
Shi Bai, Steven D. Galbraith
2013/837
Fair Two-Party Computations via Bitcoin Deposits
Marcin Andrychowicz, Stefan Dziembowski, Daniel Malinowski, Łukasz Mazurek
2013/836
Identity-Based Key-Encapsulation Mechanism from Multilinear Maps
Hao Wang, Lei Wu, Zhihua Zheng, Yilei Wang
2013/835
A Modular Framework for Building Variable-Input Length Tweakable Ciphers
Thomas Shrimpton, R. Seth Terashima
2013/834
Keyless Signatures' Infrastructure: How to Build Global Distributed Hash-Trees
Ahto Buldas, Andres Kroonmaa, Risto Laanoja
2013/833
Verifier-Based Password-Authenticated Key Exchange: New Models and Constructions
Fabrice Benhamouda, David Pointcheval
2013/832
Practical Dynamic Searchable Encryption with Small Leakage
Emil Stefanov, Charalampos Papamanthou, Elaine Shi
2013/831
Provable Security Proofs and their Interpretation in the Real World
Vikram Singh
2013/830
Property Preserving Symmetric Encryption Revisited
Sanjit Chatterjee, M. Prem Laxman Das
2013/829
Is Bitcoin a Decentralized Currency?
Arthur Gervais, Ghassan Karame, Srdjan Capkun, Vedran Capkun
2013/828
Decentralized Traceable Attribute-Based Signatures
Ali El Kaafarani, Essam Ghadafi, Dalia Khader
2013/827
Lower Bounds in the Hardware Token Model
Shashank Agrawal, Prabhanjan Ananth, Vipul Goyal, Manoj Prabhakaran, Alon Rosen
2013/826
Secure multi-party data analysis: end user validation and practical experiments
Dan Bogdanov, Liina Kamm, Sven Laur, Pille Pruulmann-Vengerfeldt
2013/825
EPCGen2 Pseudorandom Number Generators: Analysis of J3Gen
Alberto Peinado, Jorge Munilla, Amparo Fúster
2013/824
Fair and Efficient Secure Multiparty Computation with Reputation Systems
Gilad Asharov, Yehuda Lindell, Hila Zarosim
2013/823
Another Look at XCB
Debrup Chakraborty, Vicente Hernandez-Jimenez, Palash Sarkar
2013/822
Leakage Resilient Fully Homomorphic Encryption
Alexandra Berkoff, Feng-Hao Liu
2013/821
Exact Smooth Projective Hash Function based on LWE
Olivier Blazy, Céline Chevalier, Léo Ducas, Jiaxin Pan
2013/820
On the Security of Recently Proposed RFID Protocols
Mete Akgün, M. Ufuk Çaǧlayan
2013/819
Safe enclosures: towards cryptographic techniques for server protection
Sergiu Bursuc, Julian P. Murphy
2013/818
On the Relation of Random Grid, Probabilistic and Deterministic Visual Cryptography
Roberto De Prisco, Alfredo De Santis
2013/817
Interactive Encryption and Message Authentication
Yevgeniy Dodis, Dario Fiore
2013/816
Fast Prime Field Elliptic Curve Cryptography with 256 Bit Primes
Shay Gueron, Vlad Krasnov
2013/815
Iterated group products and leakage resilience against NC^1
Eric Miles
2013/814
RDAS: A Symmetric Key Scheme for Authenticated Query Processing in Outsourced Databases
Lil Maria Rodriguez-Henriquez, Debrup Chakraborty
2013/813
Multi-ciphersuite security of the Secure Shell (SSH) protocol
Florian Bergsma, Benjamin Dowling, Florian Kohlar, Jörg Schwenk, Douglas Stebila
2013/812
A Note on Bilinear Groups of a Large Composite Order
Zhengjun Cao, Lihua Liu
2013/811
Constant-Round Black-Box Construction of Composable Multi-Party Computation Protocol
Susumu Kiyoshima, Yoshifumi Manabe, Tatsuaki Okamoto
2013/810
Formal Analysis of CRT-RSA Vigilant's Countermeasure Against the BellCoRe Attack
Pablo Rauzy, Sylvain Guilley
2013/809
Riding the Saddle Point: asymptotics of the capacity-achieving simple decoder for bias-based traitor tracing
Sarah Ibrahimi, Boris Skoric, Jan-Jaap Oosterwijk
2013/808
Secrecy without Perfect Randomness: Cryptography with (Bounded) Weak Sources
Michael Backes, Aniket Kate, Sebastian Meiser, Tim Ruffing
2013/807
Distributed Key Generation for Secure Encrypted Deduplication
Yitao Duan
2013/806
Efficient (Anonymous) Compact HIBE From Standard Assumptions
Somindu C. Ramanna, Palash Sarkar
2013/805
Proofs of Space: When Space is of the Essence
Giuseppe Ateniese, Ilario Bonacina, Antonio Faonio, Nicola Galesi
2013/804
Group Signature with relaxed-privacy and revocability for VANET
Mohammad Saiful Islam Mamun, Atsuko Miyaji
2013/803
Fully, (Almost) Tightly Secure IBE from Standard Assumptions
Jie Chen, Hoeteck Wee
2013/802
Cryptosystems Resilient to Both Continual Key Leakages and Leakages from Hash Functions
Guangjun Fan, Yongbin Zhou, Chengyu Hu, Dengguo Feng
2013/801
Authenticating Computation on Groups: New Homomorphic Primitives and Applications
Dario Catalano, Antonio Marcedone, Orazio Puglisi
2013/800
Algebraic Properties of the Cube Attack
Frank-M. Quedenfeld, Christopher Wolf
2013/799
New Insight into the Isomorphism of Polynomials problem IP1S and its Use in Cryptography
Gilles Macario-Rat, Jérôme Plût, Henri Gilbert
2013/798
A Generic Chosen-Ciphertext Key-Leakage Secure Public Key Encryption Scheme from Hash Proof System
Rupeng Yang, Qiuliang Xu, Yongbin Zhou, Chengyu Hu, Zuoxia Yu
2013/797
Tamper Resilient Circuits: The Adversary at the Gates
Aggelos Kiayias, Yiannis Tselekounis
2013/796
Proofs of Space
Stefan Dziembowski, Sebastian Faust, Vladimir Kolmogorov, Krzysztof Pietrzak
2013/795
Insecurity of An Anonymous Authentication For Privacy-preserving IoT Target-driven Applications
Xi-Jun Lin, Lin Sun
2013/794
Behind the Scene of Side Channel Attacks
Victor Lomné, Emmanuel Prouff, Thomas Roche
2013/793
A fast integer-based batch full-homomorphic encryption scheme over finite field
Long Zhang, Qiuling Yue
2013/792
Improved Authenticity Bound of EAX, and Refinements
Kazuhiko Minematsu, Stefan Lucks, Tetsu Iwata
2013/791
APE: Authenticated Permutation-Based Encryption for Lightweight Cryptography
Elena Andreeva, Begül Bilgin, Andrey Bogdanov, Atul Luykx, Bart Mennink, Nicky Mouha, Kan Yasuda
2013/790
Parallelizable and Authenticated Online Ciphers
Elena Andreeva, Andrey Bogdanov, Atul Luykx, Bart Mennink, Elmar Tischhauser, Kan Yasuda
2013/789
Proofs of Data Possession and Retrievability Based on MRD Codes
Shuai Han, Shengli Liu, Kefei Chen, Dawu Gu
2013/788
Improvement of Lin-Tzeng Solution to Yao's Millionaires Problem and Its Cheating Advantage Analysis
Zhengjun Cao, Lihua Liu
2013/787
Wide-weak Privacy Preserving RFID Mutual Authentication Protocol
Raghuvir Songhela, Manik Lal Das
2013/786
Tree Based Symmetric Key Broadcast Encryption
Sanjay Bhattacherjee, Palash Sarkar
2013/785
Efficient Leakage-Resilient Signature Schemes in the Generic Bilinear Group Model
Fei Tang, Hongda Li, Qihua Niu, Bei Liang
2013/784
Secure Multiparty Computations on Bitcoin
Marcin Andrychowicz, Stefan Dziembowski, Daniel Malinowski, Łukasz Mazurek
2013/783
ECC-Based Non-Interactive Deniable Authentication with Designated Verifier
Yalin Chen, Jue-Sam Chou
2013/782
How Did Dread Pirate Roberts Acquire and Protect His Bitcoin Wealth?
Dorit Ron, Adi Shamir
2013/781
Indistinguishability Obfuscation from Semantically-Secure Multilinear Encodings
Rafael Pass, Karn Seth, Sidharth Telang
2013/780
A Distinguish attack on Rabbit Stream Cipher Based on Multiple Cube Tester
Nasser Ramazani Darmian
2013/779
Distributed Group Authentication for RFID Supply Management
Mike Burmester, Jorge Munilla
2013/778
Multi-Stage Fault Attacks on Block Ciphers
Philipp Jovanovic, Martin Kreuzer, Ilia Polian
2013/777
Construction of Multiplicative Monotone Span Program
Yuenai Chen, Chunming Tang
2013/776
Location Leakage in Distance Bounding: Why Location Privacy does not Work
Aikaterini Mitrokotsa, Cristina Onete, Serge Vaudenay
2013/775
Differential Cryptanalysis and Linear Distinguisher of Full-Round Zorro
Yanfeng Wang, Wenling Wu, Zhiyuan Guo, Xiaoli Yu
2013/774
Multi-Input Functional Encryption
S. Dov Gordon, Jonathan Katz, Feng-Hao Liu, Elaine Shi, Hong-Sheng Zhou
2013/773
CBEAM: Efficient Authenticated Encryption from Feebly One-Way $\phi$ Functions
Markku-Juhani O. Saarinen
2013/772
Beyond Modes: Building a Secure Record Protocol from a Cryptographic Sponge Permutation
Markku-Juhani O. Saarinen
2013/771
TOT, a Fast Multivariate Public Key Cryptosystem with Basic Secure Trapdoor
Wuqiang Shen, Shaohua Tang
2013/770
Efficient Template Attacks
Omar Choudary, Markus G. Kuhn
2013/769
Broadcast Amplification
Martin Hirt, Ueli Maurer, Pavel Raykov
2013/768
VMPC-R Cryptographically Secure Pseudo-Random Number Generator Alternative to RC4
Bartosz Zoltak
2013/767
Misuse Resistant Parallel Authenticated Encryptions
Nilanjan Datta, Mridul Nandi
2013/766
RankSign : an efficient signature algorithm based on the rank metric
P. Gaborit, O. Ruatta, J. Schrek, G. Zémor
2013/765
Kurosawa-Desmedt Key Encapsulation Mechanism, Revisited and More
Kaoru Kurosawa, Le Trieu Phong
2013/764
Dynamic Countermeasure Against the Zero Power Analysis
Jean-Luc Danger, Sylvain Guilley, Philippe Hoogvorst, Cédric Murdica, David Naccache
2013/763
Predicate- and Attribute-Hiding Inner Product Encryption in a Public Key Setting
Yutaka Kawai, Katsuyuki Takashima
2013/762
Self-Updatable Encryption: Time Constrained Access Control with Hidden Attributes and Better Efficiency
Kwangsu Lee, Seung Geol Choi, Dong Hoon Lee, Jong Hwan Park, Moti Yung
2013/761
Multi-user collisions: Applications to Discrete Logarithm, Even-Mansour and PRINCE
Pierre-Alain Fouque, Antoine Joux, Chrysanthi Mavromati
2013/760
On cross joining de Bruijn sequences
Johannes Mykkeltveit, Janusz Szmidt
2013/759
Vectorization of ChaCha Stream Cipher
Martin Goll, Shay Gueron
2013/758
A Revocable Online-Offline Certificateless Signature Scheme without Pairing
Karthik Abinav, Saikrishna Badrinarayanan, C. Pandu Rangan, S. Sharmila Deva Selvi, S. Sree Vivek, Vivek Krishna Pradhan
2013/757
Practical Signatures from the Partial Fourier Recovery Problem
Jeff Hoffstein, Jill Pipher, John Schanck, Joseph H. Silverman, William Whyte
2013/756
A Meet-in-the-Middle Attack on Round-Reduced mCrypton Using the Differential Enumeration Technique
Yonglin Hao, Dongxia Bai, Leibo Li
2013/755
Improving security and efficiency for multi-authority access control system in cloud storage
Qi Li, Jianfeng Ma, Rui Li, Ximeng Liu, Jinbo Xiong
2013/754
Obfuscation-based Non-black-box Simulation and Four Message Concurrent Zero Knowledge for NP
Omkant Pandey, Manoj Prabhakaran, Amit Sahai
2013/753
Dietary Recommendations for Lightweight Block Ciphers: Power, Energy and Area Analysis of Recently Developed Architectures
Lejla Batina, Amitabh Das, Baris Ege, Elif Bilge Kavun, Nele Mentens, Christof Paar, Ingrid Verbauwhede, Tolga Yalcin
2013/752
On the Power of Rewinding Simulators in Functional Encryption
Angelo De Caro, Vincenzo Iovino
2013/751
Using Hamiltonian Totems as Passwords
Hervé Chabanne, Jean-Michel Cioranesco, Vincent Despiegel, Jean-Christophe Fondeur, David Naccache
2013/750
Fully Deniable Mutual Authentication Protocol Based on RSA Signature
Xi-Jun Lin, Lin Sun
2013/749
Efficient CCA-secure Threshold Public-Key Encryption Scheme
Xi-Jun Lin, Lin Sun
2013/748
Plaintext Recovery Attacks Against WPA/TKIP
Kenneth G. Paterson, Bertram Poettering, Jacob C. N. Schuldt
2013/747
Authenticated Multiple Key Establishment Protocol for Wireless Sensor Networks
Jayaprakash Kar
2013/746
Asymptotically Efficient Lattice-Based Digital Signatures
Vadim Lyubashevsky, Daniele Micciancio
2013/745
Asynchronous MPC with a Strict Honest Majority Using Non-equivocation
Michael Backes, Fabian Bendun, Ashish Choudhury, Aniket Kate
2013/744
Functional Encryption and Property Preserving Encryption: New Definitions and Positive Results
Shashank Agrawal, Shweta Agrawal, Saikrishna Badrinarayanan, Abishek Kumarasubramanian, Manoj Prabhakaran, Amit Sahai
2013/743
Privacy Preserving Unique Statistics in a Smart Grid
Iraklis Leontiadis, Melek Önen, Refik Molva
2013/742
CODING - Stream Cipher Methods by Varying Components during Ciphering Data
Jürgen Müller
2013/741
Fast Software Implementation of Binary Elliptic Curve Cryptography
Manuel Bluhm, Shay Gueron
2013/740
An efficient FHE proposal based on the hardness of solving systems of nonlinear multivariate equations (II)
Gérald Gavin
2013/739
NEW DIGITAL SIGNATURE SCHEME USING MULTIPLE PRIVATE KEYS OVER NON-COMMUTATIVE DIVISION SEMIRINGS
Dr. G. S. G. N. Anjaneyulu, A. Vijayabarathi
2013/738
On the Resilience and Uniqueness of CPA for Secure Broadcast
Chris Litsas, Aris Pagourtzis, Giorgos Panagiotakos, Dimitris Sakavalas
2013/737
Weakness of F_{3^{6*1429}} and F_{2^{4*3041}} for Discrete Logarithm Cryptography
Gora Adj, Alfred Menezes, Thomaz Oliveira, Francisco Rodriguez-Henriquez
2013/736
TRS-80 With A Keccak Sponge Cake
Jean-Marie Chauvet
2013/735
Masking Tables---An Underestimated Security Risk
Michael Tunstall, Carolyn Whitnall, Elisabeth Oswald
2013/734
Elliptic Curve Cryptography in Practice
Joppe W. Bos, J. Alex Halderman, Nadia Heninger, Jonathan Moore, Michael Naehrig, Eric Wustrow
2013/733
A Key Compromise Impersonation attack against Wang's Provably Secure Identity-based Key Agreement Protocol
Maurizio Adriano Strangio
2013/732
SSS-V2: Secure Similarity Search
Hyun-A Park
2013/731
Constructing Differentially 4-uniform Permutations over GF(2^{2k}) from the Inverse Function Revisited
Yongqiang Li, Mingsheng Wang, Yuyin Yu
2013/730
Stamp \& Extend -- Instant but Undeniable Timestamping based on Lazy Trees
Łukasz Krzywiecki, Przemys{\l}aw Kubiak, Miros{\l}aw Kuty{\l}owski
2013/729
Functional Encryption for Randomized Functionalities
Vipul Goyal, Abhishek Jain, Venkata Koppula, Amit Sahai
2013/728
Modified Alternating Step Generators
Robert Wicik, Tomasz Rachwalik
2013/727
Multi-Input Functional Encryption
Shafi Goldwasser, Vipul Goyal, Abhishek Jain, Amit Sahai
2013/726
Homomorphic Authenticated Encryption Secure Against Chosen-Ciphertext Attack
Chihong Joo, Aaram Yun
2013/725
Mobile Transaction over NFC and GSM
Muhammad Qasim Saeed, Pardis Pourghomi
2013/724
Verifiable Set Operations over Outsourced Databases
Ran Canetti, Omer Paneth, Dimitrios Papadopoulos, Nikos Triandopoulos
2013/723
Amplifying Privacy in Privacy Amplification
Divesh Aggarwal, Yevgeniy Dodis, Zahra Jafargholi, Eric Miles, Leonid Reyzin
2013/722
The Realm of the Pairings
Diego F. Aranha, Paulo S. L. M. Barreto, Patrick Longa, Jefferson E. Ricardini
2013/721
Deep Attacks of a Certificateless Signature Scheme
Bo Yang, Zhao Yang, Zibi Xiao, Shougui Li
2013/720
Outsourced Symmetric Private Information Retrieval
Stanislaw Jarecki, Charanjit Jutla, Hugo Krawczyk, Marcel Rosu, Michael Steiner
2013/719
Constructing Confidential Channels from Authenticated Channels---Public-Key Encryption Revisited
Sandro Coretti, Ueli Maurer, Björn Tackmann
2013/718
NTRU-KE: A Lattice-based Public Key Exchange Protocol
Xinyu Lei, Xiaofeng Liao
2013/717
NICV: Normalized Inter-Class Variance for Detection of Side-Channel Leakage
Shivam Bhasin, Jean-Luc Danger, Sylvain Guilley, Zakaria Najm
2013/716
A Secure Obfuscator for Encrypted Blind Signature Functionality
Xiao Feng, Zheng Yuan
2013/715
Practical Forward-Secure Range and Sort Queries with Update-Oblivious Linked Lists
Erik-Oliver Blass, Travis Mayberry, Guevara Noubir
2013/714
Method to secure data in the cloud while preserving summary statistics
Sanchita Barman, Bimal Roy
2013/713
Cryptanalysis of Zorro
Jian Guo, Ivica Nikolic, Thomas Peyrin, Lei Wang
2013/712
PUF-Based RFID Authentication Secure and Private under Memory Leakage
Daisuke Moriyama, Shin'ichiro Matsuo, Moti Yung
2013/711
Ambiguous One-Move Nominative Signature Without Random Oracles
Dennis Y. W. Liu, Duncan S. Wong, Qiong Huang
2013/710
An Approach to Reduce Storage for Homomorphic Computations
Jung Hee Cheon, Jinsu Kim
2013/709
Efficient Statistical Zero-Knowledge Authentication Protocols for Smart Cards Secure Against Active & Concurrent Attacks
Mohammad Sadeq Dousti, Rasool Jalili
2013/708
Key Derivation Without Entropy Waste
Yevgeniy Dodis, Krzysztof Pietrzak, Daniel Wichs
2013/707
A reduction of Semigroup DLP to classic DLP
Matan Banin, Boaz Tsaban
2013/706
How to Certify the Leakage of a Chip?
François Durvaux, François-Xavier Standaert, Nicolas Veyrat-Charvillon
2013/705
Symmetric Digit Sets for Elliptic Curve Scalar Multiplication without Precomputation
Clemens Heuberger, Michela Mazzoli
2013/704
Adaptive Witness Encryption and Asymmetric Password-based Cryptography
Mihir Bellare, Viet Tung Hoang
2013/703
Limits of Extractability Assumptions with Distributional Auxiliary Input
Elette Boyle, Rafael Pass
2013/702
Efficient Non-Malleable Codes and Key-Derivation for Poly-Size Tampering Circuits
Sebastian Faust, Pratyay Mukherjee, Daniele Venturi, Daniel Wichs
2013/701
More on the Impossibility of Virtual-Black-Box Obfuscation with Auxiliary Input
Nir Bitansky, Ran Canetti, Omer Paneth, Alon Rosen
2013/700
Higher Order Masking of Look-up Tables
Jean-Sebastien Coron
2013/699
Bootstrapping Obfuscators via Fast Pseudorandom Functions
Benny Applebaum
2013/698
Cryptanalysis and improvement of a dynamic and secure key management model for hierarchical heterogeneous sensor networks
Xi-Jun Lin, Lin Sun
2013/697
A More Efficient AES Threshold Implementation
Begul Bilgin, Benedikt Gierlichs, Svetla Nikova, Ventzislav Nikov, Vincent Rijmen
2013/696
Examination of a New Defense Mechanism: Honeywords
Ziya Alper Genc, Suleyman Kardas, Mehmet Sabir Kiraz
2013/695
AEGIS: A Fast Authenticated Encryption Algorithm
Hongjun Wu, Bart Preneel
2013/694
Write-Only Oblivious RAM based Privacy-Preserved Access of Outsourced Data
Lichun Li, Anwitaman Datta
2013/693
Secure Key Exchange and Sessions Without Credentials
Ran Canetti, Vladimir Kolesnikov, Charles Rackoff, Yevgeniy Vahlis
2013/692
Faster Compact Diffie-Hellman: Endomorphisms on the x-line
Craig Costello, Huseyin Hisil, Benjamin Smith
2013/691
Non-Malleability from Malleability: Simulation-Sound Quasi-Adaptive NIZK Proofs and CCA2-Secure Encryption from Homomorphic Signatures
Benoit Libert, Thomas Peters, Marc Joye, Moti Yung
2013/690
Obfuscation ==> (IND-CPA Security =/=> Circular Security)
Antonio Marcedone, Claudio Orlandi
2013/689
Differing-Inputs Obfuscation and Applications
Prabhanjan Ananth, Dan Boneh, Sanjam Garg, Amit Sahai, Mark Zhandry
2013/688
Unbalancing Pairing-Based Key Exchange Protocols
Michael Scott
2013/687
How to Compress (Reusable) Garbled Circuits
Craig Gentry, Sergey Gorbunov, Shai Halevi, Vinod Vaikuntanathan, Dhinakaran Vinayagamurthy
2013/686
New abstractions in applied pi-calculus and automated verification of protected executions
Shiwei Xu, Sergiu Bursuc, Julian P. Murphy
2013/685
Solving shortest and closest vector problems: The decomposition approach
Anja Becker, Nicolas Gama, Antoine Joux
2013/684
Fully Bideniable Public-Key Encryption
Marcel Šebek
2013/683
Separations in Circular Security for Arbitrary Length Key Cycles
Venkata Koppula, Kim Ramchen, Brent Waters
2013/682
Secret Key Cryptosystem based on Non-Systematic Polar Codes
Reza Hooshmand, Mohammad Reza Aref, Taraneh Eghlidos
2013/681
Public-Key Encryption with Weak Randomness: Security against Strong Chosen Distribution Attacks
Damien Vergnaud, David Xiao
2013/680
A Black-Box Construction of a CCA2 Encryption Scheme from a Plaintext Aware Encryption Scheme
Dana Dachman-Soled
2013/679
Formal verification of a software countermeasure against instruction skip attacks
Nicolas Moro, Karine Heydemann, Emmanuelle Encrenaz, Bruno Robisson
2013/678
Universally composable privacy preserving finite automata execution with low online and offline complexity
Peeter Laud, Jan Willemson
2013/677
Bounded Tamper Resilience: How to go beyond the Algebraic Barrier
Ivan Damgaard, Sebastian Faust, Pratyay Mukherjee, Daniele Venturi
2013/676
Automatic Security Evaluation and (Related-key) Differential Characteristic Search: Application to SIMON, PRESENT, LBlock, DES(L) and Other Bit-oriented Block Ciphers
Siwei Sun, Lei Hu, Peng Wang, Kexin Qiao, Xiaoshuang Ma, Ling Song
2013/675
A Practical Related-Key Boomerang Attack for the Full MMB Block Cipher
Tomer Ashur, Orr Dunkelman
2013/674
Cryptanalysis of Iterated Even-Mansour Schemes with Two Keys
Itai Dinur, Orr Dunkelman, Nathan Keller, Adi Shamir
2013/673
Traps to the BGJT-Algorithm for Discrete Logarithms
Qi Cheng, Daqing Wan, Jincheng Zhuang
2013/672
Easy scalar decompositions for efficient scalar multiplication on elliptic curves and genus 2 Jacobians
Benjamin Smith
2013/671
Robust Pseudorandom Generators
Yuval Ishai, Eyal Kushilevitz, Xin Li, Rafail Ostrovsky, Manoj Prabhakaran, Amit Sahai, David Zuckerman
2013/670
Switching Lemma for Bilinear Tests and Constant-size NIZK Proofs for Linear Subspaces
Charanjit Jutla, Arnab Roy
2013/669
Attribute-Based Encryption for Arithmetic Circuits
Dan Boneh, Valeria Nikolaenko, Gil Segev
2013/668
Obfuscation for Evasive Functions
Boaz Barak, Nir Bitansky, Ran Canetti, Yael Tauman Kalai, Omer Paneth, Amit Sahai
2013/667
A TPM Diffie-Hellman Oracle
Tolga Acar, Lan Nguyen, Greg Zaverucha
2013/666
An Offline Dictionary Attack against a Three-Party Key Exchange Protocol
Junghyun Nam, Kim-Kwang Raymond Choo, Juryon Paik, Dongho Won
2013/665
The Impossibility of Obfuscation with a Universal Simulator
Henry Cohn, Shafi Goldwasser, Yael Tauman Kalai
2013/664
TUC: Time-sensitive and Modular Analysis of Anonymous Communication
Michael Backes, Praveen Manoharan, Esfandiar Mohammadi
2013/663
Linear Cryptanalysis of Round Reduced SIMON
Javad Alizadeh, Nasour Bagheri, Praveen Gauravaram, Abhishek Kumar, Somitra Kumar Sanadhya
2013/662
Fine-Tuning Groth-Sahai Proofs
Alex Escala, Jens Groth
2013/661
Private aggregation on untrusted servers with customizable thresholds
Constantinos Patsakis, Michael Clear, Paul Laird
2013/660
Discrete Logarithms and Mordell-Weil Groups
Mohammad Sadek
2013/659
A provable secure anonymous proxy signature scheme without random oracles
Rahim Toluee, Maryam Rajabzadeh Asaar, Mahmoud Salmasizadeh
2013/658
Parallel authenticated encryption with the duplex construction
Pawel Morawiecki, Josef Pieprzyk
2013/657
New Trapdoor Projection Maps for Composite-Order Bilinear Groups
Sarah Meiklejohn, Hovav Shacham
2013/656
Bias-based modeling and entropy analysis of PUFs
Robbert van den Berg, Boris Skoric, Vincent van der Leest
2013/655
Privacy-Preserving Multi-Party Reconciliation Secure in the Malicious Model (Extended version)
Georg Neugebauer, Lucas Brutschy, Ulrike Meyer, Susanne Wetzel
2013/654
Leakage-Resilient Chosen-Ciphertext Secure Public-Key Encryption from Hash Proof System and One-Time Lossy Filter
Baodong Qin, Shengli Liu
2013/653
RKA-KDM secure encryption from public-key encryption
Florian Böhl, Gareth T. Davies, Dennis Hofheinz
2013/652
Efficient Modular Arithmetic for SIMD Devices
Wilke Trei
2013/651
A Closer Look at Multiple Forking: Leveraging (In)dependence for a Tighter Bound
Sanjit Chatterjee, Chethan Kamath
2013/650
On Extractability (a.k.a. Differing-Inputs) Obfuscation
Elette Boyle, Kai-Min Chung, Rafael Pass
2013/649
Security Analysis of Password-Authenticated Key Retrieval
SeongHan Shin, Kazukuni Kobara
2013/648
Integral Distinguishers for Reduced-round Stribog
Riham AlTawy, Amr M. Youssef
2013/647
A note on high-security general-purpose elliptic curves
Diego F. Aranha, Paulo S. L. M. Barreto, Geovandro C. C. F. Pereira, Jefferson E. Ricardini
2013/646
Direct Chosen-Ciphertext Secure Attribute-Based Key Encapsulations without Random Oracles
Johannes Blömer, Gennadij Liske
2013/645
FlexDPDP: FlexList-based Optimized Dynamic Provable Data Possession
Ertem Esiner, Adilet Kachkeev, Samuel Braunfeld, Alptekin Küpçü, Öznur Özkasap
2013/644
Elliptic and Hyperelliptic Curves: a Practical Security Analysis
Joppe W. Bos, Craig Costello, Andrea Miele
2013/643
There is no Indistinguishability Obfuscation in Pessiland
Tal Moran, Alon Rosen
2013/642
Multiparty Key Exchange, Efficient Traitor Tracing, and More from Indistinguishability Obfuscation
Dan Boneh, Mark Zhandry
2013/641
Indistinguishability Obfuscation vs. Auxiliary-Input Extractable Functions: One Must Fall
Nir Bitansky, Ran Canetti, Omer Paneth, Alon Rosen
2013/640
Communication-Efficient MPC for General Adversary Structures
Joshua Lampkins, Rafail Ostrovsky
2013/639
Differentially 4-Uniform Bijections by Permuting the Inverse Function
Deng Tang, Claude Carlet, Xiaohu Tang
2013/638
DFA-Based Functional Encryption: Adaptive Security from Dual System Encryption
Somindu C. Ramanna
2013/637
Detection of Algebraic Manipulation in the Presence of Leakage
Hadi Ahmadi, Reihaneh Safavi-Naini
2013/636
SCARE of Secret Ciphers with SPN Structures
Matthieu Rivain, Thomas Roche
2013/635
Universal security; from bits and mips to pools, lakes -- and beyond
Arjen K. Lenstra, Thorsten Kleinjung, Emmanuel Thomé
2013/634
Improved Linear Sieving Techniques with Applications to Step-Reduced LED-64
Itai Dinur, Orr Dunkelman, Nathan Keller, Adi Shamir
2013/633
Four Measures of Nonlinearity
J. Boyar, M. G. Find, R. Peralta
2013/632
Combined Modeling and Side Channel Attacks on Strong PUFs
Ahmed Mahmoud, Ulrich Rührmair, Mehrdad Majzoobi, Farinaz Koushanfar
2013/631
Protecting Obfuscation Against Algebraic Attacks
Boaz Barak, Sanjam Garg, Yael Tauman Kalai, Omer Paneth, Amit Sahai
2013/630
Estimating Key Sizes For High Dimensional Lattice-Based Systems
Joop van de Pol, Nigel P. Smart
2013/629
Secure Key Management in the Cloud
Ivan Damgård, Thomas P. Jakobsen, Jesper Buus Nielsen, Jakob I. Pagter
2013/628
Parallelizable Rate-1 Authenticated Encryption from Pseudorandom Functions
Kazuhiko Minematsu
2013/627
Flexible and Publicly Verifiable Aggregation Query for Outsourced Databases in Cloud
Jiawei Yuan, Shucheng Yu
2013/626
Improved Linear Attacks on the Chinese Block Cipher Standard
Mingjie Liu, Jiazhe Chen
2013/625
PillarBox: Combating next-generation malware with fast forward-secure logging
Kevin D. Bowers, Catherine Hart, Ari Juels, Nikos Triandopoulos
2013/624
New Integer-FFT Multiplication Architectures and Implementations for Accelerating Fully Homomorphic Encryption
Xiaolin Cao, Ciara Moore
2013/623
Off-Path Hacking: The Illusion of Challenge-Response Authentication
Yossi Gilad, Amir Herzberg, Haya Shulman
2013/622
Decentralized Anonymous Credentials
Christina Garman, Matthew Green, Ian Miers
2013/621
Multi-LHL protocol
Marika Mitrengová
2013/620
Do I know you? -- Efficient and Privacy-Preserving Common Friend-Finder Protocols and Applications
Marcin Nagy, Emiliano De Cristofaro, Alexandra Dmitrienko, N. Asokan, Ahmad-Reza Sadeghi
2013/619
Fault Injection Modeling Attacks on 65nm Arbiter and RO Sum PUFs via Environmental Changes
Jeroen Delvaux, Ingrid Verbauwhede
2013/618
Security Amplification against Meet-in-the-Middle Attacks Using Whitening
Pierre-Alain Fouque, Pierre Karpman
2013/617
Some results concerning global avalanche characteristics of two $q$-ary functions
Brajesh Kumar Singh
2013/616
Accelerating Fully Homomorphic Encryption over the Integers with Super-size Hardware Multiplier and Modular Reduction
Xiaolin Cao, Ciara Moore, Maire O’Neill, Elizabeth O’Sullivan, Neil Hanley
2013/615
Privacy and Verifiability in Voting Systems: Methods, Developments and Trends
Hugo Jonker, Sjouke Mauw, Jun Pang
2013/614
Is extracting data the same as possessing data?
Douglas R. Stinson, Jalaj Upadhyay
2013/613
Recomputing with Permuted Operands: A Concurrent Error Detection Approach
Xiaofei Guo, Ramesh Karri
2013/612
Sub-linear Blind Ring Signatures without Random Oracles
Essam Ghadafi
2013/611
Limited-birthday Distinguishers for Hash Functions - Collisions Beyond the Birthday Bound can be Meaningful
Mitsugu Iwamoto, Thomas Peyrin, Yu Sasaki
2013/610
Key-recovery Attacks on Various RO PUF Constructions via Helper Data Manipulation
Jeroen Delvaux, Ingrid Verbauwhede
2013/609
Ultra Low-Power implementation of ECC on the ARM Cortex-M0+
Ruan de Clercq, Leif Uhsadel, Anthony Van Herrewege, Ingrid Verbauwhede
2013/608
Towards Optimal Leakage Exploitation Rate in Template Attacks
Guangjun Fan, Yongbin Zhou, Hailong Zhang, Dengguo Feng
2013/607
Cryptanalysis of Full RIPEMD-128
Franck Landelle, Thomas Peyrin
2013/606
Revocable quantum timed-release encryption
Dominique Unruh
2013/605
Presentation of a new class of public key cryptosystems K(XIII)SE(1)PKC along with Kp(XIII)SE(1)PKC that realizes the coding rate of exactly 1.0, constructed by modifying K(XII)SE(1)PKC.
Masao KASAHARA
2013/604
Modelling Time, or A Step Towards Reduction-based Security Proofs for OTP and Kerberos
Jörg Schwenk
2013/603
Invariance-Based Concurrent Error Detection for Advanced Encryption Standard
Xiaofei Guo, Ramesh Karri
2013/602
On the Efficacy of Solving LWE by Reduction to Unique-SVP
Martin R. Albrecht, Robert Fitzpatrick, Florian G ̈opfert
2013/601
Two-round secure MPC from Indistinguishability Obfuscation
Sanjam Garg, Craig Gentry, Shai Halevi, Mariana Raykova
2013/600
Improved Cryptanalysis of Reduced RIPEMD-160
Florian Mendel, Thomas Peyrin, Martin Schläffer, Lei Wang, Shuang Wu
2013/599
Factoring RSA keys from certified smart cards: Coppersmith in the wild
Daniel J. Bernstein, Yun-An Chang, Chen-Mou Cheng, Li-Ping Chou, Nadia Heninger, Tanja Lange, Nicko van Someren
2013/598
Fuming Acid and Cryptanalysis: Handy Tools for Overcoming a Digital Locking and Access Control System - Full Version
Daehyun Strobel, Benedikt Driessen, Timo Kasper, Gregor Leander, David Oswald, Falk Schellenberg, Christof Paar
2013/597
Efficient Pairings Computation on Jacobi Quartic Elliptic Curves
Sylvain Duquesne, Nadia El Mrabet, Emmanuel Fouotsa
2013/596
Solving the Elliptic Curve Discrete Logarithm Problem Using Semaev Polynomials, Weil Descent and Gröbner Basis Methods -- an Experimental Study
Michael Shantz, Edlyn Teske
2013/595
Enhanced certificate transparency and end-to-end encrypted mail
Mark D. Ryan
2013/594
A Local-Global Approach to Solving Ideal Lattice Problems
Yuan Tian, Rongxin Sun, Xueyong Zhu
2013/593
Efficient One-Sided Adaptively Secure Computation
Carmit Hazay, Arpita Patra
2013/592
Cryptanalysis of the Toorani-Falahati Hill Ciphers
Liam Keliher, Anthony Z. Delaney
2013/591
Analysis of the Rainbow Tradeoff Algorithm Used in Practice
Jung Woo Kim, Jin Hong, Kunsoo Park
2013/590
EyeDecrypt -- Private Interactions in Plain Sight
Andrea Forte, Juan Garay, Trevor Jim, Yevgeniy Vahlis
2013/589
Smashing MASH-1
Vladimir Antipkin
2013/588
SPHF-Friendly Non-Interactive Commitments
Michel Abdalla, Fabrice Benhamouda, Olivier Blazy, Céline Chevalier, David Pointcheval
2013/587
ESPOON ERBAC: Enforcing Security Policies in Outsourced Environments
Muhammad Rizwan Asghar, Mihaela Ion, Giovanni Russello, Bruno Crispo
2013/586
Generic related-key and induced chosen IV attacks using the method of key differentiation
Enes Pasalic, Yongzhuang Wei
2013/585
On Algebraic Immunity of Trace Inverse Functions over Finite Fields with Characteristic Two
Xiutao Feng, Guang Gong
2013/584
Cryptanalysis of GOST R Hash Function
Zongyue Wang, Hongbo Yu, Xiaoyun Wang
2013/583
Polynomial Selection for the Number Field Sieve in an Elementary Geometric View
Min Yang, Qingshu Meng, Zhangyi Wang, Lina Wang, Huanguo Zhang
2013/582
The Special Number Field Sieve in $\F _{p^{n}}$, Application to Pairing-Friendly Constructions
Antoine Joux, Cécile Pierrot
2013/581
PriWhisper: Enabling Keyless Secure Acoustic Communication for Smartphones
Bingsheng Zhang, Qin Zhan, Junfei Wang, Kui Ren, Cong Wang, Di Ma
2013/580
Random Projections, Graph Sparsification, and Differential Privacy
Jalaj Upadhyay
2013/579
On Measurable Side-Channel Leaks inside ASIC Design Primitives
Takeshi Sugawara, Daisuke Suzuki, Minoru Saeki, Mitsuru Shiozaki, Takeshi Fujino
2013/578
A Method For Generation Of High-Nonlinear S-Boxes Based On Gradient Descent
Oleksandr Kazymyrov, Valentyna Kazymyrova, Roman Oliynykov
2013/577
Secure Two-Party Computation with Reusable Bit-Commitments, via a Cut-and-Choose with Forge-and-Lose Technique
Luís T. A. N. Brandão
2013/576
Extended Criterion for Absence of Fixed Points
Oleksandr Kazymyrov, Valentyna Kazymyrova
2013/575
Equivalence between MAC and PRF for Blockcipher based Constructions
Nilanjan Datta, Mridul Nandi
2013/574
On the Minimum Number of Multiplications Necessary for Universal Hash Constructions
Mridul Nandi
2013/573
Improved Meet-in-the-Middle Attacks on AES-192 and PRINCE
Leibo Li, Keting Jia, Xiaoyun Wang
2013/572
Quad-RC4: Merging Four RC4 States towards a 32-bit Stream Cipher
Goutam Paul, Subhamoy Maitra, Anupam Chattopadhyay
2013/571
Efficient General-Adversary Multi-Party Computation
Martin Hirt, Daniel Tschudi
2013/570
New Efficient Identity-Based Encryption From Factorization
Jun Shao, Licheng Wang, Xiaolei Dong, Zhenfu Cao
2013/569
More Efficient Cryptosystems From $k^{th}$-Power Residues
Zhenfu Cao, Xiaolei Dong, Licheng Wang, Jun Shao
2013/568
Cryptanalysis of the Speck Family of Block Ciphers
Farzaneh Abed, Eik List, Stefan Lucks, Jakob Wenzel
2013/567
KDM Security in the Hybrid Framework
Gareth T. Davies, Martijn Stam
2013/566
Attacking PUF-Based Pattern Matching Key Generators via Helper Data Manipulation
Jeroen Delvaux, Ingrid Verbauwhede
2013/565
Non-Malleable Coding Against Bit-wise and Split-State Tampering
Mahdi Cheraghchi, Venkatesan Guruswami
2013/564
Capacity of Non-Malleable Codes
Mahdi Cheraghchi, Venkatesan Guruswami
2013/563
Virtual Black-Box Obfuscation for All Circuits via Generic Graded Encoding
Zvika Brakerski, Guy N. Rothblum
2013/562
Self-pairings on supersingular elliptic curves with embedding degree $three$
Binglong Chen, Chang-An Zhao
2013/561
Preimage attacks on the round-reduced Keccak with the aid of differential cryptanalysis
Pawel Morawiecki, Josef Pieprzyk, Marian Srebrny, Michal Straus
2013/560
Sometimes-Recurse Shuffle: Almost-Random Permutations in Logarithmic Expected Time
Ben Morris, Phillip Rogaway
2013/559
A Definitional Framework for Functional Encryption
Christian Matt, Ueli Maurer
2013/558
Practical approaches to varying network size in combinatorial key predistribution schemes
Kevin Henry, Maura B. Paterson, Douglas R. Stinson
2013/557
Black-Box Obfuscation for d-CNFs
Zvika Brakerski, Guy N. Rothblum
2013/556
Algebraic Aspects of the Russian Hash Standard GOST R 34.11-2012
Oleksandr Kazymyrov, Valentyna Kazymyrova
2013/555
Key Exchange with Unilateral Authentication: Composable Security Definition and Modular Protocol Design
Ueli Maurer, Björn Tackmann, Sandro Coretti
2013/554
Formally Proved Security of Assembly Code Against Power Analysis: A Case Study on Balanced Logic
Pablo Rauzy, Sylvain Guilley, Zakaria Najm
2013/553
Multi-Valued Byzantine Broadcast: the $t < n$ Case
Martin Hirt, Pavel Raykov
2013/552
More Efficient Oblivious Transfer and Extensions for Faster Secure Computation
Gilad Asharov, Yehuda Lindell, Thomas Schneider, Michael Zohner
2013/551
Puzzle Encryption Algorithm
Gregory Alvarez, Charles Berenguer
2013/550
More Efficient Cryptosystems From k-th Power Residues
Zhenfu Cao, Xiaolei Dong, Licheng Wang, Jun Shao
2013/549
Equations System coming from Weil descent and subexponential attack for algebraic curve cryptosystem
Koh-ichi Nagao
2013/548
Decomposition formula of the Jacobian group of plane curve
Koh-ichi Nagao
2013/547
Automatic Security Evaluation of Block Ciphers with S-bP Structures against Related-key Differential Attacks
Siwei Sun, Lei Hu, Ling Song, Yonghong Xie, Peng Wang
2013/546
TRS-80 with a grain of salt
Jean-Marie Chauvet
2013/545
Private Over-threshold Aggregation Protocols over Distributed Databases
Myungsun Kim, Abedelaziz Mohaisen, Jung Hee Cheon, Yongdae Kim
2013/544
Warrant-Hiding Delegation-by-Certificate Proxy Signature Schemes
Christian Hanser, Daniel Slamanig
2013/543
Cryptanalysis of the SIMON Family of Block Ciphers
Hoda A. Alkhzaimi, Martin M. Lauridsen
2013/542
Searching for Nonlinear Feedback Shift Registers with Parallel Computing
Przemysław Dąbrowski, Grzegorz Łabuzek, Tomasz Rachwalik, Janusz Szmidt
2013/541
Lattice-Based FHE as Secure as PKE
Zvika Brakerski, Vinod Vaikuntanathan
2013/540
On the security of a password-only authenticated three-party key exchange protocol
Junghyun Nam, Kim-Kwang Raymond Choo, Juryon Paik, Dongho Won
2013/539
Rebound attacks on Stribog
Riham AlTawy, Aleksandar Kircanski, Amr M. Youssef
2013/538
Practical Issues with TLS Client Certificate Authentication
Arnis Parsovs
2013/537
Inter-FSP Funds Transfer Protocol
Amir Herzberg, Shay Nachmani
2013/536
A Three-Level Sieve Algorithm for the Shortest Vector Problem
Feng Zhang, Yanbin Pan, Gengran Hu
2013/535
Accelerating Scalar Conversion for Koblitz Curve Cryptoprocessors on Hardware Platforms
Sujoy Sinha Roy, Junfeng Fan, Ingrid Verbauwhede
2013/534
Efficient Unobservable Anonymous Reporting against Strong Adversaries
Nethanel Gelernter, Amir Herzberg
2013/533
Gossip Latin Square and The Meet-All Gossipers Problem
Nethanel Gelernter, Amir Herzberg
2013/532
On a Relation between the Ate Pairing and the Weil Pairing for Supersingular Elliptic Curves
Takakazu Satoh
2013/531
On the Limits of Provable Anonymity
Nethanel Gelernter, Amir Herzberg
2013/530
The Parallel-Cut Meet-In-The-Middle Attack
Ivica Nikolic, Lei Wang, Shuang Wu
2013/529
How to Withstand Mobile Virus Attacks, Revisited
Joshua Baron, Karim El Defrawy, Joshua Lampkins, Rafail Ostrovsky
2013/528
Anonymous HIBE from Standard Assumptions over Type-3 Pairings using Dual System Encryption
Somindu C. Ramanna, Palash Sarkar
2013/527
The Spammed Code Offset Method
Boris Skoric, Niels de Vreede
2013/526
Differential and Linear Cryptanalysis of Reduced-Round Simon
Farzaneh Abed, Eik List, Stefan Lucks, Jakob Wenzel
2013/525
Catena: A Memory-Consuming Password-Scrambling Framework
Christian Forler, Stefan Lucks, Jakob Wenzel
2013/524
Threshold Secret Image Sharing
Teng Guo, Feng Liu, ChuanKun Wu, ChingNung Yang, Wen Wang, YaWei Ren
2013/523
White-Box Security Notions for Symmetric Encryption Schemes
Cécile Delerablée, Tancrède Lepoint, Pascal Paillier, Matthieu Rivain
2013/522
The Resistance of PRESENT-80 Against Related-Key Differential Attacks
Sareh Emami, San Ling, Ivica Nikolic, Josef Pieprzyk, Huaxiong Wang
2013/521
Multiple Limited-Birthday Distinguishers and Applications
Jérémy Jean, María Naya-Plasencia, Thomas Peyrin
2013/520
Locally Updatable and Locally Decodable Codes
Nishanth Chandran, Bhavana Kanukurthi, Rafail Ostrovsky
2013/519
Montgomery Multiplication Using Vector Instructions
Joppe W. Bos, Peter L. Montgomery, Daniel Shumow, Gregory M. Zaverucha
2013/518
Universal Leaky Random Oracle Model
Guangjun Fan, Yongbin Zhou, Dengguo Feng
2013/517
Improvement of One Adaptive Oblivious Transfer Scheme
Zhengjun Cao, Lihua Liu
2013/516
Algebraic MACs and Keyed-Verification Anonymous Credentials
Melissa Chase, Sarah Meiklejohn, Gregory M. Zaverucha
2013/515
When Private Set Intersection Meets Big Data: An Efficient and Scalable Protocol
Changyu Dong, Liqun Chen, Zikai Wen
2013/514
Leakage Resilient Proofs of Ownership in Cloud Storage, Revisited
Jia Xu, Jianying Zhou
2013/513
Enforcing Language Semantics Using Proof-Carrying Data
Stephen Chong, Eran Tromer, Jeffrey A. Vaughan
2013/512
Rounding LLL: Finding Faster Small Roots of Univariate Polynomial Congruences
Jingguo Bi, Phong Q. Nguyen
2013/511
Low Data Complexity Biclique Cryptanalysis of Block Ciphers with Application to Piccolo and HIGHT
Siavash Ahmadi, Zahra Ahmadian, Javad Mohajeri, Mohammad Reza Aref
2013/510
Discrete Ziggurat: A Time-Memory Trade-off for Sampling from a Gaussian Distribution over the Integers
Johannes Buchmann, Daniel Cabarcas, Florian Göpfert, Andreas Hülsing, Patrick Weiden
2013/509
Replacing a Random Oracle: Full Domain Hash From Indistinguishability Obfuscation
Susan Hohenberger, Amit Sahai, Brent Waters
2013/508
Multi-Key Searchable Encryption
Raluca Ada Popa, Nickolai Zeldovich
2013/507
SNARKs for C: Verifying Program Executions Succinctly and in Zero Knowledge
Eli Ben-Sasson, Alessandro Chiesa, Daniel Genkin, Eran Tromer, Madars Virza
2013/506
A Formal Proof of Countermeasures Against Fault Injection Attacks on CRT-RSA
Pablo Rauzy, Sylvain Guilley
2013/505
Improvement of One Anonymous Identity-Based Encryption
Zhengjun Cao, Lihua Liu
2013/504
A Comparison of Double Point Multiplication Algorithms and their Implementation over Binary Elliptic Curves
Reza Azarderakhsh, Koray Karabina
2013/503
On secret sharing with nonlinear product reconstruction
Ignacio Cascudo, Ronald Cramer, Diego Mirandola, Carles Padro, Chaoping Xing
2013/502
Proving TLS-attack related open biases of RC4
Santanu Sarkar, Sourav Sen Gupta, Goutam Paul, Subhamoy Maitra
2013/501
Type-Based Analysis of Protected Storage in the TPM (full version)
Jianxiong Shao, Dengguo Feng, Yu Qin
2013/500
Obfuscating Branching Programs Using Black-Box Pseudo-Free Groups
Ran Canetti, Vinod Vaikuntanathan
2013/499
Limits on the Power of Cryptographic Cheap Talk
Pavel Hubacek, Jesper Buus Nielsen, Alon Rosen
2013/498
Non-Malleable Codes from Two-Source Extractors
Stefan Dziembowski, Tomasz Kazana, Maciej Obremski
2013/497
Improvement of Camenisch-Neven-Shelat Oblivious Transfer Scheme
Zhengjun Cao, Hanyue Cao
2013/496
Rational Protocol Design: Cryptography Against Incentive-driven Adversaries
Juan Garay, Jonathan Katz, Ueli Maurer, Bjoern Tackmann, Vassilis Zikas
2013/495
Revocable IBE Systems with Almost Constant-size Key Update
Le Su, Hoon Wei Lim, San Ling, Huaxiong Wang
2013/494
Differential Fault Attack against Grain family with very few faults and minimal assumptions
Santanu Sarkar, Subhadeep Banik, Subhamoy Maitra
2013/493
A new class of semi-bent quadratic Boolean functions
Chunming Tang, Yanfeng Qi
2013/492
Cryptographically Enforced RBAC
Anna Lisa Ferrara, George Fuchsbauer, Bogdan Warinschi
2013/491
Improved OT Extension for Transferring Short Secrets
Vladimir Kolesnikov, Ranjit Kumaresan
2013/490
For an EPC-C1 G2 RFID compliant Protocol, CRC with Concatenation : No; PRNG with Concatenation : Yes
Masoumeh Safkhani, Nasour Bagheri
2013/489
An Efficient Scheme for Centralized Group Key Management in Collaborative Environments
Constantinos Patsakis, Agusti Solanas
2013/488
Adaptively Secure Broadcast Encryption under Standard Assumptions with Better Efficiency
Kwangsu Lee, Dong Hoon Lee
2013/487
Classification of Elliptic/hyperelliptic Curves with Weak Coverings against the GHS attack under an Isogeny Condition
Tsutomu Iijima, Fumiyuki Momose, Jinhui Chao
2013/486
Handling Authentication and Detection Probability in Multi-tag RFID Environment
Subhasish Dhal, Indranil Sengupta
2013/485
A New Object Searching Protocol for Multi-tag RFID
Subhasish Dhal, Indranil Sengupta
2013/484
Efficient Public Integrity Checking for Cloud Data Sharing with Multi-User Modification
Jiawei Yuan, Shucheng Yu
2013/483
A Variant of Coppersmith's Algorithm with Improved Complexity and Efficient Exhaustive Search
Jean-Sébastien Coron, Jean-Charles Faugère, Guénaël Renault, Rina Zeitoun
2013/482
Bounds in Shallows and in Miseries
Céline Blondeau, Andrey Bogdanov, Gregor Leander
2013/481
Cryptanalysis of the Huang-Liu-Yang Cryptosystem from PKC 2012
Yosuke Todo, Keita Xagawa
2013/480
Efficient Multiparty Protocols via Log-Depth Threshold Formulae
Gil Cohen, Ivan Bjerre Damgård, Yuval Ishai, Jonas Kölker, Peter Bro Miltersen, Ran Raz, Ron D. Rothblum
2013/479
Security analysis of Quantum-Readout PUFs in the case of challenge-estimation attacks
B. Skoric
2013/478
Enabling End-to-End Secure Communication with Anonymous and Mobile Receivers - an Attribute-Based Messaging Approach
Stefan G. Weber
2013/477
Golden Sequence for the PPSS Broadcast Encryption Scheme with an Asymmetric Pairing
Renaud Dubois, Margaux Dugardin, Aurore Guillevic
2013/476
Dependence in IV-related bytes of RC4 key enhances vulnerabilities in WPA
Sourav Sen Gupta, Subhamoy Maitra, Willi Meier, Goutam Paul, Santanu Sarkar
2013/475
A note on verifying the APN property
Pascale Charpin, Gohar M. Kyureghyan
2013/474
Eavesdropping or Disrupting a Communication --- On the Weakness of Quantum Communications
Zhengjun Cao
2013/473
The Norwegian Internet Voting Protocol
Kristian Gjøsteen
2013/472
Partially blind password-based signatures using elliptic curves
Kristian Gjøsteen
2013/471
Obfuscating Conjunctions
Zvika Brakerski, Guy N. Rothblum
2013/470
Practical Cryptanalysis of a Public-Key Encryption Scheme Based on New Multivariate Quadratic Assumptions
Martin R. Albrecht, Jean-Charles Faugère, Robert Fitzpatrick, Ludovic Perret
2013/469
Verifiable Delegation of Computation on Outsourced Data
Michael Backes, Dario Fiore, Raphael M. Reischuk
2013/468
How To Construct Extractable One-Way Functions Against Uniform Adversaries
Nir Bitansky, Ran Canetti, Omer Paneth
2013/467
Analysis of BLAKE2
Jian Guo, Pierre Karpman, Ivica Nikolic, Lei Wang, Shuang Wu
2013/466
Efficient computation of addition-subtraction chains using generalized continued Fractions
Amadou Tall, Ali Yassin Sanghare
2013/465
Practical & Provably Secure Distance-Bounding
Ioana Boureanu, Aikaterini Mitrokotsa, Serge Vaudenay
2013/464
Towards A Practical JCJ / Civitas Implementation
Stephan Neumann, Christian Feier, Melanie Volkamer, Reto Koenig
2013/463
Secret Key Cryptosystem based on Polar Codes over Binary Erasure Channel
Reza Hooshmand, Masoumeh Koochak Shooshtari, Mohammad Reza Aref
2013/462
VABKS: Verifiable Attribute-based Keyword Search over Outsourced Encrypted Data
Qingji Zheng, Shouhuai Xu, Giuseppe Ateniese
2013/461
HPAZ: a High-throughput Pipeline Architecture of ZUC in Hardware
Zongbin Liu, Neng Gao, Jiwu Jing, Peng Liu
2013/460
Solving Terminal Revocation in EAC by Augmenting Terminal Authentication
Rafik Chaabouni
2013/459
Reset Indifferentiability and its Consequences
Paul Baecher, Chris Brzuska, Arno Mittelbach
2013/458
Exponentiating in Pairing Groups
Joppe W. Bos, Craig Costello, Michael Naehrig
2013/457
Deduction Soundness: Prove One, Get Five for Free
Florian Böhl, Véronique Cortier, Bogdan Warinschi
2013/456
On the Security of Group-based Proxy Re-encryption Scheme
Purushothama B R, B B Amberker
2013/455
Another Nail in the Coffin of White-Box AES Implementations
Tancrède Lepoint, Matthieu Rivain
2013/454
How to Use Indistinguishability Obfuscation: Deniable Encryption, and More
Amit Sahai, Brent Waters
2013/453
Secret Disclosure attack on Kazahaya, a Yoking-Proof For Low-Cost RFID Tags
Nasour Bagheri, Masoumeh Safkhani
2013/452
Secure Channel Coding Schemes based on Polar Codes
Behnam Mafakheri, Taraneh Eghlidos, Hossein Pilaram
2013/451
Candidate Indistinguishability Obfuscation and Functional Encryption for all circuits
Sanjam Garg, Craig Gentry, Shai Halevi, Mariana Raykova, Amit Sahai, Brent Waters
2013/450
Revisiting the BGE Attack on a White-Box AES Implementation
Yoni De Mulder, Peter Roelse, Bart Preneel
2013/449
A Note On the Storage Requirement for AKS Primality Testing Algorithm
Zhengjun Cao
2013/448
Flush+Reload: a High Resolution, Low Noise, L3 Cache Side-Channel Attack
Yuval Yarom, Katrina Falkner
2013/447
Dynamic Runtime Methods to Enhance Private Key Blinding
Karine Gandolfi-Villegas, Nabil Hamzi
2013/446
Weakness of F_{3^{6*509}} for Discrete Logarithm Cryptography
Gora Adj, Alfred Menezes, Thomaz Oliveira, Francisco Rodríguez-Henríquez
2013/445
Implementing Lightweight Block Ciphers on x86 Architectures
Ryad Benadjila, Jian Guo, Victor Lomné, Thomas Peyrin
2013/444
Sequential message authentication code without random oracles
Bin Wang, Xiaojing Hong
2013/443
Optimally Anonymous and Transferable Conditional E-cash
Jiangxiao Zhang, Hua Guo, Zhoujun Li, Chang Xu
2013/442
On Fair Exchange, Fair Coins and Fair Sampling
Shashank Agrawal, Manoj Prabhakaran
2013/441
On Stochastic Security of Java Crypto and NIST DRBG Pseudorandom Sequences
Yongge Wang
2013/440
Revisiting Conditional Rényi Entropies and Generalizing Shannon's Bounds in Information Theoretically Secure Encryption
Mitsugu Iwamoto, Junji Shikata
2013/439
Pushing the Limits of SHA-3 Hardware Implementations to Fit on RFID
Peter Pessl, Michael Hutter
2013/438
Clustering Algorithms for Non-Profiled Single-Execution Attacks on Exponentiations
Johann Heyszl, Andreas Ibing, Stefan Mangard, Fabrizio De Santis, Georg Sigl
2013/437
A Uniform Min-Max Theorem with Applications in Cryptography
Salil Vadhan, Colin Jia Zheng
2013/436
Fast Exhaustive Search for Quadratic Systems in $\mathbb{F}_2$ on FPGAs --- Extended Version
Charles Bouillaguet, Chen-Mou Cheng, Tung Chou, Ruben Niederhagen, Bo-Yin Yang
2013/435
Efficient Cryptosystems From $2^k$-th Power Residue Symbols
Fabrice Benhamouda, Javier Herranz, Marc Joye, Benoît Libert
2013/434
Full Domain Hash from (Leveled) Multilinear Maps and Identity-Based Aggregate Signatures
Susan Hohenberger, Amit Sahai, Brent Waters
2013/433
On Symmetric Encryption with Distinguishable Decryption Failures
Alexandra Boldyreva, Jean Paul Degabriele, Kenneth G. Paterson, Martijn Stam
2013/432
How to Sign Paper Contracts? Conjectures & Evidence Related to Equitable & Efficient Collaborative Task Scheduling
Eric Brier, David Naccache, Li-yao Xia
2013/431
Practical-Time Attacks Against Reduced Variants of MISTY1
Orr Dunkelman, Nathan Keller
2013/430
Security of the Misty Structure Beyond the Birthday Bound
Jooyoung Lee
2013/429
DupLESS: Server-Aided Encryption for Deduplicated Storage
Mihir Bellare, Sriram Keelveedhi, Thomas Ristenpart
2013/428
Faster 128-EEA3 and 128-EIA3 Software
Roberto Avanzi, Billy Bob Brumley
2013/427
Toeplitz matrix-vector product based GF(2^n) shifted polynomial basis multipliers for all irreducible pentanomials
Jiangtao Han, Haining Fan
2013/426
Efficient Garbling from a Fixed-Key Blockcipher
Mihir Bellare, Viet Tung Hoang, Sriram Keelveedhi, Phillip Rogaway
2013/425
Break WEP Faster with Statistical Analysis
Rafik Chaabouni
2013/424
Instantiating Random Oracles via UCEs
Mihir Bellare, Viet Tung Hoang, Sriram Keelveedhi
2013/423
Locally Computable UOWHF with Linear Shrinkage
Benny Applebaum, Yoni Moses
2013/422
Private Database Queries Using Somewhat Homomorphic Encryption
Dan Boneh, Craig Gentry, Shai Halevi, Frank Wang, David J. Wu
2013/421
Light-weight primitive, feather-weight security? A cryptanalytic knock-out. (Preliminary results)
Valentina Banciu, Simon Hoerder, Dan Page
2013/420
The Holey Grail: A special score function for non-binary traitor tracing
B. Skoric, J. -J. Oosterwijk, J. Doumen
2013/419
How to Share a Lattice Trapdoor: Threshold Protocols for Signatures and (H)IBE
Rikke Bendlin, Sara Krehbiel, Chris Peikert
2013/418
On Tight Security Proofs for Schnorr Signatures
Nils Fleischhacker, Tibor Jager, Dominique Schröder
2013/417
The Improved Cube Attack on Grain-v1
Yongjuan Wang, Liren Ding, Wenbao Han, Xiangyu Wang
2013/416
Computational Fuzzy Extractors
Benjamin Fuller, Xianrui Meng, Leonid Reyzin
2013/415
SL2 homomorphic hash functions: Worst case to average case reduction and short collision search
Ciaran Mullan, Boaz Tsaban
2013/414
A novel certificateless deniable authentication protocol
Chunhua Jin, Chunxiang Xu, Xiaojun Zhang, Qianna Xie, Fagen Li
2013/413
Policy-Based Signatures
Mihir Bellare, Georg Fuchsbauer
2013/412
Moduar Form Aprroach to Solving Lattice Problems
Yuan Tian, Xueyong Zhu, Rongxin Sun
2013/411
Security Analysis of Lightweight Authentication Protocol from WISTP 2013
Wang Shao-Hui, Xiao Fu, Chen Dan-wei, Wang Ru-chuan
2013/410
Plug-and-Play IP Security: Anonymity Infrastructure Instead of PKI
Yossi Gilad, Amir Herzberg
2013/409
Order-Preserving Encryption Secure Beyond One-Wayness
Tal Malkin, Isamu Teranishi, Moti Yung
2013/408
Delegatable Functional Signatures
Michael Backes, Sebastian Meiser, Dominique Schröder
2013/407
Automated Security Proofs for Almost-Universal Hash for MAC verification
Martin Gagné, Pascal Lafourcade, Yassine Lakhnech
2013/406
Attribute-Based Server-Aided Verification Signature
Zhiwei Wang, Ruirui Xie, Wei Zhang, Liwen He, Guozi Sun, Wei Chen
2013/405
New Quadratic Bent Functions in Polynomial Forms with Coefficients in Extension Fields
Chunming Tang, Yanfeng Qi, Maozhi Xu
2013/404
The SIMON and SPECK Families of Lightweight Block Ciphers
Ray Beaulieu, Douglas Shors, Jason Smith, Stefan Treatman-Clark, Bryan Weeks, Louis Wingers
2013/403
Function-Private Subspace-Membership Encryption and Its Applications
Dan Boneh, Ananth Raghunathan, Gil Segev
2013/402
Efficient Two-Pass Anonymous Identity Authentication Using Smart Card
Jue-Sam Chou, Chun-Hui Huang, Yu-Siang Huang, Yalin Chen
2013/401
Functional Signatures and Pseudorandom Functions
Elette Boyle, Shafi Goldwasser, Ioana Ivan
2013/400
A quasi-polynomial algorithm for discrete logarithm in finite fields of small characteristic
Razvan Barbulescu, Pierrick Gaudry, Antoine Joux, Emmanuel Thomé
2013/399
Attack on Liao and Hsiao's Secure ECC-based RFID Authentication Scheme integrated with ID-Verifier Transfer Protocol
Roel Peeters, Jens Hermans
2013/398
ASICS: Authenticated Key Exchange Security Incorporating Certification Systems
Colin Boyd, Cas Cremers, Michèle Feltz, Kenneth G. Paterson, Bertram Poettering, Douglas Stebila
2013/397
Practical Secure Logging: Seekable Sequential Key Generators
Giorgia Azzurra Marson, Bertram Poettering
2013/396
On the Practical Security of a Leakage Resilient Masking Scheme
Emmanuel Prouff, Matthieu Rivain, Thomas Roche
2013/394
A Public Key Cryptoscheme Using Bit-pair Shadows
Shenghui Su, Shuwang Lü, Maozhi Xu, Tao Xie
2013/393
Strongly Secure One-round Group Authenticated Key Exchange in the Standard Model
Yong Li, Zheng Yang
2013/392
Efficient Simultaneous Privately and Publicly Verifiable Robust Provable Data Possession from Elliptic Curves
Christian Hanser, Daniel Slamanig
2013/391
Key Recovery Attacks on 3-round Even-Mansour, 8-step LED-128, and Full $\mbox{AES}^{2}$
Itai Dinur, Orr Dunkelman, Nathan Keller, Adi Shamir
2013/390
Chosen Ciphertext Secure Keyed-Homomorphic Public-Key Encryption
Keita Emura, Goichiro Hanaoka, Koji Nuida, Go Ohtake, Takahiro Matsuda, Shota Yamada
2013/389
A Capacity-Achieving Simple Decoder for Bias-Based Traitor Tracing Schemes
Jan-Jaap Oosterwijk, Boris Skoric, Jeroen Doumen
2013/388
Parallel Gauss Sieve Algorithm : Solving the SVP in the Ideal Lattice of 128-dimensions
Tsukasa Ishiguro, Shinsaku Kiyomoto, Yutaka Miyake, Tsuyoshi Takagi
2013/387
Cryptographically Protected Prefixes for Location Privacy in IPv6
Jonathan Trostle, Hosei Matsuoka, James Kempf, Toshiro Kawahara, Ravi Jain
2013/386
Side Channel Attacks against Pairing over Theta Functions
Nadia El Mrabet
2013/385
Cryptanalysis of ultralightweight RFID authentication protocol
Umar Mujahid, M. Najam-ul-islam, Jameel Ahmed, Usman Mujahid
2013/384
Sequential Aggregate Signatures Made Shorter
Kwangsu Lee, Dong Hoon Lee, Moti Yung
2013/383
Lattice Signatures and Bimodal Gaussians
Léo Ducas, Alain Durmus, Tancrède Lepoint, Vadim Lyubashevsky
2013/382
To Hash or Not to Hash Again? (In)differentiability Results for H^2 and HMAC
Yevgeniy Dodis, Thomas Ristenpart, John Steinberger, Stefano Tessaro
2013/381
Breaking the Even-Mansour Hash Function: Collision and Preimage Attacks on JH and Grøstl
Bingke Ma, Bao Li, Ronglin Hao
2013/380
Comments on Three Multi-Server Authentication Protocols
Yalin Chen, Jue-Sam Chou, Wen-Yi Tsai
2013/379
Delegatable Pseudorandom Functions and Applications
Aggelos Kiayias, Stavros Papadopoulos, Nikos Triandopoulos, Thomas Zacharias
2013/378
A note on quantum related-key attacks
Martin Roetteler, Rainer Steinwandt
2013/377
An Algebraic Framework for Diffie-Hellman Assumptions
Alex Escala, Gottfried Herold, Eike Kiltz, Carla Ràfols, Jorge Villar
2013/376
An Accurate Probabilistic Reliability Model for Silicon PUFs
Roel Maes
2013/375
NaCl on 8-Bit AVR Microcontrollers
Michael Hutter, Peter Schwabe
2013/374
A Secure and efficient elliptic curve based authentication and key agreement protocol suitable for WSN
Majid Bayat, Mohammad Reza Aref
2013/373
Injective Encoding to Elliptic Curves
Pierre-Alain Fouque, Antoine Joux, Mehdi Tibouchi
2013/372
Practical Bootstrapping in Quasilinear Time
Jacob Alperin-Sheriff, Chris Peikert
2013/371
Domain-Polymorphic Programming of Privacy-Preserving Applications
Dan Bogdanov, Peeter Laud, Jaak Randmets
2013/370
Leakage-Resilient Symmetric Cryptography Under Empirically Verifiable Assumptions
François-Xavier Standaert, Olivier Pereira, Yu Yu
2013/369
Block Ciphers that are Easier to Mask: How Far Can we Go?
Benoît Gérard, Vincent Grosso, María Naya-Plasencia, François-Xavier Standaert
2013/368
Security in $O(2^n)$ for the Xor of Two Random Permutations\\ -- Proof with the standard $H$ technique--
Jacques Patarin
2013/367
On the Security of TLS-DH and TLS-RSA in the Standard Model
Florian Kohlar, Sven Schäge, Jörg Schwenk
2013/366
Structural Evaluation of AES and Chosen-Key Distinguisher of 9-round AES-128
Pierre-Alain Fouque, Jérémy Jean, Thomas Peyrin
2013/365
Efficient eCK-secure Authenticated Key Exchange Protocols in the Standard Model
Zheng Yang
2013/364
On the Achievability of Simulation-Based Security for Functional Encryption
Angelo De Caro, Vincenzo Iovino Abhishek Jain, Adam O'Neill, Omer Paneth, Giuseppe Persiano
2013/363
A New Class of Public Key Cryptosystems Constructed Based on Reed-Solomon Codes, K(XII)SE(1)PKC.-- Along with a presentation of K(XII)SE(1)PKC over the extension field extensively used for present day various storage and transmission systems --
Masao KASAHARA
2013/362
A Fast Implementation of the Optimal Ate Pairing over BN curve on Intel Haswell Processor
Shigeo MITSUNARI
2013/361
Linearly Homomorphic Structure-Preserving Signatures and Their Applications
Benoit Libert, Thomas Peters, Marc Joye, Moti Yung
2013/360
Achieving the limits of the noisy-storage model using entanglement sampling
Frédéric Dupuis, Omar Fawzi, Stephanie Wehner
2013/359
A heuristic for finding compatible differential paths with application to HAS-160
Aleksandar Kircanski, Riham AlTawy, Amr M. Youssef
2013/358
Counter-cryptanalysis
Marc Stevens
2013/357
The LOCAL attack: Cryptanalysis of the authenticated encryption scheme ALE
Dmitry Khovratovich, Christian Rechberger
2013/356
Verifying Computations with State (Extended Version)
Benjamin Braun, Ariel J. Feldman, Zuocheng Ren, Srinath Setty, Andrew J. Blumberg, Michael Walfish
2013/355
New Attacks against Transformation-Based Privacy-Preserving Linear Programming
Peeter Laud, Alisa Pankova
2013/354
Programmable Hash Functions in the Multilinear Setting
Eduarda S. V. Freire, Dennis Hofheinz, Kenneth G. Paterson, Christoph Striecks
2013/353
Profiling DPA: Efficacy and efficiency trade-offs
Carolyn Whitnall, Elisabeth Oswald
2013/352
Constrained Pseudorandom Functions and Their Applications
Dan Boneh, Brent Waters
2013/351
Time-Optimal Interactive Proofs for Circuit Evaluation
Justin Thaler
2013/350
Ideal-Cipher (Ir)reducibility for Blockcipher-Based Hash Functions
Paul Baecher, Pooya Farshim, Marc Fischlin, Martijn Stam
2013/349
A Dynamic Tradeoff Between Active and Passive Corruptions in Secure Multi-Party Computation
Martin Hirt, Christoph Lucas, Ueli Maurer
2013/348
Multi-file proofs of retrievability for cloud storage auditing
Bin Wang, Xiaojing Hong
2013/347
STES: A Stream Cipher Based Low Cost Scheme for Securing Stored Data
Debrup Chakraborty, Cuauhtemoc Mancillas-Lopez, Palash Sarkar
2013/346
Using Bleichenbacher's Solution to the Hidden Number Problem to Attack Nonce Leaks in 384-Bit ECDSA
Elke De Mulder, Michael Hutter, Mark E. Marson, Peter Pearson
2013/345
Analysis and Improvement of the Generic Higher-Order Masking Scheme of FSE 2012
Arnab Roy, Srinivas Vivek
2013/344
Limits of provable security for homomorphic encryption
Andrej Bogdanov, Chin Ho Lee
2013/343
Quantum one-time programs
Anne Broadbent, Gus Gutoski, Douglas Stebila
2013/342
Attribute-Based Encryption for a Subclass of Circuits with Bounded Depth from Lattices
Xiang Xie, Rui Xue
2013/341
Trapdoor Smooth Projective Hash Functions
Fabrice Benhamouda, David Pointcheval
2013/340
Homomorphic Encryption from Learning with Errors: Conceptually-Simpler, Asymptotically-Faster, Attribute-Based
Craig Gentry, Amit Sahai, Brent Waters
2013/339
On the Security of the TLS Protocol: A Systematic Analysis
Hugo Krawczyk, Kenneth G. Paterson, Hoeteck Wee
2013/338
Security Analysis of Pseudo-Random Number Generators with Input: /dev/random is not Robust
Yevgeniy Dodis, David Pointcheval, Sylvain Ruhault, Damien Vergnaud, Daniel Wichs
2013/337
Attribute-Based Encryption for Circuits
Sergey Gorbunov, Vinod Vaikuntanathan, Hoeteck Wee
2013/336
A Novel Technique in Linear Cryptanalysis
Wen-Long Sun Jie Guan Lin Ding
2013/335
Parallel and Dynamic Searchable Symmetric Encryption
Seny Kamara, Charalampos Papamanthou
2013/334
Protecting PUF Error Correction by Codeword Masking
Dominik Merli, Frederic Stumpf, Georg Sigl
2013/333
Double-authentication-preventing signatures
Bertram Poettering, Douglas Stebila
2013/332
A method for obtaining lower bounds on the higher order nonlinearity of Boolean function
Mikhail S. Lobanov
2013/331
New Constructions and Applications of Trapdoor DDH Groups
Yannick Seurin
2013/330
Trapdoor Privacy in Asymmetric Searchable Encryption Schemes
Afonso Arriaga, Qiang Tang, Peter Ryan
2013/329
Protocol Variants and Electronic Identification
Kristian Gjøsteen
2013/328
Towards Finding Optimal Differential Characteristics for ARX: Application to Salsa20
Nicky Mouha, Bart Preneel
2013/327
A Lightweight Hash Function Resisting Birthday Attack and Meet-in-the-middle Attack
Shenghui Su, Tao Xie, Shuwang Lü
2013/326
Key-Versatile Signatures and Applications: RKA, KDM and Joint Enc/Sig
Mihir Bellare, Sarah Meiklejohn, Susan Thomson
2013/325
Elligator: Elliptic-curve points indistinguishable from uniform random strings
Daniel J. Bernstein, Mike Hamburg, Anna Krasnova, Tanja Lange
2013/324
Sieve-in-the-Middle: Improved MITM Attacks (Full Version)
Anne Canteaut, María Naya-Plasencia, Bastien Vayssiere
2013/323
Encryption Schemes with Post-Challenge Auxiliary Inputs
Tsz Hon Yuen, Ye Zhang, Siu-Ming Yiu
2013/322
BLAKE2: simpler, smaller, fast as MD5
Jean-Philippe Aumasson, Samuel Neves, Zooko Wilcox-O'Hearn, Christian Winnerlein
2013/321
Generic Constructions of Secure-Channel Free Searchable Encryption with Adaptive Security
Keita Emura, Atsuko Miyaji, Mohammad Shahriar Rahman, Kazumasa Omote
2013/320
Instantaneous Frequency Analysis
Roman Korkikian, David Naccache, Guilherme Ozari de Almeida
2013/319
On the use of continued fractions for stream ciphers
Amadou Moctar Kane
2013/318
Fully-Anonymous Functional Proxy-Re-Encryption
Yutaka Kawai, Katsuyuki Takashima
2013/317
Anon-Pass: Practical Anonymous Subscriptions
Michael Z. Lee, Alan M. Dunn, Jonathan Katz, Brent Waters, Emmett Witchel
2013/316
Certified computer-aided cryptography: efficient provably secure machine code from high-level implementations
José Bacelar Almeida, Manuel Barbosa, Gilles Barthe, François Dupressoir
2013/315
Hybrid Approach for the Fast Verification for Improved Versions of the UOV and Rainbow Signature Schemes
Albrecht Petzoldt
2013/314
Keyed Side-Channel Based Hashing for IP Protection using Wavelets
Timo Bartkewitz
2013/313
Pairing Inversion via Non-degenerate Auxiliary Pairings
Seunghwan Chang, Hoon Hong, Eunjeong Lee, Hyang-Sook Lee
2013/312
Families of fast elliptic curves from Q-curves
Benjamin Smith
2013/311
Four-dimensional GLV via the Weil restriction
Aurore Guillevic, Sorina Ionica
2013/310
MinimaLT: Minimal-latency Networking Through Better Security
W. Michael Petullo, Xu Zhang, Jon A. Solworth, Daniel J. Bernstein, Tanja Lange
2013/309
Bypassing Passkey Authentication in Bluetooth Low Energy
Tomas Rosa
2013/308
Lattice-Based Group Signatures with Logarithmic Signature Size
Fabien Laguillaumie, Adeline Langlois, Benoit Libert, Damien Stehle
2013/307
Maliciously Circuit-Private FHE
Rafail Ostrovsky, Anat Paskin-Cherniavsky, Beni Paskin-Cherniavsky
2013/306
Solving a $6120$-bit DLP on a Desktop Computer
Faruk Golouglu, Robert Granger, Gary McGuire, Jens Zumbragel
2013/305
Towards Fresh Re-Keying with Leakage-Resilient PRFs: Cipher Design Principles and Analysis
Sonia Belaid, Fabrizio De Santis, Johann Heyszl, Stefan Mangard, Marcel Medwed, Jorn-Marc Schmidt, Francois-Xavier Standaert, Stefan Tillich
2013/304
Secure PRNG Seeding on Commercial Off-the-Shelf Microcontrollers
Anthony Van Herrewege, Vincent van der Leest, André Schaller, Stefan Katzenbeisser, Ingrid Verbauwhede
2013/303
Theory of masking with codewords in hardware: low-weight $d$th-order correlation-immune Boolean functions
Shivam Bhasin, Claude Carlet, Sylvain Guilley
2013/302
Cryptanalysis of Grigoriev-Shpilrain Physical Asymmetric Scheme With Capacitors
Nicolas T. Courtois
2013/301
Impossible Differential-Linear Cryptanalysis of Reduced-Round CLEFIA-128
Zheng Yuan, Xian Li, Bart Preneel
2013/300
A Profitable Sub-Prime Loan: Obtaining the Advantages of Composite Order in Prime-Order Bilinear Groups
Allison Lewko, Sarah Meiklejohn
2013/299
Computing class polynomials for abelian surfaces
Andres Enge, Emmanuel Thomé
2013/298
Does My Device Leak Information? An a priori Statistical Power Analysis of Leakage Detection Tests
Luke Mather, Elisabeth Oswald, Joe Bandenburg, Marcin Wojcik
2013/297
Improvement and Efficient Implementation of a Lattice-based Signature Scheme
Rachid El Bansarkhani, Johannes Buchmann
2013/296
Universally Composable Symbolic Analysis for Two-Party Protocols based on Homomorphic Encryption
Morten Dahl, Ivan Damgård
2013/295
Survey and Benchmark of Lightweight Block Ciphers for Wireless Sensor Networks
Mickaël Cazorla, Kevin Marquet, Marine Minier
2013/294
Synchronous Sampling and Clock Recovery of Internal Oscillators for Side Channel Analysis
Colin O'Flynn, Zhizhang (David) Chen
2013/293
A Toolkit for Ring-LWE Cryptography
Vadim Lyubashevsky, Chris Peikert, Oded Regev
2013/292
A Leakage Resilient MAC
Daniel P. Martin, Elisabeth Oswald, Martijn Stam, Marcin Wojcik
2013/291
Security ranking among assumptions within the Uber assumption framework
Antoine Joux, Antoine Rojat
2013/290
Massive Group Message Authentication with Revocable Anonymity
Boaz Catane, Amir Herzberg
2013/289
Secure Second Price Auctions with a Rational Auctioneer
Boaz Catane, Amir Herzberg
2013/288
Key Classification Attack on Block Ciphers
Maghsoud Parviz, Seyed Hassan Mousavi, Saeed Mirahmadi
2013/287
The failure of McEliece PKC based on Reed-Muller codes.
I. V. Chizhov, M. A. Borodin
2013/286
Salvaging Indifferentiability in a Multi-stage Setting
Arno Mittelbach
2013/285
A Novel Proof on Weil Pairing
Sutirtha Sanyal
2013/284
A Secure Paper-Based Electronic Voting With No Encryption
Asghar Tavakkoli, Reza Ebrahimi Atani
2013/283
Function-Private Identity-Based Encryption: Hiding the Function in Functional Encryption
Dan Boneh, Ananth Raghunathan, Gil Segev
2013/282
Three Snakes in One Hole: The First Systematic Hardware Accelerator Design for SOSEMANUK with Optional Serpent and SNOW 2.0 Modes
Goutam Paul, Anupam Chattopadhyay
2013/281
Adapting Lyubashevsky’s Signature Schemes to the Ring Signature Setting
Carlos Aguilar-Melchor, Slim Bettaieb, Xavier Boyen, Laurent Fousse, Philippe Gaborit
2013/280
Path ORAM: An Extremely Simple Oblivious RAM Protocol
Emil Stefanov, Marten van Dijk, Elaine Shi, T-H. Hubert Chan, Christopher Fletcher, Ling Ren, Xiangyao Yu, Srinivas Devadas
2013/279
Pinocchio: Nearly Practical Verifiable Computation
Bryan Parno, Craig Gentry, Jon Howell, Mariana Raykova
2013/278
A Frequency Leakage Model and its application to CPA and DPA
S. Tiran, S. Ordas, Y. Teglia, M. Agoyan, P. Maurine
2013/277
ESPOON: Enforcing Encrypted Security Policies in Outsourced Environments
Muhammad Rizwan Asghar, Mihaela Ion, Giovanni Russello, Bruno Crispo
2013/276
Towards a Practical Cryptographic Voting Scheme Based on Malleable Proofs
David Bernhard, Stephan Neumann, Melanie Volkamer
2013/275
The Potential of an Individualized Set of trusted CAs: Defending against CA Failures in the Web PKI (Extended Version)
Johannes Braun, Gregor Rynkowski
2013/274
A time series approach for profiling attack
Liran Lerman, Gianluca Bontempi, Souhaib Ben Taieb, Olivier Markowitch
2013/273
Computing the Rank of Incidence Matrix and the Algebraic Immunity of Boolean Functions
Deepak Kumar Dalai
2013/272
Cryptography Challenges for Computational Privacy in Public Clouds
Sashank Dara
2013/271
The Legal Classification of Identity-Based Signatures
Christoph Sorge
2013/270
Pseudorandom Generators from Regular One-way Functions: New Constructions with Improved Parameters
Yu Yu
2013/269
CMCC: Misuse Resistant Authenticated Encryption with Minimal Ciphertext Expansion
Jonathan Trostle
2013/268
Dynamic Cube Attack on Grain-v1
Majid Rahimi, Mostafa Barmshory, Mohammad Hadi Mansouri, Mohammad Reza Aref
2013/267
Multi-Party Computation of Polynomials and Branching Programs without Simultaneous Interaction
S. Dov Gordon, Tal Malkin, Mike Rosulek, Hoeteck Wee
2013/266
L-P States of RC4 Stream Cipher
Jing Lv, Dongdai Lin
2013/265
Attribute-Based Encryption with Fast Decryption
Susan Hohenberger, Brent Waters
2013/264
Encrypted Secret Sharing and Analysis by Plaintext Randomization
Stephen R. Tate, Roopa Vishwanathan, Scott Weeks
2013/263
Speeding up QUAD
Albrecht Petzoldt
2013/262
An efficient FHE based on the hardness of solving systems of non-linear multivariate equations
Gérald Gavin
2013/261
Secure information transmission based on physical principles
Dima Grigoriev, Vladimir Shpilrain
2013/260
From Weak to Strong Zero-Knowledge and Applications
Kai-Min Chung, Edward Lui, Rafael Pass
2013/259
Private Interactive Communication Across an Adversarial Channel
Ran Gelles, Amit Sahai, Akshay Wadia
2013/258
Witness Encryption and its Applications
Sanjam Garg, Craig Gentry, Amit Sahai, Brent Waters
2013/257
Secure two-party computation: a visual way
Paolo D'Arco, Roberto De Prisco
2013/256
On the Lossiness of the Rabin Trapdoor Function
Yannick Seurin
2013/255
How to Construct an Ideal Cipher from a Small Set of Public Permutations
Rodolphe Lampe, Yannick Seurin
2013/254
Towards Adoption of DNSSEC: Availability and Security Challenges
Amir Herzberg, Haya Shulman
2013/253
CacheAudit: A Tool for the Static Analysis of Cache Side Channels
Goran Doychev, Dominik Feld, Boris Köpf, Laurent Mauborgne, Jan Reineke
2013/252
On the Primitivity of some Trinomials over Finite Fields
LI Yujuan, WANG Huaifu, ZHAO Jinhua
2013/251
Permutation Polynomials and Their Differential Properties over Residue Class Rings
Yuyin Yu, Mingsheng Wang
2013/250
Fully Homomorphic Encryption for Mathematicians
Alice Silverberg
2013/249
How to Factor N_1 and N_2 When p_1=p_2 mod 2^t
Kaoru Kurosawa, Takuma Ueda
2013/248
Another Look at Security Theorems for 1-Key Nested MACs
Neal Koblitz, Alfred Menezes
2013/247
Leakage-resilient Attribute-based Encryptions with Fast Decryption: Model, Analysis and Construction
Mingwu Zhang, Wei Shi, Chunzhi Wang, Zhenhua Chen, Yi Mu
2013/246
A New Lever Function with Adequate Indeterminacy
Shenghui Su, Ping Luo, Shuwang Lv, Maozhi Xu
2013/245
The Fiat-Shamir Transformation in a Quantum World
Özgür Dagdelen, Marc Fischlin, Tommaso Gagliardoni
2013/244
Cryptographic schemes, key exchange, public key.
Ted Hurley
2013/243
A Simple ORAM
Kai-Min Chung, Rafael Pass
2013/242
AE5 Security Notions: Definitions Implicit in the CAESAR Call
Chanathip Namprempre, Phillip Rogaway, Tom Shrimpton
2013/241
The Perils of Repeating Patterns: Observation of Some Weak Keys in RC4
Joachim Strömbergson, Simon Josefsson
2013/240
Algebraic analysis of Trivium-like ciphers
Sui-Guan Teo, Kenneth Koon-Ho Wong, Harry Bartlett, Leonie Simpson, Ed Dawson
2013/239
Optimizing ORAM and Using it Efficiently for Secure Computation
Craig Gentry, Kenny Goldman, Shai Halevi, Charanjit Julta, Mariana Raykova, Daniel Wichs
2013/238
Anonymity-preserving Public-Key Encryption: A Constructive Approach
Markulf Kohlweiss, Ueli Maurer, Cristina Onete, Björn Tackmann, Daniele Venturi
2013/237
Type-Based Analysis of Generic Key Management APIs (Long Version)
Pedro Adão, Riccardo Focardi, Flaminia L. Luccio
2013/236
A Ciphertext-Policy Attribute-Based Proxy Re-Encryption with Chosen-Ciphertext Security
Kaitai Liang, Liming Fang, Duncan S. Wong, Willy Susilo
2013/235
Ballot secrecy and ballot independence: definitions and relations
Ben Smyth, David Bernhard
2013/234
A Cryptographic Analysis of OPACITY
Özgür Dagdelen, Marc Fischlin, Tommaso Gagliardoni, Giorgia Azzurra Marson, Arno Mittelbach, Cristina Onete
2013/233
Attacks on JH, Grøstl and SMASH Hash Functions
Yiyuan Luo, Xuejia Lai
2013/232
Quantum algorithms to check Resiliency, Symmetry and Linearity of a Boolean function
Kaushik Chakraborty, Anupam Chattopadhyay, Subhamoy Maitra
2013/231
Sakura: a flexible coding for tree hashing
Guido Bertoni, Joan Daemen, Michael Peeters, Gilles Van Assche
2013/230
Relations among Privacy Notions for Signcryption and Key Invisible "Sign-then-Encrypt''
Yang Wang, Mark Manulis, Man Ho Au, Willy Susilo
2013/229
How to Run Turing Machines on Encrypted Data
Shafi Goldwasser, Yael Kalai, Raluca Ada Popa, Vinod Vaikuntanathan, Nickolai Zeldovich
2013/228
Public-Key Revocation and Tracing Schemes with Subset Difference Methods Revisited
Kwangsu Lee, Woo Kwon Koo, Dong Hoon Lee, Jong Hwan Park
2013/227
Analysis of authentication and key establishment in inter-generational mobile telephony
Chunyu Tang, David A. Naumann, Susanne Wetzel
2013/226
Public key exchange using semidirect product of (semi)groups
Maggie Habeeb, Delaram Kahrobaei, Charalambos Koupparis, Vladimir Shpilrain
2013/225
Transparent, Distributed, and Replicated Dynamic Provable Data Possession
Mohammad Etemad, Alptekin Küpçü
2013/224
On the Need of Physical Security for Small Embedded Devices: a Case Study with COMP128-1 Implementations in SIM Cards
Yuanyuan Zhou, Yu Yu, François-Xavier Standaert, Jean-Jacques Quisquater
2013/223
The PACE|AA Protocol for Machine Readable Travel Documents, and its Security
Jens Bender, Özgür Dagdelen, Marc Fischlin, Dennis Kügler
2013/222
Tight security bounds for key-alternating ciphers
Shan Chen, John Steinberger
2013/221
Identity-based Aggregate Signatures with Verifiable Single Ones
Yang Zhang, Jun-liang Chen
2013/220
Towards Efficient Private Distributed Computation on Unbounded Input Streams
Shlomi Dolev, Juan Garay, Niv Gilboa, Vladimir Kolesnikov, Yelena Yuditsky
2013/219
Designing a Hybrid Attribute-Based Encryption Scheme Supporting Dynamic Attributes
Stefan G. Weber
2013/218
Comparing the Pairing Efficiency over Composite-Order and Prime-Order Elliptic Curves
Aurore Guillevic
2013/217
Computing on Authenticated Data for Adjustable Predicates
Björn Deiseroth, Victoria Fehr, Marc Fischlin, Manuel Maasz, Nils Fabian Reimers, Richard Stein
2013/216
Election Verifiability or Ballot Privacy: Do We Need to Choose?
Edouard Cuvelier, Olivier Pereira, Thomas Peters
2013/215
Optical PUFs Reloaded
Ulrich Rührmair, Christian Hilgers, Sebastian Urban, Agnes Weiershäuser, Elias Dinter, Brigitte Forster, Christian Jirauschek
2013/214
Remotegrity: Design and Use of an End-to-End Verifiable Remote Voting System
Filip Zagorski, Richard T. Carback, David Chaum, Jeremy Clark, Aleksander Essex, Poorvi L. Vora
2013/213
On the Impacts of Mathematical Realization over Practical Security of Leakage Resilient Cryptographic Schemes
Guangjun Fan, Yongbin Zhou, F. -X. Standaert, Dengguo Feng
2013/212
A Closer Look at HMAC
Krzysztof Pietrzak
2013/211
A new criterion for avoiding the propagation of linear relations through an Sbox (Full version)
Christina Boura, Anne Canteaut
2013/210
Cryptophia's Short Combiner for Collision-Resistant Hash Functions
Arno Mittelbach
2013/209
New modular multiplication and division algorithms based on continued fraction expansion
Mourad Gouicem
2013/208
CloudHKA: A Cryptographic Approach for Hierarchical Access Control in Cloud Computing
Yi-Ruei Chen, Cheng-Kang Chu, Wen-Guey Tzeng, Jianying Zhou
2013/207
Self-blindable Credential: Towards LightWeight Anonymous Entity Authentication
Yanjiang Yang, Xuhua Ding, Haibing Lu, Jian Weng
2013/206
Privacy-Preserving Billing for e-Ticketing Systems in Public Transportation
Florian Kerschbaum, Hoon Wei Lim, Ivan Gudymenko
2013/205
Practical and Employable Protocols for UC-Secure Circuit Evaluation over $Z_n$
Jan Camenisch, Robert R. Enderlein, Victor Shoup
2013/204
Computing Privacy-Preserving Edit Distance and Smith-Waterman Problems on the GPU Architecture
Shi Pu, Jyh-Charn Liu
2013/203
From oblivious AES to efficient and secure database join in the multiparty setting
Sven Laur, Riivo Talviste, Jan Willemson
2013/202
Breaking NLM-MAC Generator
Mohammad Ali Orumiehchiha, Josef Pieprzyk, Ron Steinfeld
2013/201
Non-malleable Codes from Additive Combinatorics
Divesh Aggarwal, Yevgeniy Dodis, Shachar Lovett
2013/200
Selecting polynomials for the Function Field Sieve
Razvan Barbulescu
2013/199
Quantum algorithms for the subset-sum problem
Daniel J. Bernstein, Stacey Jeffery, Tanja Lange, Alexander Meurer
2013/198
On Evaluating Circuits with Inputs Encrypted by Different Fully Homomorphic Encryption Schemes
Zhizhou Li, Ten H. Lai
2013/197
Discrete logarithm in GF(2^809) with FFS
Razvan Barbulescu, Cyril Bouvier, Jérémie Detrey, Pierrick Gaudry, Hamza Jeljeli, Emmanuel Thomé, Marion Videau, Paul Zimmermann
2013/196
Fast Two-Party Secure Computation with Minimal Assumptions
abhi shelat, Chih-hao Shen
2013/195
On the (re)design of an FPGA-based PUF
Philipp Grabher, Dan Page, Marcin Wójcik
2013/194
On the Impossibility of Cryptography with Tamperable Randomness
Per Austrin, Kai-Min Chung, Mohammad Mahmoody, Rafael Pass, Karn Seth
2013/193
Certificateless Signatures: Structural Extensions of Security Models and New Provably Secure Schemes
Yu-Chi Chen, Raylin Tso, Willy Susilo, Xinyi Huang, Gwoboa Horng
2013/192
A generalisation of Miller's algorithm and applications to pairing computations on abelian varieties
David Lubicz, Damien Robert
2013/191
Improved Differential Fault Analysis on ARIA using Small Number of Faults
Yuseop Lee, Kitae Jeong, Jaechul Sung, Seokhie Hong
2013/190
Power Analysis Attacks against FPGA Implementations of KLEIN
Shaohua Tang, Jianhao Wu, Weijian Li, Zheng Gong
2013/189
Ideal and Perfect Hierarchical Secret Sharing Schemes based on MDS codes
Appala Naidu Tentu, Prabal Paul, V Ch Venkaiah
2013/188
A family of 6-to-4-bit S-boxes with large linear branch number
Daniel Loebenberger, Michael Nüsken
2013/187
Enhanced Ownership Transfer Protocol for RFID in an Extended Communication Model
Jorge Munilla, Alberto Peinado, Guoming Yang, Willy Susilo
2013/186
On the (Im)possibility of Projecting Property in Prime-Order Setting
Jae Hong Seo
2013/185
Security Analysis of Linearly Filtered NLFSRs
Mohammad Ali Orumiehchiha, Josef Pieprzyk, Ron Steinfeld, Harry Bartlett
2013/184
The Vernam cipher is robust to small deviations from randomness
Boris Ryabko
2013/183
Practical Multilinear Maps over the Integers
Jean-Sebastien Coron, Tancrede Lepoint, Mehdi Tibouchi
2013/182
Collusion-Resistant Domain-Specific Pseudonymous Signatures
Julien Bringer, Herve Chabanne, Alain Patey
2013/181
On the evaluation of modular polynomials
Andrew V. Sutherland
2013/180
A New Class of Product-sum Type Public Key Cryptosystem,K(V)$\Sigma\Pi$PKC,Constructed Based on Maximum Length Code
Masao KASAHARA
2013/179
Malleable Signatures: Complex Unary Transformations and Delegatable Anonymous Credentials
Melissa Chase, Markulf Kohlweiss, Anna Lysyanskaya, Sarah Meiklejohn
2013/178
Cryptanalysis of RC4(n,m) Stream Cipher
Mohammad Ali Orumiehchiha, Josef Pieprzyk, Elham Shakour, Ron Steinfeld
2013/177
A generic construction for voting correctness at minimum cost - Application to Helios
Veronique Cortier, David Galindo, Stephane Glondu, Malika Izabachene
2013/176
Distinguishing Attacks on RC4 and A New Improvement of the Cipher
Jing Lv, Bin Zhang, Dongdai Lin
2013/175
Machine-Generated Algorithms, Proofs and Software for the Batch Verification of Digital Signature Schemes
Joseph A. Akinyele, Matthew Green, Susan Hohenberger, Matthew W. Pagano
2013/174
Cryptanalysis of Some Double-Block-Length Hash Modes of Block Ciphers with $n$-Bit Block and $n$-Bit Key
Deukjo Hong, Daesung Kwon
2013/173
On the Classification of Differential Invariants for Multivariate Post-Quantum Cryptosystems"
Ray Perlner, Daniel Smith-Tone
2013/172
On the Applicability of Time-Driven Cache Attacks on Mobile Devices (Extended Version)
Raphael Spreitzer, Thomas Plos
2013/171
Confined Guessing: New Signatures From Standard Assumptions
Florian Böhl, Dennis Hofheinz, Tibor Jager, Jessica Koch, Christoph Striecks
2013/170
Fast Collision Attack on MD5
Tao Xie, Fanbao Liu, Dengguo Feng
2013/169
Highly-Scalable Searchable Symmetric Encryption with Support for Boolean Queries
David Cash, Stanislaw Jarecki, Charanjit Jutla, Hugo Krawczyk, Marcel Rosu, Michael Steiner
2013/168
On secure embedded token design (Long Version) -- Quasi-looped Yao circuits and bounded leakage
Simon Hoerder, Kimmo Järvinen, Dan Page
2013/167
Single Password Authentication
Tolga Acar, Mira Belenkiy, Alptekin Küpçü
2013/166
On generalized semi-bent (and partially bent) Boolean functions
Brajesh Kumar Singh
2013/165
A New Security and Privacy Framework for RFID In Cloud Computing
Süleyman Kardas, Serkan Çelik, Muhammed Ali Bingöl, Albert Levi
2013/164
Provably Secure LWE Encryption with Smallish Uniform Noise and Secret
Daniel Cabarcas, Florian Göpfert, Patrick Weiden
2013/163
Search Pattern Leakage in Searchable Encryption: Attacks and New Construction
Chang Liu, Liehuang Zhu, Mingzhong Wang, Yu-an Tan
2013/162
A Non Asymptotic Analysis of Information Set Decoding
Yann Hamdaoui, Nicolas Sendrier
2013/161
Completeness Theorems for All Finite Stateless 2-Party Primitives
Daniel Kraschewski
2013/160
Interactive Coding, Revisited
Kai-Min Chung, Rafael Pass, Sidharth Telang
2013/159
Improving the Message-ciphertext Rate of Lewko's Fully Secure IBE Scheme
Dingding Jia, Bao Liand Yamin Liu, Qixiang Mei
2013/158
Efficient and Secure Algorithms for GLV-Based Scalar Multiplication and their Implementation on GLV-GLS Curves (Extended Version)
Armando Faz-Hernandez, Patrick Longa, Ana H. Sanchez
2013/157
The fragility of AES-GCM authentication algorithm
Shay Gueron, Vlad Krasnov
2013/156
Incentivizing Outsourced Computation
Mira Belenkiy, Melissa Chase, C. Chris Erway, John Jannotti, Alptekin Küpçü, Anna Lysyanskaya
2013/155
MiniLEGO: Efficient Secure Two-Party Computation From General Assumptions
Tore Kasper Frederiksen, Thomas Pelle Jakobsen, Jesper Buus Nielsen, Peter Sebastian Nordholt, Claudio Orlandi
2013/154
Optimal Suspicion Functions for Tardos Traitor Tracing Schemes
Jan-Jaap Oosterwijk, Boris Skoric, Jeroen Doumen
2013/153
On the security of a certicateless signature scheme in the standard model
Lin Cheng, Qiaoyan Wen, Zhengping Jin, Hua Zhang
2013/152
Policy-based Secure Deletion
Christian Cachin, Kristiyan Haralambiev, Hsu-Chun Hsiao, Alessandro Sorniotti
2013/151
Some Fixes To SSH
Xu ZiJie
2013/150
Practical (Second) Preimage Attacks on TCS_SHA-3
Gautham Sekar, Soumyadeep Bhattacharya
2013/149
Secure and Constant Cost Public Cloud Storage Auditing with Deduplication
Jiawei Yuan, Shucheng Yu
2013/148
AES-like ciphers: are special S-boxes better then random ones? (Virtual isomorphisms again)
Alexander Rostovtsev
2013/147
A note on the practical complexity of the NFS in the medium prime case: Smoothness of Norms
Naomi Benger, Manuel Charlemagne, Kefei Chen
2013/146
High-Performance Scalar Multiplication using 8-Dimensional GLV/GLS Decomposition
Joppe W. Bos, Craig Costello, Huseyin Hisil, Kristin Lauter
2013/145
Key Wrapping with a Fixed Permutation
Dmitry Khovratovich
2013/144
On Weak Keys and Forgery Attacks against Polynomial-based MAC Schemes
Gordon Procter, Carlos Cid
2013/143
An architecture for practical actively secure MPC with dishonest majority
Marcel Keller, Peter Scholl, Nigel P. Smart
2013/142
A NEW METHOD OF CHOOSING PRIMITIVE ELEMENTS FOR BREZING-WENG FAMILIES OF PAIRING FRIENDLY ELLIPTIC CURVES
Kisoon YOON
2013/141
Non-isomorphic Biclique Cryptanalysis and Its Application to Full-Round mCrypton
M. Shakiba, M. Dakhilalian, H. Mala
2013/140
Limitations of the Meta-Reduction Technique: The Case of Schnorr Signatures
Marc Fischlin, Nils Fleischhacker
2013/139
Rethinking Definitions of Security for Session Key Agreement
Wesley George, Charles Rackoff
2013/138
Multi-bit homomorphic encryption based on learning with errors over rings
Zhang Wei, Liu Shuguang, Yang Xiaoyuan
2013/137
How to Hide Circuits in MPC: An Efficient Framework for Private Function Evaluation
Payman Mohassel, Saeed Sadeghian
2013/136
2048XKS-F & 4096XKS-F - Two Software Oriented High Security Block Ciphers
Dieter Schmidt
2013/135
An MQ/Code Cryptosystem Proposal
Leonard J. Schulman
2013/134
Hard-Core Predicates for a Diffie-Hellman Problem over Finite Fields
Nelly Fazio, Rosario Gennaro, Irippuge Milinda Perera, William E. Skeith III
2013/133
New Lattice Based Signature Using The Jordan Normal Form
Hemlata Nagesh, Birendra Kumar Sharma
2013/132
Yet Another Attack On the Chinese Remainder Theorem Based Hierarchical Access Control Scheme
Niu Liu, Shaohua Tang, Lingling Xu
2013/131
Two is the fastest prime: lambda coordinates for binary elliptic curves
Thomaz Oliveira, Julio López, Diego F. Aranha, Francisco Rodríguez-Henríquez
2013/130
Blank Digital Signatures
Christian Hanser, Daniel Slamanig
2013/129
An Ideal-Security Protocol for Order-Preserving Encoding
Raluca Ada Popa, Frank H. Li, Nickolai Zeldovich
2013/128
Attribute-Based Encryption for Circuits from Multilinear Maps
Sanjam Garg, Craig Gentry, Shai Halevi, Amit Sahai, Brent Waters
2013/127
Oblivious PAKE: Efficient Handling of Password Trials
Franziskus Kiefer, Mark Manulis
2013/126
Direct Proof of Security of Wegman-Carter Authentication with Partially Known Key
Aysajan Abidin, Jan-Åke Larsson
2013/125
Deterministic Public-Key Encryption for Adaptively Chosen Plaintext Distributions
Ananth Raghunathan, Gil Segev, Salil Vadhan
2013/124
Tamper Resilient Cryptography Without Self-Destruct
Ivan Damgaard, Sebastian Faust, Pratyay Mukherjee, Daniele Venturi
2013/123
Analysis and Improvement of Lindell's UC-Secure Commitment Schemes
Olivier Blazy, Céline Chevalier, David Pointcheval, Damien Vergnaud
2013/122
Practical collision attack on 40-step RIPEMD-128
Gaoli Wang
2013/121
Succinct Non-Interactive Zero Knowledge Arguments from Span Programs and Linear Error-Correcting Codes
Helger Lipmaa
2013/120
An Attack Against Fixed Value Discrete Logarithm Representations
Gergely Alpár, Jaap-Henk Hoepman, Wouter Lueks
2013/119
Speeding up Ate Pairing Computation in Affine Coordinates
Duc-Phong Le, Chik How Tan
2013/118
Throughput Optimized Implementations of QUAD
Jason R. Hamlet, Robert W. Brocato
2013/117
On r-th Root Extraction Algorithm in F_q For q=lr^s+1 (mod r^(s+1)) with 0 < l < r and Small s
Namhun Koo, Gook Hwa Cho, Soonhak Kwon
2013/116
The Algorithm of AAES
Shiyong Zhang, Gongliang Chen, Lei Fan
2013/115
A Conditional Proxy Broadcast Re-Encryption Scheme Supporting Timed-Release
Kaitai Liang, Qiong Huang, Roman Schlegel, Duncan S. Wong, Chunming Tang
2013/114
Public Key Exchange Using Matrices Over Group Rings
Delaram Kahrobaei, Charalambos Koupparis, Vladimir Shpilrain
2013/113
Compact Hardware Implementations of ChaCha, BLAKE, Threefish, and Skein on FPGA
Nuray At, Jean-Luc Beuchat, Eiji Okamoto, Ismail San, Teppei Yamazaki
2013/112
PUF Modeling Attacks on Simulated and Silicon Data
Ulrich Rührmair, Jan Sölter, Frank Sehnke, Xiaolin Xu, Ahmed Mahmoud, Vera Stoyanova, Gideon Dror, Jürgen Schmidhuber, Wayne Burleson, Srinivas Devadas
2013/111
Message Authentication Codes Secure against Additively Related-Key Attacks
Keita Xagawa
2013/110
Full Characterization of Functions that Imply Fair Coin Tossing and Ramifications to Fairness
Gilad Asharov, Yehuda Lindell, Tal Rabin
2013/109
Shorter Quasi-Adaptive NIZK Proofs for Linear Subspaces
Charanjit S. Jutla, Arnab Roy
2013/108
Unconditionally Secure and Universally Composable Commitments from Physical Assumptions
Ivan Damgard, Alessandra Scafuro
2013/107
On the Arithmetic Complexity of Strassen-Like Matrix Multiplications
Murat Cenk, M. Anwar Hasan
2013/106
URDP: General Framework for Direct CCA2 Security from any Lattice-Based PKE Scheme
Roohallah Rastaghi
2013/105
Lossy Chains and Fractional Secret Sharing
Yuval Ishai, Eyal Kushilevitz, Omer Strulovich
2013/104
A Tutorial on White-box AES
James A. Muir
2013/103
On the Complexity of Broadcast Setup
Martin Hirt, Pavel Raykov
2013/102
On the Negative Effects of Trend Noise and Its Applications in Side-Channel Cryptanalysis
Yuchen Cao, Yongbin Zhou, Zhenmei Yu
2013/101
Notions of Black-Box Reductions, Revisited
Paul Baecher, Chris Brzuska, Marc Fischlin
2013/100
Attacks and Comments on Several Recently Proposed Key Management Schemes
Niu Liu, Shaohua Tang, Lingling Xu
2013/099
Constant-round secure two-party computation from a linear number of oblivious transfer
Samuel Ranellucci, Alain Tapp
2013/098
Learning with Rounding, Revisited: New Reduction, Properties and Applications
Joel Alwen, Stephan Krenn, Krzysztof Pietrzak, Daniel Wichs
2013/097
Biclique Cryptanalysis of the Full-Round KLEIN Block Cipher
Zahra Ahmadian, Mahmoud Salmasizadeh, Mohammad Reza Aref
2013/096
State convergence in bit-based stream ciphers
Sui-Guan Teo, Harry Bartlett, Ali Alhamdan, Leonie Simpson, Kenneth Koon-Ho Wong, Ed Dawson
2013/095
A new index calculus algorithm with complexity $L(1/4+o(1))$ in very small characteristic
Antoine Joux
2013/094
On-the-Fly Multiparty Computation on the Cloud via Multikey Fully Homomorphic Encryption
Adriana Lopez-Alt, Eran Tromer, Vinod Vaikuntanathan
2013/093
On the security of a certificateless aggregate signature scheme
Lin Cheng, Qiaoyan Wen, Zhengping Jin, Hua Zhang, Liming Zhou
2013/092
Man-in-the-Middle Secure Authentication Schemes from LPN and Weak PRFs
Vadim Lyubashevsky, Daniel Masny
2013/091
Systematic Construction and Comprehensive Evaluation of Kolmogorov-Smirnov Test based Side-Channel Distinguishers
Hui Zhao, Yongbin Zhou, Francois-Xavier Standaert, Hailong Zhang
2013/090
Functional Encryption Supporting Recursive Languages
Somindu C. Ramanna, Palash Sarkar
2013/089
Filtered nonlinear cryptanalysis of reduced-round Serpent, and the Wrong-Key Randomization Hypothesis.
James McLaughlin, John A. Clark
2013/088
Secure Signatures and Chosen Ciphertext Security in a Quantum Computing World
Dan Boneh, Mark Zhandry
2013/087
Square Root Algorithm in F_q for q=2^s+1 (mod 2^(s+1))
Namhun Koo, Gook Hwa Cho, Soonhak Kwon
2013/086
Efficient Private File Retrieval by Combining ORAM and PIR
Travis Mayberry, Erik-Oliver Blass, Agnes Hui Chan
2013/085
Between a Rock and a Hard Place: Interpolating Between MPC and FHE
Ashish Choudhury, Jake Loftus, Emmanuela Orsini, Arpita Patra, Nigel P. Smart
2013/084
Security of Quantum-Readout PUFs against quadrature based challenge estimation attacks
Boris Skoric, Allard P. Mosk, Pepijn W. H. Pinkse
2013/083
A Security Framework for Analysis and Design of Software Attestation
Frederik Armknecht, Ahmad-Reza Sadeghi, Steffen Schulz, Christian Wachsmann
2013/082
Secret Sharing, Rank Inequalities, and Information Inequalities
Sebastia Martin, Carles Padro, An Yang
2013/081
Efficient Secure Two-Party Computation Using Symmetric Cut-and-Choose
Yan Huang, Jonathan Katz, Dave Evans
2013/080
An efficient attack of a McEliece cryptosystem variant based on convolutional codes
Grégory Landais, Jean-Pierre Tillich
2013/079
Fast Cut-and-Choose Based Protocols for Malicious and Covert Adversaries
Yehuda Lindell
2013/078
Broadcast Steganography
Nelly Fazio, Antonio R. Nicolosi, Irippuge Milinda Perera
2013/077
UC-Secure Multi-Session OT Using Tamper-Proof Hardware
Kaoru Kurosawa, Ro Nojima, Le Trieu Phong
2013/076
Design Space Exploration and Optimization of Path Oblivious RAM in Secure Processors
Ling Ren, Xiangyao Yu, Christopher W. Fletcher, Marten van Dijk, Srinivas Devadas
2013/075
Improved Security for a Ring-Based Fully Homomorphic Encryption Scheme
Joppe W. Bos, Kristin Lauter, Jake Loftus, Michael Naehrig
2013/074
On the Function Field Sieve and the Impact of Higher Splitting Probabilities: Application to Discrete Logarithms in $\F_{2^{1971}}$ and $\F_{2^{3164}}$
Faruk Göloğlu, Robert Granger, Gary McGuire, Jens Zumbrägel
2013/073
Zero-Knowledge Using Garbled Circuits: How To Prove Non-Algebraic Statements Efficiently
Marek Jawurek, Florian Kerschbaum, Claudio Orlandi
2013/072
The UC approach: an application view
István Vajda
2013/071
Relation collection for the Function Field Sieve
Jérémie Detrey, Pierrick Gaudry, Marion Videau
2013/070
Related-key Attacks Against Full Hummingbird-2
Markku-Juhani O. Saarinen
2013/069
Hardness of SIS and LWE with Small Parameters
Daniele Micciancio, Chris Peikert
2013/068
Why Proving HIBE Systems Secure is Difficult
Allison Lewko, Brent Waters
2013/067
Power Analysis of Hardware Implementations Protected with Secret Sharing
Guido Bertoni, Joan Daemen, Nicolas Debande, Thanh-Ha Le, Michael Peeters, Gilles Van Assche
2013/066
Analysis and Improvement of the securing RFID systems conforming to EPC Class 1 Generation 2 standard
Amin Mohammadali, Zahra Ahmadian, Mohammad Reza Aref
2013/065
Instantiating Treeless Signature Schemes
Patrick Weiden, Andreas Hülsing, Daniel Cabarcas, Johannes Buchmann
2013/064
Lightweight Zero-Knowledge Proofs for Crypto-Computing Protocols
Sven Laur, Bingsheng Zhang
2013/063
A Verifiable 1-out-of-n Distributed Oblivious Transfer Protocol
Christian L. F. Corniaux, Hossein Ghodosi
2013/062
Symbolic Universal Composability
Florian Böhl, Dominique Unruh
2013/061
On the Indifferentiability of Key-Alternating Ciphers
Elena Andreeva, Andrey Bogdanov, Yevgeniy Dodis, Bart Mennink, John P. Steinberger
2013/060
On FHE without bootstrapping
Aayush Jain
2013/059
Optimized GPU Implementation and Performance Analysis of HC Series of Stream Ciphers
Ayesha Khalid, Deblin Bagchi, Goutam Paul, Anupam Chattopadhyay
2013/058
Cryptanalysis of the Dragonfly Key Exchange Protocol
Dylan Clarke, Feng Hao
2013/057
CRT-based Fully Homomorphic Encryption over the Integers
Jinsu Kim, Moon Sung Lee, Aaram Yun, Jung Hee Cheon
2013/056
On Constructions of MDS Matrices from Companion Matrices for Lightweight Cryptography
Kishan Chand Gupta, Indranil Ghosh Ray
2013/055
Secrecy without one-way functions
Dima Grigoriev, Vladimir Shpilrain
2013/054
Joint Compartmented Threshold Access Structures
Ali Aydın Selçuk, Ramazan Yılmaz
2013/053
A revocable certificateless signature scheme
Yinxia Sun, Futai Zhang, Limin Shen, Robert H. Deng
2013/052
Some Complexity Results and Bit Unpredictable for Short Vector Problem
Kuan Cheng
2013/051
Garbled Circuits Checking Garbled Circuits: More Efficient and Secure Two-Party Computation
Payman Mohassel, Ben Riva
2013/050
Cryptanalysis and Improvement of Akleylek et al.'s cryptosystem
Roohallah Rastaghi
2013/049
Lessons Learned From Previous SSL/TLS Attacks - A Brief Chronology Of Attacks And Weaknesses
Christopher Meyer, Jörg Schwenk
2013/048
Power Balanced Circuits for Leakage-Power-Attacks Resilient Design
Basel Halak, Julian Murphy, Alex Yakovlev
2013/047
Lower Bounds on the Information Ratio of Linear Secret Sharing Schemes
Carles Padro
2013/046
Fast and Maliciously Secure Two-Party Computation Using the GPU
Tore Kasper Frederiksen, Jesper Buus Nielsen
2013/045
Towards Efficient Verifiable SQL Query for Outsourced Dynamic Databases in Cloud
Jiawei Yuan, Shucheng Yu
2013/044
Efficient Computation Outsourcing for Inverting a Class of Homomorphic Functions
Fangguo Zhang, Xu Ma, Shengli Liu
2013/043
Differential Fault Attack on the PRINCE Block Cipher
Ling Song, Lei Hu
2013/042
Complexity of Multi-Party Computation Functionalities
Hemanta K. Maji, Manoj Prabhakaran, Mike Rosulek
2013/041
Trace Expression of r-th Root over Finite Field
Gook Hwa Cho, Namhun Koo, Eunhye Ha, Soonhak Kwon
2013/040
An Efficient CCA2-Secure Variant of the McEliece Cryptosystem in the Standard Model
Roohallah Rastaghi
2013/039
Creating a Challenge for Ideal Lattices
Thomas Plantard, Michael Schneider
2013/038
Verifiable Data Streaming
Dominique Schröder, Heike Schröder
2013/037
Provably Secure Identity-Based Aggregate Signcryption Scheme in Random Oracles
Jayaprakash Kar
2013/036
Batch Fully Homomorphic Encryption over the Integers
Jean-Sébastien Coron, Tancrède Lepoint, Mehdi Tibouchi
2013/035
Improvements to NFC Mobile Transaction and Authentication Protocol
Muhammad Qasim Saeed
2013/034
New Smooth Projective Hash Functions and One-Round Authenticated Key Exchange
Fabrice Benhamouda, Olivier Blazy, Céline Chevalier, David Pointcheval, Damien Vergnaud
2013/033
CCA-Secure IB-KEM from Identity-Based Extractable Hash Proof Systems
Yu Chen, Zongyang Zhang, Dongdai Lin, Zhenfu Cao
2013/032
Detection of Cheaters in Non-interactive Polynomial Evaluation
Maki Yoshida, Satoshi Obana
2013/031
An Analysis of the EMV Channel Establishment Protocol
Chris Brzuska, Nigel P. Smart, Bogdan Warinschi, Gaven J. Watson
2013/030
On the security of an identity-based authenticated group key agreement protocol for imbalanced mobile networks
Haiyan Sun
2013/029
Improved Differential Fault Attack on MICKEY 2.0
Subhadeep Banik, Subhamoy Maitra, Santanu Sarkar
2013/028
More on linear hulls of PRESENT-like ciphers and a cryptanalysis of full-round EPCBC-96
Stanislav Bulygin
2013/027
Anonymity Guarantees of the UMTS/LTE Authentication and Connection Protocol
Ming-Feng Lee, Nigel P. Smart, Bogdan Warinschi, Gaven Watson
2013/026
RSA private key reconstruction from random bits using SAT solvers
Constantinos Patsakis
2013/025
The IITM Model: a Simple and Expressive Model for Universal Composability
Ralf Kuesters, Max Tuengerthal, Daniel Rausch
2013/024
New Cube Root Algorithm Based on Third Order Linear Recurrence Relation in Finite Field
Gook Hwa Cho, Namhun Koo, Eunhye Ha, Soonhak Kwon
2013/023
A New Practical Identity-Based Encryption System
Jong Hwan Park, Dong Hoon Lee
2013/022
Nonlinear cryptanalysis of reduced-round Serpent and metaheuristic search for S-box approximations.
James McLaughlin, John A. Clark
2013/021
Rate-Limited Secure Function Evaluation
Özgür Dagdelen, Payman Mohassel, Daniele Venturi
2013/020
Aggregate and Verifiably Encrypted Signatures from Multilinear Maps Without Random Oracles
Markus Rückert, Dominique Schroeder
2013/019
Plain versus Randomized Cascading-Based Key-Length Extension for Block Ciphers
Peter Gaźi
2013/018
Efficient Delegation of Key Generation and Revocation Functionalities in Identity-Based Encryption
Jae Hong Seo, Keita Emura
2013/017
Provable Security of S-BGP and other Path Vector Protocols: Model, Analysis and Extensions
Alexandra Boldyreva, Robert Lychev
2013/016
Revocable Identity-Based Encryption Revisited: Security Model and Construction
Jae Hong Seo, Keita Emura
2013/015
Complete and Unified Group Laws are not Enough for Elliptic Curve Cryptography
Graham Enos
2013/014
On formal and automatic security verification of WSN transport protocols
Ta Vinh Thong, Amit Dvir
2013/013
Efficiently Outsourcing Multiparty Computation under Multiple Keys
Andreas Peter, Erik Tews, Stefan Katzenbeisser
2013/012
Tropical cryptography
Dima Grigoriev, Vladimir Shpilrain
2013/011
Evolving balanced Boolean functions with optimal resistance to algebraic and fast algebraic attacks, maximal algebraic degree, and very high nonlinearity.
James McLaughlin, John A. Clark
2013/010
Simultaneous Resettable WI from One-way Functions
Kai-Min Chung, Rafael Pass
2013/009
Achieving Anonymity Against Major Face Recognition Algorithms
Benedikt Driessen, Markus Dürmuth
2013/008
Non-Black-Box Simulation from One-Way Functions And Applications to Resettable Security
Kai-Min Chung, Rafael Pass, Karn Seth
2013/007
A Matrix Approach for Constructing Quadratic APN Functions
Yuyin Yu, Mingsheng Wang, Yongqiang Li
2013/006
Cryptanalysis of a pairing-free identity-based authenticated group key agreement protocol for imbalanced mobile networks
Qingfeng Cheng
2013/005
Efficient Multiplier for pairings over Barreto-Naehrig Curves on Virtex-6 FPGA
Riadh Brinci, Walid Khmiriy, Mefteh Mbarekz, Abdellatif Ben Rabaˆa, Ammar Bouallegue, Faouzi Chekir
2013/004
Making NTRUEncrypt and NTRUSign as Secure as Standard Worst-Case Problems over Ideal Lattices
Damien Stehlé, Ron Steinfeld
2013/003
On Formal Expressions of BRW-polynomials
Guillermo Morales-Luna
2013/002
Generalized (Identity-Based) Hash Proof System and Its Applications
Yu Chen, Zongyang Zhang, Dongdai Lin, Zhenfu Cao
2013/001
Shielding circuits with groups
Eric Miles, Emanuele Viola
2012/733
Reusable Garbled Circuits and Succinct Functional Encryption
Shafi Goldwasser, Yael Kalai, Raluca Ada Popa, Vinod Vaikuntanathan, Nickolai Zeldovich
2012/732
Non-Interactive Key Exchange
Eduarda S. V. Freire, Dennis Hofheinz, Eike Kiltz, Kenneth G. Paterson
2012/731
Time-memory Trade-offs for Near-collisions
Gaëtan Leurent
2012/730
Twisted Edwards-Form Elliptic Curve Cryptography for 8-bit AVR-based Sensor Nodes
Dalin Chu, Johann Großschädl, Zhe Liu, Volker Müller, Yang Zhang
2012/729
On the Impossibility of Approximate Obfuscation and Applications to Resettable Cryptography
Nir Bitansky, Omer Paneth
2012/728
Defensive Leakage Camouflage
E. Brier, Q. Fortier, R. Korkikian, K. W. Magld, D. Naccache, G. Ozari de Almeida, A. Pommellet, A. H. Ragab, J. Vuillemin
2012/727
On the Impossibility of Sender-Deniable Public Key Encryption
Dana Dachman-Soled
2012/726
Applications of Polynomial Properties to Verifiable Delegation of Computation and Electronic Voting
Marc Obrador, Paz Morillo, Sandra Guasch
2012/725
Cryptanalysis of an efficient certificateless two-party authenticated key agreement protocol
Qingfeng Cheng
2012/724
A Coding-Theoretic Approach to Recovering Noisy RSA Keys
Kenneth G. Paterson, Antigoni Polychroniadou, Dale L. Sibborn
2012/723
Two Exponentiation Algorithms Resistant to Cross-correlation Power Analysis and to Other Known Attacks
Yaacov Belenky, Zeev Geyzel, Michael Kara-Ivanov, Avraham Entelis
2012/722
Hardness Preserving Reductions via Cuckoo Hashing
Itay Berman, Iftach Haitner, Ilan Komargodski, Moni Naor
2012/721
On the (In)security of Fischlin's Paradigm
Prabhanjan Ananth, Raghav Bhaskar, Vipul Goyal, Vanishree Rao
2012/720
Faster index calculus for the medium prime case. Application to 1175-bit and 1425-bit finite fields
Antoine Joux
2012/719
An ideal multi-secret sharing scheme based on minimal privileged coalitions
Yun Song, Zhihui Li
2012/718
Succinct Non-Interactive Arguments via Linear Interactive Proofs
Nir Bitansky, Alessandro Chiesa, Yuval Ishai, Rafail Ostrovsky, Omer Paneth
2012/717
Practical Yet Universally Composable Two-Server Password-Authenticated Secret Sharing
Jan Camenisch, Anna Lysyanskaya, Gregory Neven
2012/716
Attribute-Based Functional Encryption on Lattices
Xavier Boyen
2012/715
New Impossible Differential Attack on $\text{SAFER}_{+}$ and $\text{SAFER}_{++}$
Jingyuan Zhao, Meiqin Wang, Jiazhe Chen, Yuliang Zheng
2012/714
Discrete Gaussian Leftover Hash Lemma over Infinite Domains
Shweta Agrawal, Craig Gentry, Shai Halevi, Amit Sahai
2012/713
Systematic Treatment of Remote Attestation
Aurelien Francillon, Quan Nguyen, Kasper B. Rasmussen, Gene Tsudik
2012/712
On the Security of the Core of PRINCE Against Biclique and Differential Cryptanalysis
Farzaneh Abed, Eik List, Stefan Lucks
2012/711
Unprovable Security of 2-Message Zero Knowledge
Kai-Min Chung, Edward Lui, Mohammad Mahmoody, Rafael Pass
2012/710
Non Observability in the Random Oracle Model
Prabhanjan Ananth, Raghav Bhaskar
2012/709
Further results on the distinctness of binary sequences derived from primitive sequences modulo square-free odd integers
Qun-Xiong Zheng, Wen-Feng Qi
2012/708
Calling out Cheaters: Covert Security With Public Verifiability
Gilad Asharov, Claudio Orlandi
2012/707
Cryptanalysis of WIDEA
Gaëtan Leurent
2012/706
On the (In)security of the Fiat-Shamir Paradigm, Revisited
Dana Dachman-Soled, Abhishek Jain, Yael Tauman Kalai, Adriana Lopez-Alt
2012/705
Why "Fiat-Shamir for Proofs" Lacks a Proof
Nir Bitansky, Sanjam Garg, Daniel Wichs
2012/704
On the Non-malleability of the Fiat-Shamir Transform
Sebastian Faust, Markulf Kohlweiss, Giorgia Azzurra Marson, Daniele Venturi
2012/703
Profiled Model Based Power Simulator for Side Channel Evaluation
Nicolas Debande, Maël Berthier, Yves Bocktaels, Thanh-Ha Le
2012/702
Cryptanalysis of RAPP, an RFID Authentication Protocol
Nasour Bagheri, Masoumeh Safkhani, Pedro Peris-Lopez, Juan E. Tapiador
2012/701
Recovering RSA Secret Keys from Noisy Key Bits with Erasures and Errors
Noboru Kunihiro, Naoyuki Shinohara, Tetsuya Izu
2012/700
Efficient, Adaptively Secure, and Composable Oblivious Transfer with a Single, Global CRS
Seung Geol Choi, Jonathan Katz, Hoeteck Wee, Hong-Sheng Zhou
2012/699
How Practical is Public-Key Encryption Based on LPN and Ring-LPN?
Ivan Damgård, Sunoo Park
2012/698
5PM: Secure Pattern Matching
Joshua Baron, Karim El Defrawy, Kirill Minkovich, Rafail Ostrovsky, Eric Tressler
2012/697
Verifiable Elections That Scale for Free
Melissa Chase, Markulf Kohlweiss, Anna Lysyanskaya, Sarah Meiklejohn
2012/696
Cryptanalysis of RAKAPOSHI Stream Cipher
Lin Ding, Jie Guan
2012/695
Fully Automated Analysis of Padding-Based Encryption in the Computational Model
Gilles Barthe, Juan Manuel Crespo, Benjamin Grégoire, César Kunz, Yassine Lakhnech, Benedikt Schmidt, Santiago Zanella-Béguelin
2012/694
Cryptanalysis of matrix conjugation schemes
A. D. Myasnikov, A. Ushakov
2012/693
Encoding Functions with Constant Online Rate or How to Compress Garbled Circuits Keys
Benny Applebaum, Yuval Ishai, Eyal Kushilevitz, Brent Waters
2012/692
Generic Constructions of Integrated PKE and PEKS
Yu Chen, Jiang Zhang, Zhenfeng Zhang, Dongdai Lin
2012/691
Root Optimization of Polynomials in the Number Field Sieve
Shi Bai, Richard P. Brent, Emmanuel Thomé
2012/690
The Weakness of Integrity Protection for LTE
Teng Wu, Guang Gong
2012/689
Cryptography Using CAPTCHA Puzzles
Abishek Kumarasubramanian, Rafail Ostrovsky, Omkant Pandey, Akshay Wadia
2012/688
A Simple Provably Secure Key Exchange Scheme Based on the Learning with Errors Problem
Jintai Ding, Xiang Xie, Xiaodong Lin
2012/687
The k-BDH Assumption Family: Bilinear Map Cryptography from Progressively Weaker Assumptions
Karyn Benson, Hovav Shacham, Brent Waters
2012/686
Improved (Pseudo) Preimage Attack and Second Preimage Attack on Round-Reduced Grøstl
Jian Zou, Wenling Wu, Shuang Wu, Le Dong
2012/685
Square root computation over even extension fields
Gora Adj, Francisco Rodríguez-Henríquez
2012/684
Generic Related-key Attacks for HMAC
Thomas Peyrin, Yu Sasaki, Lei Wang
2012/683
Fingerprint Tables: A Generalization of Rainbow Tables
Gildas Avoine, Adrien Bourgeois, Xavier Carpent
2012/682
Proofs of Retrievability with Public Verifiability and Constant Communication Cost in Cloud
Jiawei Yuan, Shucheng Yu
2012/681
Resilience to Distinguishing Attacks on WG-7 Cipher and Their Generalizations
Guang Gong, Mark Aagaard, Xinxin Fan
2012/680
Natural Generalizations of Threshold Secret Sharing
Oriol Farras, Carles Padro, Chaoping Xing, An Yang
2012/679
Hiding the Input-Size in Secure Two-Party Computation
Yehuda Lindell, Kobbi Nissim, Claudio Orlandi
2012/678
Infective Computation and Dummy Rounds: Fault Protection for Block Ciphers without Check-before-Output
Benedikt Gierlichs, Jorn-Marc Schmidt, Michael Tunstall
2012/677
What is the Effective Key Length for a Block Cipher: an Attack on Every Block Cipher
Jialin Huang, Xuejia Lai
2012/676
Mixed-integer Linear Programming in the Analysis of Trivium and Ktantan
Julia Borghoff
2012/675
Minkowski sum based lattice construction for multivariate simultaneous Coppersmith's technique and applications to RSA
Yoshinori Aono
2012/674
Lecture Notes in Secret Sharing
Carles Padro
2012/673
Robust Encryption, Revisited
Pooya Farshim, Benoît Libert, Kenneth G. Paterson, Elizabeth A. Quaglia
2012/672
Collision Attacks on Up to 5 Rounds of SHA-3 Using Generalized Internal Differentials
Itai Dinur, Orr Dunkelman, Adi Shamir
2012/671
Fully Secure Unbounded Inner-Product and Attribute-Based Encryption
Tatsuaki Okamoto, Katsuyuki Takashima
2012/670
Fast Cryptography in Genus 2
Joppe W. Bos, Craig Costello, Huseyin Hisil, Kristin Lauter
2012/669
Blackbox Traceable CP-ABE: How to Catch People Leaking Their Keys by Selling Decryption Devices on eBay
Zhen Liu, Zhenfu Cao, Duncan S. Wong
2012/668
Construction of Differential Characteristics in ARX Designs -- Application to Skein
Gaetan Leurent
2012/667
False Negative probabilities in Tardos codes
Antonino Simone, Boris Skoric
2012/666
Estimating the Φ(n) of Upper/Lower Bound in its RSA Cryptosystem
Chenglian Liu, Ziwei Ye
2012/665
Uniform Compression Functions Can Fail to Preserve “Full” Entropy
Daniel R. L. Brown
2012/664
PRE- Stronger Security Notion and Efficient Construction with New Property
Jiang Zhang, Zhenfeng Zhang, Yu Chen
2012/663
Virtual isomorphisms of ciphers: is AES secure against differential / linear attack?
Alexander Rostovtsev
2012/662
Asynchronous Physical Unclonable Functions – AsyncPUF
Julian Murphy
2012/661
Breaking Another Quasigroup-Based Cryptographic Scheme
Markus Dichtl, Pascale Böffgen
2012/660
Design of Secure Image Transmission In MANET using Number Theory Based Image Compression and uasigroup Encryption (NTICQE) Algorithm
Munivel E, Rajeswari Mukesh
2012/659
Does Counting Still Count? Revisiting the Security of Counting based User Authentication Protocols against Statistical Attacks
Hassan Jameel Asghar, Shujun Li, Ron Steinfeld, Josef Pierpzyk
2012/658
Digital Signatures with Minimal Overhead from Indifferentiable Random Invertible Functions
Eike Kiltz, Krzysztof Pietrzak, Mario Szegedy
2012/657
Fixed Argument Pairing Inversion on Elliptic Curves
Sungwook Kim, Jung Hee Cheon
2012/656
Security Evaluation of Rakaposhi Stream Cipher
Mohammad Ali Orumiehchiha, Josef Pieprzyk, Elham Shakour, Ron Steinfeld
2012/655
Privacy Preserving Revocable Predicate Encryption Revisited
Kwangsu Lee, Intae Kim, Seong Oun Hwang
2012/654
Refine the Concept of Public Key Encryption with Delegated Search
Qiang Tang, Yuanjie Zhao, Xiaofeng Chen, Hua Ma
2012/653
How powerful are the DDH hard groups?
Periklis A. Papakonstantinou, Charles W. Rackoff, Yevgeniy Vahlis
2012/652
Round-Efficient Concurrently Composable Secure Computation via a Robust Extraction Lemma
Vipul Goyal, Huijia Lin, Omkant Pandey, Rafael Pass, Amit Sahai
2012/651
TAAC: Temporal Attribute-based Access Control for Multi-Authority Cloud Storage Systems
Kan Yang, Zhen Liu, Zhenfu Cao, Xiaohua Jia, Duncan S. Wong, Kui Ren
2012/650
Formal analysis of privacy in Direct Anonymous Attestation schemes
Ben Smyth, Mark D. Ryan, Liqun Chen
2012/649
A Robust and Plaintext-Aware Variant of Signed ElGamal Encryption
Yannick Seurin, Joana Treger
2012/648
Search in Encrypted Data: Theoretical Models and Practical Applications
Qiang Tang
2012/647
A Measure of Dependence for Cryptographic Primitives Relative to Ideal Functions
Daniel Smith-Tone, Cristina Tone
2012/646
Galindo-Garcia Identity-Based Signature, Revisited
Sanjit Chatterjee, Chethan Kamath, Vikas Kumar
2012/645
Simple, Efficient and Strongly KI-Secure Hierarchical Key Assignment Schemes
Eduarda S. V. Freire, Kenneth G. Paterson, Bertram Poettering
2012/644
Impossibility Results for Indifferentiability with Resets
Atul Luykx, Elena Andreeva, Bart Mennink, Bart Preneel
2012/643
Protocols for Multiparty Coin Toss With Dishonest Majority
Amos Beimel, Eran Omri, Ilan Orlov
2012/642
Practical Covertly Secure MPC for Dishonest Majority – or: Breaking the SPDZ Limits
Ivan Damgard, Marcel Keller, Enrique Larraia, Valerio Pastro, Peter Scholl, Nigel P. Smart
2012/641
A unidirectional conditional proxy re-encryption scheme based on non-monotonic access structure
Bin Wang
2012/640
Preimage and Pseudo-Collision Attacks on Step-Reduced SM3 Hash Function
Gaoli Wang, Yanzhao Shen
2012/639
Coarse-grained integer - Smooth? Rough? Both!
Daniel Loebenberger, Michael Nüsken
2012/638
Cryptanalysis and Improvement of a Multi-Receiver Generalized Signcryption Scheme
Cai-xue Zhou
2012/637
Efficient Methods for Practical Fully Homomorphic Symmetric-key Encrypton, Randomization and Verification
Aviad Kipnis, Eliphaz Hibshoosh
2012/636
On the Complexity of the BKW Algorithm on LWE
Martin R. Albrecht, Carlos Cid, Jean-Charles Faugère, Robert Fitzpatrick, Ludovic Perret
2012/635
Secure Outsourced Attribute-based Encryption
Jin Li, Jingwei Li, Xiaofeng Chen, Chunfu Jia, Duncan S. Wong
2012/634
Cryptanalysis of Double-Block-Length Hash Mode MJH
Deukjo Hong, Daesung Kwon
2012/633
New Preimage Attack on MDC-4
Deukjo Hong, Daesung Kwon
2012/632
Pairings on Generalized Huff Curves
Abdoul Aziz Ciss, Djiby Sow
2012/631
Message-Locked Encryption and Secure Deduplication
Mihir Bellare, Sriram Keelveedhi, Thomas Ristenpart
2012/630
On the Security of TLS Renegotiation
Florian Giesen, Florian Kohlar, Douglas Stebila
2012/629
SCAPI: The Secure Computation Application Programming Interface
Yael Ejgenberg, Moriya Farbstein, Meital Levy, Yehuda Lindell
2012/628
Efficient Group Key Management Schemes for Multicast Dynamic Communication Systems
Muhammad Yasir Malik
2012/627
Efficient Group Signatures in the Standard Model
Laila El Aimani, Olivier Sanders
2012/626
Bit-Parallel $GF(2^{n})$ Squarer Using Shifted Polynomial Basis
Xi Xiong, Haining Fan
2012/625
Order-Preserving Encryption Revisited: Improved Security Analysis and Alternative Solutions
Alexandra Boldyreva, Nathan Chenette, Adam O’Neill
2012/624
Order-Preserving Symmetric Encryption
Alexandra Boldyreva, Nathan Chenette, Younho Lee, Adam O’Neill
2012/623
Impossible plaintext cryptanalysis and probable-plaintext collision attacks of 64-bit block cipher modes
David McGrew
2012/622
Resolving the conflict between generality and plausibility in verified computation
Srinath Setty, Benjamin Braun, Victor Vu, Andrew J. Blumberg, Bryan Parno, Michael Walfish
2012/621
Biclique Cryptanalysis of Lightweight Block Ciphers PRESENT, Piccolo and LED
Kitae Jeong, HyungChul Kang, Changhoon Lee, Jaechul Sung, Seokhie Hong
2012/620
Solving Subset Sum Problems of Densioty close to 1 by "randomized" BKZ-reduction
Claus P. Schnorr, Taras Shevchenko
2012/619
Asynchronous Computational VSS with Reduced Communication Complexity
Michael Backes, Amit Datta, Aniket Kate
2012/618
An ultra-lightweight ID-based pairwise key establishment scheme aiming at full collusion resistance
Oscar Garcia-Morchon, Ronald Rietman, Ludo Tolhuizen, Domingo Gomez-Perez, Jaime Gutierrez, Santos Merino del Pozo
2012/617
Security Analysis of an Open Car Immobilizer Protocol Stack
Stefan Tillich, Marcin Wójcik
2012/616
Balancing Output Length and Query Bound in Hardness Preserving Constructions of Pseudorandom Functions
Nishanth Chandran, Sanjam Garg
2012/615
Polynomial time solutions of computational problems in noncommutative-algebraic cryptography
Boaz Tsaban
2012/614
An arithmetic intersection formula for denominators of Igusa class polynomials
Kristin Lauter, Bianca Viray
2012/613
Resource-Restricted Indifferentiability
Grégory Demay, Peter Gaźi, Martin Hirt, Ueli Maurer
2012/612
Analysis of the Non-Perfect Table Fuzzy Rainbow Tradeoff
Byoung-Il Kim, Jin Hong
2012/611
A coding theory foundation for the analysis of general unconditionally secure proof-of-retrievability schemes for cloud storage
Maura B. Paterson, Douglas R. Stinson, Jalaj Upadhyay
2012/610
Candidate Multilinear Maps from Ideal Lattices
Sanjam Garg, Craig Gentry, Shai Halevi
2012/609
A NEW APPROACH TO THE DISCRETE LOGARITHM PROBLEM WITH AUXILIARY INPUTS
Taechan Kim, Jung Hee Cheon
2012/608
On the (Non-)Reusability of Fuzzy Sketches and Extractors and Security Improvements in the Computational Setting
Marina Blanton, Mehrdad Aliasgari
2012/607
Graph-Theoretic Algorithms for the ``Isomorphism of Polynomials'' Problem
Charles Bouillaguet, Pierre-Alain Fouque, Amandine Véber
2012/606
Quantum-Secure Message Authentication Codes
Dan Boneh, Mark Zhandry
2012/605
Secure Outsourced Attribute-Based Signatures
Jin Li, Xiaofeng Chen, Jingwei Li, Chunfu Jia, Duncan S. Wong, Willy Susilo
2012/604
Leakage-Resilient Cryptography from Minimal Assumptions
Carmit Hazay, Adriana Lopez-Alt, Hoeteck Wee, Daniel Wichs
2012/603
Collecting Data while Preserving Individuals' Privacy: A Case Study
Alexis Bonnecaze, Robert Rolland
2012/602
A note on invariant linear transformations in multivariate public key cryptography
Andreas Wiemers
2012/601
How to Garble RAM Programs
Steve Lu, Rafail Ostrovsky
2012/600
The LED Block Cipher
Jian Guo, Thomas Peyrin, Axel Poschmann, Matt Robshaw
2012/599
On the coefficients of the polynomial in the number field sieve
Min Yang, Qingshu Meng, Zhangyi Wang, Li Li, Huanguo Zhang
2012/598
Taking proof-based verified computation a few steps closer to practicality (extended version)
Srinath Setty, Victor Vu, Nikhil Panpalia, Benjamin Braun, Muqeet Ali, Andrew J. Blumberg, Michael Walfish
2012/597
A Novel Permutation-based Hash Mode of Operation FP and the Hash Function SAMOSA
Souradyuti Paul, Ekawat Homsirikamol, Kris Gaj
2012/596
Evaluating User Privacy in Bitcoin
Elli Androulaki, Ghassan Karame, Marc Roeschlin, Tobias Scherer, Srdjan Capkun
2012/595
Extending Brickell-Davenport Theorem to Non-Perfect Secret Sharing Schemes
Oriol Farràs, Carles Padró
2012/594
Improved Impossible Differential Attack on Reduced Version of Camellia-192/256
Ya Liu, Dawu Gu, Zhiqiang Liu, Wei Li
2012/593
Factor-4 and 6 (De)compression for Values of Pairings using Trace Maps
Tomoko Yonemura, Taichi Isogai, Hirofumi Muratani, Yoshikazu Hanatani
2012/592
Attribute-Based Encryption for Circuits from Multilinear Maps
Amit Sahai, Brent Waters
2012/591
Biclique Cryptanalysis Of PRESENT, LED, And KLEIN
Farzaneh Abed, Christian Forler, Eik List, Stefan Lucks, Jakob Wenzel
2012/590
--withdrawn--
--withdrawn--
2012/589
--withdrawn--
--withdrawn--
2012/588
Breaking Public Keys - How to Determine an Unknown RSA Public Modulus
Hans-Joachim Knobloch
2012/587
Symbolic computation in block cipher with application to PRESENT
Changyong Peng, Chuangying zhu, Yuefei Zhu, Fei Kang
2012/586
SHADE: Secure HAmming DistancE computation from oblivious transfer
Julien Bringer, Herve Chabanne, Alain Patey
2012/585
On Provably Secure Code-based Signature and Signcryption Scheme
Preetha Mathew K, Sachin Vasant, C. Pandu Rangan
2012/584
Quantitative Analysis of the Full Bitcoin Transaction Graph
Dorit Ron, Adi Shamir
2012/583
New Constructions and Proof Methods for Large Universe Attribute-Based Encryption
Yannis Rouselakis, Brent Waters
2012/582
Using Randomizers for Batch Verification of ECDSA Signatures
Sabyasachi Karati, Abhijit Das, Dipanwita Roychowdhury
2012/581
On the (in)security of some smart-card-based password authentication schemes for WSN
Ding Wang, Chun-guang Ma
2012/580
Cryptanalysis of the OKH Authenticated Encryption Scheme
Peng Wang, Wenling Wu, Liting Zhang
2012/579
Defending Against the Unknown Enemy: Applying FlipIt to System Security
Kevin D. Bowers, Marten van Dijk, Robert Griffin, Ari Juels, Alina Oprea, Ronald L. Rivest, Nikos Triandopoulos
2012/578
Security Evaluations Beyond Computing Power: How to Analyze Side-Channel Attacks you Cannot Mount?
Nicolas Veyrat-Charvillon, Benoît Gérard, François-Xavier Standaert
2012/577
A Framework for Unique Ring Signatures
Matthew Franklin, Haibin Zhang
2012/576
Concurrent Signature without Random Oracles
Xiao Tan, Qiong Huang, Duncan S. Wong
2012/575
Nanoelectronic Solutions for Hardware Security
Jeyavijayan Rajendran, Ramesh Karri, James B. Wendt, Miodrag Potkonjak, Nathan McDonald, Garrett S. Rose, Bryant Wysocki
2012/574
Quantum algorithm for the discrete logarithm problem for matrices over finite group rings
A. D. Myasnikov, A. Ushakov
2012/573
Limits on the Usefulness of Random Oracles
Iftach Haitner, Eran Omri, Hila Zarosim
2012/572
On Constant-Round Concurrent Zero-Knowledge from a Knowledge Assumption
Divya Gupta, Amit Sahai
2012/571
Improved side channel attack on the block cipher NOEKEON
Changyong Peng, Chuangying zhu, Yuefei Zhu, Fei Kang
2012/570
Zero-Correlation Linear Cryptanalysis of Reduced-Round LBlock
Hadi Soleimany, Kaisa Nyberg
2012/569
Improved Zero-knowledge Proofs of Knowledge for the ISIS Problem, and Applications
San Ling, Khoa Nguyen, Damien Stehle, Huaxiong Wang
2012/568
On Transaction Pseudonyms with Implicit Attributes
Stefan G. Weber
2012/567
Leakage Squeezing of Order Two
Claude Carlet, Jean-Luc Danger, Sylvain Guilley, Houssem Maghrebi
2012/566
Quantization in Continuous-Source Zero Secrecy Leakage Helper Data Schemes
Joep de Groot, Boris Škorić, Niels de Vreede, Jean-Paul Linnartz
2012/565
Packed Ciphertexts in LWE-based Homomorphic Encryption
Zvika Brakerski, Craig Gentry, Shai Halevi
2012/564
Adaptively Secure Garbling with Applications to One-Time Programs and Secure Outsourcing
Mihir Bellare, Viet Tung Hoang, Phillip Rogaway
2012/563
Constant-Round Concurrent Zero Knowledge From Falsifiable Assumptions
Kai-Min Chung, Huijia Lin, Rafael Pass
2012/562
Aggregating CL-Signatures Revisited: Extended Functionality and Better Efficiency
Kwangsu Lee, Dong Hoon Lee, Moti Yung
2012/561
An Attack on a Fully Homomorphic Encryption Scheme
Hu Yupu, Wang Fenghe
2012/560
Computational Soundness of Coinductive Symbolic Security under Active Attacks
Mohammad Hajiabadi, Bruce M. Kapron
2012/559
Plaintext Awareness in Identity-Based Key Encapsulation
Mark Manulis, Bertram Poettering, Douglas Stebila
2012/558
Domain-Specific Pseudonymous Signatures for the German Identity Card
Jens Bender, Özgür Dagdelen, Marc Fischlin, Dennis Kügler
2012/557
PUFs: Myth, Fact or Busted? A Security Evaluation of Physically Unclonable Functions (PUFs) Cast in Silicon (Extended Version)
Stefan Katzenbeisser, Ünal Kocabaş, Vladimir Rožić, Ahmad-Reza Sadeghi, Ingrid Verbauwhede, Christian Wachsmann
2012/556
Resource-based Corruptions and the Combinatorics of Hidden Diversity
Juan Garay, David Johnson, Aggelos Kiayias, Moti Yung
2012/555
New Impossibility Results for Concurrent Composition and a Non-Interactive Completeness Theorem for Secure Computation
Shweta Agrawal, Vipul Goyal, Abhishek Jain, Manoj Prabhakaran, Amit Sahai
2012/554
Security weakness in the Proof of Storage with Deduplication
Youngjoo Shin, Junbeom Hur, Kwangjo Kim
2012/553
Bellcore attack in practice
Andrey Sidorenko, Joachim van den Berg, Remko Foekema, Michiel Grashuis, Jaap de Vos
2012/552
Provably Secure Concurrent Error Detection Against Differential Fault Analysis
Xiaofei Guo, Debdeep Mukhopadhyay, Ramesh Karri
2012/551
Faster Pairing Computation on Jacobi quartic Curves with High-Degree Twists
Liangze Li, Hongfeng Wu, Fan Zhang
2012/550
Dynamic Proofs of Retrievability via Oblivious RAM
David Cash, Alptekin Kupcu, Daniel Wichs
2012/549
Faster batch forgery identification
Daniel J. Bernstein, Jeroen Doumen, Tanja Lange, Jan-Jaap Oosterwijk
2012/548
Efficient Modular NIZK Arguments from Shift and Product
Prastudy Fauzi, Helger Lipmaa, Bingsheng Zhang
2012/547
Constrained Search for a Class of Good S-Boxes with Improved DPA Resistivity
Bodhisatwa Mazumdar, Debdeep Mukhopadhyay, Indranil Sengupta
2012/546
Rotational cryptanalysis of round-reduced Keccak
Pawel Morawiecki, Josef Pieprzyk, Marian Srebrny
2012/545
A Versatile Multi-Input Multiplier over Finite Fields
Haibo Yi, Shaohua Tang, Lingling Xu
2012/544
Differential Analysis of the LED Block Cipher
Florian Mendel, Vincent Rijmen, Deniz Toz, Kerem Varici
2012/543
Enhanced Chosen-Ciphertext Security and Applications
Dana Dachman-Soled, Georg Fuchsbauer, Payman Mohassel, Adam O'Neill
2012/542
Salus: A System for Server-Aided Secure Function Evaluation
Seny Kamara, Payman Mohassel, Ben Riva
2012/541
2048XKS - A Software Oriented High Security Block Cipher
Dieter Schmidt
2012/540
A Comparison of Perfect Table Cryptanalytic Tradeoff Algorithms
Ga Won Lee, Jin Hong
2012/539
Efficient Implementation of RSA Algorithm with MKE
Sami A. Nagar, Dr. Saad Alshamma
2012/538
Private Top-k Aggregation Protocols
Myungsun Kim, Abedelaziz Mohaisen, Jung Hee Cheon, Yongdae Kim
2012/537
Intercepting Tokens: The Empire Strikes Back in the Clone Wars
Özgür Dagdelen, Marc Fischlin
2012/536
Secret Sharing and Secure Computing from Monotone Formulae
Ivan Bjerre Damgård, Jonas Kölker, Peter Bro Miltersen
2012/535
A Low-Area Unified Hardware Architecture for the AES and the Cryptographic Hash Function Grøstl
Nuray At, Jean-Luc Beuchat, Eiji Okamoto, Ismail San, Teppei Yamazaki
2012/534
A Simple Combinatorial Treatment of Constructions and Threshold Gaps of Ramp Schemes
Maura B. Paterson, Douglas R. Stinson
2012/533
Solving Hard Lattice Problems and the Security of Lattice-Based Cryptosystems
Thijs Laarhoven, Joop van de Pol, Benne de Weger
2012/532
Pairing computation on Edwards curves with high-degree twists
Liangze Li, Hongfeng Wu, Fan Zhang
2012/531
Generic Construction of Trace and Revoke Schemes
Murat Ak, Aggelos Kiayias, Serdar Pehlivanoglu, Ali Aydin Selcuk
2012/530
Dynamic Searchable Symmetric Encryption
Seny Kamara, Charalampos Papamanthou, Tom Roeder
2012/529
PRINCE - A Low-latency Block Cipher for Pervasive Computing Applications (Full version)
Julia Borghoff, Anne Canteaut, Tim Güneysu, Elif Bilge Kavun, Miroslav Knežević, Lars R. Knudsen, Gregor Leander, Ventzislav Nikov, Christof Paar, Christian Rechberger, Peter Rombouts, Søren S. Thomsen, Tolga Yalçın
2012/528
An ID-Based Signcryption Scheme with Compartmented Secret Sharing for Unsigncryption
Graham Enos, Yuliang Zheng
2012/527
Cryptanalysis of a recent two factor authentication scheme
Michael Scott
2012/526
Invertible Polynomial Representation for Private Set Operations
Jung Hee Cheon, Hyunsook Hong, Hyung Tae Lee
2012/525
Computing endomorphism rings of abelian varieties of dimension two
Gaetan Bisson
2012/524
Tahoe – The Least-Authority Filesystem
Zooko Wilcox-O'Hearn, Brian Warner
2012/523
The Curious Case of Non-Interactive Commitments
Mohammad Mahmoody, Rafael Pass
2012/522
False Positive probabilities in q-ary Tardos codes: comparison of attacks
A. Simone, B. Skoric
2012/521
Functional Encryption with Bounded Collusions via Multi-Party Computation
Sergey Gorbunov, Vinod Vaikuntanathan, Hoeteck Wee
2012/520
Optimizing Segment Based Document Protection (Corrected Version)
Miroslaw Kutylowski, Maciej Gebala
2012/519
Faster implementation of scalar multiplication on Koblitz curves
Diego F. Aranha, Armando Faz-Hernández, Julio López, Francisco Rodríguez-Henríquez
2012/518
Sequential Aggregate Signatures with Short Public Keys: Design, Analysis and Implementation Studies
Kwangsu Lee, Dong Hoon Lee, Moti Yung
2012/517
Unconditionally Secure Asynchronous Multiparty Computation with Linear Communication Complexity
Ashish Choudhury, Martin Hirt, Arpita Patra
2012/516
Garbling XOR Gates ``For Free'' in the Standard Model
Benny Applebaum
2012/515
Semantically-Secure Functional Encryption: Possibility Results, Impossibility Results and the Quest for a General Definition
Mihir Bellare, Adam O'Neill
2012/514
RKA Security beyond the Linear Barrier: IBE, Encryption and Signatures
Mihir Bellare, Kenneth G. Paterson, Susan Thomson
2012/513
Commitments and Efficient Zero-Knowledge Proofs from Learning Parity with Noise
Abhishek Jain, Stephan Krenn, Krzysztof Pietrzak, Aris Tentes
2012/512
Constant-Overhead Secure Computation of Boolean Circuits using Preprocessing
Ivan Damgard, Sarah Zakarias
2012/511
Entangled Cloud Storage
Giuseppe Ateniese, Özgür Dagdelen, Ivan Damgard, Daniele Venturi
2012/510
Enabling 3-share Threshold Implementations for any 4-bit S-box
Sebastian Kutzner, Phuong Ha Nguyen, Axel Poschmann
2012/509
On 3-share Threshold Implementations for 4-bit S-boxes
Sebastian Kutzner, Phuong Ha Nguyen, Axel Poschmann, Huaxiong Wang
2012/508
On the Implausibility of Constant-Round Public-Coin Zero-Knowledge Proofs
Yi Deng, Juan Garay, San Ling, Huaxiong Wang, Moti Yung
2012/507
Compact Implementation and Performance Evaluation of Hash Functions in ATtiny Devices
Josep Balasch, Bariş Ege, Thomas Eisenbarth, Benoit Gérard, Zheng Gong, Tim Güneysu, Stefan Heyse, Stéphanie Kerckhof, François Koeune, Thomas Plos, Thomas Pöppelmann, Francesco Regazzoni, François-Xavier Standaert, Gilles Van Assche, Ronny Van Keer, Loïc van Oldeneel tot Oldenzeel, Ingo von Maurich
2012/506
Succinct Malleable NIZKs and an Application to Compact Shuffles
Melissa Chase, Markulf Kohlweiss, Anna Lysyanskaya, Sarah Meiklejohn
2012/505
On pseudorandomization of information-theoretically secure schemes without hardness assumptions
Koji Nuida
2012/504
Scalable Deniable Group Key Establishment
Kashi Neupane, Rainer Steinwandt, Adriana Suarez Corona
2012/503
Hierarchical Identity-Based (Lossy) Trapdoor Functions
Alex Escala, Javier Herranz, Benoit Libert, Carla Rafols
2012/502
Are We Compromised? Modelling Security Assessment Games
Viet Pham, Carlos Cid
2012/501
Privacy Amplification with Asymptotically Optimal Entropy Loss
Nishanth Chandran, Bhavana Kanukurthi, Rafail Ostrovsky, Leonid Reyzin
2012/500
Constant Ciphertext Length in CP-ABE
Nishant Doshi, Devesh Jinwala
2012/499
Authenticity, Integrity and Proof of Existence for Long-Term Archiving: a Survey
Martín A. G. Vigil, Daniel Cabarcas, Alexander Wiesmaier, Johannes Buchmann
2012/498
Almost Perfect Algebraic Immune Functions with Good Nonlinearity
Meicheng Liu, Dongdai Lin
2012/497
The low-call diet: Authenticated Encryption for call counting HSM users
Mike Bond, George French, Nigel P. Smart, Gaven J. Watson
2012/496
Updating attribute in CP-ABE: A New Approach
Nishant Doshi, Devesh Jinwala
2012/495
"Metaproofs" (and their Cryptographic Applications)
Alfredo De Santis, Moti Yung
2012/494
Protocol Misidentification Made Easy with Format-Transforming Encryption
Kevin P. Dyer, Scott E. Coull, Thomas Ristenpart, Thomas Shrimpton
2012/493
Efficient Query Integrity for Outsourced Dynamic Databases
Qingji Zheng, Shouhuai Xu, Giuseppe Ateniese
2012/492
A Method for Generating Full Cycles by a Composition of NLFSRs
Elena Dubrova
2012/491
On the Multiple Fault Attack on RSA Signatures with LSBs of Messages Unknown
Lidong Han, Wei Wei, Mingjie Liu
2012/490
Desynchronization Attack on RAPP Ultralightweight Authentication Protocol
Zahra Ahmadian, Mahmoud Salmasizadeh, Mohammad Reza Aref
2012/489
Recursive Linear and Differential Cryptanalysis of Ultralightweight Authentication Protocols
Zahra Ahmadian, Mahmoud Salmasizadeh, Mohammad Reza Aref
2012/488
Designated Verifier Threshold Proxy Signature Scheme without Random Oracles
Mohammad Beheshti-Atashgah, Majid Bayat, Mahmoud Gardeshi, Mohammad Reza Aref
2012/487
Short communication: An interpretation of the Linux entropy estimator
Benjamin Pousse
2012/486
Computational Soundness without Protocol Restrictions
Michael Backes, Ankit Malik, Dominique Unruh
2012/485
Exploiting Collisions in Addition Chain-based Exponentiation Algorithms Using a Single Trace
Neil Hanley, HeeSeok Kim, Michael Tunstall
2012/484
Cryptanalysis of Two Dynamic ID-based Remote User Authentication Schemes for Multi-Server Architecture
Ding Wang, Chun-guang Ma, De-li Gu, Zhen-shan Cui
2012/483
An Efficient Signcryption Scheme from q-Diffie-Hellman Problems
Jayaprakash Kar
2012/482
Approaches for the Parallelization of Software Implementation of Integer Multiplication
Vladislav Kovtun, Andrew Okhrimenko
2012/481
Improved Security Bounds for Key-Alternating Ciphers via Hellinger Distance
John Steinberger
2012/480
Short Signatures From Diffie-Hellman: Realizing Short Public Key
Jae Hong Seo
2012/479
Mix-Compress-Mix Revisited: Dispensing with Non-invertible Random Injection Oracles
Mohammad Reza Reyhanitabar, Willy Susilo
2012/478
Cryptanalysis on a novel unconditionally secure oblivious polynomial evaluation protocol
Wang Qinglong, Xu Li
2012/477
Improved Key Recovery Attacks on Reduced-Round AES in the Single-Key Setting
Patrick Derbez, Pierre-Alain Fouque, Jérémy Jean
2012/476
A j-lanes tree hashing mode and j-lanes SHA-256
Shay Gueron
2012/475
Efficient Signatures of Knowledge and DAA in the Standard Model
David Bernhard, Georg Fuchsbauer, Essam Ghadafi
2012/474
On the Semantic Security of Functional Encryption Schemes
Manuel Barbosa, Pooya Farshim
2012/473
Sender Equivocable Encryption Schemes Secure against Chosen-Ciphertext Attacks Revisited
Zhengan Huang, Shengli Liu, Baodong Qin
2012/472
On the Simplicity of Converting Leakages from Multivariate to Univariate – Case Study of a Glitch-Resistant Masking Scheme –
Amir Moradi, Oliver Mischke
2012/471
A Quasigroup Based Random Number Generator for Resource Constrained Environments
Matthew Battey, Abhishek Parakh
2012/470
Some Connections Between Primitive Roots and Quadratic Non-Residues Modulo a Prime
Sorin Iftene
2012/469
Perfect Keyword Privacy in PEKS Systems
Mototsugu Nishioka
2012/468
Functional Encryption: New Perspectives and Lower Bounds
Shweta Agrawal, Sergey Gorbunov, Vinod Vaikuntanathan, Hoeteck Wee
2012/467
New results on nonexistence of generalized bent functions
Yupeng Jiang, Yingpu Deng
2012/466
Computational Entropy and Information Leakage
Benjamin Fuller, Leonid Reyzin
2012/465
T-MATCH: Privacy-Preserving Item Matching for Storage-Only RFID Tags
Kaoutar Elkhiyaoui, Erik-Oliver Blass, Refik Molva
2012/464
Finding Lower Bounds on the Complexity of Secret Sharing Schemes by Linear Programming
Carles Padro, Leonor Vazquez, An Yang
2012/463
Deterministic Public Key Encryption and Identity-Based Encryption from Lattices in the Auxiliary-Input Setting
Xiang Xie, Rui Xue, Rui Zhang
2012/462
Perfect Ambiguous Optimistic Fair Exchange
Yang Wang, Man Ho Au, Willy Susilo
2012/461
Succinct Arguments from Multi-Prover Interactive Proofs and their Efficiency Benefits
Nir Bitansky, Alessandro Chiesa
2012/460
Information-Theoretic Timed-Release Security: Key-Agreement, Encryption, and Authentication Codes
Yohei Watanabe, Takenobu Seito, Junji Shikata
2012/459
Barriers in Cryptography with Weak, Correlated and Leaky Sources
Daniel Wichs
2012/458
Computing small discrete logarithms faster
Daniel J. Bernstein, Tanja Lange
2012/457
Hush Functions Extended to Any Size Input versus Any Size Output
Gideon Samid
2012/456
Crowd-Blending Privacy
Johannes Gehrke, Michael Hay, Edward Lui, Rafael Pass
2012/455
Must you know the code of f to securely compute f?
Mike Rosulek
2012/454
A Probabilistic Quantum Key Transfer Protocol
Abhishek Parakh
2012/453
New Leakage Resilient CCA-Secure Public Key Encryption
Kaoru Kurosawa, Ryo Nojima, Le Trieu Phong
2012/452
EPiC: Efficient Privacy-Preserving Counting for MapReduce
Erik-Oliver Blass, Guevara Noubir, Triet D. Vo-Huu
2012/451
Stam's Conjecture and Threshold Phenomena in Collision Resistance
John Steinberger, Xiaoming Sun, Zhe Yang
2012/450
Tweakable Blockciphers with Beyond Birthday-Bound Security
Will Landecker, Thomas Shrimpton, R. Seth Terashima
2012/449
Long Term Confidentiality: a Survey
Johannes Braun, Johannes Buchmann, Ciaran Mullan, Alex Wiesmaier
2012/448
On the Impossibility of Constructing Efficient Key Encapsulation and Programmable Hash Functions in Prime Order Groups
Goichiro Hanaoka, Takahiro Matsuda, Jacob C. N. Schuldt
2012/447
Multi-receiver Homomorphic Authentication Codes for Network Coding
Zhaohui Tang, Hoon Wei Lim
2012/446
Differential Fault Analysis of AES: Towards Reaching its Limits
Sk Subidh Ali, Debdeep Mukhopadhyay, Michael Tunstall
2012/445
A note on ‘An efficient certificateless aggregate signature with constant pairing computations’
Debiao He, Jianhua Chen, Miaomiao Tian
2012/444
Factorization of a 1061-bit number by the Special Number Field Sieve
Greg Childers
2012/443
Improved CRT Algorithm for Class Polynomials in Genus 2
Kristin Lauter, Damien Robert
2012/442
Group Signatures with Almost-for-free Revocation
Benoit Libert, Thomas Peters, Moti Yung
2012/441
Adaptively Secure Multi-Party Computation with Dishonest Majority
Sanjam Garg, Amit Sahai
2012/440
New Preimage Attacks Against Reduced SHA-1
Simon Knellwolf, Dmitry Khovratovich
2012/439
Robust Smart Card based Password Authentication Scheme against Smart Card Security Breach
Ding Wang, Ping Wang, Chun-guang Ma, Zhong Chen
2012/438
Breaking and Repairing GCM Security Proofs
Tetsu Iwata, Keisuke Ohashi, Kazuhiko Minematsu
2012/437
Dynamic Credentials and Ciphertext Delegation for Attribute-Based Encryption
Amit Sahai, Hakan Seyalioglu, Brent Waters
2012/436
Secure Database Commitments and Universal Arguments of Quasi Knowledge
Melissa Chase, Ivan Visconti
2012/435
Differential Privacy with Imperfect Randomness
Yevgeniy Dodis, Adriana Lopez-Alt, Ilya Mironov, Salil Vadhan
2012/434
Algebraic (Trapdoor) One Way Functions and their Applications
Dario Catalano, Dario Fiore, Rosario Gennaro, Konstantinos Vamvourellis
2012/433
Impossibility Results for Static Input Secure Computation
Sanjam Garg, Abishek Kumarasubramanian, Rafail Ostrovsky, Ivan Visconti
2012/432
TorScan: Tracing Long-lived Connections and Differential Scanning Attacks
Alex Biryukov, Ivan Pustogarov, Ralf-Philipp Weinmann
2012/431
On the Security of Dynamic Group Signatures: Preventing Signature Hijacking
Yusuke Sakai, Jacob C. N. Schuldt, Keita Emura, Goichiro Hanaoka, Kazuo Ohta
2012/430
A formal study of two physical countermeasures against side channel attacks
Sébastien Briais, Sylvain Guilley, Jean-Luc Danger
2012/429
Simple construction of epsilon-biased distribution
Long Hoang Nguyen, Andrew William Roscoe
2012/428
Rational authentication protocols and their use in financial transactions
Long Hoang Nguyen
2012/427
Constructing Pairing-Friendly Genus 2 Curves with Split Jacobian
Robert Drylo
2012/426
A Generalised Formula for Calculating the Resilience of Random Key Predistribution Schemes
Ed Kendall, Michelle Kendall, Wilfrid S. Kendall
2012/425
The Stream Cipher Core of the 3GPP Encryption Standard 128-EEA3: Timing Attacks and Countermeasures
Gautham Sekar
2012/424
Scalable Group Signatures with Revocation
Benoit Libert, Thomas Peters, Moti Yung
2012/423
Programmable encryption and key-dependent messages
Dominique Unruh
2012/422
Biclique Cryptanalysis of TWINE
Mustafa Çoban, Ferhat Karakoç, Özkan Boztaş
2012/421
Security margin evaluation of SHA-3 contest finalists through SAT-based attacks
Ekawat Homsirikamol, Pawel Morawiecki, Marcin Rogawski, Marian Srebrny
2012/420
A Publicly-Veriable Mix-net with Everlasting Privacy Towards Observers
Denise Demirel, Jeroen van de Graaf
2012/419
DAC-MACS: Effective Data Access Control for Multi-Authority Cloud Storage Systems
Kan Yang, Xiaohua Jia, Kui Ren
2012/418
Weaknesses of an Improvement Authentication Scheme using
Rafael Martínez-Peláez, Francisco Rico-Novella
2012/417
Efficient Padding Oracle Attacks on Cryptographic Hardware
Romain Bardou, Riccardo Focardi, Yusuke Kawamoto, Lorenzo Simionato, Graham Steel, Joe-Kai Tsay
2012/416
Beyond eCK: Perfect Forward Secrecy under Actor Compromise and Ephemeral-Key Reveal
Cas Cremers, Michèle Feltz
2012/415
Revisiting Key Schedule's Diffusion In Relation With Round Function's Diffusion
Jialin Huang, Xuejia Lai
2012/414
Low complexity bit-parallel $GF(2^m)$ multiplier for all-one polynomials
Yin Li, Gong-liang Chen, Xiao-ning Xie
2012/413
Highly Secure Strong PUF based on Nonlinearity of MOSFET Subthreshold Operation
Mukund Kalyanaraman, Michael Orshansky
2012/412
Probabilistic Infinite Secret Sharing
Laszlo Csirmaz
2012/411
Infinite Secret Sharing -- Examples
Alexander Dibert, Laszlo Csirmaz
2012/410
Cryptanalysis of an Identity-Based Multiple Key Agreement Scheme
Qingfeng Cheng
2012/409
MDPC-McEliece: New McEliece Variants from Moderate Density Parity-Check Codes
Rafael Misoczki, Jean-Pierre Tillich, Nicolas Sendrier, Paulo S. L. M. Barreto
2012/408
Efficient Implementation of Bilinear Pairings on ARM Processors
Gurleen Grewal, Reza Azarderakhsh, Patrick Longa, Shi Hu, David Jao
2012/407
Cross-Unlinkable Hierarchical Group Signatures
Julien Bringer, Herve Chabanne, Alain Patey
2012/406
Comments on four multi-server authentication protocols using smart card
Jue-Sam Chou, Yalin Chen, Chun-Hui Huang, Yu-Siang Huang
2012/405
Secure Computation on Floating Point Numbers
Mehrdad Aliasgari, Marina Blanton, Yihua Zhang, Aaron Steele
2012/404
Secret Sharing Schemes for Very Dense Graphs
Amos Beimel, Oriol Farràs, Yuval Mintz
2012/403
Fully Private Revocable Predicate Encryption
Juan Manuel Gonzälez Nieto, Mark Manulis, Dongdong Sun
2012/402
Forward-Secure Hierarchical Predicate Encryption
Juan Manuel Gonzälez Nieto, Mark Manulis, Dongdong Sun
2012/401
An All-In-One Approach to Differential Cryptanalysis for Small Block Ciphers
Martin Albrecht, Gregor Leander
2012/400
An Algebraic Fault Attack on the LED Block Cipher
Philipp Jovanovic, Martin Kreuzer, Ilia Polian
2012/399
Differential Fault Analysis on Block Cipher Piccolo
Kitae Jeong
2012/398
PIRMAP: Efficient Private Information Retrieval for MapReduce
Travis Mayberry, Erik-Oliver Blass, Agnes Hui Chan
2012/397
Cross-Domain Password-Based Authenticated Key Exchange Revisited
Liqun Chen, Hoon Wei Lim, Guomin Yang
2012/396
On second-order nonlinearity and maximum algebraic immunity of some bent functions in $\cP S^+$
Brajesh Kumar Singh
2012/395
A New Efficient Authenticated ID-Based Group Key Agreement Protocol
Morteza Arifi, Mahmoud Gardeshi, Mohammad Sabzinejad Farash
2012/394
An ID-Based Key Agreement Protocol Based on ECC Among Users of Separate Networks
Mohammad Sabzinejad Farash, Mahmoud Ahmadian Attari
2012/393
A Certificateless Multiple-key Agreement Protocol Based on Bilinear Pairings
Mohammad Sabzinejad Farash, Mahmoud Ahmadian Attari, Majid Bayat
2012/392
ID Based Signcryption Scheme in Standard Model
S. Sharmila Deva Selvi, S. Sree Vivek, Dhinakaran Vinayagamurthy, C. Pandu Rangan
2012/391
Analysis and Construction of Efficient RFID Authentication Protocol with Backward Privacy
Shaohui Wang, Sujuan Liu, Danwei Chen
2012/390
Regular Ternary Algorithm for Scalar Multiplication on Elliptic Curves over Finite Fields of Characteristic Three
Chol-Sun Sin
2012/389
Wide Strong Private RFID Identification based on Zero-Knowledge
Roel Peeters, Jens Hermans
2012/388
The Arithmetic Codex
Ignacio Cascudo, Ronald Cramer, Chaoping Xing
2012/387
New cryptographic constructions using generalized learning with errors problem
Jintai ding
2012/386
Cryptanalysis of Sood et al.’s Authentication Scheme using Smart Cards
Rafael Martínez-Peláez, Francisco Rico-Novella
2012/385
CCBKE – Session Key Negotiation for Fast and Secure Scheduling of Scientific Applications in Cloud Computing
Chang Liu, Xuyun Zhang, Chi Yang, Jinjun Chen
2012/384
Functional Encryption for Regular Languages
Brent Waters
2012/383
Formalization of Information-Theoretic Security for Encryption and Key Agreement, Revisited
Junji Shikata
2012/382
On the Joint Security of Signature and Encryption Schemes under Randomness Reuse: Efficiency and Security Amplification
Afonso Arriaga, Manuel Barbosa, Pooya Farshim
2012/381
A Strongly Secure Authenticated Key Exchange Protocol from Bilinear Groups without Random Oracles
Zheng Yang
2012/380
Several Weak Bit-Commitments Using Seal-Once Tamper-Evident Devices
Ioana Boureanu, Serge Vaudenay
2012/379
All-But-Many Encryption: A New Framework for Fully-Equipped UC Commitments
Eiichiro Fujisaki
2012/378
Multiparty Proximity Testing with Dishonest Majority from Equality Testing
Ran Gelles, Rafail Ostrovsky, Kina Winoto
2012/377
Distributed Key Generation in the Wild
Aniket Kate, Yizhou Huang, Ian Goldberg
2012/376
Combinatorial Solutions Providing Improved Security for the Generalized Russian Cards Problem
Colleen M. Swanson, Douglas R. Stinson
2012/375
How to Store some Secrets
Reto E. Koenig, Rolf Haenni
2012/374
Infiltrate the Vault: Security Analysis and Decryption of Lion Full Disk Encryption
Omar Choudary, Felix Grobert, Joachim Metz
2012/373
Optimal Lower Bound for Differentially Private Multi-Party Aggregation
T-H. Hubert Chan, Elaine Shi, Dawn Song
2012/372
New Preimage Attacks on Hash Modes of AES-256
Deukjo Hong, Dong-Chan Kim, Daesung Kwon
2012/371
Simultaneous hashing of multiple messages
Shay Gueron, Vlad Krasnov
2012/370
Improved Broadcast Encryption Scheme with Constant-Size Ciphertext
Renaud Dubois, Aurore Guillevic, Marine Sengelin Le Breton
2012/369
Factorisation of RSA-704 with CADO-NFS
Shi Bai, Emmanuel Thomé, Paul Zimmermann
2012/368
Comprehensive Evaluation of High-Speed and Medium-Speed Implementations of Five SHA-3 Finalists Using Xilinx and Altera FPGAs
Kris Gaj, Ekawat Homsirikamol, Marcin Rogawski, Rabia Shahid, Malik Umar Sharif
2012/367
On Continual Leakage of Discrete Log Representations
Shweta Agrawal, Yevgeniy Dodis, Vinod Vaikuntanathan, Daniel Wichs
2012/366
Securing Circuits Against Constant-Rate Tampering
Dana Dachman-Soled, Yael Tauman Kalai
2012/365
Public Auditing for Ensuring Cloud Data Storage Security With Zero Knowledge Privacy
Wang Shao-hui, Chen Dan-wei, Wang Zhi-wei, Chang Su-qin
2012/364
Zero-Knowledge Proofs with Low Amortized Communication from Lattice Assumptions
Ivan Damgard, Adriana Lopez-Alt
2012/363
A Unified Indifferentiability Proof for Permutation- or Block Cipher-Based Hash Functions
Anne Canteaut, Thomas Fuhr, María Naya-Plasencia, Pascal Paillier, Jean-René Reinhard, Marion Videau
2012/362
Achieving Constant Round Leakage-Resilient Zero-Knowledge
Omkant Pandey
2012/361
Quantum Key Distribution in the Classical Authenticated Key Exchange Framework
Michele Mosca, Douglas Stebila, Berkant Ustaoglu
2012/360
Multiple Differential Cryptanalysis using \LLR and $\chi^2$ Statistics
Céline Blondeau, Benoît Gérard, Kaisa Nyberg
2012/359
Another look at non-uniformity
Neal Koblitz, Alfred Menezes
2012/358
PICARO - A Block Cipher Allowing Efficient Higher-Order Side-Channel Resistance -- Extended Version --
Gilles Piret, Thomas Roche, Claude Carlet
2012/357
Publicly Verifiable Ciphertexts
Juan Manuel Gonzälez Nieto, Mark Manulis, Bertram Poettering, Jothi Rangasamy, Douglas Stebila
2012/356
Fully Anonymous Attribute Tokens from Lattices
Jan Camenisch, Gregory Neven, Markus Rückert
2012/355
Never trust a bunny
Daniel J. Bernstein, Tanja Lange
2012/354
Hash Combiners for Second Pre-Image Resistance, Target Collision Resistance and Pre-Image Resistance have Long Output
Arno Mittelbach
2012/353
On Reconfigurable Fabrics and Generic Side-Channel Countermeasures
Robert Beat, Philipp Grabher, Dan Page, Stefan Tillich, Marcin Wójcik
2012/352
On Hashing Graphs
Ashish Kundu, Elisa Bertino
2012/351
SipHash: a fast short-input PRF
Jean-Philippe Aumasson, Daniel J. Bernstein
2012/350
A Note for the Ideal Order-Preserving Encryption Object and Generalized Order-Preserving Encryption
Liangliang Xiao, I-Ling Yen
2012/349
A Differential Fault Attack on Grain-128a using MACs
Subhadeep Banik, Subhamoy Maitra, Santanu Sarkar
2012/348
Oblivious Transfer with Hidden Access Control from Attribute-Based Encryption
Jan Camenisch, Maria Dubovitskaya, Robert R. Enderlein, Gregory Neven
2012/347
Algebraic Differential Fault Attacks on LED using a Single Fault Injection
Xinjie Zhao, Shize Guo, Fan Zhang, Tao Wang, Zhijie Shi, Keke Ji
2012/346
Edwards model of elliptic curves defined over any fields
Oumar DIAO, Emmanuel FOUOTSA
2012/345
Breaking pairing-based cryptosystems using $\eta_T$ pairing over $GF(3^{97})$
Takuya Hayashi, Takeshi Shimoyama, Naoyuki Shinohara, Tsuyoshi Takagi
2012/344
Construction of New Classes of Knapsack Type Public Key Cryptosystem Using Uniform Secret Sequence, K(II)$\Sigma\Pi$PKC, Constructed Based on Maximum Length Code
Masao KASAHARA
2012/343
High-Throughput Hardware Architecture for the SWIFFT / SWIFFTX Hash Functions
Tamas Gyorfi, Octavian Cret, Guillaume Hanrot, Nicolas Brisebarre
2012/342
Enhancing Location Privacy for Electric Vehicles (at the right time)
Joseph Liu, Man Ho Au, Willy Susilo, Jianying Zhou
2012/341
From Selective to Full Security: Semi-Generic Transformations in the Standard Model
Michel Abdalla, Dario Fiore, Vadim Lyubashevsky
2012/340
Deciding Epistemic and Strategic Properties of Cryptographic Protocols
Henning Schnoor
2012/339
Practical Polynomial Time Known Plaintext Attacks on a Stream Cipher Proposed by John Nash
Adi Shamir, Eldad Zinger
2012/338
Characterizations on Algebraic Immunity for Multi-Output Boolean Functions
Xiao Zhong, Mingsheng Wang
2012/337
Analysis and Trade-Offs for the (Complete Tree) Layered Subset Difference Broadcast Encryption Scheme
Sanjay Bhattacherjee, Palash Sarkar
2012/336
RSA modulus generation in the two-party case
Gerald Gavin
2012/335
Constructing Vectorial Boolean Functions with High Algebraic Immunity Based on Group Decomposition
Yu Lou, Huiting Han, Chunming Tang, Maozhi Xu
2012/334
On the Traceability of Tags in SUAP RFID Authentication Protocols
Masoumeh Safkhani, Nasour Bagheri, Majid Naderi
2012/333
On the Feasibility of Extending Oblivious Transfer
Yehuda Lindell, Hila Zarosim
2012/332
A Non-delegatable Identity-based Designated Verifier Signature Scheme without Bilinear Pairings
Maryam Rajabzadeh Asaar, Mahmoud Salmasizadeh
2012/331
Homomorphic Authentication Codes for Network Coding
Zhaohui Tang
2012/330
A Way Reduce Signed Bitwise Differences that Transformed Into Same Modular Differences
Xu ZiJie, Xu Ke
2012/329
An Analysis of ZVP-Attack on ECC Cryptosystems
Claude Crépeau, Raza Ali Kazmi
2012/328
The Multivariate Probabilistic Encryption Scheme MQQ-ENC
Danilo Gligoroski, Simona Samardjiska
2012/327
Security Analysis of RAPP An RFID Authentication Protocol based on Permutation
Wang Shao-hui, Han Zhijie, Liu Sujuan, Chen Dan-wei
2012/326
New Proof Methods for Attribute-Based Encryption: Achieving Full Security through Selective Techniques
Allison Lewko, Brent Waters
2012/325
A note on generalized bent criteria for Boolean functions
Sugata Gangopadhyay, Enes Pasalic, Pantelimon Stanica
2012/324
3D Hardware Canaries
Sébastien Briais, Stéphane Caron, Jean-Michel Cioranesco, Jean-Luc Danger, Sylvain Guilley, Jacques-Henri Jourdan, Arthur Milchior, David Naccache, Thibault Porteboeuf
2012/323
ML Confidential: Machine Learning on Encrypted Data
Thore Graepel, Kristin Lauter, Michael Naehrig
2012/322
Revisiting Dedicated and Block Cipher based Hash Functions
Anupam Pattanayak
2012/321
DECT Security Analysis
Erik Tews
2012/320
The Discrete Logarithm Problem in non-representable rings
Matan Banin, Boaz Tsaban
2012/319
Bounds on the Threshold Gap in Secret Sharing and its Applications
Ignacio Cascudo, Ronald Cramer, Chaoping Xing
2012/318
Non-uniform cracks in the concrete: the power of free precomputation
Daniel J. Bernstein, Tanja Lange
2012/317
A Do-It-All-Cipher for RFID: Design Requirements (Extended Abstract)
Markku-Juhani O. Saarinen, Daniel Engels
2012/316
Computationally Complete Symbolic Attacker in Action
Gergei Bana, Pedro Adão, Hideki Sakurada
2012/315
Using Variance to Analyze Visual Cryptography Schemes
Teng Guo, Feng Liu, ChuanKun Wu, YoungChang Hou
2012/314
Generation of Nonlinear Feedback Shift Registers with special-purpose hardware
Tomasz Rachwalik, Janusz Szmidt, Robert Wicik, Janusz Zablocki
2012/313
An anonymous proxy signature scheme without random oracles
Rahim Toluee, Maryam Rajabzadeh Asaar, Mahmoud Salmasizadeh
2012/312
Cryptanalysis of a Provably Secure Gateway-Oriented Password-Based Authenticated Key Exchange Protocol
Debiao He
2012/311
Tightly Secure Signatures and Public-Key Encryption
Dennis Hofheinz, Tibor Jager
2012/310
A mathematical problem for security analysis of hash functions and pseudorandom generators
Koji Nuida, Takuro Abe, Shizuo Kaji, Toshiaki Maeno, Yasuhide Numata
2012/309
Fast and compact elliptic-curve cryptography
Mike Hamburg
2012/308
Verified Security of Redundancy-Free Encryption from Rabin and RSA
Gilles Barthe, David Pointcheval, Santiago Zanella-Béguelin
2012/307
Multi-Channel Broadcast Encryption
Duong Hieu Phan, David Pointcheval, Viet Cuong Trinh
2012/306
Efficient Threshold Zero-Knowledge with Applications to User-Centric Protocols
Marcel Keller, Gert Læssøe Mikkelsen, Andy Rupp
2012/305
Resistance to Pirates 2.0: A Method from Leakage Resilient Cryptography
Duong Hieu Phan, Viet Cuong Trinh
2012/304
Actively Secure Two-Party Evaluation of any Quantum Operation
Frédéric Dupuis, Jesper Buus Nielsen, Louis Salvail
2012/303
On The Distribution of Linear Biases: Three Instructive Examples
Mohamed Ahmed Abdelraheem, Martin Aagren, Peter Beelen, Gregor Leander
2012/302
On instance separation in the UC-framework
István Vajda
2012/301
A Public Shuffle without Private Permutations
Myungsun Kim, Jinsu Kim, Jung Hee Cheon
2012/300
Threshold Implementations of all 3x3 and 4x4 S-boxes
B. Bilgin, S. Nikova, V. Nikov, V. Rijmen, G. Stütz
2012/299
Differential Power Analysis on ZUC Algorithm
TANG Ming, CHENG PingPan, QIU ZhenLong
2012/298
Anonymous Credentials Light
Foteini Baldimtsi, Anna Lysyanskaya
2012/297
Tamper and Leakage Resilience in the Split-State Model
Feng-Hao Liu, Anna Lysyanskaya
2012/296
In the blink of an eye: There goes your AES key
Sergei Skorobogatov, Christopher Woods
2012/295
Broadcast-enhanced key predistribution schemes
Michelle Kendall, Keith M. Martin, Siaw-Lynn Ng, Maura B. Paterson, Douglas R. Stinson
2012/294
Two grumpy giants and a baby
Daniel J. Bernstein, Tanja Lange
2012/293
New Transference Theorems on Lattices Possessing n^\epsilon-unique Shortest Vectors
Wei Wei, Chengliang Tian, Xiaoyun Wang
2012/292
An Adaptive-Ciphertext Attack against "I $\oplus$ C'' Block Cipher Modes With an Oracle
Jon Passki, Tom Ritter
2012/291
Efficient Dynamic Provable Possession of Remote Data via Update Trees
Yihua Zhang, Marina Blanton
2012/290
Fully Homomorphic Message Authenticators
Rosario Gennaro, Daniel Wichs
2012/289
Ring Group Signatures
Liqun Chen
2012/288
Fair Exchange of Short Signatures without Trusted Third Party
Philippe Camacho
2012/287
Computationally-Fair Group and Identity-Based Key-Exchange
Andrew C. Yao, Yunlei Zhao
2012/286
Protecting Last Four Rounds of CLEFIA is Not Enough Against Differential Fault Analysis
Sk Subidh Ali, Debdeep Mukhopadhyay
2012/285
Constant-Size Structure-Preserving Signatures: Generic Constructions and Simple Assumptions
Masayuki Abe, Melissa Chase, Bernardo David, Markulf Kohlweiss, Ryo Nishimaki, Miyako Ohkubo
2012/284
Efficient UC-Secure Authenticated Key-Exchange for Algebraic Languages
Fabrice Ben Hamouda, Olivier Blazy, Céline Chevalier, David Pointcheval, Damien Vergnaud
2012/283
Some properties of q-ary functions based on spectral analysis
Deep Singh, Maheshanand Bhaintwal
2012/282
ALGEBRAIC COUNTERMEASURE TO ENHANCE THE IMPROVED SUMMATION GENERATOR WITH 2-BIT MEMORY
Md. Iftekhar Salam, Hoon-Jae Lee
2012/281
Publicly Verifiable Delegation of Large Polynomials and Matrix Computations, with Applications
Dario Fiore, Rosario Gennaro
2012/280
Improved ``Partial Sums"-based Square Attack on AES
Michael Tunstall
2012/279
Concurrent Zero Knowledge in the Bounded Player Model
Vipul Goyal, Abhishek Jain, Rafail Ostrovsky, Silas Richelson, Ivan Visconti
2012/278
Improved Indifferentiability Security Bound for the JH Mode
Dustin Moody, Souradyuti Paul, Daniel Smith-Tone
2012/277
Cyptanalysis CDHP , BDHP and Tate pairing under certain conditions The Tate pairing is less secure than Weil
Rkia Aouinatou, Mostafa Belkasmi
2012/276
Official Arbitration with Secure Cloud Storage Application
Alptekin Küpçü
2012/275
Implementing BLAKE with AVX, AVX2, and XOP
Samuel Neves, Jean-Philippe Aumasson
2012/274
Boomerang and Slide-Rotational Analysis of the SM3 Hash Function
Aleksandar Kircanski, Amr M. Youssef
2012/273
Public-Key Cryptography from New Multivariate Quadratic Assumptions
Yun-Ju Huang, Feng-Hao Liu, Bo-Yin Yang
2012/272
Passive Corruption in Statistical Multi-Party Computation
Martin Hirt, Christoph Lucas, Ueli Maurer, Dominik Raub
2012/271
Homomorphic Signature for Identity Authentication in Cloud Computing
Zhiwei Wang, Guozi Sun, Danwei Chen
2012/270
Quo Vadis Quaternion? Cryptanalysis of Rainbow over Non-Commutative Rings
Enrico Thomae
2012/269
Quantifying Side-Channel Information Leakage from Web Applications
Luke Mather, Elisabeth Oswald
2012/268
On the CCA2 Security of McEliece in the Standard Model
Edoardo Persichetti
2012/267
Self-pairings on Hyperelliptic Curves
Steven D. Galbraith, Chang-An Zhao
2012/266
Compilation Techniques for Efficient Encrypted Computation
Christopher Fletcher, Marten van Dijk, Srinivas Devadas
2012/265
Foundations of Garbled Circuits
Mihir Bellare, Viet Tung Hoang, Phillip Rogaway
2012/264
On the (In)Security of IDEA in Various Hashing Modes
Lei Wei, Thomas Peyrin, Przemyslaw Sokolowski, San Ling, Josef Pieprzyk, Huaxiong Wang
2012/263
One-way Functions from Chebyshev Polynomials
Kai-Yuen Cheong
2012/262
Implementing AES via an Actively/Covertly Secure Dishonest-Majority MPC Protocol
I. Damgard, M. Keller, E. Larraia, C. Miles, N. P. Smart
2012/261
Dual Form Signatures: An Approach for Proving Security from Static Assumptions
Michael Gerbush, Allison Lewko, Adam O'Neill, Brent Waters
2012/260
Transposition of AES Key Schedule
Jialin Huang, Xuejia Lai
2012/259
A Novel Strong Designated Verifier Signature Scheme without Random Oracles
Maryam Rajabzadeh Asaar, Mahmoud Salmasizadeh
2012/258
Full Proof Cryptography: Verifiable Compilation of Efficient Zero-Knowledge Protocols
José Bacelar Almeida, Manuel Barbosa, Endre Bangerter, Gilles Barthe, Stephan Krenn, Santiago Zanella Béguelin
2012/257
The Transformation from the Galois NLFSR to the Fibonacci Configuration
Lin Zhiqiang
2012/256
The myth of generic DPA...and the magic of learning
Carolyn Whitnall, Elisabeth Oswald, François-Xavier Standaert
2012/255
How to Garble Arithmetic Circuits
Benny Applebaum, Yuval Ishai, Eyal Kushilevitz
2012/254
FastPRP: Fast Pseudo-Random Permutations for Small Domains
Emil Stefanov, Elaine Shi
2012/253
Cryptanalysis of pairing-free certificateless authenticated key agreement protocol
Zhian Zhu
2012/252
Fair Private Set Intersection with a Semi-trusted Arbiter
Changyu Dong, Liqun Chen, Jan Camenisch, Giovanni Russello
2012/251
The Linux Pseudorandom Number Generator Revisited
Patrick Lacharme, Andrea Röck, Vincent Strubel, Marion Videau
2012/250
New Identity Based Encryption And Its Proxy Re-encryption
Xu An Wang, Xiaoyuan Yang
2012/249
Binary and q-ary Tardos codes, revisited
Boris Skoric, Jan-Jaap Oosterwijk
2012/248
Two Bitcoins at the Price of One? Double-Spending Attacks on Fast Payments in Bitcoin
Ghassan O. Karame, Elli Androulaki, Srdjan Capkun
2012/247
On Efficient Pairings on Elliptic Curves over Extension Fields
Xusheng Zhang, Kunpeng Wang, Dongdai Lin
2012/246
A Secret Sharing Scheme Based on Group Presentations and the Word Problem
Maggie Habeeb, Delaram Kahrobaei, Vladimir Shpilrain
2012/245
On the Equivalence between the Set Covering Problem and the Problem of Finding Optimal Cumulative Assignment Schemes
Qiang Li, Xiangxue Li, Dong Zheng, Zheng Huang, Kefei Chen
2012/244
Cryptography from tensor problems
Leonard J. Schulman
2012/243
COMPRESS MULTIPLE CIPHERTEXTS USING ELGAMAL ENCRYPTION SCHEMES
MYUNGSUN KIM, JIHYE KIM, JUNG HEE CHEON
2012/242
Less is More: Relaxed yet Composable Security Notions for Key Exchange
C. Brzuska, M. Fischlin, N. P. Smart, B. Warinschi, S. Williams
2012/241
Key distribution system and attribute-based encryption
Masahiro Yagisawa
2012/240
Field Switching in BGV-Style Homomorphic Encryption
Craig Gentry, Shai Halevi, Chris Peikert, Nigel P. Smart
2012/239
Zero-Knowledge for Multivariate Polynomials
Valerie Nachef, Jacques Patarin, Emmanuel Volte
2012/238
The Boomerang Attacks on the Round-Reduced Skein-512
Hongbo Yu, Jiazhe Chen, XIaoyun Wang
2012/237
In the point of view security, An efficient scheme in IBE with random oracle
Rkia Aouinatou, Mostafa Belkasmi
2012/236
On Necessary and Sufficient Conditions for Private Ballot Submission
D. Bernhard, O. Pereira, B. Warinschi
2012/235
Ring-LWE in Polynomial Rings
Leo Ducas, Alain Durmus
2012/234
SPN-Hash: Improving the Provable Resistance Against Differential Collision Attacks
Jiali Choy, Huihui Yap, Khoongming Khoo, Jian Guo, Thomas Peyrin, Axel Poschmann, Chik How Tan
2012/233
A Cryptanalysis of HummingBird-2: The Differential Sequence Analysis
Qi Chai, Guang Gong
2012/232
Implementing Pairings at the 192-bit Security Level
Diego F. Aranha, Laura Fuentes-Castañeda, Edward Knapp, Alfred Menezes, Francisco Rodríguez-Henríquez
2012/231
A General Construction for 1-round $\delta$-RMT and (0, $\delta$)-SMT
Reihaneh Safavi-Naini, Mohammed Ashraful Alam Tuhin, Pengwei Wang
2012/230
On Ideal Lattices and Learning with Errors Over Rings
Vadim Lyubashevsky, Chris Peikert, Oded Regev
2012/229
Languages with Efficient Zero-Knowledge PCP's are in SZK
Mohammad Mahmoody, David Xiao
2012/228
Physical Unclonable Functions in Cryptographic Protocols: Security Proofs and Impossibility Results
Marten van Dijk, Ulrich Rührmair
2012/227
Secure password-based remote user authentication scheme with non-tamper resistant smart cards
Ding Wang, Chun-guang Ma, Peng Wu
2012/226
ZKPDL: A Language-Based System for Efficient Zero-Knowledge Proofs and Electronic Cash
Sarah Meiklejohn, C. Chris Erway, Alptekin Küpçü, Theodora Hinkle, Anna Lysyanskaya
2012/225
When Homomorphism Becomes a Liability
Zvika Brakerski
2012/224
Shorter IBE and Signatures via Asymmetric Pairings
Jie Chen, Hoon Wei Lim, San Ling, Huaxiong Wang, Hoeteck Wee
2012/223
A Generalization of the Rainbow Band Separation Attack and its Applications to Multivariate Schemes
Enrico Thomae
2012/222
A secret sharing scheme of prime numbers based on hardness of factorization
Kai-Yuen Cheong
2012/221
Almost-Everywhere Secure Computation with Edge Corruptions
Nishanth Chandran, Juan Garay, Rafail Ostrovsky
2012/220
Hedged Public-key Encryption: How to Protect against Bad Randomness
Mihir Bellare, Zvika Brakerski, Moni Naor, Thomas Ristenpart, Gil Segev, Hovav Shacham, Scott Yilek
2012/219
Private Fingerprint Matching
Siamak F. Shahandashti, Reihaneh Safavi-Naini, Philip Ogunbona
2012/218
Differentially Private Continual Monitoring of Heavy Hitters from Distributed Streams
T-H. Hubert Chan, Mingfei Li, Elaine Shi, Wenchang Xu
2012/217
Efficient Dissection of Bicomposite Problems with Cryptanalytic Applications
Itai Dinur, Orr Dunkelman, Nathan Keller, Adi Shamir
2012/216
Adaptive CCA Broadcast Encryption with Constant-Size Secret Keys and Ciphertexts
Duong-Hieu Phan, David Pointcheval, Siamak F. Shahandashti, Mario Strefler
2012/215
Quadratic Span Programs and Succinct NIZKs without PCPs
Rosario Gennaro, Craig Gentry, Bryan Parno, Mariana Raykova
2012/214
Automatic Search of Truncated Impossible Differentials for Word-Oriented Block Ciphers (Full Version)
Shengbao Wu, Mingsheng Wang
2012/213
Relation between Verifiable Random Functions and Convertible Undeniable Signatures, and New Constructions
Kaoru Kurosawa, Ryo Nojima, Le Trieu Phong
2012/212
Perfect Algebraic Immune Functions
Meicheng Liu, Yin Zhang, Dongdai Lin
2012/211
Strongly Secure Authenticated Key Exchange from Factoring, Codes, and Lattices
Atsushi Fujioka, Koutarou Suzuki, Keita Xagawa, Kazuki Yoneyama
2012/210
On the Existence of Boolean Functions with Optimal Resistance against Fast Algebraic Attacks
Yusong Du, Fangguo Zhang
2012/209
Adaptive Preimage Resistance Analysis Revisited:\\ Requirements, Subtleties and Implications
Donghoon Chang, Moti Yung
2012/208
A NEW GUESS-AND-DETERMINE ATTACK ON THE A5/1 STREAM CIPHER
Jay Shah, Ayan Mahalanobis
2012/207
Cryptanalysis of Hummingbird-2
Kai Zhang, Lin Ding, Jie Guan
2012/206
(Pseudo) Preimage Attack on Round-Reduced Grøstl Hash Function and Others (Extended Version)
Shuang Wu, Dengguo Feng, Wenling Wu, Jian Guo, Le Dong, Jian Zou
2012/205
Information-flow control for programming on encrypted data
J. C. Mitchell, R. Sharma, D. Stefan, J. Zimmerman
2012/204
Unique Group Signatures
Matthew Franklin, Haibin Zhang
2012/203
Robust biometric-based user authentication scheme for wireless sensor networks
Debiao He
2012/202
Secure Similarity Coefficients Computation with Malicious Adversaries
Bo Zhang, Fangguo Zhang
2012/201
Comment an Anonymous Multi-receiver Identity-based Encryption Scheme
J. H. Zhang, Y. B. Cui
2012/200
Aggregate Signcryption
Alexander W. Dent
2012/199
Using Symmetries in the Index Calculus for Elliptic Curves Discrete Logarithm
Jean-Charles Faugère, Pierrick Gaudry, Louise Huot, Guénaël Renault
2012/198
Beyond the Limitation of Prime-Order Bilinear Groups, and Round Optimal Blind Signatures
Jae Hong Seo, Jung Hee Cheon
2012/197
On The Security of One-Witness Blind Signature Schemes
Foteini Baldimtsi, Anna Lysyanskaya
2012/196
Multi-Instance Security and its Application to Password-Based Cryptography
Mihir Bellare, Thomas Ristenpart, Stefano Tessaro
2012/195
The BlueJay Ultra-Lightweight Hybrid Cryptosystem
Markku-Juhani O. Saarinen
2012/194
A Multivariate based Threshold Ring Signature Scheme
Albrecht Petzoldt, Stanislav Bulygin, Johannes Buchmann
2012/193
An Efficient Homomorphic Encryption Protocol for Multi-User Systems
Liangliang Xiao, Osbert Bastani, I-Ling Yen
2012/192
Extending Order Preserving Encryption for Multi-User Systems
Liangliang Xiao, I-Ling Yen, Dung T. Huynh
2012/191
Security Analysis and Enhancement for Prefix-Preserving Encryption Schemes
Liangliang Xiao, I-Ling Yen
2012/190
On the Security of an Improved Password Authentication Scheme Based on ECC
Ding Wang, Chun-guang Ma
2012/189
Universally Composable Key-Management
Steve Kremer, Robert Künnemann, Graham Steel
2012/188
Non-Malleable Extractors, Two-Source Extractors and Privacy Amplification
Xin Li
2012/187
SmartTokens: Delegable Access Control with NFC-enabled Smartphones (Full Version)
Alexandra Dmitrienko, Ahmad-Reza Sadeghi, Sandeep Tamrakar, Christian Wachsmann
2012/186
Third-order nonlinearities of some biquadratic monomial Boolean functions
Brajesh Kumar Singh
2012/185
Replay attacks that violate ballot secrecy in Helios
Ben Smyth
2012/184
Asymptotic fingerprinting capacity in the Combined Digit Model
Dion Boesten, Boris Skoric
2012/183
Differentially Private Smart Metering with Battery Recharging
Michael Backes, Sebastian Meiser
2012/182
How to Construct Quantum Random Functions
Mark Zhandry
2012/181
A Modular Framework for Multi-Factor Authentication and Key Exchange
Nils Fleischhacker, Mark Manulis, Amir Azodi
2012/180
Yet Another SHA-3 Round 3 FPGA Results Paper
Brian Baldwin, William P. Marnane
2012/179
Billion-Gate Secure Computation with Malicious Adversaries
Benjamin Kreuter, abhi shelat, Chih-hao Shen
2012/178
Eperio: Mitigating Technical Complexity in Cryptographic Election Verification
Aleksander Essex, Jeremy Clark, Urs Hengartner, Carlisle Adams
2012/177
Everlasting Multi-Party Computation
Dominique Unruh
2012/176
Improvements of Algebraic Attacks Based on Structured Gaussian Elimination
Satrajit Ghosh, Abhijit Das
2012/175
Optimal First-Order Masking with Linear and Non-Linear Bijections
Houssem MAGHREBI, Claude CARLET, Sylvain GUILLEY, Jean-Luc DANGER
2012/174
Zero Knowledge with Rubik's Cubes and Non-Abelian Groups
Emmanuel VOLTE, Jacques PATARIN, Valérie NACHEF
2012/173
Automatically Verified Mechanized Proof of One-Encryption Key Exchange
Bruno Blanchet
2012/172
Attacking RSA-CRT Signatures with Faults on Montgomery Multiplication
Pierre-Alain Fouque, Nicolas Guillermin, Delphine Leresteux, Mehdi Tibouchi, Jean-Christophe Zapalowicz
2012/171
Quantum Money from Hidden Subspaces
Scott Aaronson, Paul Christiano
2012/170
Approaches for the performance increasing of software implementation of integer multiplication in prime fields
Vladislav Kovtun, Andrew Okhrimenko
2012/169
Analysis of Minimum Numbers of Linearly Active S-Boxes of a Class of Generalized Feistel Block Ciphers
Xiaopei Guo, Kejian Xu, Tongsen Sun, Xiubin Fan
2012/168
A Distinguisher-Based Attack of a Homomorphic Encryption Scheme Relying on Reed-Solomon Codes
Valérie Gauthier, Ayoub Otmani, Jean-Pierre Tillich
2012/167
Pairing-based methods for genus 2 jacobians with maximal endomorphism ring
Sorina Ionica
2012/166
A List of Maximum Period NLFSRs
Elena Dubrova
2012/165
Key Updates for RFID Distance-Bounding Protocols: Achieving Narrow-Destructive Privacy
Cristina Onete
2012/164
On Secure Two-party Integer Division
Morten Dahl, Chao Ning, Tomas Toft
2012/163
Differential propagation analysis of Keccak
Joan Daemen, Gilles Van Assche
2012/162
Provably Secure Online/Off-line Identity-Based Signature Scheme forWireless Sensor Network
Jayaprakash Kar
2012/161
New Constructions of Low Correlation Sequences with High Linear Complexity
Hai Xiong, Chao Li, Qingping Dai, Shaojing Fu
2012/160
New Construction of Perfect Sequence Set and Low Correlation Zone Sequence Set
Hai Xiong, Longjiang Qu, Chao Li
2012/159
Hybrid Encryption in the Multi-User Setting
G. M. Zaverucha
2012/158
Efficient and Optimally Secure Key-Length Extension for Block Ciphers via Randomized Cascading
Peter Gazi, Stefano Tessaro
2012/157
Attack on Fully Homomorphic Encryption over the Integers
Gu Chunsheng
2012/156
Fast Embedded Software Hashing
Dag Arne Osvik
2012/155
Toward Practical Group Encryption
Laila El Aimani, Marc Joye
2012/154
The Joint Signature and Encryption Revisited
Laila El Aimani
2012/153
A Framework for the Cryptographic Verification of Java-like Programs
Ralf Kuesters, Tomasz Truderung, Juergen Graf
2012/152
On security of a Certificateless Aggregate Signature Scheme
Limin Shen, Yinxia Sun
2012/151
On Boolean Ideals and Varieties with Application to Algebraic Attacks
Alexander Rostovtsev, Alexey Mizyukin
2012/150
Circular chosen-ciphertext security with compact ciphertexts
Dennis Hofheinz
2012/149
Attacking Scrambled Burrows-Wheeler Transform
Martin Stanek
2012/148
Replacing Username/Password with Software-Only Two-Factor Authentication
Michael Scott
2012/147
On Security Arguments of the Second Round SHA-3 Candidates
Elena Andreeva, Andrey Bogdanov, Bart Mennink, Bart Preneel, Christian Rechberger
2012/146
On Polynomial Systems Arising from a Weil Descent
Christophe Petit, Jean-Jacques Quisquater
2012/145
Construction of the Tsujii-Shamir-Kasahara (TSK) Type Multivariate Public Key Cryptosystem, which relies on the Difficulty of Prime Factorization
Shigeo Tsujii, Kohtaro Tadaki, Masahito Gotaishi, Ryou Fujita
2012/144
Somewhat Practical Fully Homomorphic Encryption
Junfeng Fan, Frederik Vercauteren
2012/143
Universally Composable Secure Computation with (Malicious) Physically Uncloneable Functions
Rafail Ostrovsky, Alessandra Scafuro, Ivan Visconti, Akshay Wadia
2012/142
Identity-Based Encryption with Master Key-Dependent Message Security and Applications
David Galindo, Javier Herranz, Jorge Villar
2012/141
Bicliques for permutations: collision and preimage attacks in stronger settings
Dmitry Khovratovich
2012/140
Highly-Parallel Montgomery Multiplication for Multi-core General-Purpose Microprocessors
Selcuk Baktir, Erkay Savas
2012/139
Formal verication of secure ad-hoc network routing protocols using deductive model-checking
Ta Vinh Thong
2012/138
An Improved Differential Attack on Full GOST (extended version)
Nicolas T. Courtois
2012/137
Usable assembly language for GPUs: a success story
Daniel J. Bernstein, Hsieh-Chung Chen, Chen-Mou Cheng, Tanja Lange, Ruben Niederhagen, Peter Schwabe, Bo-Yin Yang
2012/136
Adaptive Key Protection in Complex Cryptosystems with Attributes
Zilong Wang, Danfeng (Daphne) Yao, Rongquan Feng
2012/135
David & Goliath Oblivious Affine Function Evaluation - Asymptotically Optimal Building Blocks for Universally Composable Two-Party Computation from a Single Untrusted Stateful Tamper-Proof Hardware Token
Nico Döttling, Daniel Kraschewski, Jörn Müller-Quade
2012/134
A Digital Signature Scheme for Long-Term Security
Dimitrios Poulakis, Robert Rolland
2012/133
Toward Practical Private Access to Data Centers via Parallel ORAM
Jacob R. Lorch, Bryan Parno, James Mickens, Mariana Raykova, Joshua Schiffman
2012/132
CFS Software Implementation
Gregory Landais, Nicolas Sendrier
2012/131
Composition Theorems for CCA Cryptographic Security
Rodolphe Lampe, Jacques Patarin
2012/130
Broadcast (and Round) Efficient Verifiable Secret Sharing
Juan Garay, Clint Givens, Rafail Ostrovsky, Pavel Raykov
2012/129
Outsider-Anonymous Broadcast Encryption with Sublinear Ciphertexts
Nelly Fazio, Irippuge Milinda Perera
2012/128
Provably Secure Distance-Bounding: an Analysis of Prominent Protocols
Marc Fischlin, Cristina Onete
2012/127
Additive autocorrelation of some classes of cubic semi-bent Boolean functions
Deep Singh, Maheshanand Bhaintwal
2012/126
Compact Implementation of Threefish and Skein on FPGA
Nuray At, Jean-Luc Beuchat, Ismail San
2012/125
Short and Efficient Expressive Attribute-Based Signature in the Standard Model
Aijun Ge, Cheng Chen, Chuangui Ma, Zhenfeng Zhang
2012/124
On Securing Communication From Profilers
Sandra Diaz-Santiago, Debrup Chakraborty
2012/123
Injection of transient faults using electromagnetic pulses -Practical results on a cryptographic system-
A. Dehbaoui, J. M. Dutertre, B. Robisson, P. Orsatelli, P. Maurine, A. Tria
2012/122
Efficient Arithmetic on Elliptic Curves over Fields of Characteristic Three
Reza R. Farashahi, Hongfeng Wu, Chang-An Zhao
2012/121
An Efficient Multistage Secret Sharing Scheme Using Linear One-way Functions and Bilinear Maps
Mitra Fatemi, Taraneh Eghlidos, Mohammadreza Aref
2012/120
Password Protected Smart Card and Memory Stick Authentication Against Off-line Dictionary Attacks
Yongge Wang
2012/119
Accelerating the Final Exponentiation in the Computation of the Tate Pairings
Taechan Kim, Sungwook Kim, Jung Hee Cheon
2012/118
Stronger Public Key Encryption Schemes Withstanding RAM Scraper Like Attacks
S. Sree Vivek, S. Sharmila Deva Selvi, C. Pandu Rangan
2012/117
Universally Composable Security With Local Adversaries
Ran Canetti, Margarita Vald
2012/116
Clash Attacks on the Verifiability of E-Voting Systems
Ralf Kuesters, Tomasz Truderung, Andreas Vogt
2012/115
Cryptanalysis of auditing protocol proposed by Wang et al. for data storage security in Cloud Computing
XU Chun-xiang, HE Xiao-hu, Daniel Abraha
2012/114
On Hardening Leakage Resilience of Random Extractors for Instantiations of Leakage Resilient Cryptographic Primitives
Danyang Chen, Yongbin Zhou, Yang Han, Rui Xue, Qing He
2012/113
On the Collision and Preimage Security of MDC-4 in the Ideal Cipher Model
Bart Mennink
2012/112
On The Nonlinearity of Maximum-length NFSR Feedbacks
Meltem Sonmez Turan
2012/111
On the Immunity of Rotation Symmetric Boolean Functions Against Fast Algebraic Attacks
Yin Zhang, Meicheng Liu, Dongdai Lin
2012/110
Finding Optimal Formulae for Bilinear Maps
Razvan Barbulescu, Jérémie Detrey, Nicolas Estibals, Paul Zimmermann
2012/109
Chosen-Ciphertext Secure Efficiently Searchable Encryption in the Standard Model
Yang Cui, Kirill Morozov
2012/108
On the Optimality of Lattices for the Coppersmith Technique
Yoshinori Aono, Manindra Agrawal, Takakazu Satoh, Osamu Watanabe
2012/107
Security Analysis of A Single Sign-On Mechanism for Distributed Computer Networks
Guilin Wang, Jiangshan Yu, Qi Xie
2012/106
More on Correcting Errors in RSA Private Keys: Breaking CRT-RSA with Low Weight Decryption Exponents
Santanu Sarkar, Subhamoy Maitra
2012/105
Generic Construction of Certificate Based Encryption from Certificateless Encryption Revisited
Wei Gao, Guilin Wang, Kefei Chen, Xueli Wang
2012/104
Provably Secure Generic Construction of Certificate Based Signature from Certificateless Signature in Standard Model
Wei Gao, Guilin Wang, Kefei Chen, Xueli Wang
2012/103
FlipIt: The Game of "Stealthy Takeover"
Marten van Dijk, Ari Juels, Alina Oprea, Ronald L. Rivest
2012/102
On the Circular Security of Bit-Encryption
Ron Rothblum
2012/101
Unbalanced Elementary Symmetric Boolean Functions with the Degree "d" and "wt(d)>=3"
Zhihui Ou
2012/100
Cryptanalysis of a Universally Verifiable Efficient Re-encryption Mixnet
Shahram Khazaei, Björn Terelius, Douglas Wikström
2012/099
Homomorphic Evaluation of the AES Circuit
Craig Gentry, Shai Halevi, Nigel P. Smart
2012/098
Combined Attacks on the AES Key Schedule
François Dassance, Alexandre Venelli
2012/097
An algorithm for factoring integers
Yingpu Deng, Yanbin Pan
2012/096
The Collision Security of MDC-4
Ewan Fleischmann, Christian Forler, Stefan Lucks, Jakob Wenzel
2012/095
Recursive Composition and Bootstrapping for SNARKs and Proof-Carrying Data
Nir Bitansky, Ran Canetti, Alessandro Chiesa, Eran Tromer
2012/094
Algebraic attack on lattice based cryptosystems via solving equations over real numbers.
Jintai Ding, Dieter Schmidt
2012/093
Recent Results on Balanced Symmetric Boolean Functions
Yingming Guo, Guangpu Gao, Yaqun Zhao
2012/092
Tolerant Algebraic Side-Channel Analysis of {AES}
Yossef Oren, Avishai Wool
2012/091
Hardness of decision (R)LWE for any modulus
Adeline Langlois, Damien Stehle
2012/090
Worst-Case to Average-Case Reductions for Module Lattices
Adeline Langlois, Damien Stehle
2012/089
ECM at Work
Joppe W. Bos, Thorsten Kleinjung
2012/088
A Lattice-Based Traitor Tracing Scheme
San Ling, Damien Stehle
2012/087
Collision Bounds for the Additive Pollard Rho Algorithm for Solving Discrete Logarithms
Joppe W. Bos, Alina Dudeanu, Dimitar Jetchev
2012/086
Remarks on- An ideal multi-secret sharing scheme based on MSP
Zhi-hui Li Jing Li
2012/085
Study of the invariant coset attack on PRINTcipher: more weak keys with practical key recovery
Stanislav Bulygin, Michael Walter
2012/084
Improved Algebraic Side-Channel Attack on AES
Mohamed Saied Emam Mohamed, Stanislav Bulygin, Michael Zohner, Annelie Heuser, Michael Walter
2012/083
Optimally Robust Private Information Retrieval
Casey Devet, Ian Goldberg, Nadia Heninger
2012/082
Semi-Supervised Template Attack
Liran Lerman, Stephane Fernandes Medeiros, Nikita Veshchikov, Cedric Meuter, Gianluca Bontempi, Olivier Markowitch
2012/081
Computational Soundness of Symbolic Zero-knowledge Proofs: Weaker Assumptions and Mechanized Verification
Michael Backes, Fabian Bendun, Dominique Unruh
2012/080
Strongly Unforgeable Proxy Re-Signatures in the Standard Model
S. Sree Vivek, S. Sharmila Deva Selvi, Guhan Balasubramanian, C. Pandu Rangan
2012/079
Public Key Cryptosystems Constructed Based on Reed-Solomon Codes, K(XV)SE(2)PKC, Realizing Coding Rate of Exactly 1.0
Masao KASAHARA
2012/078
Fully Homomorphic Encryption without Modulus Switching from Classical GapSVP
Zvika Brakerski
2012/077
MAGNITUDE SQUARED COHERENCE BASED SCA
Sebastien Tiran, Amine Dehbaoui, Philippe Maurine
2012/076
Secure Identity-Based Encryption in the Quantum Random Oracle Model
Mark Zhandry
2012/075
Efficient identity-based threshold decryption scheme from bilinear pairings
Wei Gao, Guilin Wang, Kefei Chen, Xueli Wang, Guoyan Zhang
2012/074
Another look at HMAC
Neal Koblitz, Alfred Menezes
2012/073
Efficient identity-based threshold signature scheme from bilinear pairings in the standard model
Wei Gao, Guilin Wang, Xueli Wang, Kefei Chen
2012/072
Particularly Friendly Members of Family Trees
Craig Costello
2012/071
Fast Reductions from RAMs to Delegatable Succinct Constraint Satisfaction Problems
Eli Ben-Sasson, Alessandro Chiesa, Daniel Genkin, Eran Tromer
2012/070
Finding ECM-Friendly Curves through a Study of Galois Properties
Razvan Barbulescu, Joppe W. Bos, Cyril Bouvier, Thorsten Kleinjung, Peter L. Montgomery
2012/069
Automatic Search of Attacks on round-reduced AES and Applications
Charles Bouillaguet, Patrick Derbez, Pierre-Alain Fouque
2012/068
Extended Security Arguments for (Ring) Signature Schemes
Sidi Mohamed El Yousfi Alaoui, Özgür Dagdelen, Pascal Véron, David Galindo, Pierre-Louis Cayrel
2012/067
Parallelizing message schedules to accelerate the computations of hash functions
Shay Gueron, Vlad Krasnov
2012/066
Weak Keys of the Full MISTY1 Block Cipher for Related-Key Cryptanalysis
Jiqiang Lu, Wen-She Yap, Yongzhuang Wei
2012/065
Modified version of “Latin Dances Revisited: New Analytic Results of Salsa20 and ChaCha”
Tsukasa Ishiguro
2012/064
Ron was wrong, Whit is right
Arjen K. Lenstra, James P. Hughes, Maxime Augier, Joppe W. Bos, Thorsten Kleinjung, Christophe Wachter
2012/063
Randomized Partial Checking Revisited
Shahram Khazaei, Douglas Wikström
2012/062
On the Security of Attribute Based Signature Schemes
S Sharmila Deva Selvi, Subhashini Venugopalan, C. Pandu Rangan
2012/061
A Pairing Based Strong Designated Verifier Signature Scheme without Random Oracles
Maryam Rajabzadeh Asaar, Mahmoud Salmasizadeh
2012/060
Improved Security for Linearly Homomorphic Signatures: A Generic Framework
David Mandell Freeman
2012/059
Message Authentication, Revisited
Yevgeniy Dodis, Eike Kiltz, Krzysztof Pietrzak, Daniel Wichs
2012/058
Key recycling in authentication
Christopher Portmann
2012/057
Anonymous Constant-Size Ciphertext HIBE From Asymmetric Pairings
Somindu C. Ramanna, Palash Sarkar
2012/056
A New Pseudorandom Generator from Collision-Resistant Hash Functions
Alexandra Boldyreva, Virendra Kumar
2012/055
Cryptanalysis of Mun et al.'s anonymous authentication scheme for roaming service in global mobility networks
Hongbin Tang, Xinsong Liu
2012/054
On the performance of certain Private Set Intersection protocols
Emiliano De Cristofaro, Gene Tsudik
2012/053
Beating Shannon requires BOTH efficient adversaries AND non-zero advantage
Yevgeniy Dodis
2012/052
Identity-based Encryption with Efficient Revocation
Alexandra Boldyreva, Vipul Goyal, Virendra Kumar
2012/051
Eavesdropping on Satellite Telecommunication Systems
Benedikt Driessen
2012/050
Investigating the Potential of Custom Instruction Set Extensions for SHA-3 Candidates on a 16-bit Microcontroller Architecture
Jeremy Constantin, Andreas Burg, Frank K. Gurkaynak
2012/049
2-Dimension Sums: Distinguishers Beyond Three Rounds of RIPEMD-128 and RIPEMD-160
Yu Sasaki, Lei Wang
2012/048
Designing Integrated Accelerator for Stream Ciphers with Structural Similarities
Sourav Sen Gupta, Anupam Chattopadhyay, Ayesha Khalid
2012/047
Incremental Deterministic Public-Key Encryption
Ilya Mironov, Omkant Pandey, Omer Reingold, Gil Segev
2012/046
Modifying Boolean Functions to Ensure Maximum Algebraic Immunity
Konstantinos Limniotis, Nicholas Kolokotronis, Nicholas Kalouptsidis
2012/045
Signature Schemes Secure against Hard-to-Invert Leakage
Sebastian Faust, Carmit Hazay, Jesper Buus Nielsen, Peter Sebastian Nordholt, Angela Zottarel
2012/044
PSCPA: Patient Self-controllable Privacy-preserving Cooperative Authentication in Distributed m-Healthcare Systems
Jun Zhou, Zhenfu Cao
2012/043
A novel Group Key Transfer Protocol
Chingfang Hsu, Bing Zeng, Qi Cheng, Guohua Cui
2012/042
Key Length Estimation of Pairing-based Cryptosystems using $\eta_T$ Pairing
Naoyuki Shinohara, Takeshi Shimoyama, Takuya Hayashi, Tsuyoshi Takagi
2012/041
A NEW DEDICATED CRYPTOGRAPHIC HASH FUNCTION
Norziana Jamil, Ramlan Mahmood, Muhammad Reza Z'aba, Nur Izura Udzir, Zuriati Ahmad Zukarnaen
2012/040
Single-block collision attack on MD5
Marc Stevens
2012/039
Security Analysis of a Multi-Factor Authenticated Key Exchange Protocol
Feng Hao, Dylan Clarke
2012/038
Cryptanalysis of the CHES 2009/2010 Random Delay Countermeasure
François Durvaux, Mathieu Renauld, François-Xavier Standaert, Loic van Oldeneel tot Oldenzeel, Nicolas Veyrat-Charvillon
2012/037
Some results on $q$-ary bent functions
Deep Singh, Maheshanand Bhaintwal, Brajesh Kumar Singh
2012/036
Efficient Leakage-free Authentication of Trees, Graphs and Forests
Ashish Kundu, Mikhail Atallah, Elisa Bertino
2012/035
Key-Alternating Ciphers in a Provable Setting: Encryption Using a Small Number of Public Permutations
Andrey Bogdanov, Lars R. Knudsen, Gregor Leander, Francois-Xavier Standaert, John Steinberger, Elmar Tischhauser
2012/034
Automatic Quantification of Cache Side-Channels
Boris Köpf, Laurent Mauborgne, Martin Ochoa
2012/033
A note on hyper-bent functions via Dillon-like exponents
Sihem Mesnager, Jean-Pierre Flori
2012/032
Counterexamples to Hardness Amplification Beyond Negligible
Yevgeniy Dodis, Abhishek Jain, Tal Moran, Daniel Wichs
2012/031
An error in "On a new formal proof model for RFID location privacy"
Da-Zhi Sun
2012/030
Fault Analysis of the KATAN Family of Block Ciphers
Shekh Faisal Abdul-Latip, Mohammad Reza Reyhanitabar, Willy Susilo, Jennifer Seberry
2012/029
On the Exact Security of Schnorr-Type Signatures in the Random Oracle Model
Yannick Seurin
2012/028
A First-Order Leak-Free Masking Countermeasure
Houssem MAGHREBI, Emmanuel PROUFF, Sylvain GUILLEY, Jean-Luc DANGER
2012/027
Breaking the provably secure SAKE-C authenticated key exchange protocol with Extended Key Compromise Impersonation (E-KCI) Attack
Ali Mackvandi, Maryam Saeed, Mansour Naddafiun
2012/026
Decoding Random Binary Linear Codes in $2^{n/20}$: How $1+1=0$ Improves Information Set Decoding
Anja Becker, Antoine Joux, Alexander May, Alexander Meurer
2012/025
A new remote data integrity checking scheme for cloud storage
Xiangtao Yan, Yifa Li
2012/024
Variants of Waters' Dual-System Primitives Using Asymmetric Pairings
Somindu C. Ramanna, Sanjit Chatterjee, Palash Sarkar
2012/023
On the security of Lo et al.’s ownership transfer protocol
Masoumeh Safkhani, Nasour Bagheri, Majid Naderi, Ali Mahani
2012/022
Polynomial-Time, Semantically-Secure Encryption Achieving the Secrecy Capacity
Mihir Bellare, Stefano Tessaro
2012/021
Security Analysis of J-PAKE
Mohsen Toorani
2012/020
Dickson polynomials, hyperelliptic curves and hyper-bent functions
Jean-Pierre Flori, Sihem Mesnager
2012/019
Towards Unconditional Soundness: Computationally Complete Symbolic Attacker
Gergei Bana, Hubert Comon-Lundh
2012/018
Attacks and Security Proofs of EAX-Prime
Kazuhiko Minematsu, Stefan Lucks, Hiraku Morita, Tetsu Iwata
2012/017
Secondary constructions on generalized bent functions
Brajesh Kumar Singh
2012/016
Efficient Mix-Net Verication by Proofs of Random Blocks
Denise Demirel, Melanie Volkamer, Hugo Jonker
2012/015
A Cryptographic Treatment of the Wiretap Channel
Mihir Bellare, Stefano Tessaro, Alexander Vardy
2012/014
Reset Indifferentiability from Weakened Random Oracle Salvages One-pass Hash Functions
Yusuke Naito, Kazuki Yoneyama, Kazuo Ohta
2012/013
Higher Order Algebraic Attacks on Stream Ciphers
Qichun Wang, Thomas Johansson
2012/012
Malleable Proof Systems and Applications
Melissa Chase, Markulf Kohlweiss, Anna Lysyanskaya, Sarah Meiklejohn
2012/011
Biclique Attack of the Full ARIA-256
Shao-zhen Chen Tian-min Xu
2012/010
PayTree: "Amortized Signature" for Flexible Micro-Payments
Charanjit Jutla, Moti Yung
2012/009
On the Indifferentiability of the Integrated-Key Hash Functions
Saif Al-Kuwari
2012/008
Security proof with dishonest keys
Hubert Comon-Lundh, Véronique Cortier, Guillaume Scerri
2012/007
Optimal Multiple Assignments with (m,m)-Scheme for General Access Structures
Qiang Li, Xiangxue Li, Dong Zheng, Kefei Chen
2012/006
Detecting Dangerous Queries: A New Approach for Chosen Ciphertext Security
Susan Hohenberger, Allison Lewko, Brent Waters
2012/005
A Unified Approach to Deterministic Encryption: New Constructions and a Connection to Computational Entropy
Benjamin Fuller, Adam O'Neill, Leonid Reyzin
2012/004
The new SHA-3 software shootout
Daniel J. Bernstein, Tanja Lange
2012/003
On the distinctness of binary sequences derived from primitive sequences modulo square-free odd integers
Qun-Xiong Zheng, Wen-Feng Qi, Tian Tian
2012/002
ECC2K-130 on NVIDIA GPUs
Daniel J. Bernstein, Hsieh-Chung Chen, Chen-Mou Cheng, Tanja Lange, Ruben Niederhagen, Peter Schwabe, Bo-Yin Yang
2012/001
Digital Signatures from Challenge-Divided Sigma-Protocols
Andrew C. Yao, Yunlei Zhao
2011/714
Position-Verification in Multi-Channel Models
Huajun Zhang, Zongyang Zhang, Zhenfu Cao
2011/713
A server-aided verification signature scheme without random oracles
Bin Wang, Qing Zhao
2011/712
Efficient Java Implementation of Elliptic Curve Cryptography for J2ME-Enabled Mobile Devices
Johann Großschädl, Dan Page, Stefan Tillich
2011/711
Evolutionary Construction of de Bruijn Sequences
Meltem Sonmez Turan
2011/710
Cryptanalysis of the Full AES Using GPU-Like Special-Purpose Hardware
Alex Biryukov, Johann Großschädl
2011/709
Fault Attack against Miller's algorithm
Nadia El Mrabet
2011/708
Computational Extractors and Pseudorandomness
Dana Dachman-Soled, Rosario Gennaro, Hugo Krawczyk, Tal Malkin
2011/707
Cryptanalysis of The Atmel Cipher in SecureMemory, CryptoMemory and CryptoRF
Alex Biryukov, Ilya Kizhvatov, Bin Zhang
2011/706
Improved Side Channel Attacks on Pairing Based Cryptography
Johannes Blömer, Peter Günther, Gennadij Liske
2011/705
Differential Attacks on Generalized Feistel Schemes
Valerie Nachef, Emmanuel Volte, Jacques Patarin
2011/704
Security Analysis of a PUF based RFID Authentication Protocol
Masoumeh Safkhani, Nasour Bagheri, Majid Naderi
2011/703
Waters Signatures with Optimal Security Reduction
Dennis Hofheinz, Tibor Jager, Edward Knapp
2011/702
Comments of an efficient and secure multi-server authentication scheme with key agreement
Yitao Chen
2011/701
Decentralized Attribute-Based Signatures
Tatsuaki Okamoto, Katsuyuki Takashima
2011/700
Efficient Attribute-Based Signatures for Non-Monotone Predicates in the Standard Model
Tatsuaki Okamoto, Katsuyuki Takashima
2011/699
Public-Key Encryption with Cluster-Chain-based Keyword Search
Peng Xu, Hai Jin, Wei Wang, Deqing Zou
2011/698
A generalization of the class of hyper-bent Boolean functions in binomial forms
Chunming Tang, Yu Lou, Yanfeng Qi, Baocheng Wang, Yixian Yang
2011/697
SPONGENT: The Design Space of Lightweight Cryptographic Hashing
Andrey Bogdanov, Miroslav Knezevic, Gregor Leander, Deniz Toz, Kerem Varici, Ingrid Verbauwhede
2011/696
Efficient Network Coding Signatures in the Standard Model
Dario Catalano, Dario Fiore, Bogdan Warinschi
2011/695
Deterministic Identity Based Signature Scheme and its Application for Aggregate Signatures
S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Rangan
2011/694
Generic Side-channel Distinguisher Based on Kolmogorov-Smirnov Test: Explicit Construction and Practical Evaluation
Jiye Liu, Yongbin Zhou, Shuguo Yang, Dengguo Feng
2011/693
A non-interactive deniable authentication scheme in the standard model
Bin Wang, Qing Zhao, Ke Dai
2011/692
Fully Secure (Doubly-)Spatial Encryption under Simpler Assumptions
Cheng Chen, Zhenfeng Zhang, Dengguo Feng
2011/691
Yet Another Ultralightweight Authentication Protocol that is Broken
Gildas Avoine, Xavier Carpent
2011/690
A New Class of Multivariate Public Key Cryptosystem Constructed on the Basis of Message-Dependent Transformation
Masao KASAHARA
2011/689
(Efficient) Universally Composable Two-Party Computation Using a Minimal Number of Stateless Tokens
Seung Geol Choi, Jonathan Katz, Dominique Schröder, Arkady Yerukhimovich, Hong-Sheng Zhou
2011/688
Authenticated Key Exchange under Bad Randomness
Guomin Yang, Shanshan Duan, Duncan S. Wong, Chik How Tan, Huaxiong Wang
2011/687
Cryptanalysis of WG-7 (A Lightweight Stream Cipher for RFID Encryption)
Mohammad Ali Orumiehchiha, Josef Pieprzyk, Ron Steinfeld
2011/686
Analysis of some natural variants of the PKP Algorithm
Rodolphe LAMPE, Jacques PATARIN
2011/685
Cryptanalysis of Symmetric Block Ciphers Based on the Feistel Network with Non-bijective S-boxes in the Round Function
Roman Oliynykov
2011/684
Identification Based Encryption with RSA-OAEP. Using SEM and Without
Rkia Aouinatou, Mostafa Belkasmi
2011/683
Timing Attacks against the Syndrome Inversion in Code-based Cryptosystems
Falko Strenzke
2011/682
UC framework for anonymous communication
István Vajda
2011/681
Physically Uncloneable Functions in the Universal Composition Framework
Chris Brzuska, Marc Fischlin, Heike Schröder, Stefan Katzenbeisser
2011/680
Better Bootstrapping in Fully Homomorphic Encryption
Craig Gentry, Shai Halevi, Nigel P. Smart
2011/679
CTL: A Platform-Independent Crypto Tools Library Based on Dataflow Programming Paradigm
Junaid Jameel Ahmad, Shujun Li, Ahmad-Reza Sadeghi, Thomas Schneider
2011/678
On definitions of selective opening security
Florian Böhl, Dennis Hofheinz, Daniel Kraschewski
2011/677
CommitCoin: Carbon Dating Commitments with Bitcoin
Jeremy Clark, Aleksander Essex
2011/676
Enhanced Biometrics-based Remote User Authentication Scheme Using Smart Cards
Jian-Zhu Lu, Shaoyuan Zhang, Shijie Qie
2011/675
Basing Obfuscation on Simple Tamper-Proof Hardware Assumptions
Nico Döttling, Thilo Mie, Jörn Müller-Quade, Tobias Nilges
2011/674
Extended Combinatorial Constructions for Peer-to-peer User-Private Information Retrieval
Colleen M. Swanson, Douglas R. Stinson
2011/673
Pseudorandom Signatures
Nils Fleischhacker, Felix Günther, Franziskus Kiefer, Mark Manulis, Bertram Poettering
2011/672
Fast and Secure Root Finding for Code-based Cryptosystems
Falko Strenzke
2011/671
Improved Results on Impossible Differential Cryptanalysis of Reduced-Round Camellia-192/256
Ya Liu, Dawu Gu, Zhiqiang Liu, Wei Li, Ying Man
2011/670
SHA-3 on ARM11 processors
Peter Schwabe, Bo-Yin Yang, Shang-Yi Yang
2011/669
Small Linearization: Memory Friendly Solving of Non-Linear Equations over Finite Fields
Christopher Wolf, Enrico Thomae
2011/668
Re-Encryption-Based Key Management Towards Secure and Scalable Mobile Applications in Clouds
Piotr K. Tysowski, M. Anwarul Hasan
2011/667
An Efficient and Private RFID Authentication Protocol Supporting Ownership Transfer
Suleyman Kardas, Atakan Arslan, Serkan Celik, Albert Levi
2011/666
A Gross-Zagier formula for quaternion algebras over totally real fields
Eyal Z. Goren, Kristin E. Lauter
2011/665
Efficient Modular Exponentiation-based Puzzles for Denial-of-Service Protection
Jothi Rangasamy, Douglas Stebila, Lakshmi Kuppusamy, Colin Boyd, Juan Gonzalez Nieto
2011/664
On the Security of ID Based Signcryption Schemes
S. Sharmila Deva Selvi, S. Sree Vivek, Dhinakaran Vinayagamurthy, C. Pandu Rangan
2011/663
Cloud-Assisted Multiparty Computation from Fully Homomorphic Encryption
Adriana Lopez-Alt, Eran Tromer, Vinod Vaikuntanathan
2011/662
Deploying secure multi-party computation for financial data analysis
Dan Bogdanov, Riivo Talviste, Jan Willemson
2011/661
New Impossible Differential Attacks on Camellia
Dongxia Bai, Leibo Li
2011/660
Program Obfuscation with Leaky Hardware
Nir Bitansky, Ran Canetti, Shafi Goldwasser, Shai Halevi, Yael Tauman Kalai, Guy N. Rothblum
2011/659
Formally Assessing Cryptographic Entropy
Daniel R. L. Brown
2011/658
Anonymous attestation with user-controlled linkability
D. Bernhard, G. Fuchsbauer, E. Ghadafi, N. P. Smart, B. Warinschi
2011/657
A Systematic Method to Evaluate and Compare the Performance of Physical Unclonable Functions
Abhranil Maiti, Vikash Gunreddy, Patrick Schaumont
2011/656
Use Data-depend Function Build Message Expansion Function
ZiJie Xu, Ke Xu
2011/655
Privacy-Preserving Stream Aggregation with Fault Tolerance
T-H. Hubert Chan, Elaine Shi, Dawn Song
2011/654
Elliptic Curve Cryptography in JavaScript
Laurie Haustenne, Quentin De Neyer, Olivier Pereira
2011/653
An Improved Certificateless Authenticated Key Agreement Protocol
Haomin Yang, Yaoxue Zhang, Yuezhi Zhou
2011/652
Security Enhancement of the Vortex Family of Hash Functions
Shay Gueron, Michael Kounavis
2011/651
CHECKER: On-site checking in RFID-based supply chains
Kaoutar Elkhiyaoui, Erik-Oliver Blass, Refik Molva
2011/650
Fully Secure Spatial Encryption under Simple Assumptions with Constant-Size Ciphertexts
Jie Chen, Hoon Wei Lim, San Ling, Huaxiong Wang
2011/649
On the Security of NMAC and Its Variants
Fanbao Liu, Changxiang Shen, Tao Xie, Dengguo Feng
2011/648
Achieving Short Ciphertexts or Short Secret-Keys for Adaptively Secure General Inner-Product Encryption
Tatsuaki Okamoto, Katsuyuki Takashima
2011/647
Breaking $H^2$-MAC Using Birthday Paradox
Fanbao Liu, Tao Xie, Changxiang Shen
2011/646
The security impact of a new cryptographic library
Daniel J. Bernstein, Tanja Lange, Peter Schwabe
2011/645
Fully Homomorphic Encryption Based on Approximate Matrix GCD
Gu Chunsheng
2011/644
McOE: A Family of Almost Foolproof On-Line Authenticated Encryption Schemes
Ewan Fleischmann, Christian Forler, Stefan Lucks, Jakob Wenzel
2011/643
Some Words About Cryptographic Key Recognition In Data Streams
Alexey Chilikov, Evgeny Alekseev
2011/642
Constructing differentially 4-uniform permutations over $\mbf_{2^{2m}}$ from quadratic APN permutations over $\mbf_{2^{2m+1}}$
Yongqiang Li, Mingsheng Wang
2011/641
Collision for 75-step SHA-1: Intensive Parallelization with GPU
E. A. Grechnikov, A. V. Adinetz
2011/640
Hummingbird: Privacy at the time of Twitter
Emiliano De Cristofaro, Claudio Soriente, Gene Tsudik, Andrew Williams
2011/639
Towards a Probabilistic Complexity-theoretic Modeling of Biological Cyanide Poisoning as Service Attack in Self-organizing Networks
Jiejun Kong, Dapeng Wu, Xiaoyan Hong, Mario Gerla
2011/638
Rubik's for cryptographers
Christophe Petit, Jean-Jacques Quisquater
2011/637
Random Number Generation Based on Oscillatory Metastability in Ring Circuits
Laszlo Hars
2011/636
Untangling RFID Privacy Models
Iwen Coisel, Tania Martin
2011/635
Groestl Tweaks and their Effect on FPGA Results
Marcin Rogawski, Kris Gaj
2011/634
Security of Multiple-Key Agreement Protocols and Propose an Enhanced Protocol
Mohammad Sabzinejad Farash, Mahmoud Ahmadian Attari, Majid Bayat
2011/633
Practical realisation and elimination of an ECC-related software bug attack
B. B. Brumley, M. Barbosa, D. Page, F. Vercauteren
2011/632
A Scalable Method for Constructing Galois NLFSRs with Period $2^n-1$ using Cross-Join Pairs
Elena Dubrova
2011/631
Cheating Human Vision in Visual Secret Sharing
Yu-Chi Chen, Gwoboa Horng, Du-Shiau Tsai
2011/630
Indifferentiability Security of the Fast Wide Pipe Hash: Breaking the Birthday Barrier
Dustin Moody, Souradyuti Paul, Daniel Smith-Tone
2011/629
Near-Linear Unconditionally-Secure Multiparty Computation with a Dishonest Minority
Eli Ben-Sasson, Serge Fehr, Rafail Ostrovsky
2011/628
Maximum Leakage Resilient IBE and IPE
Kaoru Kurosawa, Le Trieu Phong
2011/627
A note on semi-bent functions with multiple trace terms and hyperelliptic curves
Sihem Mesnager
2011/626
Algebraic Complexity Reduction and Cryptanalysis of GOST
Nicolas T. Courtois
2011/625
Two RFID Privacy Models in Front of a Court
Mohammad Hassan Habibi, Mohammad Reza Aref
2011/624
New attacks on Keccak-224 and Keccak-256
Itai Dinur, Orr Dunkelman, Adi Shamir
2011/623
Indifferentiability of the Hash Algorithm BLAKE
Donghoon Chang, Mridul Nandi, Moti Yung
2011/622
Homomorphic encryption from codes
Andrej Bogdanov, Chin Ho Lee
2011/621
Adaptive Security of Concurrent Non-Malleable Zero-Knowledge
Zhenfu Cao, Zongyang Zhang, Yunlei Zhao
2011/620
Provable Security of BLAKE with Non-Ideal Compression Function
Elena Andreeva, Atul Luykx, Bart Mennink
2011/619
Multidimensional Meet-in-the-Middle Attack and Its Applications to KATAN32/48/64
Bo Zhu, Guang Gong
2011/618
Practical Relay Attack on Contactless Transactions by Using NFC Mobile Phones
Lishoy Francis, Gerhard Hancke, Keith Mayes, Konstantinos Markantonakis
2011/617
Charm: A framework for Rapidly Prototyping Cryptosystems
Joseph A. Akinyele, Matthew D. Green, Avi D. Rubin
2011/616
Impossible Differential Cryptanalysis of the Lightweight Block Ciphers TEA, XTEA and HIGHT
Jiazhe Chen, Meiqin Wang, Bart Preneel
2011/615
On the Joint Security of Encryption and Signature in EMV
Jean Paul Degabriele, Anja Lehmann, Kenneth G. Paterson, Nigel P. Smart, Mario Strefler
2011/614
On Security of RASP Data Perturbation for Secure Half-Space Queries in the Cloud
Keke Chen
2011/613
Multiparty Computation with Low Communication, Computation and Interaction via Threshold FHE
Gilad Asharov, Abhishek Jain, Daniel Wichs
2011/612
IBAKE: Identity-Based Authenticated Key Exchange Protocol
Vladimir Kolesnikov, Ganapathy S. Sundaram
2011/611
Adaptive and Concurrent Secure Computation from New Notions of Non-Malleability
Dana Dachman-Soled, Tal Malkin, Mariana Raykova, Muthuramakrishnan Venkitasubramaniam
2011/610
An optimal Key Enumeration Algorithm and its Application to Side-Channel Attacks
Nicolas Veyrat-Charvillon, Benoît Gérard, Mathieu Renauld, François-Xavier Standaert
2011/609
The PHOTON Family of Lightweight Hash Functions
Jian Guo, Thomas Peyrin, Axel Poschmann
2011/608
Four-Dimensional Gallant-Lambert-Vanstone Scalar Multiplication
Patrick Longa, Francesco Sica
2011/607
Improving Additive and Multiplicative Homomorphic Encryption Schemes Based on Worst-Case Hardness Assumptions}
Carlos Aguilar Melchor, Slim Bettaieb, Philippe Gaborit, Javier Herranz
2011/606
$GF(2^{n})$ Subquadratic Polynomial Basis Multipliers for Some Irreducible Trinomials
Xi Xiong, Haining Fan
2011/605
Efficient and Secure Delegation of Linear Algebra
Payman Mohassel
2011/604
Genus 2 Hyperelliptic Curve Families with Explicit Jacobian Order Evaluation and Pairing-Friendly Constructions
Aurore Guillevic, Damien Vergnaud
2011/603
Advanced Zero-Sum Distinguishers for the Permutations of the PHOTON Family
Le Dong, Wenling Wu, Shuang Wu, Jian Zou
2011/602
Positive Results for Concurrently Secure Computation in the Plain Model
Vipul Goyal
2011/601
A Multi-Receiver ID-Based Generalized Signcryption Scheme
Caixue Zhou
2011/600
A New Class of Hyper-bent Boolean Functions with Multiple Trace Terms
Chunming Tang, Yanfeng Qi, Maozhi Xu, Baocheng Wang, Yixian Yang
2011/599
Efficient Password-Based Authenticated Key Exchange from Lattices
Yi Ding, Lei Fan
2011/598
New Subexponential Algorithms for Factoring in $SL(2,\fq)$
Jean-Charles Faugère, Ludovic Perret, Christophe Petit, Guénaël Renault
2011/597
How to Delegate and Verify in Public: Verifiable Computation from Attribute-based Encryption
Bryan Parno, Mariana Raykova, Vinod Vaikuntanathan
2011/596
Parallel Homomorphic Encryption
Seny Kamara, Mariana Raykova
2011/595
Efficient Multi-Query CPIR from Ring-LWE
Helger Lipmaa
2011/594
Receipt Freeness of Prêt à Voter Provably Secure
Dalia Khader, Peter Y. A. Ryan
2011/593
CCA Secure IB-KEM from the Computational Bilinear Diffie-Hellman Assumption in the Standard Model
Yu Chen, Liqun Chen, Zongyang Zhang
2011/592
Generic Constructions for Verifiable Signcryption
Laila El Aimani
2011/591
A Unified Framework for Small Secret Exponent Attack on RSA
Noboru Kunihiro, Naoyuki Shinohara, Tetsuya Izu
2011/590
An Efficient Broadcast Attack against NTRU
Jianwei Li, Yanbin Pan, Mingjie Liu, Guizhen Zhu
2011/589
Impact of Intel's New Instruction Sets on Software Implementation of $GF(2)[x]$ Multiplication
Chen Su, Haining Fan
2011/588
Another Look at Symmetric Incoherent Optimal Eavesdropping against BB84
Arpita Maitra, Goutam Paul
2011/587
Signatures of Correct Computation
Charalampos Papamanthou, Elaine Shi, Roberto Tamassia
2011/586
TweLEX: A Tweaked Version of the LEX Stream Cipher
Mainack Mondal, Avik Chakraborti, Nilanjan Datta, Debdeep Mukhopadhyay
2011/585
Iris: A Scalable Cloud File System with Efficient Integrity Checks
Emil Stefanov, Marten van Dijk, Alina Oprea, Ari Juels
2011/584
A Single-Key Attack on 6-Round KASUMI
Teruo Saito
2011/583
Revocable Identity-Based Encryption from Lattices
Jie Chen, Hoon Wei Lim, San Ling, Huaxiong Wang, Khoa Nguyen
2011/582
Randomness Extraction in finite fields $\mathbb{F}_{p^{n}}$
Abdoul Aziz Ciss
2011/581
Standard Security Does Not Imply Security Against Selective-Opening
Mihir Bellare, Rafael Dowsley, Brent Waters, Scott Yilek
2011/580
On a new generalization of Huff curves
Abdoul Aziz Ciss, Djiby Sow
2011/579
Clockwise Collision Analysis -- Overlooked Side-Channel Leakage Inside Your Measurements
Yang Li, Daisuke Nakatsu, Qi Li, Kazuo Ohta, Kazuo Sakiyama
2011/578
ACCELERATING THE SCALAR MULTIPLICATION ON GENUS 2 HYPERELLIPTIC CURVE CRYPTOSYSTEMS
Balasingham Balamohan
2011/577
An Efficient Protocol for the Commit-Prove-Fair-Open functionality
Ou Ruan, Cai Fu, Guohua Cui
2011/576
Efficient Multicast Key Distribution Using HOWP-Based Dynamic Group Access Structures
Jing Liu, Qiong Huang, Bo Yang, Yang Zhang
2011/575
Exclusive Key Based Group Rekeying Protocols
Jing Liu, Changji Wang
2011/574
Towards Efficient Provable Data Possession in Cloud Storage
Jia Xu, Ee-Chien Chang, Jianying Zhou
2011/573
A New Class of Multivariate Public Key Cryptosystems Constructed Based on Random Pseudo Cyclic Codes, K(XIII)SE(2)PKC, Realizing Coding Rate of Exactly 1.0
Masao Kasahara
2011/572
The ElGamal cryptosystem over circulant matrices
Ayan Mahalanobis
2011/571
Lower Bound on Covering Radius of Reed-Muller Codes in Set of Balanced Functions
Brajesh Kumar Singh, Sugata Gangopadhyay
2011/570
Degree of regularity for HFE-
Jintai Ding, Thorsten Kleinjung
2011/569
Analysis of the Hamming Weight of the Extended wmbNAF
Ming Li, Ali Miri, Daming Zhu
2011/568
Single Layer Optical-scan Voting with Fully Distributed Trust
Aleksander Essex, Christian Henrich, Urs Hengartner
2011/567
On the sparse subset sum problem from Gentry-Halevi's implementation of fully homomorphic encryption
Moon Sung Lee
2011/566
Fully Homomorphic Encryption with Polylog Overhead
Craig Gentry, Shai Halevi, Nigel P. Smart
2011/565
Cryptographic Hash Functions: Recent Design Trends and Security Notions
Saif Al-Kuwari, James H. Davenport, Russell J. Bradford
2011/564
Private-key Symbolic Encryption
N. Ahmed, C. D. Jensen, E. Zenner
2011/563
On the Security of RFID Anti Cloning Security Protocol(ACSP)
Masoumeh Safkhani, Nasour Bagheri, Majid Naderi
2011/562
A Group Testing Approach to Improved Corruption Localizing Hashing
Annalisa De Bonis, Giovanni Di Crescenzo
2011/561
A Domain-Specific Language for Computing on Encrypted Data
Alex Bain, John Mitchell, Rahul Sharma, Deian Stefan, Joe Zimmerman
2011/560
Randomized Secure Two-Party Computation for Modular Conversion, Zero Test, Comparison, MOD and Exponentiation
Ching-Hua Yu, Bo-Yin Yang
2011/559
Instantiability of RSA-OAEP under Chosen-Plaintext Attack
Eike Kiltz, Adam O'Neill, Adam Smith
2011/558
Improved Attacks on Full GOST
Itai Dinur, Orr Dunkelman, Adi Shamir
2011/557
An Improved Trace Driven Instruction Cache Timing Attack on RSA
Chen Cai-Sen, Wang Tao, Chen Xiao-Cen, Zhou Ping
2011/556
GF(2^n) redundant representation using matrix embedding
Yongjia Wang, Xi Xiong, Haining Fan
2011/555
On the Role of Expander Graphs in Key Predistribution Schemes for Wireless Sensor Networks
Michelle Kendall, Keith Martin
2011/554
On the security models for certificateless signature schemes achieving level 3 security
Yu-Chi Chen, Gwoboa Horng
2011/553
Publicly Verifiable Proofs of Sequential Work
Mohammad Mahmoody, Tal Moran, Salil Vadhan
2011/552
Recyclable PUFs: Logically Reconfigurable PUFs
Stefan Katzenbeisser, Ünal Kocabas, Vincent van der Leest, Ahmad-Reza Sadeghi, Geert-Jan Schrijen, Heike Schröder, Christian Wachsmann
2011/551
Security Evaluation against Differential Cryptanalysis for Block Cipher Structures
Shengbao Wu, Mingsheng Wang
2011/550
A New Distinguisher for CubeHash-8/b and CubeHash-15/b Compression Functions
Javad Alizadeh, Abdolrasoul Mirghadri
2011/549
1-Resilient Boolean Function with Optimal Algebraic Immunity
Qingfang Jin, Zhuojun Liu, Baofeng Wu
2011/548
On the security of MQ_DRBG
V. O. Drelikhov, G. B. Marshalko, A. V. Pokrovskiy
2011/547
The Single Cycle T-functions
Zhaopeng Dai, Zhuojun Liu
2011/546
Hidden Vector Encryption Fully Secure Against Unrestricted Queries
Angelo De Caro, Vincenzo Iovino, Giuseppe Persiano
2011/545
Public Key Cryptosystems Constructed Based on Random Pseudo Cyclic Codes, K(IX)SE(1)PKC, Realizing Coding Rate of Exactly 1.0
Masao Kasahara
2011/544
Designing Privacy-preserving Smart Meters with Low-cost Microcontrollers
Andres Molina-Markham, George Danezis, Kevin Fu, Prashant Shenoy, David Irwin
2011/543
Adaptively Attribute-Hiding (Hierarchical) Inner Product Encryption
Tatsuaki Okamoto, Katsuyuki Takashima
2011/542
Certificate-Based Signcryption: Security Model and Efficient Construction
Yang Lu, Jiguo Li
2011/541
Minimalism in Cryptography: The Even-Mansour Scheme Revisited
Orr Dunkelman, Nathan Keller, Adi Shamir
2011/540
Efficient Implementation of the $\eta_T$ Pairing on GPU
Yosuke Katoh, Yun-Ju Huang, Chen-Mou Cheng, Tsuyoshi Takagi
2011/539
Sign Modules in Secure Arithmetic Circuits
Ching-Hua Yu
2011/538
Leakage-Resilient Client-side Deduplication of Encrypted Data in Cloud Storage
Jia Xu, Ee-Chien Chang, Jianying Zhou
2011/537
Lattice Signatures Without Trapdoors
Vadim Lyubashevsky
2011/536
Revisiting Lower and Upper Bounds for Selective Decommitments
Rafail Ostrovsky, Vanishree Rao, Alessandra Scafuro, Ivan Visconti
2011/535
Multiparty Computation from Somewhat Homomorphic Encryption
I. Damgard, V. Pastro, N. P. Smart, S. Zakarias
2011/534
Formal Analysis of the Entropy / Security Trade-off in First-Order Masking Countermeasures against Side-Channel Attacks
Maxime Nassar, Sylvain Guilley, Jean-Luc Danger
2011/533
Two-Output Secure Computation with Malicious Adversaries
abhi shelat, Chih-hao Shen
2011/532
Hash Functions Based on Three Permutations: A Generic Security Analysis
Bart Mennink, Bart Preneel
2011/531
Static Fault Attacks on Hardware DES Registers
Philippe Loubet-Moundi, David Vigilant, Francis Olivier
2011/530
Key-Evolution Schemes Resilient to Space-Bounded Leakage
Stefan Dziembowski, Tomasz Kazana, Daniel Wichs
2011/529
Secure and Efficient Proof of Storage with Deduplication
Qingji Zheng, Shouhuai Xu
2011/528
Efficient Delegation-Based Authentication Protocol with Strong Mobile Privacy
Jian-Zhu Lu, Hong-Qing Ren, Jipeng Zhou
2011/527
Security Weaknesses of password-only authenticated key establishment protocol without public key cryptography
Mohsen Toorani, Maryam Saeed
2011/526
Universally Composable Security Analysis of OAuth v2.0
Suresh Chari, Charanjit Jutla, Arnab Roy
2011/525
A Note on the Density of the Multiple Subset Sum Problems
Yanbin Pan, Feng Zhang
2011/524
Security of Reduced-Round Camellia against Impossible Differential Attack
Leibo Li, Jiazhe Chen, Xiaoyun Wang
2011/523
Security analysis of a fuzzy identity-based encryption scheme
Miaomiao Tian, Liusheng Huang, Wei Yang
2011/522
A Compact S-Box Design for SMS4 Block Cipher
Imran Abbasi, Mehreen Afzal
2011/521
Pseudorandom Knapsacks and the Sample Complexity of LWE Search-to-Decision Reductions
Daniele Micciancio, Petros Mol
2011/520
Houssem Maghrebi and Sylvain Guilley and Claude Carlet and Jean-Luc Danger
Houssem maghebi, Sylvain Guilley, Claude Carlet, Jean-Luc Danger
2011/519
Leakage-Resilient Cryptography From the Inner-Product Extractor
Stefan Dziembowski, Sebastian Faust
2011/518
Two 1-Round Protocols for Delegation of Computation
Ran Canetti, Ben Riva, Guy N. Rothblum
2011/517
Verifiability, Privacy, and Coercion-Resistance: New Insights from a Case Study
Ralf Kuesters, Tomasz Truderung, Andreas Vogt
2011/516
Protecting AES with Shamir's Secret Sharing Scheme
Louis Goubin, Ange Martinelli
2011/515
A general conjecture similar to T-D conjecture and its applications in constructing Boolean functions with optimal algebraic immunity
Qingfang Jin, Zhuojun Liu, Baofeng Wu, Xiaoming Zhang
2011/514
Milder Definitions of Computational Approximability: The Case of Zero-Knowledge Protocols
Mohammad Sadeq Dousti, Rasool Jalili
2011/513
Non-Malleable Zero Knowledge: Black-Box Constructions and Definitional Relationships
Abhishek Jain, Omkant Pandey
2011/512
A Dichotomy for Local Small-Bias Generators
Benny Applebaum, Andrej Bogdanov, Alon Rosen
2011/511
The Cryptographic Power of Random Selection
Matthias Krause, Matthias Hamann
2011/510
On the Security of the Free-XOR Technique
Seung Geol Choi, Jonathan Katz, Ranjit Kumaresan, Hong-Sheng Zhou
2011/509
Policy-Enhanced Private Set Intersection: Sharing Information While Enforcing Privacy Policies
Emil Stefanov, Elaine Shi, Dawn Song
2011/508
Secure Two-Party Computation with Low Communication
Ivan Damgård, Sebastian Faust, Carmit Hazay
2011/507
Relatively-Sound NIZKs and Password-Based Key-Exchange
Charanjit Jutla, Arnab Roy
2011/506
Towards quantum-resistant cryptosystems from supersingular elliptic curve isogenies
Luca De Feo, David Jao, Jérôme Plût
2011/505
A New Second Order Side Channel Attack Based on Linear Regression
Julien Doget, Guillaume Dabosville, Emmanuel Prouff
2011/504
From Non-Adaptive to Adaptive Pseudorandom Functions
Iftach Haitner, Itay Berman
2011/503
On the influence of the algebraic degree of $F^{−1}$ on the algebraic degree of $G \circ F$
Christina Boura, Anne Canteaut
2011/502
Wild McEliece Incognito
Daniel J. Bernstein, Tanja Lange, Christiane Peters
2011/501
Trapdoors for Lattices: Simpler, Tighter, Faster, Smaller
Daniele Micciancio, Chris Peikert
2011/500
Biclique Cryptanalysis of the Block Cipher SQUARE
Hamid Mala
2011/499
Duplexing the sponge: single-pass authenticated encryption and other applications
Guido Bertoni, Joan Daemen, Michaël Peeters, Gilles Van Assche
2011/498
An Efficient Secure Anonymous Proxy Signature Scheme
Jue-Sam Chou, Shih-Che Hung, Yalin Chen
2011/497
Can a Program Reverse-Engineer Itself?
Antoine Amarilli, David Naccache, Pablo Rauzy, Emil Simion
2011/496
On the Public Indifferentiability and Correlation Intractability of the 6-Round Feistel Construction
Avradip Mandal, Jacques Patarin, Yannick Seurin
2011/495
Vector Commitments and their Applications
Dario Catalano, Dario Fiore
2011/494
Efficient RSA Key Generation and Threshold Paillier in the Two-Party Setting
Carmit Hazay, Gert Læssøe Mikkelsen, Tal Rabin, Tomas Toft, Angelo Agatino Nicolosi
2011/493
From Point Obfuscation To 3-round Zero-Knowledge
Nir Bitansky, Omer Paneth
2011/492
Rational distance-bounding protocols over noisy channels
Long H. Nguyen
2011/491
Cryptanalysis of a Privacy-Preserving Communication Architecture for V2G Networks in Smart Grid
Qi Jiang, Jianfeng Ma, Guangsong Li, Xiang Lu
2011/490
Tools for Simulating Features of Composite Order Bilinear Groups in the Prime Order Setting
Allison Lewko
2011/489
Towards a Theory of Security Evaluation for GOST-like Ciphers against Differential and Linear Cryptanalysis
A. N. Alekseychuk, L. V. Kovalchuk
2011/488
A Survey of Cryptography Based on Physically Unclonable Objects
Kai-Yuen Cheong
2011/487
Noiseless Database Privacy
Raghav Bhaskar, Abhishek Bhowmick, Vipul Goyal, Srivatsan Laxman, Abhradeep Thakurta
2011/486
On the Joint Security of Encryption and Signature, Revisited
Kenneth G. Paterson, Jacob C. N. Schuldt, Martijn Stam, Susan Thomson
2011/485
Another Look at Automated Theorem-Proving. II
Neal Koblitz
2011/484
XMSS - A Practical Forward Secure Signature Scheme based on Minimal Security Assumptions
Johannes Buchmann, Erik Dahmen, Andreas Hülsing
2011/483
Adaption of Pollard's kangaroo algorithm to the FACTOR problem
Mario Romsy
2011/482
Secure Computation with Sublinear Amortized Work
Dov Gordon, Jonathan Katz, Vladimir Kolesnikov, Tal Malkin, Mariana Raykova, Yevgeniy Vahlis
2011/481
Close to Uniform Prime Number Generation With Fewer Random Bits
Pierre-Alain Fouque, Mehdi Tibouchi
2011/480
Complete Tree Subset Difference Broadcast Encryption Scheme and its Analysis
Sanjay Bhattacherjee, Palash Sarkar
2011/479
Identity-Based (Lossy) Trapdoor Functions and Applications
Mihir Bellare, Eike Kiltz, Chris Peikert, Brent Waters
2011/478
An efficient certificateless authenticated key agreement scheme
Debiao He, Sahadeo Padhye, Jianhua Chen
2011/477
Cryptanalysis of NTRU with two public keys
Abderrahmane Nitaj
2011/476
Anonymous Broadcast Encryption: Adaptive Security and Efficient Constructions in the Standard Model
Benoit Libert, Kenneth G. Paterson, Elizabeth A. Quaglia
2011/475
Solving Circuit Optimisation Problems in Cryptography and Cryptanalysis
Nicolas T. Courtois, Daniel Hulme, Theodosis Mourouzis
2011/474
Improved Generic Algorithms for Hard Knapsacks
Anja Becker, Jean-Sébastien Coron, Antoine Joux
2011/473
Practically Efficient Verifiable Delegation of Polynomial and its Applications
Jia XU
2011/472
Forward Secure Ring Signature without Random Oracles
Joseph K. Liu, Tsz Hon Yuen, Jianying Zhou
2011/471
Improved Key Generation For Gentry's Fully Homomorphic Encryption Scheme
P. Scholl, N. P. Smart
2011/470
Non-malleable public key encryption in BRSIM/UC
István Vajda
2011/469
Cryptanalysis of INCrypt32 in HID's iCLASS Systems
ChangKyun Kim, Eun-Gu Jung, Dong Hoon Lee, Chang-Ho Jung, Daewan Han
2011/468
Faster Scalar Multiplication on Ordinary Weierstrass Elliptic Curves over Fields of Characteristic Three
Hongfeng Wu, Chang-An Zhao
2011/467
A !ew Efficient Asymmetric Cryptosystem for large data sets
M. R. K. Ariffin, M. A. Asbullah, N. A. Abu
2011/466
Green Cryptanalysis: Meet-in-the-Middle Key-Recovery for the Full KASUMI Cipher
Keting Jia, Christian Rechberger, Xiaoyun Wang
2011/465
Attractive Subfamilies of BLS Curves for Implementing High-Security Pairings
Craig Costello, Kristin Lauter, Michael Naehrig
2011/464
Private and Oblivious Set and Multiset Operations
Marina Blanton, Everaldo Aguiar
2011/463
Decentralized Dynamic Broadcast Encryption
Duong Hieu Phan, David Pointcheval, Mario Strefler
2011/462
Secure Outsourced Computation of Iris Matching
Marina Blanton, Mehrdad Aliasgari
2011/461
Speeding Up Elliptic Curve Discrete Logarithm Computations with Point Halving
Fangguo Zhang, Ping Wang
2011/460
Computationally Sound Symbolic Security Reduction Analysis of Group Key Exchange Protocol using Bilinear Pairings
Zijian Zhang, Liehuang Zhu, Lejian Liao
2011/459
Sufficient conditions for sound hashing using a truncated permutation
Joan Daemen, Tony Dusenge, Gilles Van Assche
2011/458
Sieving for Shortest Vectors in Ideal Lattices
Michael Schneider
2011/457
Resettable Statistical Zero Knowledge
Sanjam Garg, Rafail Ostrovsky, Ivan Visconti, Akshay Wadia
2011/456
Delegation of Computation without Rejection Problem from Designated Verifier CS-Proofs
Shafi Goldwasser, Huijia Lin, Aviad Rubinstein
2011/455
The Relation and Transformation between Hierarchical Inner Product Encryption and Spatial Encryption
Jie Chen, Hoon Wei Lim, San Ling, Huaxiong Wang
2011/454
Threshold Fully Homomorphic Encryption and Secure Computation
Steven Myers, Mona Sergi, abhi shelat
2011/453
Practical Complexity Differential Cryptanalysis and Fault Analysis of AES
Michael Tunstall
2011/452
The Good lower bound of Second-order nonlinearity of a class of Boolean function
Manish Garg, Sugata Gangopadhyay
2011/451
Cryptanalysis and improvement of a biometrics-based multi-server authentication with key agreement scheme
Hakhyun Kim, Woongryul Jeon, Yunho Lee, Dongho Won
2011/450
R-hash : Hash Function Using Random Quadratic Polynomials Over GF (2)
Dhananjoy Dey, Noopur Shrotriya, Indranath Sengupta
2011/449
Biclique Cryptanalysis of the Full AES
Andrey Bogdanov, Dmitry Khovratovich, Christian Rechberger
2011/448
(Non-)Random Sequences from (Non-)Random Permutations - Analysis of RC4 stream cipher
Sourav Sen Gupta, Subhamoy Maitra, Goutam Paul, Santanu Sarkar
2011/447
On Verifying Dynamic Multiple Data Copies over Cloud Servers
Ayad F. Barsoum, M. Anwar Hasan
2011/446
Privacy-Preserving Friend Search over Online Social Networks
Huang Lin, Yuguang Fang, Zhenfu Cao
2011/445
Privacy-Preserving Friend Search over Online Social Networks
Huang Lin, Sherman S. M. Chow, Dongsheng Xing, Yuguang Fang, Zhenfu Cao
2011/444
Generalised Mersenne Numbers Revisited
Robert Granger, Andrew Moss
2011/443
From Extractable Collision Resistance to Succinct Non-Interactive Arguments of Knowledge, and Back Again
Nir Bitansky, Ran Canetti, Alessandro Chiesa, Eran Tromer
2011/442
Another Look at Tightness
Sanjit Chatterjee, Alfred Menezes, Palash Sarkar
2011/441
Fully Homomorphic Encryption over the Integers with Shorter Public Keys
Jean-Sebastien Coron, Avradip Mandal, David Naccache, Mehdi Tibouchi
2011/440
Public Key Compression and Modulus Switching for Fully Homomorphic Encryption over the Integers
Jean-Sebastien Coron, David Naccache, Mehdi Tibouchi
2011/439
Optimal Data Authentication from Directed Transitive Signatures
Philippe Camacho
2011/438
Short Transitive Signatures for Directed Trees
Philippe Camacho, Alejandro Hevia
2011/437
Approximate common divisors via lattices
Henry Cohn, Nadia Heninger
2011/436
Faster Algorithms for Approximate Common Divisors: Breaking Fully-Homomorphic-Encryption Challenges over the Integers
Yuanmi Chen, Phong Q. Nguyen
2011/435
The IPS Compiler: Optimizations, Variants and Concrete Efficiency
Yehuda Lindell, Benny Pinkas, Eli Oxman
2011/434
An Efficient Protocol for Oblivious DFA Evaluation and Applications
Payman Mohassel, Salman Niksefat, Saeed Sadeghian, Babak Sadeghiyan
2011/433
Collusion-Preserving Computation
Joel Alwen, Jonathan Katz, Ueli Maurer, Vassilis Zikas
2011/432
Ciphers that Securely Encipher their own Keys
Mihir Bellare, David Cash, Sriram Keelveedhi
2011/431
Roots of Square: Cryptanalysis of Double-Layer Square and Square+
Enrico Thomae, Christopher Wolf
2011/430
Analogues of Velu's Formulas for Isogenies on Alternate Models of Elliptic Curves
Dustin Moody, Daniel Shumow
2011/429
Round-efficient Oblivious Database Manipulation
Sven Laur, Jan Willemson, Bingsheng Zhang
2011/428
AES Flow Interception: Key Snooping Method on Virtual Machine - Exception Handling Attack for AES-NI -
Tatsuya TAKEHISA, Hiroki NOGAWA, Masakatu MORII
2011/427
A new attack on the KMOVcryptosystem
Abderrahmane Nitaj
2011/426
Cryptanalysis of improved Yeh \textit{et al. }'s authentication Protocol: An EPC Class-1 Generation-2 standard compliant protocol
Masoumeh Safkhani, Nasour Bagheri, Somitra Kumar Sanadhya, Majid Naderi
2011/425
Thwarting Higher-Order Side Channel Analysis with Additive and Multiplicative Maskings
Laurie Genelle, Emmanuel Prouff, Michaël Quisquater
2011/424
Cryptanalysis of AZUMI: an EPC Class-1 Generation-2 Standard Compliant RFID Authentication Protocol
Masoumeh Safkhani, Nasour Bagheri, Majid Naderi
2011/423
Linear Cryptanalysis of PRINTcipher --- Trails and Samples Everywhere
Martin Ågren, Thomas Johansson
2011/422
Improved Analysis of ECHO-256
Jérémy Jean, María Naya-Plasencia, Martin Schläffer
2011/421
Superposition Attacks on Cryptographic Protocols
Ivan Damgård, Jakob Funder, Jesper Buus Nielsen, Louis Salvail
2011/420
Unaligned Rebound Attack - Application to Keccak
Alexandre Duc, Jian Guo, Thomas Peyrin, Lei Wei
2011/419
On the security of a certificateless short signature scheme
Miaomiao Tian, Liusheng Huang, Wei Yang
2011/418
An efficient RFID mutual authentication scheme based on ECC
Jue-Sam Chou, Yalin Chen, Cheng-Lun Wu, Chi-Fong Lin
2011/417
New Data-Efficient Attacks on Reduced-Round IDEA
Eli Biham, Orr Dunkelman, Nathan Keller, Adi Shamir
2011/416
Efficient Parallelization of Lanczos Type Algorithms
Ilya Popovyan
2011/415
On the Access Structures of Hyperelliptic Secret Sharing
Lei Li, Siman Yang
2011/414
Fuzzy Identity Based Encryption from Lattices
Shweta Agrawal, Xavier Boyen, Vinod Vaikuntanathan, Panagiotis Voulgaris, Hoeteck Wee
2011/413
Higher-Order Glitches Free Implementation of the AES using Secure Multi-Party Computation Protocols - Extended Version
Thomas Roche, Emmanuel Prouff
2011/412
Automatic Insertion of DPA Countermeasures
Andrew Moss, Elisabeth Oswald, Dan Page, Michael Tunstall
2011/411
Comments on a password authentication and update scheme based on elliptic curve cryptography
Debiao He
2011/410
Functional Encryption for Inner Product Predicates from Learning with Errors
Shweta Agrawal, David Mandell Freeman, Vinod Vaikuntanathan
2011/409
--Withdrawn--
Xiaoyuan Yang, Weiyi Cai, Xu An Wang
2011/408
Resettable Cryptography in Constant Rounds -- the Case of Zero Knowledge
Yi Deng, Dengguo Feng, Vipul Goyal, Dongdai Lin, Amit Sahai, Moti Yung
2011/407
Oblivious RAM with O((log N)^3) Worst-Case Cost
Elaine Shi, Hubert Chan, Emil Stefanov, Mingfei Li
2011/406
Composition Theorems Without Pre-Established Session Identifiers
Ralf Kuesters, Max Tuengerthal
2011/405
Can Homomorphic Encryption be Practical?
Kristin Lauter, Michael Naehrig, Vinod Vaikuntanathan
2011/404
A constant-round resettably-sound resettable zero-knowledge argument in the BPK model
Seiko Arita
2011/403
A Fair Evaluation Framework for Comparing Side-Channel Distinguishers
Carolyn Whitnall, Elisabeth Oswald
2011/402
Formalizing Group Blind Signatures and Practical Constructions without Random Oracles
Essam Ghadafi
2011/401
Pseudorandom Functions and Lattices
Abhishek Banerjee, Chris Peikert, Alon Rosen
2011/400
On a generalized combinatorial conjecture involving addition $\mod 2^k - 1$
Gérard Cohen, Jean-Pierre Flori
2011/399
Cryptanalysis of HFE, Multi-HFE and Variants for Odd and Even Characteristic
Luk Bettale, Jean-Charles Faugère, Ludovic Perret
2011/398
Hardness of Learning Problems over Burnside Groups of Exponent 3
Nelly Fazio, Kevin Iga, Antonio Nicolosi, Ludovic Perret, William E. Skeith III
2011/397
The n-Diffie-Hellman Problem and its Applications
Liqun Chen, Yu Chen
2011/396
Fair Computation with Rational Players
Amos Beimel, Adam Groce, Jonathan Katz, Ilan Orlov
2011/395
Improved Anonymity for Key-Trees
Michael Beye, Thijs Veugen
2011/394
A More Efficient Computationally Sound Non-Interactive Zero-Knowledge Shuffle Argument
Helger Lipmaa, Bingsheng Zhang
2011/393
Analysis and Improvement of Thing's Time-Memory Trade-Off Attack
Zhenqi Li, Dongdai Lin, Wenhao Wang
2011/392
An Efficient Rational Secret Sharing Scheme Based on the Chinese Remainder Theorem (Revised Version)
Yun Zhang, Christophe Tartary, Huaxiong Wang
2011/391
On the Portability of Side-Channel Attacks - An Analysis of the Xilinx Virtex 4, Virtex 5, and Spartan 6 Bitstream Encryption Mechanism
Amir Moradi, Markus Kasper, Christof Paar
2011/390
On the Vulnerability of FPGA Bitstream Encryption against Power Analysis Attacks - Extracting Keys from Xilinx Virtex-II FPGAs
Amir Moradi, Alessandro Barenghi, Timo Kasper, Christof Paar
2011/389
Spatial Encryption
Mike Hamburg
2011/388
Modulus Fault Attacks Against RSA-CRT Signatures
Eric Brier, David Naccache, Phong Q. Nguyen, Mehdi Tibouchi
2011/387
Analysis of the Parallel Distinguished Point Tradeoff
Jin Hong, Ga Won Lee, Daegun Ma
2011/386
How to share secrets simultaneously
Laszlo Csirmaz
2011/385
Efficient Implementation of Grand Cru with TI C6x+ Processor
Azhar Ali Khan, Ghulam Murtaza
2011/384
Distributed Oblivious RAM for Secure Two-Party Computation
Steve Lu, Rafail Ostrovsky
2011/383
A representation of the $p$-sylow subgroup of $\perm(\F_p^n)$ and a cryptographic application
Stefan Maubach
2011/382
Generic Fully Simulatable Adaptive Oblivious Transfer
Kaoru Kurosawa, Ryo Nojima, Le Trieu Phong
2011/381
A Novel RFID Authentication Protocol based on Elliptic Curve Cryptosystem
Yalin Chen, Jue-Sam Chou, Chi-Fong Lin, Cheng-Lun Wu
2011/380
An Exploration of the Kolmogorov-Smirnov Test as Competitor to Mutual Information Analysis
Carolyn Whitnall, Elisabeth Oswald, Luke Mather
2011/379
Cryptanalysis and improvement of a certificateless multi-proxy signature scheme
Miaomiao Tian, Wei Yang, Liusheng Huang
2011/378
A generalization of the Lucas addition chains
Amadou TALL
2011/377
Improved Generalized Birthday Attack
Paul Kirchner
2011/376
Backward Unlinkability for a VLR Group Signature Scheme with Efficient Revocation Check
Julien Bringer, Alain Patey
2011/375
Complexity of universal access structures
Laszlo Csirmaz
2011/374
Restoring the Differential Resistance of MD6
Ethan Heilman
2011/373
An efficient characterization of a family of hyperbent functions with multiple trace terms
Jean-Pierre Flori, Sihem Mesnager
2011/372
Identity based signcryption schemes without random oracles
Prashant Kushwah, Sunder Lal
2011/371
Monoidic Codes in Cryptography
Paulo S. L. M. Barreto, Richard Lindner, Rafael Misoczki
2011/370
Socio-Rational Secret Sharing as a New Direction in Rational Cryptography
Mehrdad Nojoumian, Douglas R. Stinson
2011/369
Storing Secrets on Continually Leaky Devices
Yevgeniy Dodis, Allison Lewko, Brent Waters, Daniel Wichs
2011/368
High-speed high-security signatures
Daniel J. Bernstein, Niels Duif, Tanja Lange, Peter Schwabe, Bo-Yin Yang
2011/367
Decoding One Out of Many
Nicolas Sendrier
2011/366
Highly Nonlinear Boolean Functions with Optimal Algebraic Immunity and Good Behavior Against Fast Algebraic Attacks
Deng Tang, Claude Carlet, Xiaohu Tang
2011/365
Security flaws in a biometrics-based multi-server authentication with key agreement scheme
Debiao He
2011/364
The Value $4$ of Binary Kloosterman Sums
Jean-Pierre Flori, Sihem Mesnager, Gérard Cohen
2011/363
Dynamic Group Blind Signatures
Essam Ghadafi
2011/362
Practically Efficient Proof of Retrievability in Cloud Storage
Jia XU, Ee-Chien CHANG
2011/361
The Exact Security of a Stateful IBE and New Compact Stateful PKE Schemes
S. Sree Vivek, S. Sharmila Deva Selvi, C. Pandu Rangan
2011/360
Certificateless Aggregate Signcryption Schemes
Ziba Eslami, Nasrollah Pakniat
2011/359
High-Entropy Visual Identification for Touch Screen Devices
Nathaniel Wesley Filardo, Giuseppe Ateniese
2011/358
Constructing a Ternary FCSR with a Given Connection Integer
Lin Zhiqiang, Pei Dingyi
2011/357
Generalized Learning Problems and Applications to Non-Commutative Cryptography
Gilbert Baumslag, Nelly Fazio, Antonio R. Nicolosi, Vladimir Shpilrain, William E. Skeith III
2011/356
An Efficient Attack on All Concrete KKS Proposals
Ayoub Otmani, Jean-Pierre Tillich
2011/355
On the (Non-)Equivalence of UC Security Notions
Oana Ciobotaru
2011/354
A coprocessor for secure and high speed modular arithmetic
Nicolas Guillermin
2011/353
Hidden Pair of Bijection Signature Scheme
Masahito Gotaishi, Shigeo Tsujii
2011/352
Bi-Deniable Public-Key Encryption
Adam O'Neill, Chris Peikert, Brent Waters
2011/351
Cryptanalysis of the $AA_{\beta}$ Cryptosystem based on Linear Diophantine Equation Discrete Log Problem
Yanbin Pan, Yingpu Deng
2011/350
$HB^N$: An HB-like protocol secure against man-in-the-middle attacks
Carl Bosley, Kristiyan Haralambiev, Antonio Nicolosi
2011/349
Efficient Methods for Exploiting Faults Induced at AES Middle Rounds
Chong Hee Kim
2011/348
Extractors Against Side-Channel Attacks: Weak or Strong?
Marcel Medwed, Francois-Xavier Standaert
2011/347
An efficient certificateless authenticated key agreement protocol without bilinear pairings
Debiao He
2011/346
Strongly Secure One Round Authenticated Key Exchange Protocol with Perfect Forward Security
Hai Huang
2011/345
LBlock: A Lightweight Block Cipher *
Wenling Wu, Lei Zhang
2011/344
Efficient Fully Homomorphic Encryption from (Standard) LWE
Zvika Brakerski, Vinod Vaikuntanathan
2011/343
Another Look at Security Definitions
Neal Koblitz, Alfred Menezes
2011/342
A Domain Transformation for Structure-Preserving Signatures on Group Elements
Melissa Chase, Markulf Kohlweiss
2011/341
An Improved Internet Voting Protocol
Mehmet Sabir Kiraz, Süleyman Kardaş, Muhammed Ali Bingöl, Fatih Birinci
2011/340
Encrypting More Information in Visual Cryptography Scheme
Feng Liu, Peng Li, ChuanKun Wu
2011/339
Careful with Composition: Limitations of Indifferentiability and Universal Composability
Thomas Ristenpart, Hovav Shacham, Thomas Shrimpton
2011/338
Fast and Regular Algorithms for Scalar Multiplication over Elliptic Curves
Matthieu Rivain
2011/337
Functional Re-encryption and Collusion-Resistant Obfuscation
Nishanth Chandran, Melissa Chase, Vinod Vaikuntanathan
2011/336
Cryptanalysis of an Authenticated Key Agreement Protocol for Wireless Mobile Communications
Debiao He
2011/335
New look at impossibility result on Dolev-Yao models with hashes
István Vajda
2011/334
On the Efficient Implementation of Pairing-Based Protocols
Michael Scott
2011/333
Cryptanalysis of a key agreement protocol based on chaotic Hash
Debiao He
2011/332
A depth-16 circuit for the AES S-box
Joan Boyar, Rene Peralta
2011/331
Cryptanalysis of Cho \textit{et al.}'s Protocol, A Hash-Based Mutual Authentication Protocol for RFID Systems
Masoumeh Safkhani, Pedro Peris-Lopez, Julio Cesar Hernandez-Castro, Nasour Bagheri, Majid Naderi
2011/330
Simple and Asymptotically Optimal $t$-Cheater Identifiable Secret Sharing Scheme
Ashish Choudhury
2011/329
Hardness of Computing Individual Bits for One-way Functions on Elliptic Curves
Alexandre Duc, Dimitar Jetchev
2011/328
Cryptanalysis of the Smart-Vercauteren and Gentry-Halevi’s Fully Homomorphic Encryption
Gu Chunsheng
2011/327
On the (In)security of Hash-based Oblivious RAM and a New Balancing Scheme
Eyal Kushilevitz, Steve Lu, Rafail Ostrovsky
2011/326
SGCM: The Sophie Germain Counter Mode
Markku-Juhani O. Saarinen
2011/325
New Receipt-Free E-Voting Scheme and Self-Proving Mix Net as New Paradigm
Aram Jivanyan, Gurgen Khachatryan
2011/324
On the Efficiency of Bit Commitment Reductions
Samuel Ranellucci, Alain Tapp, Severin Winkler, Jürg Wullschleger
2011/323
A New Related-Key Boomerang Distinguishing Attack of Reduced-Round Threefish-256
Shusheng Liu, Libin Wang, Zheng Gong
2011/322
A Comprehensive Evaluation of Mutual Information Analysis Using a Fair Evaluation Framework
Carolyn Whitnall, Elisabeth Oswald
2011/321
A Formal Approach to Distance-Bounding RFID Protocols
Ulrich Duerholz, Marc Fischlin, Michael Kasper, Cristina Onete
2011/320
Minimal Connectivity for Unconditionally Secure Message Transmission in Synchronous Directed Networks
Manan Nayak, Shashank Agrawal, Kannan Srinathan
2011/319
Structure Preserving CCA Secure Encryption and Its Application to Oblivious Third Parties
Jan Camenisch, Kristiyan Haralambiev, Markulf Kohlweiss, Jorn Lapon, Vincent Naessens
2011/318
Scalar Multiplication on Koblitz Curves using $\tau^2-$NAF
Sujoy Sinha Roy, Chester Rebeiro, Debdeep Mukhopadhyay, Junko Takahashi, Toshinori Fukunaga
2011/317
Two Simple Code-Verification Voting Protocols
Helger Lipmaa
2011/316
Security of Blind Signatures Revisited
Dominique Schröder, Dominique Unruh
2011/315
Implementing 4-Dimensional GLV Method on GLS Elliptic Curves with j-Invariant 0
Zhi Hu, Patrick Longa, Maozhi Xu
2011/314
Tamper-Proof Circuits: How to Trade Leakage for Tamper-Resilience
Sebastian Faust, Krzysztof Pietrzak, Daniele Venturi
2011/313
Error-free Multi-valued Broadcast and Byzantine Agreement with Optimal Communication Complexity
Arpita Patra
2011/312
Differential Cryptanalysis of GOST
Nicolas T. Courtois, Michal Misztal
2011/311
Targeted Malleability: Homomorphic Encryption for Restricted Computations
Dan Boneh, Gil Segev, Brent Waters
2011/310
Universally Composable Synchronous Computation
Jonathan Katz, Ueli Maurer, Bjoern Tackmann, Vassilis Zikas
2011/309
On Constructing Homomorphic Encryption Schemes from Coding Theory
Frederik Armknecht, Daniel Augot, Ludovic Perret, Ahmad-Reza Sadeghi
2011/308
Provably Secure and Practical Onion Routing
Michael Backes, Ian Goldberg, Aniket Kate, Esfandiar Mohammadi
2011/307
Ways to restrict the differential path
ZiJie Xu, Ke Xu
2011/306
Group Law Computations on Jacobians of Hyperelliptic Curves
Craig Costello, Kristin Lauter
2011/305
A new attack on Jakobsson Hybrid Mix-Net
Seyyed Amir Mortazavi
2011/304
Auditing the Auditor: Secure Delegation of Auditing Operation over Cloud Storage
Jia XU
2011/303
GNUC: A New Universal Composability Framework
Dennis Hofheinz, Victor Shoup
2011/302
Univariate Side Channel Attacks and Leakage Modeling
Julien Doget, Emmanuel Prouff, Matthieu Rivain, François-Xavier Standaert
2011/301
On the Amortized Complexity of Zero Knowledge Protocols for Multiplicative Relations
Ronald Cramer, Ivan Damgard, Valerio Pastro
2011/300
One-round Strongly Secure Key Exchange with Perfect Forward Secrecy and Deniability
Cas Cremers, Michele Feltz
2011/299
Modes of Operations for Encryption and Authentication Using Stream Ciphers Supporting an Initialisation Vector
Palash Sarkar
2011/298
Local limit theorem for large deviations and statistical box-tests
Igor Semaev
2011/297
NEW STATISTICAL BOX-TEST AND ITS POWER
Igor Semaev, Mehdi M. Hassanzadeh
2011/296
Short Signatures From Weaker Assumptions
Dennis Hofheinz, Tibor Jager, Eike Kiltz
2011/295
Counting Points on Genus 2 Curves with Real Multiplication
P. Gaudry, D. Kohel, B. Smith
2011/294
Small Public Keys and Fast Verification for Multivariate Quadratic Public Key Systems
Albrecht Petzoldt, Enrico Thomae, Stanislav Bulygin, Christopher Wolf
2011/293
Weakness of a Secured Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography
W. Han
2011/292
On Nonlinear Polynomial Selection and Geometric Progression (mod N) for Number Field Sieve
Namhun Koo, Gooc Hwa Jo, Soonhak Kwon
2011/291
Leakage-Resilient Coin Tossing
Elette Boyle, Shafi Goldwasser, Yael Tauman Kalai
2011/290
Some Results Concerning Generalized Bent Functions
Pantelimon Stanica, Sugata Gangopadhyay, Brajesh Kumar Singh
2011/289
Polly Cracker, Revisited
Martin R. Albrecht, Jean-Charles Faugère, Pooya Farshim, Gottfried Herold, Ludovic Perret
2011/288
On the Communication Complexity of Reliable and Secure Message Transmission in Asynchronous Networks
Ashish Choudhury, Arpita Patra
2011/287
Algebraic cryptanalysis of the round-reduced and side channel analysis of the full PRINTCipher-48
Stanislav Bulygin
2011/286
Bicliques for Preimages: Attacks on Skein-512 and the SHA-2 family
Dmitry Khovratovich, Christian Rechberger, Alexandra Savelieva
2011/285
Exploiting Linear Hull in Matsui’s Algorithm 1 (extended version)
Andrea Röck, Kaisa Nyberg
2011/284
On the Security of PPPoE Network
Fanbao Liu, Yumeng Feng, Yuan Cao
2011/283
The Fault Attack ECDLP Revisited
Mingqiang Wang, Xiaoyun Wang, Tao Zhan
2011/282
An Experimentally Verified Attack on Full Grain-128 Using Dedicated Reconfigurable Hardware
Itai Dinur, Tim Güneysu, Christof Paar, Adi Shamir, Ralf Zimmermann
2011/281
Computational Verifiable Secret Sharing Revisited
Michael Backes, Aniket Kate, Arpita Patra
2011/280
DDH-like Assumptions Based on Extension Rings
Ronald Cramer, Ivan Damgaard, Eike Kiltz, Sarah Zakarias, Angela Zottarel
2011/279
Fully Homomorphic Encryption without Squashing Using Depth-3 Arithmetic Circuits
Craig Gentry, Shai Halevi
2011/278
Comparing Different Definitions of Secure Session
Can Zhang
2011/277
Fully Homomorphic Encryption without Bootstrapping
Zvika Brakerski, Craig Gentry, Vinod Vaikuntanathan
2011/276
Analysis of the SSH Key Exchange Protocol
Stephen C. Williams
2011/275
Inverting the Square systems is exponential
Jintai Ding
2011/274
A Splice-and-Cut Cryptanalysis of the AES
Dmitry Khovratovich, Christian Rechberger
2011/273
Memory Delegation
Kai-Min Chung, Yael Tauman Kalai, Feng-Hao Liu, Ran Raz
2011/272
Outsourcing Multi-Party Computation
Seny Kamara, Payman Mohassel, Mariana Raykova
2011/271
Practical Key-recovery For All Possible Parameters of SFLASH
Charles Bouillaguet, Pierre-Alain Fouque, Gilles Macario-Rat
2011/270
Programmable Hash Functions and Their Applications
Dennis Hofheinz, Eike Kiltz
2011/269
Authenticated and Misuse-Resistant Encryption of Key-Dependent Data
Mihir Bellare, Sriram Keelveedhi
2011/268
Birthday Forgery Attack on 128-EIA3 Version 1.5
Raja Zeshan Haider
2011/267
Mutual Private Set Intersection with Linear Complexity
Myungsun Kim, Hyung Tae Lee, Jung Hee Cheon
2011/266
Identity-Based Decryption
Daniel R. L. Brown
2011/265
Efficient 2-Round General Perfectly Secure Message Transmission: A Minor Correction to Yang and Desmedt's Protocol
Qiushi Yang, Yvo Desmedt
2011/264
Round Optimal Blind Signatures
Dominique Schröder, Dominique Unruh
2011/263
The Computational Square-Root Exponent Problem- Revisited
Fangguo Zhang
2011/262
Cryptanalysis of the Light-Weight Cipher A2U2 - Reduced draft version
Mohamed Ahmed Abdelraheem, Julia Borghoff, Erik Zenner
2011/261
OBSERVATION: An explicit form for a class of second preimages for any message M for the SHA-3 candidate Keccak
Danilo Gligoroski, Rune Steinsmo Ødeård, Rune Erlend Jensen
2011/260
Security \& Indistinguishability in the Presence of Traffic Analysis
Cristina Onete, Daniele Venturi
2011/259
Comments on a sensor network key redistribution technique of Cichon, Golebiewski and Kutylowski
Douglas R. Stinson
2011/258
A High Speed Pairing Coprocessor Using RNS and Lazy Reduction
Gavin Xiaoxu Yao, Junfeng Fan, Ray C. C. Cheung, Ingrid Verbauwhede
2011/257
Secure Multi-Party Computation of Boolean Circuits with Applications to Privacy in On-Line Marketplaces
Seung Geol Choi, Kyung-Wook Hwang, Jonathan Katz, Tal Malkin, Dan Rubenstein
2011/256
Leakage Resilient Secure Two-Party Computation
Ivan Damgaard, Carmit Hazay, Arpita Patra
2011/255
Hiding the Policy in Cryptographic Access Control
Sascha Müller, Stefan Katzenbeisser
2011/254
Using the Cloud to Determine Key Strengths
T. Kleinjung, A. K. Lenstra, D. Page, N. P. Smart
2011/253
Attack Cryptosystems Based on HCDLP
Mingqiang Wang, Xiaoyun Wang, Tao Zhan
2011/252
Cryptography Secure Against Related-Key Attacks and Tampering
Mihir Bellare, David Cash, Rachel Miller
2011/251
Concurrently Secure Computation in Constant Rounds
Sanjam Garg, Vipul Goyal, Abhishek Jain, Amit Sahai
2011/250
A Parallel Repetition Theorem for Leakage Resilience
Zvika Brakerski, Yael Tauman Kalai
2011/249
Breaking a certificateless key agreement protocol withour bilinear pairing
W. Han
2011/248
Fast Password Recovery Attack: Application to APOP
Fanbao Liu, Yi Liu, Tao Xie, Yumeng Feng
2011/247
An Ultra-Efficient Key Recovery Attack on the Lightweight Stream Cipher A2U2
Qi Chai, Xinxin Fan, Guang Gong
2011/246
A Framework for Secure Single Sign-On
Bernardo Machado David, Anderson C. A. Nascimento, Rafael Tonicelli
2011/245
On the Number of Carries Occuring in an Addition $\mod 2^k-1$
Jean-Pierre Flori, Hugues Randriam
2011/244
PRISM -- Privacy-Preserving Search in MapReduce
Erik-Oliver Blass, Roberto Di Pietro, Refik Molva, Melek Onen
2011/243
Affine Pairings on ARM
Tolga Acar, Kristin Lauter, Michael Naehrig, Daniel Shumow
2011/242
Cryptanalysis of KeeLoq code-hopping using a Single FPGA
Idan Sheetrit, Avishai Wool
2011/241
A Novel Adaptive Proactive Secret Sharing without a Trusted Party
Xiuqun Wang
2011/240
Universal Composability from Essentially Any Trusted Setup
Mike Rosulek
2011/239
Efficient Software Implementations of Modular Exponentiation
Shay Gueron
2011/238
Attacks On a Double Length Blockcipher-based Hash Proposal
Yiyuan Luo, Xuejia Lai
2011/237
The block cipher NSABC (public domain)
Alice Nguyenova-Stepanikova, Tran Ngoc Duong
2011/236
Using Templates to Distinguish Multiplications from Squaring Operations
Neil Hanley, Michael Tunstall, William P. Marnane
2011/235
Computer-Aided Decision-Making with Trust Relations and Trust Domains (Cryptographic Applications)
Simon Kramer, Rajeev Goré, Eiji Okamoto
2011/234
Comments on a secure dynamic ID-based remote user authentication scheme for multi-server environment using smart cards
Debiao He
2011/233
Correlated-Input Secure Hash Functions
Vipul Goyal, Adam O'Neill, Vanishree Rao
2011/232
Remote Timing Attacks are Still Practical
Billy Bob Brumley, Nicola Tuveri
2011/231
History-Free Sequential Aggregate Signatures
Marc Fischlin, Anja Lehmann, Dominique Schröder
2011/230
All-But-Many Lossy Trapdoor Functions
Dennis Hofheinz
2011/229
Routing Protocol Based Shared and Session Key Exchange Protocol for Wireless Mobile Ad-hoc Network
Md. Golam Kaosar
2011/228
A Framework for Practical Universally Composable Zero-Knowledge Protocols
Jan Camenisch, Stephan Krenn, Victor Shoup
2011/227
Robust parent-identifying codes and combinatorial arrays
Alexander Barg, Grigory Kabatiansky
2011/226
Substitution-permutation networks, pseudorandom functions, and Natural Proofs
Eric Miles, Emanuele Viola
2011/225
A Simple and Efficient New Group Key Management Approach Based on Linear Geometry
Shaohua Tang, Jintai Ding, Yujun Liang
2011/224
Cryptanalysis and Improvement of an Efficient CCA Secure PKE Scheme
Xu An Wang, Liqiang Wu, Xiaoyuan Yang, Huaqun Wang
2011/223
A Perfectly Binding Commitment Scheme Against Quantum Attacks
Zeng Bing, Chen Liang, Tang Xueming
2011/222
Sequential Aggregate Signatures with Lazy Verification from Trapdoor Permutations
Kyle Brogle, Sharon Goldberg, Leonid Reyzin
2011/221
Protecting Drive Encryption Systems Against Memory Attacks
Leo Dorrendorf
2011/220
Framework for Security Proofs for On-demand Routing Protocols in Multi-Hop Wireless Networks
István Vajda
2011/219
On the Security of TLS-DHE in the Standard Model
Tibor Jager, Florian Kohlar, Sven Schäge, Jörg Schwenk
2011/218
Cryptographic Analysis of All 4 x 4 - Bit S-Boxes
Markku-Juhani O. Saarinen
2011/217
Identity Based Deterministic Signature Scheme Without Forking-Lemma
S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Rangan
2011/216
Provably Secure Group Key Management Approach Based upon Hyper-sphere
Shaohua Tang, Lingling Xu, Niu Liu, Jintai Ding, Zhiming Yang
2011/215
Delegatable Homomorphic Encryption with Applications to Secure Outsourcing of Computation
M. Barbosa, P. Farshim
2011/214
On ``identities'', ``names'', ``NAMES'', ``ROLES'' and Security: A Manifesto
Charles Rackoff
2011/213
On Cipher-Dependent Related-Key Attacks in the Ideal-Cipher Model
M. R. Albrecht, P. Farshim, K. G. Paterson, G. J. Watson
2011/212
Maiorana-McFarland Functions with High Second-Order Nonlinearity
Nicholas Kolokotronis, Konstantinos Limniotis
2011/211
Security Evaluation of GOST 28147-89 In View Of International Standardisation
Nicolas T. Courtois
2011/210
The preimage security of double-block-length compression functions
Jooyoung Lee, Martijn Stam, John Steinberger
2011/209
Better Security for Deterministic Public-Key Encryption: The Auxiliary-Input Setting
Zvika Brakerski, Gil Segev
2011/208
Direct Constructions of Bidirectional Proxy Re-Encryption with Alleviated Trust in Proxy
Jian Weng, Yunlei Zhao
2011/207
Proofs of Ownership in Remote Storage Systems
Shai Halevi, Danny Harnik, Benny Pinkas, Alexandra Shulman-Peleg
2011/206
Isomorphism classes of Edwards curves over finite fields
R. Farashahi, D. Moody, H. Wu
2011/205
Group-oriented ring signature
Chunbo Ma, Jun Ao
2011/204
Leakage Tolerant Interactive Protocols
Nir Bitansky, Ran Canetti, Shai Halevi
2011/203
Key agreement based on homomorphisms of algebraic structures
Juha Partala
2011/202
Cycling Attacks on GCM, GHASH and Other Polynomial MACs and Hashes
Markku-Juhani O. Saarinen
2011/201
Improved Meet-in-the-Middle Cryptanalysis of KTANTAN
Lei Wei, Christian Rechberger, Jian Guo, Hongjun Wu, Huaxiong Wang, San Ling
2011/200
Fair and Privacy-Preserving Multi-Party Protocols for Reconciling Ordered Input Sets (Extended version)
Georg Neugebauer, Ulrike Meyer, Susanne Wetzel
2011/199
An efficient deterministic test for Kloosterman sum zeros
Omran Ahmadi, Robert Granger
2011/198
Terminating BKZ
Guillaume Hanrot, Xavier Pujol, Damien Stehlé
2011/197
Public Key Encryption for the Forgetful
Puwen Wei, Yuliang Zheng, Xiaoyun Wang
2011/196
Acceleration of Composite Order Bilinear Pairing on Graphics Hardware
Ye Zhang, Chun Jason Xue, Duncan S. Wong, Nikos Mamoulis, S. M. Yiu
2011/195
An ID-based three-party authenticated key exchange protocol using elliptic curve cryptography for mobile-commerce environments
Debiao He, Yitao Chen
2011/194
Cryptanalysis of Chen \textit{et al.}'s RFID Access Control Protocol
Masoumeh Safkhani, Nasour Bagheri, Majid Naderi
2011/193
Security Analysis of $LMAP^{++}$, an RFID Authentication Protocol
Nasour Bagheri, Masoumeh Safkhani, Majid Naderi, Somitra Kumar Sanadhya
2011/192
Short and Efficient Certificate-Based Signature
Joseph K. Liu, Feng Bao, Jianying Zhou
2011/191
On the Security of the Winternitz One-Time Signature Scheme
Johannes Buchmann, Erik Dahmen, Sarah Ereth, Andreas Hülsing, Markus Rückert
2011/190
SHS: Secure Hybrid Search by Combining Dynamic and Static Indexes in PEKS
Peng Xu, Hai Jin
2011/189
SIMPL Systems as a Keyless Cryptographic and Security Primitive
Ulrich Rührmair
2011/188
Physical Turing Machines and the Formalization of Physical Cryptography
Ulrich Rührmair
2011/187
Accelerating ID-based Encryption based on Trapdoor DL using Pre-computation
Hyung Tae Lee, Jung Hee Cheon, Jin Hong
2011/186
Some aspects of multi-variable secret sharing
Umadevi Ganugula, Prabal Paul
2011/185
Efficient and Secure Data Storage Operations for Mobile Cloud Computing
Zhibin Zhou, Dijiang Huang
2011/184
Fortification of AES with Dynamic Mix-Column Transformation
Ghulam Murtaza, Azhar Ali Khan, Syed Wasi Alam, Aqeel Farooqi
2011/183
Elliptic Curve Point Multiplication Using MBNR and Point Halving
G. N. Purohit, Asmita SIngh Rawat
2011/182
Designated Confirmer Signatures With Unified Verification
Guilin Wang, Fubiao Xia, Yunlei Zhao
2011/181
Security of Prime Field Pairing Cryptoprocessor Against Differential Power Attack
Santosh Ghosh, Debdeep Mukhopadhyay, Dipanwita Roy Chowdhury
2011/180
Highly-Efficient Universally-Composable Commitments based on the DDH Assumption
Yehuda Lindell
2011/179
Compact McEliece keys based on Quasi-Dyadic Srivastava codes
Edoardo Persichetti
2011/178
Differential Fault Analysis of AES: Toward Reducing Number of Faults
Chong Hee KIM
2011/177
Dynamic MDS Matrices for Substantial Cryptographic Strength
Muhammad Yasir Malik, Jong-Seon No
2011/176
A FPGA pairing implementation using the Residue Number System
Sylvain Duquesne, Nicolas Guillermin
2011/175
Analysis of reduced-SHAvite-3-256 v2
Marine Minier, Maria Naya-Plasencia, Thomas Peyrin
2011/174
On-line secret sharing
Laszlo Csirmaz, Gabor Tardos
2011/173
An efficient certificateless short signature scheme from pairings
Debiao He, Jianhua Chen
2011/172
The weak password problem: chaos, criticality, and encrypted p-CAPTCHAs
T. V. Laptyeva, S. Flach, K. Kladko
2011/171
On lower bounds on second--order nonliearities of bent functions obtained by using Niho power functions
Manish Garg, Sugata Gangopadhyay
2011/170
Software implementation of binary elliptic curves: impact of the carry-less multiplier on scalar multiplication
Jonathan Taverne, Armando Faz-Hernández, Diego F. Aranha, Francisco Rodríguez-Henríquez, Darrel Hankerson, Julio López
2011/169
Identity-Based Cryptography for Cloud Security
Hongwei Li, Yuanshun Dai, Bo Yang
2011/168
A Commitment-Consistent Proof of a Shuffle
Douglas Wikström
2011/167
Identifying Large-Scale RFID Tags Using Non-Cryptographic Approach
Yalin Chen, Jue-Sam Chou, Cheng-Lun Wu, Chi-Fong Lin
2011/166
Selections: Internet Voting with Over-the-Shoulder Coercion-Resistance
Jeremy Clark, Urs Hengartner
2011/165
Improved Side Channel Cube Attacks on PRESENT
XinJie Zhao, Tao Wang, ShiZe Guo
2011/164
On the relation between the MXL family of algorithms and Gröbner basis algorithms
Martin Albrecht, Carlos Cid, Jean-Charles Faugère, Ludovic Perret
2011/163
Improved Integral Attacks on Reduced Round Camellia
Yanjun Li, Wenling Wu, Liting Zhang, Lei Zhang
2011/162
Collision Timing Attack when Breaking 42 AES ASIC Cores
Amir Moradi, Oliver Mischke, Christof Paar
2011/161
Efficient Hardware Implementations of BRW Polynomials and Tweakable Enciphering Schemes
Debrup Chakraborty, Cuauhtemoc Mancillas-Lopez, Francisco Rodriguez-Henriquez, Palash Sarkar
2011/160
Cryptanalysis of ARMADILLO2
Mohamed Ahmed Abdelraheem, Céline Blondeau, María Naya-Plasencia, Marion Videau, Erik Zenner
2011/159
The Block Cipher Thuca
Isaiah Makwakwa
2011/158
Enhancing Data Privacy in the Cloud
Yanbin Lu, Gene Tsudik
2011/157
Secure Computation on the Web: Computing without Simultaneous Interaction
Shai Halevi, Yehuda Lindell, Benny Pinkas
2011/156
Strong Forward Security in Identity-Based Signcryption
Madeline González Muñiz, Peeter Laud
2011/155
High-speed Hardware Implementation of Rainbow Signatures on FPGAs
Shaohua Tang, Haibo Yi, Huan Chen, Guomin Chen, Jintai Ding
2011/154
The Block Cipher Vuna
Isaiah Makwakwa
2011/153
Lower bounds of shortest vector lengths in random knapsack lattices and random NTRU lattices
Jingguo Bi, Qi Cheng
2011/152
A Practical Application of Differential Privacy to Personalized Online Advertising
Yehuda Lindell, Eran Omri
2011/151
Direct Exponent and Scalar Multiplication Classes of an MDS Matrix
G. Murtaza, N. Ikram
2011/150
A Novel k-out-of-n Oblivious Transfer Protocol from Bilinear Pairing
Jue-Sam Chou, Cheng-Lun Wu, Yalin Chen
2011/149
Generic Side-Channel Distinguishers: Improvements and Limitations
Nicolas Veyrat-Charvillon, François-Xavier Standaert
2011/148
Near-Collision Attack on the Step-Reduced Compression Function of Skein-256
Hongbo Yu, Jiazhe Chen, Keting jia, Xiaoyun Wang
2011/147
The Optimal Linear Secret Sharing Scheme for Any Given Access Structure
Tang Chunming, Gao Shuhong, Zhang Chengli
2011/146
ECDLP on GPU
Lei Xu, Dongdai Lin, Jing Zou
2011/145
Linear Diophantine Equation Discrete Log Problem, Matrix Decomposition Problem and the AA{\beta}-cryptosystem
M. R. K. Ariffin, N. A. Abu
2011/144
Deniable Encryption from the McEliece Assumptions
Bernardo M. David, Anderson C. A. Nascimento
2011/143
Computing $(\ell,\ell)$-isogenies in polynomial time on Jacobians of genus~$2$ curves
Romain Cosset, Damien Robert
2011/142
A Parallel Hardware Architecture for the Solution of Linear Equation Systems Implemented over GF(2^n)
Haibo Yi, Shaohua Tang, Huan Chen, Guomin Chen
2011/141
Fast and Private Computation of Cardinality of Set Intersection and Union
Emiliano De Cristofaro, Paolo Gasti, Gene Tsudik
2011/140
Some Instant- and Practical-Time Related-Key Attacks on KTANTAN32/48/64
Martin Ågren
2011/139
Shortest Lattice Vectors in the Presence of Gaps
Mingjie Liu, Xiaoyun Wang, Guangwu Xu, Xuexin Zheng
2011/138
Constant-Round Privacy Preserving Multiset Union
Jeongdae Hong, Jung Woo Kim, Jihye Kim, Kunsoo Park, Jung Hee Cheon
2011/137
Towards a Game Theoretic View of Secure Computation
Gilad Asharov, Ran Canetti, Carmit Hazay
2011/136
A Full Proof of the BGW Protocol for Perfectly-Secure Multiparty Computation
Gilad Asharov, Yehuda Lindell
2011/135
On isogeny classes of Edwards curves over finite fields
Omran Ahmadi, Robert Granger
2011/134
Differentially Private Billing with Rebates
George Danezis, Markulf Kohlweiss, Alfredo Rial
2011/133
Fully Homomorphic SIMD Operations
N. P. Smart, F. Vercauteren
2011/132
Verifiable Delegation of Computation over Large Datasets
Siavosh Benabbas, Rosario Gennaro, Yevgeniy Vahlis
2011/131
Trapdoor oneway functions associated with exponentiation
Virendra Sule
2011/130
Ergodic Theory Over ${\F}_2[[T]]$
Dongdai Lin, Tao Shi, Zifeng Yang
2011/129
Distance Hijacking Attacks on Distance Bounding Protocols
Cas Cremers, Kasper B. Rasmussen, Benedikt Schmidt, Srdjan Capkun
2011/128
The Ligo Block Cipher
Isaiah Makwakwa
2011/127
Integer Arithmetic without Arithmetic Addition
Gideon Samid
2011/126
The Hummingbird-2 Lightweight Authenticated Encryption Algorithm
Daniel Engels, Markku-Juhani O. Saarinen, Peter Schweitzer, Eric M. Smith
2011/125
A Construction of A New Class of Knapsack-Type Public Key Cryptosystem, K(III)$\Sigma$PKC
Masao KASAHARA
2011/124
A New Class of Biometrics on the Basis of Forgotten Secret Recovering Scheme, KSS(I)
Masao KASAHARA
2011/123
Linear Hulls with Correlation Zero and Linear Cryptanalysis of Block Ciphers
Andrey Bogdanov, Vincent Rijmen
2011/122
Secure Multi-Party Sorting and Applications
Kristjän Valur Jönsson, Gunnar Kreitz, Misbah Uddin
2011/121
More Practical Fully Homomorphic Encryption
Gu Chunsheng
2011/120
Faster 2-regular information-set decoding
Daniel J. Bernstein, Tanja Lange, Christiane Peters, Peter Schwabe
2011/119
Multiplicative Learning with Errors and Cryptosystems
Gu Chunsheng
2011/118
New Fully Homomorphic Encryption over the Integers
Gu Chunsheng
2011/117
Bounded Vector Signatures and their Applications
Lei Wei, Scott E. Coull, Michael K. Reiter
2011/116
Short-output universal hash functions and their use in fast and secure message authentication
Long Hoang Nguyen, Andrew William Roscoe
2011/115
Multiple Differential Cryptanalysis: Theory and Practice (Corrected)
Céline Blondeau, Benoît Gérard
2011/114
Fully Homomorphic Encryption, Approximate Lattice Problem and LWE
Gu Chunsheng
2011/113
Efficient Techniques for Privacy-Preserving Sharing of Sensitive Information
Emiliano De Cristofaro, Yanbin Lu, Gene Tsudik
2011/112
An efficient certificateless two-party authenticated key agreement scheme from pairings
Debiao He, Jin Hu
2011/111
Generalizations of Bent Functions. A Survey
Natalia Tokareva
2011/110
Fully Homomorphic Encryption over the Binary Polynomials
Gu Chunsheng
2011/109
Secure Blind Decryption
Matthew Green
2011/108
Practical Secure and Efficient Multiparty Linear Programming Based on Problem Transformation
Jannik Dreier, Florian Kerschbaum
2011/107
Threshold Encryption into Multiple Ciphertexts
Martin Stanek
2011/106
Common Randomness and Secret Key Capacities of Two-way Channels
Hadi Ahmadi, Reihaneh Safavi-Naini
2011/105
Explicit Formulas for Real Hyperelliptic Curves of Genus 2 in Affine Representation
S. Erickson, M. J. Jacobson Jr., A. Stein
2011/104
Unconditionally Secure Signature Schemes Revisited
Colleen M. Swanson, Douglas R. Stinson
2011/103
Cryptographically Sound Security Proof for On-Demand Source Routing Protocol EndairA
István Vajda
2011/102
Optimal and Parallel Online Memory Checking
Charalampos Papamanthou, Roberto Tamassia
2011/101
Lightweight Anonymous Authentication with TLS and DAA for Embedded Mobile Devices
Liqun Chen, Kurt Dietrich, Hans Löhr, Ahmad-Reza Sadeghi, Christian Wachsmann, Johannes Winter
2011/100
A Novel Group Signature Scheme Based on MPKC
Guangdong Yang, Shaohua Tang, Li Yang
2011/099
Can Code Polymorphism Limit Information Leakage?
Antoine Amarilli, Sascha Müller, David Naccache, Daniel Page, Pablo Rauzy, Michael Tunstall
2011/098
Computing Discrete Logarithms in the Jacobian of High-Genus Hyperelliptic Curves over Even Characteristic Finite Fields
M. D. Velichka, M. J. Jacobson Jr., A. Stein
2011/097
Fastplay-A Parallelization Model and Implementation of SMC on CUDA based GPU Cluster Architecture
Shi Pu, Pu Duan, Jyh-Charn Liu
2011/096
Computing on Authenticated Data
Jae Hyun Ahn, Dan Boneh, Jan Camenisch, Susan Hohenberger, abhi shelat, Brent Waters
2011/095
ALRED Blues: New Attacks on AES-Based MAC's
Orr Dunkelman, Nathan Keller, Adi Shamir
2011/094
Graceful Degradation in Multi-Party Computation
Martin Hirt, Christoph Lucas, Ueli Maurer, Dominik Raub
2011/093
Linear Cryptanalysis Using Multiple Linear Approximations
Miia Hermelin, Kaisa Nyberg
2011/092
Characterization of the relations between information-theoretic non-malleability, secrecy, and authenticity
Akinori Kawachi, Christopher Portmann, Keisuke Tanaka
2011/091
A New Approach to Practical Active-Secure Two-Party Computation
Jesper Buus Nielsen, Peter Sebastian Nordholt, Claudio Orlandi, Sai Sheshank Burra
2011/090
Generic Methods to Achieve Tighter Security Reductions for a Category of IBE Schemes
Yu Chen, Liqun Chen, Zhong Chen
2011/089
Octal Bent Generalized Boolean Functions
Pantelimon Stanica, Thor Martinsen
2011/088
Leftover Hash Lemma, Revisited
Boaz Barak, Yevgeniy Dodis, Hugo Krawczyk, Olivier Pereira, Krzysztof Pietrzak, Francois-Xavier Standaert, Yu Yu
2011/087
On the Instantiability of Hash-and-Sign RSA Signatures
Yevgeniy Dodis, Iftach Haitner, Aris Tentes
2011/086
Fault-propagation Pattern Based DFA on SPN Structure Block Ciphers using Bitwise Permutation, with Application to PRESENT and PRINTcipher
Xin-jie Zhao, Tao Wang, Shi-ze Guo
2011/085
Co-induction and Computational Semantics for Public-key Encryption with Key Cycles
Mohammad Hajiabadi, Bruce M. Kapron
2011/084
Traitor Tracing against Public Collaboration (Full Version)
Xingwen Zhao, Fangguo Zhang
2011/083
On the number of bent functions from iterative constructions: lower bounds and hypotheses
Natalia Tokareva
2011/082
Does Pseudo-basis Extend to General Adversary?
Ashish Choudhury, Kaoru Kurosawa, Arpita Patra
2011/081
Secure Datastructures based on Multiparty Computation
Tomas Toft
2011/080
Turbo Codes Can Be Asymptotically Information-Theoretically Secure
Xiao Ma
2011/079
Identity-based Digital Signature Scheme Without Bilinear Pairings
He Debiao, Chen Jianhua, Hu Jin
2011/078
A Low-Area Unified Hardware Architecture for the AES and the Cryptographic Hash Function ECHO
Jean-Luc Beuchat, Eiji Okamoto, Teppei Yamazaki
2011/077
DPA Leakage Evaluation and Countermeasure Plug-in
Tang Ming, Wang Xiaorong, Qiu Zhenlong, Gao Si, Zhang Huanguo, Wu Qianhong
2011/076
A Unified Approach to Combinatorial Key Predistribution Schemes for Sensor Networks
Maura B. Paterson, Douglas R. Stinson
2011/075
A Novel RFID Distance Bounding Protocol Based on Physically Unclonable Functions
Suleyman Kardas, Mehmet Sabir Kiraz, Muhammed Ali Bingol, Huseyin Demirci
2011/074
Really fast syndrome-based hashing
Daniel J. Bernstein, Tanja Lange, Christiane Peters, Peter Schwabe
2011/073
Cryptanalysis of three matrix-based key establishment protocols
Simon R. Blackburn, Carlos Cid, Ciaran Mullan
2011/072
AES Variants Secure Against Related-Key Differential and Boomerang Attacks
Jiali Choy, Aileen Zhang, Khoongming Khoo, Matt Henricksen, Axel Poschmann
2011/071
Information-theoretic Bounds for Differentially Private Mechanisms
Gilles Barthe, Boris Köpf
2011/070
Rational authentication protocols
Long H. Nguyen
2011/069
Constant-Rounds, Linear Multi-party Computation for Exponentiation and Modulo Reduction with Perfect Security
Chao Ning, Qiuliang Xu
2011/068
Rational Secret Sharing with Honest Players over an Asynchronous Channel
William K. Moses Jr., C. Pandu Rangan
2011/067
On the Distribution of the Subset Sum Pseudorandom Number Generator on Elliptic Curves
Simon R. Blackburn, Alina Ostafe, Igor E. Shparlinski
2011/066
Deniable Encryption with Negligible Detection Probability: An Interactive Construction
Markus Duermuth, David Mandell Freeman
2011/065
Fully Simulatable Quantum-Secure Coin-Flipping and Applications
Carolin Lunemann, Jesper Buus Nielsen
2011/064
Cryptographic Treatment of Private User Profiles
Felix Günther, Mark Manulis, Thorsten Strufe
2011/063
Secret Keys from Channel Noise
Hadi Ahmadi, Reihaneh Safavi-Naini
2011/062
Cryptanalysis and Security Enhancement of an Advanced Authentication Scheme using Smart Cards, and a Key Agreement Scheme for Two-Party Communication
Swapnoneel Roy, Amlan K Das, Yu Li
2011/061
Cryptanalysis of Some Protocols for RFID Systems
Masoumeh Safkhani, Majid Naderi, Nasour Bagheri, Somitra Kumar Sanadhya
2011/060
A Group Signature Scheme from Lattice Assumptions
S. Dov Gordon, Jonathan Katz, Vinod Vaikuntanathan
2011/059
Extending Baby-step Giant-step algorithm for FACTOR problem
Martin Stanek
2011/058
Supplemental Access Control (PACE v2): Security Analysis of PACE Integrated Mapping
Jean-Sébastien Coron, Aline Gouget, Thomas Icart, Pascal Paillier
2011/057
Another Look at RSA Signatures With Affine Padding
Jean-Sébastien Coron, David Naccache, Mehdi Tibouchi
2011/056
Spectral Coherence Analysis - First Experimental Results -
Amine Dehbaoui, Sébastien Tiran, Philippe Maurine, François-Xavier Standaert, Nicolas Veyrat-Charvillon
2011/055
On Enumeration of Polynomial Equivalence Classes and Their Application to MPKC
Dongdai Lin, Jean-Charles Faugere, Ludovic Perret, Tianze Wang
2011/054
Non-Applicability of Pseudobasis for Designing Perfectly Secure Message Transmission Protocols Against Non-Threshold Adversary
Ashish Choudhury, Kaoru Kurosawa, Arpita Patra
2011/053
Adaptive Pseudo-Free Groups and Applications
Dario Catalano, Dario Fiore, Bogdan Warinschi
2011/052
Revocable Attribute-Based Signatures with Adaptive Security in the Standard Model
Alex Escala, Javier Herranz, Paz Morillo
2011/051
Towards Strong Adaptive Corruption Security of Authenticated Key Exchange
Zheng Yang
2011/050
Authenticated Key Exchange with Synchronized State
Zheng Yang
2011/049
Unbounded HIBE and Attribute-Based Encryption
Allison Lewko, Brent Waters
2011/048
A non-Abelian factorization problem and an associated cryptosystem
Srinath Baba, Srinivas Kotyad, Raghu Teja
2011/047
Constructing differential 4-uniform permutations from know ones
Yuyin Yu, Mingsheng Wang, Yongqiang Li
2011/046
Lower and Upper Bounds for Deniable Public-Key Encryption
Rikke Bendlin, Jesper Buus Nielsen, Peter Sebastian Nordholt, Claudio Orlandi
2011/045
Private Identification, Authentication and Key Agreement Protocol with Security Mode Setup
Farshid Farhat, Somayeh Salimi, Ahmad Salahi
2011/044
Fast Scalar Multiplication in ECC using The Multi base Number System.
G. N. Purohit, Asmita Singh Rawat
2011/043
Proxy Blind Multi-signature Scheme using ECC for handheld devices
Jayaprakash Kar
2011/042
Computing endomorphism rings of elliptic curves under the GRH
Gaetan Bisson
2011/041
Reclaiming Privacy for Smartphone Applications (Revised Version)
Emiliano De Cristofaro, Anthony Durussel, Imad Aad
2011/040
Simple and Exact Formula for Minimum Loop Length in Ate_i Pairing based on Brezing-Weng Curves
Hoon Hong, Eunjeong Lee, Hyang-Sook Lee, Cheol-Min Park
2011/039
Fast point quadrupling on elliptic curves
Duc-Phong Le, Binh P Nguyen
2011/038
Cold Boot Key Recovery by Solving Polynomial Systems with Noise
Martin Albrecht, Carlos Cid
2011/037
Higher-Order Differential Attack on Reduced SHA-256
Mario Lamberger, Florian Mendel
2011/036
The Complexity Analysis of the MutantXL Family
Mohamed Saied Emam Mohamed, Jintai Ding, Johannes Buchmann
2011/035
A New Family of Implicitly Authenticated Diffie-Hellman Protocols
Andrew C. Yao, Yunlei Zhao
2011/034
Secure Authentication from a Weak Key, Without Leaking Information
Niek J. Bouman, Serge Fehr
2011/033
The Geometry of Flex Tangents to a Cubic Curve and its Parameterizations
Jean-Marc Couveignes, Jean-Gabriel Kammerer
2011/032
Corrigendum to: The Cube Attack on Stream Cipher Trivium and Quadraticity Tests
Piotr Mroczkowski, Janusz Szmidt
2011/031
Efficient Unconditional Asynchronous Byzantine Agreement with Optimal Resilience
Ashish Choudhury, Arpita Patra
2011/030
Fast Elliptic Curve Cryptography Using Optimal Double-Base Chains
Vorapong Suppakitpaisarn, Masato Edahiro, Hiroshi Imai
2011/029
Outline of a proposal responding to E.U. and U.S. calls for trustworthy global-scale IdM and CKM designs
Benjamin Gittins
2011/028
The Parazoa Family: Generalizing the Sponge Hash Functions
Elena Andreeva, Bart Mennink, Bart Preneel
2011/027
Simple and Efficient Single Round Almost Perfectly Secure Message Transmission Tolerating Generalized Adversary
Ashish Choudhury, Kaoru Kurosawa, Arpita Patra
2011/026
Private Discovery of Common Social Contacts
Emiliano De Cristofaro, Mark Manulis, Bertram Poettering
2011/025
Supporting Publication and Subscription Confidentiality in Pub/Sub Networks
Mihaela Ion, Giovanni Russello, Bruno Crispo
2011/024
Secure evaluation of polynomial using privacy ring homomorphisms
Alexander Rostovtsev, Alexey Bogdanov, Mikhail Mikhaylov
2011/023
Improved zero-sum distinguisher for full round Keccak-f permutation
Ming Duan, Xuajia Lai
2011/022
Cryptanalysis with Ternary Difference: Applied to Block Cipher PRESENT
Farzaneh Abazari, Babak Sadeghian
2011/021
Fully Secure Anonymous Hierarchical Identity-Based Encryption with Constant Size Ciphertexts
Jae Hong Seo, Jung Hee Cheon
2011/020
Cover and Decomposition Index Calculus on Elliptic Curves made practical. Application to a seemingly secure curve over $\F_{p^6}$
Antoine Joux, Vanessa Vitse
2011/019
Collision Resistance of the JH Hash Function
Jooyoung Lee, Deukjo Hong
2011/018
Homomorphic Signatures for Polynomial Functions
Dan Boneh, David Mandell Freeman
2011/017
New Impossible Differential Attacks of Reduced-Round Camellia-192 and Camellia-256
Jiazhe Chen, Keting Jia, Hongbo Yu, Xiaoyun Wang
2011/016
An Anonymous Health Care System
Melissa Chase, Kristin Lauter
2011/015
Exponential attacks on 6-round Luby-Rackoff and on 5-round Lai-Massey
Jean-Philippe Aumasson
2011/014
Unconditionally Reliable Message Transmission in Directed Neighbour Networks
Shashank Agrawal, Abhinav Mehta, Kannan Srinathan
2011/013
Secure Message Transmission In Asynchronous Directed Networks
Shashank Agrawal, Abhinav Mehta, Kannan Srinathan
2011/012
Minimizing Non-interactive Zero-Knowledge Proofs Using Fully Homomorphic Encryption
Jens Groth
2011/011
After-the-Fact Leakage in Public-Key Encryption
Shai Halevi, Huijia Lin
2011/010
Structured Encryption and Controlled Disclosure
Melissa Chase, Seny Kamara
2011/009
Progression-Free Sets and Sublinear Pairing-Based Non-Interactive Zero-Knowledge Arguments
Helger Lipmaa
2011/008
Computing Elliptic Curve Discrete Logarithms with the Negation Map
Ping Wang, Fangguo Zhang
2011/007
KISS: A Bit Too Simple
Greg Rose
2011/006
Exploring the Limits of Common Coins Using Frontier Analysis of Protocols
Hemanta K. Maji, Pichayoot Ouppaphan, Manoj Prabhakaran, Mike Rosulek
2011/005
Is privacy compatible with truthfulness?
David Xiao
2011/004
A low-memory algorithm for finding short product representations in finite groups
Gaetan Bisson, Andrew V. Sutherland
2011/003
On the correct use of the negation map in the Pollard rho method
Daniel J. Bernstein, Tanja Lange, Peter Schwabe
2011/002
A Zero-One Law for Secure Multi-Party Computation with Ternary Outputs (full version)
Gunnar Kreitz
2011/001
Practical Frameworks For $h$-Out-Of-$n$ Oblivious Transfer With Security Against Covert and Malicious Adversaries
Zeng Bing, Tang Xueming, Xu Peng, Jing Jiandu
2010/661
Security Evaluation of MISTY Structure with SPN Round Function
Ruilin Li, Chao Li, Jinshu Su, Bing Sun
2010/660
Identification of Multiple Invalid Pairing-based Signatures in Constrained Batches
Brian J. Matt
2010/659
Practical Affiliation-Hiding Authentication from Improved Polynomial Interpolation
Mark Manulis, Bertram Poettering
2010/658
ABC - A New Framework for Block Ciphers
Uri Avraham, Eli Biham, Orr Dunkelman
2010/657
On small secret key attack against RSA with high bits known prime factor
Yasufumi Hashimoto
2010/656
A Note on Constant-Round Zero-Knowledge Proofs of Knowledge
Yehuda Lindell
2010/655
On the Affine Equivalence and Nonlinearity Preserving Bijective Mappings
İsa Sertkaya, Ali Doğanaksoy
2010/654
Completeness Theorems with Constructive Proofs for Finite Deterministic 2-Party Functions (full version)
Daniel Kraschewski, Jörn Müller-Quade
2010/653
Cubic groups
M. A. Popov
2010/652
Active Domain Expansion for Normal Narrow-pipe Hash Functions
Xigen Yao
2010/651
On the Impossibility of Instantiating PSS in the Standard Model
Rishiraj Bhattacharyya, Avradip Mandal
2010/650
Cryptanalysis of the RSA Subgroup Assumption from TCC 2005
Jean-Sebastien Coron, Antoine Joux, Avradip Mandal, David Naccache, Mehdi Tibouchi
2010/649
Stronger difficulty notions for client puzzles and denial-of-service-resistant protocols
Douglas Stebila, Lakshmi Kuppusamy, Jothi Rangasamy, Colin Boyd, Juan Gonzalez Nieto
2010/648
Uniqueness is a Different Story: Impossibility of Verifiable Random Functions from Trapdoor Permutations
Dario Fiore, Dominique Schröder
2010/647
Improved Nguyen-Vidick Heuristic Sieve Algorithm for Shortest Vector Problem
Xiaoyun Wang, Mingjie Liu, Chengliang Tian, Jingguo Bi
2010/646
Statistical Analysis of Second Order Differential Power Analysis
Emmanuel Prouff, Matthieu Rivain, Régis Bévan
2010/645
A Timed Logic for Modeling and Reasoning about Security Protocols
Xinfeng Lei, Rui Xue, Ting Yu
2010/644
A Practical Platform for Cube-Attack-like Cryptanalyses
Bo Zhu, Wenye Yu, Tao Wang
2010/643
Construct MD5 Collisions Using Just A Single Block Of Message
Tao Xie, Dengguo Feng
2010/642
More Insights on Blockcipher-Based Hash Functions
Yiyuan Luo, Xuejia Lai
2010/641
A new algorithm for computing Groebner bases
Shuhong Gao, Frank Volny IV, Mingsheng Wang
2010/640
Short collusion-secure fingerprint codes against three pirates
Koji Nuida
2010/639
Enumerating Results of Homogeneous Rotation over $GF(p)$
Guang-Pu Go, Xi-Yong Zhang, Wen-Fen Liu
2010/638
One-Pass HMQV and Asymmetric Key-Wrapping
Shai Halevi, Hugo Krawczyk
2010/637
Breaking An Identity-Based Encryption Scheme based on DHIES
Martin R. Albrecht, Kenneth G. Paterson
2010/636
Differential Fault Analysis of AES using a Single Multiple-Byte Fault
Subidh Ali, Debdeep Mukhopadhyay, Michael Tunstall
2010/635
An Efficient and Information Theoretically Secure Rational Secret Sharing Scheme based on Symmetric Bivariate Polynomials
Zhang Yun, Christophe Tartary
2010/634
ROTIV: RFID Ownership Transfer with Issuer Verification
Kaoutar Elkhiyaoui, Erik-Oliver Blass, Refik Molva
2010/633
Low Data Complexity Attacks on AES
Charles Bouillaguet, Patrick Derbez, Orr Dunkelman, Nathan Keller, Vincent Rijmen, Pierre-Alain Fouque
2010/632
Efficient and provably-secure certificateless signature scheme without bilinear pairings
He Debiao, Chen Jianhua, Zhang Rui
2010/631
Black-box property of Cryptographic Hash Functions
Michal Rjaško
2010/630
Divison Polynomials for Alternate Models of Elliptic Curves
Dustin Moody
2010/629
On the Security of Hash Functions Employing Blockcipher Postprocessing
Donghoon Chang, Mridul Nandi, Moti Yung
2010/628
State convergence and keyspace reduction of the Mixer stream cipher
Sui-Guan Teo, Kenneth Koon-Ho Wong, Leonie Simpson, Ed Dawson
2010/627
Secure and Efficient Protocols for Iris and Fingerprint Identification
Marina Blanton, Paolo Gasti
2010/626
Public-Key Encryption with Fuzzy Keyword Search: A Provably Secure Scheme under Keyword Guessing Attack
Peng Xu, Hai Jin
2010/625
Attacking and fixing Helios: An analysis of ballot secrecy
Veronique Cortier, Ben Smyth
2010/624
No-leak authentication by the Sherlock Holmes method
Dima Grigoriev, Vladimir Shpilrain
2010/623
Cryptanalysis of Skein
Daniel J. Bernstein, Tanja Lange
2010/622
A new result on the distinctness of primitive sequences over Z(pq) modulo 2
Qunxiong Zheng, Wenfeng Qi
2010/621
Generic Compilers for Authenticated Key Exchange (Full Version)
Tibor Jager, Florian Kohlar, Sven Schäge, Jörg Schwenk
2010/620
Identity-based Digital Signature Scheme Without Bilinear Pairings
He Debiao, Chen Jianhua, Hu Jin
2010/619
Further Observations on Certificate-Base Encryption and its Generic Construction from Certificateless Public Key Encryption
Yang Lu
2010/618
A Forgery Attack on the Candidate LTE Integrity Algorithm 128-EIA3
Thomas Fuhr, Henri Gilbert, Jean-Renë Reinhard, Marion Videau
2010/617
Computing Discrete Logarithms in an Interval
Steven D. Galbraith, John M. Pollard, Raminder S. Ruprai
2010/616
A non-uniform birthday problem with applications to discrete logarithms
Steven D. Galbraith, Mark Holmes
2010/615
Using Equivalence Classes to Accelerate Solving the Discrete Logarithm Problem in a Short Interval
Steven D. Galbraith, Raminder S. Ruprai
2010/614
An Evaluation of Hash Functions on a Power Analysis Resistant Processor Architecture
Simon Hoerder, Marcin Wojcik, Stefan Tillich, Dan Page
2010/613
Better Key Sizes (and Attacks) for LWE-Based Encryption
Richard Lindner, Chris Peikert
2010/612
Cryptanalysis of Hummingbird-1
Markku-Juhani O. Saarinen
2010/611
Statistical Analysis of Reduced Round Compression Functions of SHA-3 Second Round Candidates
Ali Doğanaksoy, Barış Ege, Onur Koçak, Fatih Sulak
2010/610
Separating Succinct Non-Interactive Arguments From All Falsifiable Assumptions
Craig Gentry, Daniel Wichs
2010/609
The Round Complexity of General VSS
Ashish Choudhury, Kaoru Kurosawa, Arpita Patra
2010/608
A New Model of Binary Elliptic Curves with Fast Arithmetic
Hongfeng Wu, Chunming Tang, Rongquan Feng
2010/607
How to Improve Rebound Attacks
María Naya-Plasencia
2010/606
Weakness of two ID-based remote mutual authentication with key agreement protocols for mobile devices
He Debiao, Chen Jianhua, Hu Jin
2010/605
A Closer Look at Keyboard Acoustic Emanations: Random Passwords, Typing Styles and Decoding Techniques
Tzipora Halevi, Nitesh Saxena
2010/604
On Functional Decomposition of Multivariate Polynomials with Differentiation and Homogenization
Shangwei Zhao, Ruyong Feng, Xiao-Shan Gao
2010/603
Cryptanalysis of Dual CRT-RSA
Santanu Sarkar, Subhamoy Maitra
2010/602
An Improved Algebraic Attack on Hamsi-256
Itai Dinur, Adi Shamir
2010/601
Fast Endomorphism for any Genus 2 Hyperelliptic Curve over a Finite Field of Even Characteristic
Lei Li, Siman Yang
2010/600
Exact, Efficient and Information-Theoretically Secure Voting with an Arbitrary Number of Cheaters
Anne Broadbent, Stacey Jeffery, Alain Tapp
2010/599
Secure Multiparty Computation with Partial Fairness
Amos Beimel, Eran Omri, Ilan Orlov
2010/598
A Broadcast Attack against NTRU Using Ding's Algorithm
Yanbin Pan, Yingpu Deng
2010/597
A New Class of Bent--Negabent Boolean Functions
Sugata Gangopadhyay, Ankita Chaturvedi
2010/596
Solving Systems of Multivariate Quadratic Equations over Finite Fields or: From Relinearization to MutantXL
Enrico Thomae, Christopher Wolf
2010/595
Attribute-Based Signatures
Hemanta K. Maji, Manoj Prabhakaran, Mike Rosulek
2010/594
Cache Games - Bringing Access Based Cache Attacks on AES to Practice
Endre Bangerter, David Gullasch, Stephan Krenn
2010/593
Differential Attack on Five Rounds of the SC2000 Block Cipher
Jiqiang Lu
2010/592
Better Key Sizes (and Attacks) for LWE-Based Encryption
Richard Lindner, Chris Peikert
2010/591
Bonsai Trees, or How to Delegate a Lattice Basis
David Cash, Dennis Hofheinz, Eike Kiltz, Chris Peikert
2010/590
Beyond the Limits of DPA: Combined Side-Channel Collision Attacks
Andrey Bogdanov, Ilya Kizhvatov
2010/589
Higher-order differential properties of Keccak and Luffa
Christina Boura, Anne Canteaut, Christophe De Cannière
2010/588
Improved Collisions for Reduced ECHO-256
Martin Schläffer
2010/587
Group Message Authentication
Bartosz Przydatek, Douglas Wikström
2010/586
Enhanced FPGA Implementation of the Hummingbird Cryptographic Algorithm
İsmail San, Nuray At
2010/585
Smaller decoding exponents: ball-collision decoding
Daniel J. Bernstein, Tanja Lange, Christiane Peters
2010/584
VMCrypt - Modular Software Architecture for Scalable Secure Computation
Lior Malka, Jonathan Katz
2010/583
Improved Preimage Attack on One-block MD4
Jinmin Zhong, Xuejia Lai
2010/582
Secret Key Leakage from Public Key Perturbation of DLP-based Cryptosystems
Alexandre Berzati, Cécile Canovas-Dumas, Louis Goubin
2010/581
Fast Algorithm to solve a family of SIS problem with $l_\infty$ norm
Jintai Ding
2010/580
The Cube Attack on Stream Cipher Trivium and Quadraticity Tests
Piotr Mroczkowski, Janusz Szmidt
2010/579
Construction of Highly Nonlinear Resilient Boolean Functions Satisfying Strict Avalanche Criterion
WeiGuo Zhang, GuoZhen Xiao
2010/578
L1 - An Intermediate Language for Mixed-Protocol Secure Computation
Axel Schroepfer, Florian Kerschbaum, Guenter Mueller
2010/577
Discrete Logarithms, Diffie-Hellman, and Reductions
Neal Koblitz, Alfred Menezes, Igor Shparlinski
2010/576
Efficient Hashing using the AES Instruction Set
Joppe W. Bos, Onur Ozen, Martijn Stam
2010/575
A Discrete Logarithm Attack on Elliptic Curves
Otto Johnston
2010/574
Cryptanalysis of PRESENT-like ciphers with secret S-boxes
Julia Borghoff, Lars R. Knudsen, Gregor Leander, Soeren S. Thomsen
2010/573
On permutation polynomials EA-equivalent to the inverse function over $GF(2^n)$
Yongqiang Li, Mingsheng Wang
2010/572
Cryptanalysis of splay tree based encryption
Jean-Philippe Aumasson
2010/571
Single Core Implementation of Blue Midnight Wish Hash Function on VIRTEX 5 Platform
Mohamed El Hadedy, Danilo Gligoroski, Svein J. Knapskog
2010/570
Breaking Grain-128 with Dynamic Cube Attacks
Itai Dinur, Adi Shamir
2010/569
Practical Near-Collisions and Collisions on Round-Reduced ECHO-256 Compression Function
Jérémy Jean, Pierre-Alain Fouque
2010/568
Efficient Two-Move Blind Signatures in the Common Reference String Model
E. Ghadafi, N. P. Smart
2010/567
ON DILLON'S CLASS H OF BENT FUNCTIONS, NIHO BENT FUNCTIONS AND O-POLYNOMIALS
Claude Carlet, Sihem Mesnager
2010/566
Blockcipher-based Double-length Hash Functions for Pseudorandom Oracles
Yusuke Naito
2010/565
Self-Protecting Electronic Medical Records Using Attribute-Based Encryption
Joseph A. Akinyele, Christoph U. Lehmann, Matthew D. Green, Matthew W. Pagano, Zachary N. J. Peterson, Aviel D. Rubin
2010/564
Cryptographic Randomness Testing of Block Ciphers and Hash Functions
Ali Doğanaksoy, Barış Ege, Onur Koçak, Fatih Sulak
2010/563
Fully Secure Functional Encryption with General Relations from the Decisional Linear Assumption
Tatsuaki Okamoto, Katsuyuki Takashima
2010/562
How to Leak on Key Updates
Allison Lewko, Mark Lewko, Brent Waters
2010/561
Password-Protected Secret Sharing
Stanislaw Jarecki, Ali Bagherzandi, Nitesh Saxena, Yanbin Lu
2010/560
On CCA-Secure Fully Homomorphic Encryption
J. Loftus, A. May, N. P. Smart, F. Vercauteren
2010/559
Optimal Eta Pairing on Supersingular Genus-2 Binary Hyperelliptic Curves
Diego F. Aranha, Jean-Luc Beuchat, Jérémie Detrey, Nicolas Estibals
2010/558
Solving LWE problem with bounded errors in polynomial time
Jintai Ding
2010/557
A Digital Signature Based on Multivariate Polynomials over Fq
Masahiro Yagisawa
2010/556
Definitional Issues in Functional Encryption
Adam O'Neill
2010/555
RNS arithmetic in ${\mathbb F}_{p^k}$ and application to fast pairing computation
S. Duquesne
2010/554
Cryptanalysis of a Fast Encryption Scheme for Databases and of its Variant
Stéphane Jacob
2010/553
Strongly Secure Certificate-Based Encryption Scheme with Low Communication Bandwidth
Yang Lu
2010/552
A Note on Zero-Knowledge Proofs of Knowledge and the ZKPOK Ideal Functionality
Carmit Hazay, Yehuda Lindell
2010/551
A Note on the Relation between the Definitions of Security for Semi-Honest and Malicious Adversaries
Carmit Hazay, Yehuda Lindell
2010/550
Isogenies and Cryptography
RAZA ALI KAZMI
2010/549
A Novel Non-interactive Deniable Authentication Protocol with Designated Verifier on elliptic curve cryptosystem
Yalin Chen, Jue-Sam Chou, Chi-Fong Lin
2010/548
SHA-512/256
Shay Gueron, Simon Johnson, Jesse Walker
2010/547
Symmetric-key Searchable keyword Concealment (SSC)
Yacov Yacobi
2010/546
Timed Encryption and Its Application
Shaoquan Jiang
2010/545
Optimal XOR based (2,n)-Visual Cryptography Schemes
Feng Liu, Chuankun Wu
2010/544
Semantic Security Under Related-Key Attacks and Applications
Benny Applebaum, Danny Harnik, Yuval Ishai
2010/543
Functional Encryption: Definitions and Challenges
Dan Boneh, Amit Sahai, Brent Waters
2010/542
Squaring in cyclotomic subgroups
Koray Karabina
2010/541
One-time Computable and Uncomputable Functions
Stefan Dziembowski, Tomasz Kazana, Daniel Wichs
2010/540
Rational Secret Sharing with Side Information in Point-to-Point Networks via Time-Delayed Encryption
Anna Lysyanskaya, Aaron Segal
2010/539
Indifferentiable Deterministic Hashing to Elliptic and Hyperelliptic Curves
Reza R. Farashahi, Pierre-Alain Fouque, Igor E. Shparlinski, Mehdi Tibouchi, J. Felipe Voloch
2010/538
Rotational Rebound Attacks on Reduced Skein
Dmitry Khovratovich, Ivica Nikolic, Christian Rechberger
2010/537
Meet-in-the-Middle Attack on 8 Rounds of the AES Block Cipher under 192 Key Bits
Yongzhuang Wei, Jiqiang Lu, Yupu Hu
2010/536
On The Impact of Target Technology in SHA-3 Hardware Benchmark Rankings
Xu Guo, Sinan Huang, Leyla Nazhandali, Patrick Schaumont
2010/535
Linear Analysis of Reduced-Round CubeHash
Tomer Ashur, Orr Dunkelman
2010/534
Balanced Boolean Functions with Optimum Algebraic Immunity and High Nonlinearity
Xiangyong Zeng, Claude Carlet, Jinyong Shan, Lei Hu
2010/533
Deterministic Public-Key Encryption Revisited
Adam O'Neill
2010/532
A 3-Subset Meet-in-the-Middle Attack: Cryptanalysis of the Lightweight Block Cipher KTANTAN
Andrey Bogdanov, Christian Rechberger
2010/531
Comparison of seven SHA-3 candidates software implementations on smart cards.
Mourad Gouicem
2010/530
How to Read a Signature?
Vanessa Gratzer, David Naccache
2010/529
Generating Pairing-friendly Parameters for the CM Construction of Genus 2 Curves over Prime Fields
Kristin Lauter, Ning Shang
2010/528
Constant-Round Private Function Evaluation with Linear Complexity
Jonathan Katz, Lior Malka
2010/527
The Digital Signature Scheme MQQ-SIG
Danilo Gligoroski, Rune Steinsmo \O deg\aa rd, Rune Erlend Jensen, Ludovic Perret, Jean-Charles Faugère, Svein Johan Knapskog, Smile Markovski
2010/526
Faster Explicit Formulas for Computing Pairings over Ordinary Curves
Diego F. Aranha, Koray Karabina, Patrick Longa, Catherine H. Gebotys, Julio López
2010/525
Torus-based compression by factor 4 and 6
Koray Karabina
2010/524
Combining properties of cryptographic hash functions
Michal Rjaško
2010/523
Affine Masking against Higher-Order Side Channel Analysis
Guillaume Fumaroli, Ange Martinelli, Emmanuel Prouff, Matthieu Rivain
2010/522
Signatures Resilient to Continual Leakage on Memory and Computation
Tal Malkin, Isamu Teranishiy, Yevgeniy Vahlis, Moti Yung
2010/521
Linear Approximations of Addition Modulo $2^n$-1
Xiutao Feng, Chunfang Zhou, Chuankun Wu
2010/520
Implementing Gentry's Fully-Homomorphic Encryption Scheme
Craig Gentry, Shai Halevi
2010/519
Preimage Resistance Beyond the Birthday Bound: Double-Length Hashing Revisited
Matthias Krause, Frederik Armknecht, Ewan Fleischmann
2010/518
Boolean functions with all main cryptographic properties
Ziran Tu, Yingpu Deng
2010/517
Cryptanalysis of block EnRUPT
Elias Yarrkov
2010/516
Key Agreement Protocols Based on Multivariate Polynomials over Fq
Masahiro Yagisawa
2010/515
--Withdrawn--
Xu An Wang, Xiaoyuan Yang, Yiliang Han
2010/514
Semi-Homomorphic Encryption and Multiparty Computation
Rikke Bendlin, Ivan Damgård, Claudio Orlandi, Sarah Zakarias
2010/513
Key-Dependent Message Security: Generic Amplification and Completeness
Benny Applebaum
2010/512
Multi-Party Privacy-Preserving Set Intersection with Quasi-Linear Complexity
Jung Hee Cheon, Stanislaw Jarecki, Jae Hong Seo
2010/511
On the complexity of Decomposition Attack
Koh-ichi Nagao
2010/509
On Efficient Non-Interactive Oblivious Transfer with Tamper-Proof Hardware
Maria Dubovitskaya, Alessandra Scafuro, Ivan Visconti
2010/508
A Fault Analytic Method against HB+
Jose Carrijo, Rafael Tonicelli, Anderson C. A. Nascimento
2010/507
On isotopisms of commutative presemifields and CCZ-equivalence of functions
Lilya Budaghyan, Tor Helleseth
2010/506
Quantum Preimage and Collision Attacks on CubeHash
Gaëtan Leurent
2010/505
Termination-Insensitive Computational Indistinguishability (and applications to computational soundness)
Dominique Unruh
2010/504
Practical Cryptanalysis of the Identification Scheme Based on the Isomorphism of Polynomial with One Secret Problem
Charles Bouillaguet, Jean-Charles Faugère, Pierre-Alain Fouque, Ludovic Perret
2010/503
BiTR: Built-in Tamper Resilience
Seung Geol Choi, Aggelos Kiayias, Tal Malkin
2010/502
Proving Coercion-Resistance of Scantegrity II
Ralf Kuesters, Tomasz Truderung, Andreas Vogt
2010/501
Group Homomorphic Encryption: Characterizations, Impossibility Results, and Applications
Frederik Armknecht, Stefan Katzenbeisser, Andreas Peter
2010/500
ATTACKS ON THE AKACP PROTOCOL
Konstantinos Chalkias, Foteini Baldimtsi, Dimitrios Hristu-Varsakelis, Spyros T. Halkidis, George Stephanides
2010/499
Secure Computations on Non-Integer Values
M. Franz, B. Deiseroth, K. Hamacher, S. Jha, S. Katzenbeisser, H. Schroeder
2010/498
Co-Z Divisor Addition Formulae in Jacobian of Genus 2 Hyperelliptic Curves over Prime Fields
Vladislav Kovtun, Sergey Kavun
2010/497
Number formula and degree level of ergodic polynomial functions over $\mathbb{Z}$/$2^{n}\mathbb{Z}$ and generalized result of linear equation on ergodic power-series T-Function
Tao Shi, Dongdai Lin
2010/496
Efficient Attributes for Anonymous Credentials (Extended Version)
Jan Camenisch, Thomas Groß
2010/495
A Practical (Non-interactive) Publicly Verifiable Secret Sharing Scheme
Mahabir Prasad Jhanwar
2010/494
Stronger Security Model of Group Key Agreement
Jianjie Zhao, Dawu Gu, M. Choudary Gorantla
2010/493
A Suite of Identity Based Aggregate Signatures and a Multi-Signature Scheme from RSA
S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Rangan
2010/492
Efficient Fully Secure Predicate Encryption for Conjunctions, Disjunctions and k-CNF/DNF formulae
Angelo De Caro, Vincenzo Iovino, Giuseppe Persiano
2010/491
A Collaborative Framework for Privacy Protection in Online Social Networks
Yan Zhu, Zexing Hu, Huaixi Wang, Hongxin Hu, Gail-Joon Ahn
2010/490
Strong designated verifier signature scheme: new definition and construction
Zuhua Shao
2010/489
Loiss: A Byte-Oriented Stream Cipher
Dengguo Feng, Xiutao Feng, Wentao Zhang, Xiubin Fan, Chuankun Wu
2010/488
Fully Leakage-Resilient Signatures
Elette Boyle, Gil Segev, Daniel Wichs
2010/487
Constant Round Non-Malleable Protocols using One Way Functions
Vipul Goyal
2010/486
A NOTE ON SEMI-BENT BOOLEAN FUNCTIONS
Claude Carlet, Sihem Mesnager
2010/485
Cryptanalysis of Block Ciphers Using Almost-Impossible Differentials
Hamid Mala, Mohammad Dakhilalian, Mohsen Shakiba
2010/484
Automata Evaluation and Text Search Protocols with Simulation Based Security
Rosario Gennaro, Carmit Hazay, Jeffrey S. Sorensen
2010/483
Constant-round Non-Malleable Commitments from Any One-Way Function
Huijia Lin, Rafael Pass
2010/482
On Instantiation of the Random Oracle
He Ge
2010/481
A secure email login system using virtual password
Bhavin Tanti, Nishant doshi
2010/480
Enhanced STS using Check Equation --Extended Version of the Signature scheme proposed in the PQCrypt2010--
Shigeo Tsujii, Masahito Gotaishi
2010/479
Side-Channel Attacks on the McEliece and Niederreiter Public-Key Cryptosystems
R. M. Avanzi, S. Hoerder, D. Page, M. Tunstall
2010/478
Cryptanalysis of the Convex Hull Click Human Identification Protocol
Hassan Jameel Asghar, Shujun Li, Josef Pieprzyk, Huaxiong Wang
2010/477
On Compression of Data Encrypted with Block Ciphers
Demijan Klinc, Carmit Hazay, Ashish Jagmohan, Hugo Krawczyk, Tal Rabin
2010/476
Predicate Encryption with Partial Public Keys
Carlo Blundo, Vincenzo Iovino, Giuseppe Persiano
2010/475
Pairing Computation on Elliptic Curves of Jacobi Quartic Form
Hong Wang, Kunpeng Wang, Lijun Zhang, Bao Li
2010/474
Limitations on Transformations from Composite-Order to Prime-Order Groups: The Case of Round-Optimal Blind Signatures
Sarah Meiklejohn, Hovav Shacham, David Mandell Freeman
2010/473
Two Attacks on Dutta’s Dynamic Group Key Agreement Protocol
Hui Zhang, Chunxiang Xu, Abdur Rashid Sangi
2010/472
Accusation probabilities in Tardos codes: the Gaussian approximation is better than we thought
A. Simone, B. Skoric
2010/471
Privacy-preserving Sharing of Sensitive Information
Emiliano De Cristofaro, Yanbin Lu, Gene Tsudik
2010/470
Two identification protocols based on Cayley graphs of Coxeter groups
Feliú Sagols, Guillermo Morales-Luna
2010/469
Linear-Complexity Private Set Intersection Protocols Secure in Malicious Model
Emiliano De Cristofaro, Jihye Kim, Gene Tsudik
2010/468
Generic Constructions of Parallel Key-Insulated Encryption: Stronger Security Model and Novel Schemes
Goichiro Hanaoka, Jian Weng
2010/467
Computational Soundness about Formal Encryption in the Presence of Secret Shares and Key Cycles
Xinfeng Lei, Rui Xue, Ting Yu
2010/466
PEKSrand: Providing Predicate Privacy in Public-key Encryption with Keyword Search
Benwen Zhu, Bo Zhu, Kui Ren
2010/465
How to implement the public Key Operations in Code-based Cryptography on Memory-constrained Devices
Falko Strenzke
2010/464
Weaknesses of SIP Authentication Scheme for Converged VoIP Networks
Q. Pu
2010/463
Passive Cryptanalysis of the UnConditionally Secure Authentication Protocol for RFID Systems
Mohammad Reza Sohizadeh Abyaneh
2010/462
Unconditionally Secure Rational Secret Sharing in Standard Communication Networks
Zhifang Zhang
2010/461
Identity Based Partial Aggregate Signature Scheme Without Pairing
S. Sharmila Deva Selvi, S. Sree Vivek, J. Shriram, C. Pandu Rangan
2010/460
On extended algebraic immunity
Gaofei Wu, Yuqing Zhang, Weiguo Zhang
2010/459
CCA2 Secure Certificateless Encryption Schemes Based on RSA
S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Rangan
2010/458
Key Agreement Protocols Using Multivariate Equations on Non-commutative Ring
Masahiro Yagisawa
2010/457
Improving the performance of Luffa Hash Algorithm
Thomaz Oliveira, Julio López
2010/456
Robust Fuzzy Extractors and Authenticated Key Agreement from Close Secrets
Yevgeniy Dodis, Bhavana Kanukurthi, Jonathan Katz, Leonid Reyzin, Adam Smith
2010/455
Optimal Verification of Operations on Dynamic Sets
Charalampos Papamanthou, Roberto Tamassia, Nikos Triandopoulos
2010/454
Key Exchange with Anonymous Authentication using DAA-SIGMA Protocol
Jesse Walker, Jiangtao Li
2010/453
Linearly Homomorphic Signatures over Binary Fields and New Tools for Lattice-Based Signatures
Dan Boneh, David Mandell Freeman
2010/452
Every Vote Counts: Ensuring Integrity in Large-Scale DRE-based Electronic Voting
Feng Hao, Matthew Nicolas Kreeger
2010/451
Acceleration of Differential Fault Analysis of the Advanced Encryption Standard Using Single Fault
Subidh Ali, Debdeep Mukhopadhyay
2010/450
Round-Efficient Perfectly Secure Message Transmission Scheme Against General Adversary
Kaoru Kurosawa
2010/449
Oblivious and Fair Server-Aided Two-Party Computation
Amir Herzberg, Haya Shulman
2010/448
Sequential Rationality in Cryptographic Protocols
Ronen Gradwohl, Noam Livne, Alon Rosen
2010/447
Side-channel Analysis of Six SHA-3 Candidates
Olivier Benoit, Thomas Peyrin
2010/446
Short One-Time Signatures
G. M. Zaverucha, D. R. Stinson
2010/445
Comparing Hardware Performance of Fourteen Round Two SHA-3 Candidates Using FPGAs
Ekawat Homsirikamol, Marcin Rogawski, Kris Gaj
2010/444
New Construction of Identity-based Proxy Re-encryption
Song Luo, Jianbin Hu, Zhong Chen
2010/443
Balanced Boolean Functions with (Almost) Optimal Algebraic Immunity and Very High Nonlinearity
Xiaohu Tang, Deng Tang, Xiangyong Zeng, Lei Hu
2010/442
Algebraic Pseudorandom Functions with Improved Efficiency from the Augmented Cascade
Dan Boneh, Hart Montgomery, Ananth Raghunathan
2010/441
Provably Secure Higher-Order Masking of AES
Matthieu Rivain, Emmanuel Prouff
2010/440
Piret and Quisquater's DFA on AES Revisited
Christophe Giraud, Adrian Thillard
2010/439
Embedded Extended Visual Cryptography Schemes
Feng Liu, Chuankun Wu
2010/438
Achieving Leakage Resilience Through Dual System Encryption
Allison Lewko, Yannis Rouselakis, Brent Waters
2010/437
Selecting Parameters for the Rainbow Signature Scheme - Extended Version -
Albrecht Petzoldt, Stanislav Bulygin, Johannes Buchmann
2010/436
Arithmetic of Supersingular Koblitz Curves in Characteristic Three
Roberto Avanzi, Clemens Heuberger, Helmut Prodinger
2010/435
The Improbable Differential Attack: Cryptanalysis of Reduced Round CLEFIA
Cihangir Tezcan
2010/434
Low-weight Pseudo Collision Attack on Shabal and Preimage Attack on Reduced Shabal-512
Takanori Isobe, Taizo Shirai
2010/433
The PASSERINE Public Key Encryption and Authentication Mechanism
Markku-Juhani O. Saarinen
2010/432
AN EFFICIENT PARALLEL ALGORITHM FOR SKEIN HASH FUNCTIONS
K. Atighehchi, A. Enache, T. Muntean, G. Risterucci
2010/431
Collusion-Resistant Multicast Key Distribution Based on Homomorphic One-Way Function Trees
Jing Liu, Bo Yang
2010/430
Generic Collision Attacks on Narrow-pipe Hash Functions Faster than Birthday Paradox, Applicable to MDx, SHA-1, SHA-2, and SHA-3 Narrow-pipe Candidates
Vlastimil Klima, Danilo Gligoroski
2010/429
A Family of Implementation-Friendly BN Elliptic Curves
Geovandro C. C. F. Pereira, Marcos A. Simplício Jr, Michael Naehrig, Paulo S. L. M. Barreto
2010/428
Random Oracles in a Quantum World
Dan Boneh, Özgür Dagdelen, Marc Fischlin, Anja Lehmann, Christian Schaffner, Mark Zhandry
2010/427
Security Improvement on a Password-Authenticated Group Key Exchange Protocol
Junghyun Nam
2010/426
Parallelizing the Camellia and SMS4 Block Ciphers - Extended version
Huihui Yap, Khoongming Khoo, Axel Poschmann
2010/425
KIST: A new encryption algorithm based on splay
R. Wei, Z. Zeng
2010/424
CyclicRainbow - A multivariate Signature Scheme with a Partially Cyclic Public Key based on Rainbow
Albrecht Petzoldt, Stanislav Bulygin, Johannes Buchmann
2010/423
Near Collisions for the Compress Function of Hamsi-256 Found by Genetic Algorithm
LI Yun-qiang, Wang Ai-lan
2010/422
Synchronized Aggregate Signatures: New Definitions, Constructions and Applications
Jae Hyun Ahn, Matthew Green, Susan Hohenberger
2010/421
Binomial Sieve Series -- a Prospective Cryptographic Tool
Gideon Samid
2010/420
Towards provable security of the Unbalanced Oil and Vinegar signature scheme under direct attacks
Stanislav Bulygin, Albrecht Petzoldt, Johannes Buchmann
2010/419
White-Box Cryptography and SPN ciphers. LRC method.
Dmitry Schelkunov
2010/418
Cryptanalysis and Improvement of A New Electronic Traveler’s Check Scheme Based on One-way Hash Function
Jue-Sam Chou, Hsien-ching Chen, Chun-Yun Chen
2010/417
Distinguishing Properties of Higher Order Derivatives of Boolean Functions
Ming Duan, Xuejia Lai, Mohan Yang, Xiaorui Sun, Bo Zhu
2010/416
Computationally Sound Verification of Source Code
Michael Backes, Matteo Maffei, Dominique Unruh
2010/415
Perfectly Balanced Boolean Functions and Golić Conjecture
Stanislav Smyshlyaev
2010/414
On Strong Simulation and Composable Point Obfuscation
Nir Bitansky, Ran Canetti
2010/413
Collisions for 72-step and 73-step SHA-1: Improvements in the Method of Characteristics
E. A. Grechnikov
2010/412
Optimal Adversary Behavior for the Serial Model of Financial Attack Trees
Margus Niitsoo
2010/411
Cryptanalysis of Cryptosystems Based on Noncommutative Skew Polynomials.
Vivien Dubois, Jean-Gabriel Kammerer
2010/410
Wild McEliece
Daniel J. Bernstein, Tanja Lange, Christiane Peters
2010/409
The collision security of Tandem-DM in the ideal cipher model
Jooyoung Lee, Martijn Stam, John Steinberger
2010/408
Improved Trace-Driven Cache-Collision Attacks against Embedded AES Implementations
Jean-François Gallais, Ilya Kizhvatov, Michael Tunstall
2010/407
Flaws in Differential Cryptanalysis of Reduced Round PRESENT
Manoj Kumar, Pratibha Yadav, Meena Kumari
2010/406
Unfolding Method for Shabal on Virtex-5 FPGAs: Concrete Results.pdf
Julien Francq, Céline Thuillet
2010/405
Privacy-Preserving RFID Systems: Model and Constructions
Sébastien Canard, Iwen Coisel, Jonathan Etrog, Marc Girault
2010/404
On the Insecurity of Parallel Repetition for Leakage Resilience
Allison Lewko, Brent Waters
2010/403
Linear Secret Sharing for Hierarchical Access Structures
Ali Aydın Selçuk, Ramazan Yılmaz
2010/402
On the Security of Non-Linear HB (NLHB) Protocol Against Passive Attack
Mohammad Reza Sohizadeh Abyaneh
2010/401
Privacy-friendly Incentives and their Application to Wikipedia (Extended Version)
Jan Camenisch, Thomas Groß, Peter Hladky, Christian Hoertnagl
2010/400
Security Analysis of a Threshold Proxy Signature Scheme
Kitae Kim, Dahun Nyang
2010/399
Faster Computation of Self-pairings
Chang-An Zhao, Fangguo Zhang, Dongqing Xie
2010/398
Distinguisher for Shabal's Permutation Function
Peter Novotney
2010/397
Pseudorandom Functions and Permutations Provably Secure Against Related-Key Attacks
Mihir Bellare, David Cash
2010/396
From AES-128 to AES-192 and AES-256, How to Adapt Differential Fault Analysis Attacks
Noémie Floissac, Yann L'Hyver
2010/395
On Efficient Ciphertext-Policy Attribute Based Encryption and Broadcast Encryption
Zhibin Zhou, Dijiang Huang
2010/394
Horizontal Correlation Analysis on Exponentiation
Christophe Clavier, Benoit Feix, Georges Gagnerot, Mylene Roussellet, Vincent Verneuil
2010/393
A Privacy-Flexible Password Authentication Scheme for Multi-Server Environment
Jue-Sam Chou, Yalin Chen, Chun-Hui Huang
2010/392
Interplay between (Im)perfectness, Synchrony and Connectivity: The Case of Reliable Message Transmission
Abhinav Mehta, Shashank Agrawal, Kannan Srinathan
2010/391
Exponential Bounds for Information Leakage in Unknown-Message Side-Channel Attacks
Daniel Z. Zanger
2010/390
Elliptic curves in Huff's model
Hongfeng Wu, Rongquan Feng
2010/389
The impossibility of computationally sound XOR
Dominique Unruh
2010/388
On the Efficiency and Security of Pairing-Based Protocols in the Type 1 and Type 4 Settings
Sanjit Chatterjee, Darrel Hankerson, Alfred Menezes
2010/387
A Combinatorial Analysis of HC-128
Goutam Paul, Subhamoy Maitra, Shashwat Raizada
2010/386
BoostReduce - A Framework For Strong Lattice Basis Reduction
Werner Backes, Susanne Wetzel
2010/385
First-Order Side-Channel Attacks on the Permutation Tables Countermeasure –Extended Version–
Emmanuel Prouff, Robert McEvoy
2010/384
Practical consequences of the aberration of narrow-pipe hash designs from ideal random functions
Danilo Gligoroski, Vlastimil Klima
2010/383
Huff's Model for Elliptic Curves
Marc Joye, Mehdi Tibouchi, Damien Vergnaud
2010/382
Deterministic Encoding and Hashing to Odd Hyperelliptic Curves
Pierre-Alain Fouque, Mehdi Tibouchi
2010/381
Security Reductions of the Second Round SHA-3 Candidates
Elena Andreeva, Bart Mennink, Bart Preneel
2010/380
Analysis of an internet voting protocol
Kristian Gjøsteen
2010/379
Pairing computation on elliptic curves with efficiently computable endomorphism and small embedding degree
Sorina Ionica, Antoine Joux
2010/378
Ring Signature and Identity-Based Ring Signature from Lattice Basis Delegation
Jin Wang
2010/377
Key Agreement Protocols Based on Multivariate Algebraic Equations on Quaternion Ring
Masahiro Yagisawa
2010/376
Identity Based Online/Offline Signcryption Scheme
S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Rangan
2010/375
Improved Collision Attacks on the Reduced-Round Grøstl Hash Function
Kota Ideguchi, Elmar Tischhauser, Bart Preneel
2010/374
Efficient Generation of Linear Secret Sharing Scheme Matrices from Threshold Access Trees
Zhen Liu, Zhenfu Cao, Duncan S. Wong
2010/373
Hashing into Hessian Curves
Reza Rezaeian Farashahi
2010/372
Decoding square-free Goppa codes over $\F_p$
Paulo S. L. M. Barreto, Richard Lindner, Rafael Misoczki
2010/371
Compact hardware for computing the Tate pairing over 128-bit-security supersingular curves
Nicolas Estibals
2010/370
Finding discrete logarithms with a set orbit distinguisher
Robert P. Gallant
2010/369
Double Ciphertext Mode : A Proposal for Secure Backup
Debrup Chakraborty, Cuauhtemoc Mancillas-Lopez
2010/368
Round-Optimal Password-Based Authenticated Key Exchange
Jonathan Katz, Vinod Vaikuntanathan
2010/367
Starfish on Strike
Daniel J. Bernstein, Peter Birkner, Tanja Lange
2010/366
Oblivious RAM Revisited
Benny Pinkas, Tzachy Reinman
2010/365
TASTY: Tool for Automating Secure Two-partY computations
Wilko Henecka, Stefan Kögl, Ahmad-Reza Sadeghi, Thomas Schneider, Immo Wehrenberg
2010/364
A Compact FPGA Implementation of the SHA-3 Candidate ECHO
Jean-Luc Beuchat, Eiji Okamoto, Teppei Yamazaki
2010/363
An Analysis of Affine Coordinates for Pairing Computation
Kristin Lauter, Peter L. Montgomery, Michael Naehrig
2010/362
Construction of Balanced Boolean Functions with High Nonlinearity and Good Autocorrelation Properties
Deng Tang, Weiguo Zhang, Xiaohu Tang
2010/361
On the Use of Financial Data as a Random Beacon
Jeremy Clark, Urs Hengartner
2010/360
On the Security of Identity Based Threshold Unsigncryption Schemes
S. Sharmila Deva Selvi, S. Sree Vivek, S. Priti, C. Pandu Rangan
2010/359
Identity Based Self Delegated Signature - Self Proxy Signatures
S. Sharmila Deva Selvi, S. Sree Vivek, S. Gopinath, C. Pandu Rangan
2010/358
The Fiat--Shamir Transform for Group and Ring Signature Schemes
M. -F. Lee, N. P. Smart, B. Warinschi
2010/357
CCA-Secure PRE Scheme without Public Verifiability
Jun Shao, Peng liu, Jian Weng
2010/356
Secure Connectivity Model In Wireless Sensor Network(WSN) Using 1st Order Reed Muller Codes
Pinaki Sarkar, Amrita Saha, Morshed Udan Chowdhury
2010/355
Near-Collisions on the Reduced-Round Compression Functions of Skein and BLAKE
Bozhan Su, Wenling Wu, Shuang Wu, Le Dong
2010/354
High-Speed Software Implementation of the Optimal Ate Pairing over Barreto-Naehrig Curves
Jean-Luc Beuchat, Jorge Enrique González Díaz, Shigeo Mitsunari, Eiji Okamoto, Francisco Rodríguez-Henríquez, Tadanori Teruya
2010/353
Cryptographic Pairings Based on Elliptic Nets
Naoki Ogura, Naoki Kanayama, Shigenori Uchiyama, Eiji Okamoto
2010/352
A Digital Signature Using Multivariate Functions on Quaternion Ring
Masahiro Yagisawa
2010/351
Decentralizing Attribute-Based Encryption
Allison Lewko, Brent Waters
2010/350
A Security Enhancement and Proof for Authentication and Key Agreement (AKA)
Vladimir Kolesnikov
2010/349
Improved Algebraic Cryptanalysis of QUAD, Bivium and Trivium via Graph Partitioning on Equation Systems
Kenneth Koon-Ho Wong, Gregory V. Bard
2010/348
Lattice-theoretic Characterization of Secret Sharing Representable Connected Matroids
A. N. Alekseychuk
2010/347
Time-Specific Encryption
Kenneth G. Paterson, Elizabeth A. Quaglia
2010/346
Efficient Generalized Signcryption Schemes
Prashant Kushwah, Sunder Lal
2010/345
Robust RFID Authentication Protocol with Formal Proof and Its Feasibility
Miyako Ohkubo, Shin'ichiro Matsuo, Yoshikazu Hanatani, Kazuo Sakiyama, Kazuo Ohta
2010/344
Generating more Kawazoe-Takahashi Genus 2 Pairing-friendly Hyperelliptic Curves.
Ezekiel J Kachisa
2010/343
Identity Based Public Verifiable Signcryption Scheme
S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Rangan
2010/342
Fixed Argument Pairings
Craig Costello, Douglas Stebila
2010/341
A New Class of Public Key Cryptosystems Constructed Based on Error-Correcting Codes, Using K(III) Scheme
Masao Kasahara
2010/340
A secure Deniable Authentication Protocol based on Bilinear Diffie-Hellman Algorithm
Jayaprakash Kar, Banshidhar Majhi
2010/339
A Certifying Compiler for Zero-Knowledge Proofs of Knowledge Based on $\Sigma$-Protocols
Jose Bacelar Almeida, Endre Bangerter, Manuel Barbosa, Stephan Krenn, Ahmad-Reza Sadeghi, Thomas Schneider
2010/338
Efficient SIMD arithmetic modulo a Mersenne number
Joppe W. Bos, Thorsten Kleinjung, Arjen K. Lenstra, Peter L. Montgomery
2010/337
Practical-Titled Attack on AES-128 Using Chosen-Text Relations
Vincent Rijmen
2010/336
Efficient Differential Fault Analysis for AES
Shigeto Gomisawa, Yang Li, Junko Takahashi, Toshinori Fukunaga, Yu Sasaki, Kazuo Sakiyama, Kazuo Ohta
2010/335
Analysis of Efficient Techniques for Fast Elliptic Curve Cryptography on x86-64 based Processors
Patrick Longa, Catherine Gebotys
2010/334
Security Proof of AugPAKE
SeongHan Shin, Kazukuni Kobara, Hideki Imai
2010/333
Cryptanalysis of Libert-Vergnaud Proxy Re-encryption Scheme
Zhengjun Cao
2010/332
Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars
Aurelien Francillon, Boris Danev, Srdjan Capkun
2010/331
A Distinguisher for High Rate McEliece Cryptosystems
Jean-Charles Faugère, Valérie Gauthier, Ayoub Otmani, Ludovic Perret, Jean-Pierre Tillich
2010/330
Distributed Rational Consensus
Amjed Shareef
2010/329
On the Security of Pseudorandomized Information-Theoretically Secure Schemes
Koji Nuida, Goichiro Hanaoka
2010/328
Signatures for Multi-source Network Coding
László Czap, István Vajda
2010/327
Efficiency-Improved Fully Simulatable Adaptive OT under the DDH Assumption
Kaoru Kurosawa, Ryo Nojima, Le Trieu Phong
2010/326
Privacy-Preserving Multi-Objective Evolutionary Algorithms
Daniel Funke, Florian Kerschbaum
2010/325
Effect of the Dependent Paths in Linear Hull
Zhenli Dai, Meiqin Wang, Yue Sun
2010/324
Applications of SAT Solvers to AES key Recovery from Decayed Key Schedule Images
Abdel Alim Kamal, Amr M. Youssef
2010/323
Security Analysis of SIMD
Charles Bouillaguet, Pierre-Alain Fouque, Gaëtan Leurent
2010/322
Improved Single-Key Attacks on 8-round AES
Orr Dunkelman, Nathan Keller, Adi Shamir
2010/321
Subspace Distinguisher for 5/8 Rounds of the ECHO-256 Hash Function
Martin Schläffer
2010/320
On isotopisms of commutative presemifields and CCZ-equivalence of functions
Lilya Budaghyan, Tor Helleseth
2010/319
On the Security of a Bidirectional Proxy Re-Encryption Scheme from PKC 2010
Jian Weng, Yunlei Zhao
2010/318
Multiparty Computation for Dishonest Majority: from Passive to Active Security at Low Cost
Ivan Damgård, Claudio Orlandi
2010/317
A Note On Gottesman-Chuang Quantum Signature Scheme
Zhengjun Cao
2010/316
A New Human Identification Protocol and Coppersmith's Baby-Step Giant-Step Algorithm
Hassan Jameel Asghar, Josef Pieprzyk, Huaxiong Wang
2010/315
Efficient Techniques for High-Speed Elliptic Curve Cryptography
Patrick Longa, Catherine Gebotys
2010/314
Weaknesses of a dynamic ID-based remote user authentication scheme
He Debiao, Chen Jianhua, Hu Jin
2010/313
Fast Exhaustive Search for Polynomial Systems in $F_2$
Charles Bouillaguet, Chen-Mou Cheng, Tony (Tung) Chou, Ruben Niederhagen, Adi Shamir, Bo-Yin Yang
2010/312
Security weakness of two authenticated key exchange protocols from pairings
Qingfeng Cheng, Chuangui Ma
2010/311
Combining leak--resistant arithmetic for elliptic curves defined over $\F_p$ and RNS representation
J. C. Bajard, S. Duquesne, M. Ercegovac
2010/310
The analytical property for $\zeta(s)$
Sheng-Ping Wu
2010/309
Co-Z Addition Formulae and Binary Ladders on Elliptic Curves
Raveen R. Goundar, Marc Joye, Atsuko Miyaji
2010/308
Attacking M&M Collective Signature Scheme
Michal Rjaško, Martin Stanek
2010/307
Impossible Differential Cryptanalysis of SPN Ciphers
Ruilin Li, Bing Sun, Chao Li
2010/306
On security of a remote user authentication scheme without using smart cards
He Debiao, Chen Jianhua, Hu Jin
2010/305
On the Impossibility of Cryptography Alone for Privacy-Preserving Cloud Computing
Marten van Dijk, Ari Juels
2010/304
Cryptanalysis of the Compression Function of SIMD
Hongbo Yu, Xiaoyun Wang
2010/303
Universally Composable Symbolic Analysis of Diffie-Hellman based Key Exchange
Ran Canetti, Sebastian Gajek
2010/302
Using the Inhomogeneous Simultaneous Approximation Problem for Cryptographic Design
Frederik Armknecht, Carsten Elsner, Martin Schmidt
2010/301
On generalized Feistel networks
Viet Tung Hoang, Phillip Rogaway
2010/300
Optimal Average Joint Hamming Weight and Minimal Weight Conversion of d Integers
Vorapong Suppakitpaisarn, Masato Edahiro, Hiroshi Imai
2010/299
Faster Fully Homomorphic Encryption
Damien Stehle, Ron Steinfeld
2010/298
On the Indifferentiability of the Grøstl Hash Function
Elena Andreeva, Bart Mennink, Bart Preneel
2010/297
Correlation-Enhanced Power Analysis Collision Attack
Amir Moradi, Oliver Mischke, Thomas Eisenbarth
2010/296
Hash-based Multivariate Public Key Cryptosystems
WANG Hou-Zhen, ZHANG Huan-Guo
2010/295
Ideal Key Derivation and Encryption in Simulation-based Security
Ralf Kuesters, Max Tuengerthal
2010/294
Computing genus 2 curves from invariants on the Hilbert moduli space
Kristin Lauter, Tonghai Yang
2010/293
Security of balanced and unbalanced Feistel Schemes with Linear Non Equalities
Jacques Patarin
2010/292
A Low-Area yet Performant FPGA Implementation of Shabal
Jérémie Detrey, Pierrick Gaudry, Karim Khalfallah
2010/291
Cryptanalysis of an Exquisite Mutual Authentication Scheme with Key Agreement Using Smart Card
He Debiao, Chen Jianhua, Hu Jin
2010/290
Intractable Problems in Cryptography
Neal Koblitz, Alfred Menezes
2010/289
A Two-Party Protocol with Trusted Initializer for Computing the Inner Product
Rafael Dowsley, Jeroen van de Graaf, Davidson Marques, Anderson C. A. Nascimento
2010/288
Lattice-based Identity-Based Broadcast Encryption Scheme
Jin Wang, Jingguo Bi
2010/287
Introduction to Mirror Theory: Analysis of Systems of Linear Equalities and Linear Non Equalities for Cryptography
Jacques Patarin
2010/286
On second-order nonlinearities of some $\mathcal{D}_0$ type bent functions
Sugata Gangopadhyay, Brajesh Kumar Singh
2010/285
A SAT-based preimage analysis of reduced KECCAK hash functions
Pawel Morawiecki, Marian Srebrny
2010/284
Secure Two-Party Computation via Cut-and-Choose Oblivious Transfer
Yehuda Lindell, Benny Pinkas
2010/283
Recursive Information Hiding in Visual Cryptography
Sandeep Katta
2010/282
Pseudo-Linear Approximations for ARX Ciphers: With Application to Threefish
Kerry A. McKay, Poorvi L. Vora
2010/281
Protocols for Reliable and Secure Message Transmission
Ashish Choudhury
2010/280
Studies on Verifiable Secret Sharing, Byzantine Agreement and Multiparty Computation
Arpita Patra
2010/279
On the Round Complexity of Covert Computation
Vipul Goyal, Abhishek Jain
2010/278
Overcoming the Hole In The Bucket: Public-Key Cryptography Resilient to Continual Memory Leakage
Zvika Brakerski, Yael Tauman Kalai, Jonathan Katz, Vinod Vaikuntanathan
2010/277
Adaptively Secure Broadcast Encryption with Short Ciphertexts
Behzad Malek, Ali Miri
2010/276
Garbled Circuits for Leakage-Resilience: Hardware Implementation and Evaluation of One-Time Programs
Kimmo Järvinen, Vladimir Kolesnikov, Ahmad-Reza Sadeghi, Thomas Schneider
2010/275
Position-Based Quantum Cryptography: Impossibility and Constructions
Harry Buhrman, Nishanth Chandran, Serge Fehr, Ran Gelles, Vipul Goyal, Rafail Ostrovsky, Christian Schaffner
2010/274
Online/Offline Identity-Based Signcryption Revisited
Joseph K. Liu, Joonsang Baek, Jianying Zhou
2010/273
Symmetric States and their Structure: Improved Analysis of CubeHash
Niels Ferguson, Stefan Lucks, Kerry A. McKay
2010/272
Virtual Secure Circuit: Porting Dual-Rail Pre-charge Technique into Software on Multicore
Zhimin Chen, Patrick Schaumont
2010/271
Selecting Parameters for Secure McEliece-based Cryptosystems
Robert Niebuhr, Mohammed Meziani, Stanislav Bulygin, Johannes Buchmann
2010/270
Factorization of RSA-180
S. A. Danilov, I. A. Popovyan
2010/269
LAB Form for Iterated Hash Functions
Xigen Yao
2010/268
Key-Controlled Order-Preserving Encryption
HU Mengke, GAO Juntao
2010/267
Two improved authenticated multiple key exchange protocols
Feng LIU
2010/266
Multiparty Computation for Modulo Reduction without Bit-Decomposition and A Generalization to Bit-Decomposition
Chao Ning, Qiuliang Xu
2010/265
CCA-Secure Unidirectional Proxy Re-Encryption in the Adaptive Corruption Model without Random Oracles
Jian Weng, Minrong Chen, Yanjiang Yang, Robert H. Deng, Kefei Chen, Feng Bao
2010/264
Cryptographic Extraction and Key Derivation: The HKDF Scheme
Hugo Krawczyk
2010/263
Lattice Reduction and Polynomial Solving
Raphaël Marinier
2010/262
Cube Test Analysis of the Statistical Behavior of CubeHash and Skein
Alan Kaminsky
2010/261
Links Between Theoretical and Effective Differential Probabilities: Experiments on PRESENT
Céline Blondeau, Benoît Gérard
2010/260
On FPGA-based implementations of Gr\{o}stl
Bernhard Jungk, Steffen Reith
2010/259
Bent functions at the minimal distance and algorithms of constructing linear codes for CDMA
Andrey V. Pavlov
2010/258
On lower bounds of second-order nonlinearities of cubic bent functions constructed by concatenating Gold functions
Ruchi Gode, Sugata Gangopadhyay
2010/257
Feasible Attack on the 13-round AES-256
Alex Biryukov, Dmitry Khovratovich
2010/256
On the Public Key Replacement and Universal Forgery Attacks of Short Certificateless Signature
Mingwu Zhang, Tsuyoshi Takagi, Bo Yang
2010/255
Automorphism group of the set of all bent functions
Natalia Tokareva
2010/254
Cryptanalysis of XXTEA
Elias Yarrkov
2010/253
Separable Hash Functions
Sarang Aravamuthan
2010/252
A supplement to Liu et al.'s certificateless signcryption scheme in the standard model
Zhengping Jin, Qiaoyan Wen, Hua Zhang
2010/251
Modeling Attacks on Physical Unclonable Functions
Ulrich Rührmair, Frank Sehnke, Jan Sölter, Gideon Dror, Srinivas Devadas, Jürgen Schmidhuber
2010/250
Collusion Free Protocol for Rational Secret Sharing
Amjed Shareef
2010/249
Rational Secret Sharing without Broadcast
Amjed Shareef
2010/248
Automatic Search for Related-Key Differential Characteristics in Byte-Oriented Block Ciphers: Application to AES, Camellia, Khazad and Others
Alex Biryukov, Ivica Nikolić
2010/247
A New Joint Fingerprinting and Decryption Scheme based on a Lattice Problem
Jia XU
2010/246
Quantifying Trust
Mariusz Jakubowski, Ramarathnam Venkatesan, Yacov Yacobi
2010/245
Towards a Theory of Trust Based Collaborative Search
Yacov Yacobi
2010/244
Authenticating Aggregate Range Queries over Dynamic Multidimensional Dataset
Jia XU
2010/243
Construction of 1-Resilient Boolean Functions with Optimal Algebraic Immunity and Good Nonlinearity
Senshan Pan, Xiaotong Fu, Weiguo Zhang
2010/242
Efficient Access Control of Sensitive Data Service in Outsourcing Scenarios
Yang ZHANG, Jun-Liang CHEN
2010/241
Improved Delegation of Computation using Fully Homomorphic Encryption
Kai-Min Chung, Yael Kalai, Salil Vadhan
2010/240
Weaknesses of a dynamic ID-based remote user authentication scheme
He Debiao, Chen Jianhua, Hu Jin
2010/239
One-round and authenticated three-party multiple key exchange protocol from parings
Feng LIU
2010/238
Collusion Free Protocol for Correlated Element Selection Problem
Amjed Shareef, Akshay Agrawal, C. Pandu Rangan
2010/237
A New Security Model for Authenticated Key Agreement
Augustin P. Sarr, Philippe Elbaz–Vincent, Jean–Claude Bajard
2010/236
Accountability: Definition and Relationship to Verifiability
Ralf Kuesters, Tomasz Truderung, Andreas Vogt
2010/235
Attribute-based group key establishment
Rainer Steinwandt, Adriana Suárez Corona
2010/234
Efficient provable data possession for hybrid clouds
Yan Zhu, Huaixi Wang, Zexing Hu, Gail-Joon Ahn, Hongxin Hu, Stephen S. Yau
2010/233
Commuting Signatures and Verifiable Encryption and an Application to Non-Interactively Delegatable Credentials
Georg Fuchsbauer
2010/232
On Representable Matroids and Ideal Secret Sharing
Ching-Fang Hsu, Qi Cheng
2010/231
Throughput-Optimal Routing in Unreliable Networks
Paul Bunn, Rafail Ostrovsky
2010/230
A calculus for game-based security proofs
David Nowak, Yu Zhang
2010/229
Concurrent composition in the bounded quantum storage model
Dominique Unruh
2010/228
Practical NFC Peer-to-Peer Relay Attack using Mobile Phones
Lishoy Francis, Gerhard Hancke, Keith Mayes, Konstantinos Markantonakis
2010/227
A Security Weakness in Composite-Order Pairing-Based Protocols with Imbedding Degree $k>2$
Neal Koblitz
2010/226
Circular and Leakage Resilient Public-Key Encryption Under Subgroup Indistinguishability (or: Quadratic Residuosity Strikes Back)
Zvika Brakerski, Shafi Goldwasser
2010/225
A Security Weakness in a Generic Construction of a Group Key Exchange Protocol
Junghyun Nam
2010/224
Efficient Implementation of the Orlandi Protocol Extended Version
Thomas P. Jakobsen, Marc X. Makkes, Janus Dam Nielsen
2010/223
Improved Differential Attacks for ECHO and Grostl
Thomas Peyrin
2010/222
Some Observations on Indifferentiability
Ewan Fleischmann, Michael Gorski, Stefan Lucks
2010/221
Solving Generalized Small Inverse Problems
Noboru Kunihiro
2010/220
(If) Size Matters: Size-Hiding Private Set Intersection
Giuseppe Ateniese, Emiliano De Cristofaro, Gene Tsudik
2010/219
Tracker: Security and Privacy for RFID-based Supply Chains
Erik-Oliver Blass, Kaoutar Elkhiyaoui, Refik Molva
2010/218
New Montgomery-based Semi-systolic Multiplier for Even-type GNB of GF(2^m)
Zhen Wang, Shuqin Fan
2010/217
Secure Code Update for Embedded Devices via Proofs of Secure Erasure
Daniele Perito, Gene Tsudik
2010/216
Distinguishing Attacks on MAC/HMAC Based on A New Dedicated Compression Function Framework
Zheng Yuan, Xiaoqiu Ren
2010/215
On the q-Strong Diffie-Hellman Problem
Naoki Tanaka, Taiichi Saito
2010/214
How to Tell if Your Cloud Files Are Vulnerable to Drive Crashes
Kevin D. Bowers, Marten van Dijk, Ari Juels, Alina Oprea, Ronald L. Rivest
2010/213
Composable Security Analysis of OS Services
Ran Canetti, Suresh Chari, Shai Halevi, Birgit Pfitzmann, Arnab Roy, Michael Steiner, Wietse Venema
2010/212
Quantum Proofs of Knowledge
Dominique Unruh
2010/211
Practical-time Attack on the Full MMB Block Cipher
Keting Jia, Jiazhe Chen, Meiqin Wang, Xiaoyun Wang
2010/210
Fully Secure Identity-Based Encryption Without Random Oracles: A variant of Boneh-Boyen HIBE
Yu Chen
2010/209
Identity-Based Authenticated Asymmetric Group Key Agreement Protocol
Lei Zhang, Qianhong Wu, Bo Qin, Josep Domingo-Ferrer
2010/208
Efficient Implementation of Elliptic Curve Point Operations Using Binary Edwards Curves
Richard Moloney, Aidan O'Mahony, Pierre Laurent
2010/207
Increased Resilience in Threshold Cryptography: Sharing a Secret with Devices That Cannot Store Shares
Koen Simoens, Roel Peeters, Bart Preneel
2010/206
Authentication protocols based on low-bandwidth unspoofable channels: a comparative survey
Long Hoang Nguyen, Andrew William Roscoe
2010/205
On Protecting Cryptographic Keys Against Continual Leakage
Ali Juma, Yevgeniy Vahlis
2010/204
Certificateless generalized signcryption
Ji Huifang, Han Wenbao, Zhao Long
2010/203
Heraclitus: A LFSR-based Stream Cipher with Key Dependent Structure
Bernard Colbert, Anthony H. Dekker, Lynn Margaret Batten
2010/202
Robust Combiner for Obfuscators
Amir Herzberg, Haya Shulman
2010/201
Impossible Differential Cryptanalysis on E2
Yuechuan Wei, Ruilin Li, Ping Li, Chao Li
2010/200
Generic Constructions for Verifiably Encrypted Signatures without Random Oracles or NIZKs
Markus Rückert, Michael Schneider, Dominique Schröder
2010/199
A Framework for Fully-Simulatable $t$-out-of-$n$ Oblivious Transfer
Bing Zeng, Christophe Tartary, Chingfang Hsu
2010/198
The Rebound Attack and Subspace Distinguishers: Application to Whirlpool
Mario Lamberger, Florian Mendel, Christian Rechberger, Vincent Rijmen, Martin Schläffer
2010/197
Fully Secure Anonymous HIBE and Secret-Key Anonymous IBE with Short Ciphertexts
Angelo De Caro, Vincenzo Iovino, Giuseppe Persiano
2010/196
Cryptography Against Continuous Memory Attacks
Yevgeniy Dodis, Kristiyan Haralambiev, Adriana Lopez-Alt, Daniel Wichs
2010/195
On E-Vote Integrity in the Case of Malicious Voter Computers
Sven Heiberg, Helger Lipmaa, Filip Van Laenen
2010/194
Identity-Based Online/Offline Key Encapsulation and Encryption
Sherman S. M. Chow, Joseph K. Liu, Jianying Zhou
2010/193
Speeding Up The Widepipe: Secure and Fast Hashing
Mridul Nandi, Souradyuti Paul
2010/192
Non-Transferable Proxy Re-Encryption Scheme for Data Dissemination Control
Yi-Jun He, Tat Wing Chim, Lucas Chi Kwong Hui, Siu-Ming Yiu
2010/191
On Designated Verifier Signature Schemes
Michal Rjaško, Martin Stanek
2010/190
J-PAKE: Authenticated Key Exchange Without PKI
Feng Hao, Peter Ryan
2010/189
New generic algorithms for hard knapsacks
Nick Howgrave-Graham, Antoine Joux
2010/188
Cryptographic Role-based Security Mechanisms based on Role-Key Hierarchy
Yan Zhu, Gail-Joon Ahn, Hongxin Hu, Huaixi Wang
2010/187
Certificateless Signcryption without Pairing
Wenjian Xie, Zhang Zhang
2010/186
New software speed records for cryptographic pairings
Michael Naehrig, Ruben Niederhagen, Peter Schwabe
2010/185
New Methods to Construct Golay Complementary Sequences Over the $QAM$ Constellation
Wenping Ma, Chen Yang, Shaohui Sun
2010/184
Rational Secret Sharing AS Extensive Games
Zhifang Zhang
2010/183
Preventing Pollution Attacks in Multi-Source Network Coding
Shweta Agrawal, Dan Boneh, Xavier Boyen, David Mandell Freeman
2010/182
A Simple BGN-type Cryptosystem from LWE
Craig Gentry, Shai Halevi, Vinod Vaikuntanathan
2010/181
Cryptanalysis of a DoS-resistant ID-based password authentication
He Debiao, Chen Jianhua, Hu Jin
2010/180
The World is Not Enough: Another Look on Second-Order DPA
Francois-Xavier Standaert, Nicolas Veyrat-Charvillon, Elisabeth Oswald, Benedikt Gierlichs, Marcel Medwed, Markus Kasper, Stefan Mangard
2010/179
A Class of 1-Resilient Function with High Nonlinearity and Algebraic Immunity
Ziran Tu, Yingpu Deng
2010/178
Identity Based Online/Offline Encryption Scheme
Sharmila Deva Selvi S, Sree Vivek S, Pandu Rangan C
2010/177
On the Static Diffie-Hellman Problem on Elliptic Curves over Extension Fields
Robert Granger
2010/176
A Comparison of Cryptanalytic Tradeoff Algorithms
Jin Hong, Sunghwan Moon
2010/175
Sanitizable signatures with strong transparency in the standard model
Shivank Agrawal, Swarun Kumar, Amjed Shareef, C. Pandu Rangan
2010/174
A Reflection on the Security of Two-Party Key Establishment Protocols
Qiang Tang
2010/173
Compact Implementations of BLAKE-32 and BLAKE-64 on FPGA
Jean-Luc Beuchat, Eiji Okamoto, Teppei Yamazaki
2010/172
Chosen Ciphertext Secure Encryption over Semi-smooth Subgroup
Qixiang Mei, Bao Li, Xianhui Lu, Dingding Jia
2010/171
On Foundation and Construction of Physical Unclonable Functions
Jiang Wu, Maire O'Neill
2010/170
On a conjecture about binary strings distribution
Jean-Pierre Flori, Hugues Randriambololona, Gérard Cohen, Sihem Mesnager
2010/169
Dismantling SecureMemory, CryptoMemory and CryptoRF
Flavio D. Garcia, Peter van Rossum, Roel Verdult, Ronny Wichers Schreur
2010/168
A Meet-in-the-Middle Attack on ARIA
Xuehai Tang, Bing Sun, Ruilin Li, Chao Li
2010/167
Evolutionary Cipher against Differential Power Attack
Tang ming, Meng Qinshu, Zhang Huanguo, Gao Si, Dou Qin, Shen Fei, Li Du
2010/166
Fault Analysis Study of the Block Cipher FOX64
Ruilin Li, Jianxiong You, Bing Sun, Chao Li
2010/165
Comment on four two-party authentication protocols
Yalin Chen, Jue-Sam Chou, Chun-Hui Huang
2010/164
Black-Box Constructions of Protocols for Secure Computation
Iftach Haitner, Yuval Ishai, Eyal Kushilevitz, Yehuda Lindell, Erez Petrank
2010/163
Golay Complementary Sequences Over the QAM Constellation
Wenping Ma, Chen Yang, Shaohui Sun
2010/162
1024XKS - A High Security Software Oriented Block Cipher Revisited
Dieter Schmidt
2010/161
Stange's Elliptic Nets and Coxeter Group F4
Daniel R. L. Brown
2010/160
A Flaw in The Internal State Recovery Attack on ALPHA-MAC
Shengbao Wu, Mingsheng Wang, Zheng Yuan
2010/159
Identity-Based Encryption Secure against Selective Opening Attack
Mihir Bellare, Brent Waters, Scott Yilek
2010/158
A variant of the F4 algorithm
Antoine Joux, Vanessa Vitse
2010/157
Elliptic Curve Discrete Logarithm Problem over Small Degree Extension Fields. Application to the static Diffie-Hellman problem on $E(\F_{q^5})$
Antoine Joux, Vanessa Vitse
2010/156
Genus 2 Curves with Complex Multiplication
Eyal Z. Goren, Kristin E. Lauter
2010/155
the upper bounds on differntial characteristics in block cipher SMS4
Zhang MeiLing, Liu JingMei, Wang XinMei
2010/154
Efficient Public-Key Cryptography in the Presence of Key Leakage
Yevgeniy Dodis, Kristiyan Haralambiev, Adriana Lopez-Alt, Daniel Wichs
2010/153
Founding Cryptography on Tamper-Proof Hardware Tokens
Vipul Goyal, Yuval Ishai, Amit Sahai, Ramarathnam Venkatesan, Akshay Wadia
2010/152
Secure and Fast Implementations of Two Involution Ciphers
Billy Bob Brumley
2010/151
Ring signature with divided private key
Stelian Flonta, Liviu-Cristian Miclea
2010/150
Black-Box Computational Zero-Knowledge Proofs, Revisited: The Simulation-Extraction Paradigm
Mohammad Sadeq Dousti
2010/149
On Small Subgroup Non-confinement Attack
Feng Hao
2010/148
Comments on five smart card based password authentication protocols
Yalin Chen, Jue-Sam Chou, Chun-Hui Huang
2010/147
A New Framework for Password-Based Authenticated Key Exchange
Adam Groce, Jonathan Katz
2010/146
Some Applications of Lattice Based Root Finding Techniques
Santanu Sarkar, Subhamoy Maitra
2010/145
i-Hop Homomorphic Encryption and Rerandomizable Yao Circuits
Craig Gentry, Shai Halevi, Vinod Vaikuntanathan
2010/144
New Definitions and Separations for Circular Security
David Cash, Matthew Green, Susan Hohenberger
2010/143
Small Scale Variants Of The Block Cipher PRESENT
Gregor Leander
2010/142
Mean value formulas for twisted Edwards curves
Dustin Moody
2010/141
A Reflection on the Security Proofs of Boneh-Franklin Identity-Based Encryption
Yu Chen
2010/140
Improved Agreeing-Gluing Algorithm
Igor Semaev
2010/139
A New Class of Public Key Cryptosystems Constructed Based on Perfect Error-Correcting Codes Realizing Coding Rate of Exactly 1.0
Masao Kasahara
2010/138
On the Security of a Novel Remote User Authentication Scheme using Smart Card based on ECDLP
Manoj Kumar
2010/137
Estimating the Security of Lattice-based Cryptosystems
Markus Rückert, Michael Schneider
2010/136
On Robust Key Agreement Based on Public Key Authentication
Feng Hao
2010/135
On The Broadcast and Validity-Checking Security of PKCS \#1 v1.5 Encryption
Aurélie Bauer, Jean-Sébastien Coron, David Naccache, Mehdi Tibouchi, Damien Vergnaud
2010/134
Barreto-Naehrig Curve With Fixed Coefficient - Efficiently Constructing Pairing-Friendly Curves -
Masaaki Shirase
2010/133
Signing on Elements in Bilinear Groups for Modular Protocol Design
Masayuki Abe, Kristiyan Haralambiev, Miyako Ohkubo
2010/132
On the claimed privacy of EC-RAC III
Junfeng Fan, Jens Hermans, Frederik Vercauteren
2010/131
Multi-property-preserving Domain Extension Using Polynomial-based Modes of Operation
Jooyoung Lee, John Steinberger
2010/130
Low Voltage Fault Attacks to AES and RSA on General Purpose Processors
Alessandro Barenghi, Guido Bertoni, Luca Breveglieri, Mauro Pellicioli, Gerardo Pelosi
2010/129
Relation for Algebraic Attack on E0 combiner
N. Rajesh Pillai, S. S. Bedi, Sanjay Kumar, Roopika Chaudhary
2010/128
Update-Optimal Authenticated Structures Based on Lattices
Charalampos Papamanthou, Roberto Tamassia
2010/127
CCA-Secure Cryptosystem from Lattice
Chen Huiyan
2010/126
On the Security of an Efficient Mobile Authentication Scheme for Wireless Networks
Jian-zhu Lu, Jipeng Zhou
2010/125
Cryptographic Aspects of Real Hyperelliptic Curves
M. J. Jacobson Jr., R. Scheidler, A. Stein
2010/124
A Hardware Wrapper for the SHA-3 Hash Algorithms
Brian Baldwin, Andrew Byrne, Liang Lu, Mark Hamilton, Neil Hanley, Maire O'Neill, William P. Marnane
2010/123
Delaying Mismatched Field Multiplications in Pairing Computations
Craig Costello, Colin Boyd, Juan Manuel Gonzalez Nieto, Kenneth Koon-Ho Wong
2010/122
Security of Encryption Schemes in Weakened Random Oracle Models
Akinori Kawachi, Akira Numayama, Keisuke Tanaka, Keita Xagawa
2010/121
Lattice-Based Public Key Cryptosystem Provably Secure against Adaptive Chosen Ciphertext Attack
Chen Huiyan, Li Zichen
2010/120
Universal One-Way Hash Functions and Average Case Complexity via Inaccessible Entropy
Iftach Haitner, Thomas Holenstein, Omer Reingold, Salil Vadhan, Hoeteck Wee
2010/119
How to Construct Space Efficient Revocable IBE from Non-monotonic ABE
Huang Lin, Zhenfu Cao, Muxin Zhou, Haojin Zhu
2010/118
Proposal of a Signature Scheme based on STS Trapdoor
Shigeo Tsujii, Masahito Gotaishi, Kohtaro Tadaki, Ryou Fujita
2010/117
Cryptographic Agility and its Relation to Circular Encryption
Tolga Acar, Mira Belenkiy, Mihir Bellare, David Cash
2010/116
Practical Improvements of Profiled Side-Channel Attacks on a Hardware Crypto-Accelerator
M. Abdelaziz Elaabid, Sylvain Guilley
2010/115
A Security Evaluation of DNSSEC with NSEC3
Jason Bau, John C Mitchell
2010/114
The Discrete Logarithm Problem Modulo One: Cryptanalysing the Ariffin--Abu cryptosystem
Simon R. Blackburn
2010/113
Cryptanalysis of Two Efficient HIBE Schemes in the Standard Model
Xu An Wang, Xiaoyuan Yang
2010/112
CCA-Secure PRE Scheme without Random Oracles
Jun Shao, Zhenfu Cao, Peng Liu
2010/111
On zero practical significance of “"Key recovery attack on full GOST block cipher with zero time and memory”"
Vladimir Rudskoy
2010/110
Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption
Allison Lewko, Tatsuaki Okamoto, Amit Sahai, Katsuyuki Takashima, Brent Waters
2010/109
Practical Adaptive Oblivious Transfer from Simple Assumptions
Matthew Green, Susan Hohenberger
2010/108
Perfectly Secure Oblivious RAM Without Random Oracles
Ivan Damgård, Sigurd Meldgaard, Jesper Buus Nielsen
2010/107
Adaptive Concurrent Non-Malleability with Bare Public-Keys
Andrew C. Yao, Moti Yung, Yunlei Zhao
2010/106
Perfectly Secure Multiparty Computation and the Computational Overhead of Cryptography
Ivan Damgård, Yuval Ishai, Mikkel Krøigaard
2010/105
Bias in the nonlinear filter generator output sequence
Sui-Guan Teo, Leonie Simpson, Ed Dawson
2010/104
Avoiding Full Extension Field Arithmetic in Pairing Computations
Craig Costello, Colin Boyd, Juan Manuel Gonzalez Nieto, Kenneth Koon-Ho Wong
2010/103
The Extended Access Control for Machine Readable Travel Documents
Rafik Chaabouni, Serge Vaudenay
2010/102
Constructing Verifiable Random Functions with Large Input Spaces
Susan Hohenberger, Brent Waters
2010/101
Fair Blind Signatures without Random Oracles
Georg Fuchsbauer, Damien Vergnaud
2010/100
Correlated Product Security From Any One-Way Function and the New Notion of Decisional Correlated Product Security
Brett Hemenway, Steve Lu, Rafail Ostrovsky
2010/099
On Homomorphic Encryption and Chosen-Ciphertext Security
Brett Hemenway, Rafail Ostrovsky
2010/098
A Zero-One Law for Deterministic 2-Party Secure Computation
Hemanta K. Maji, Manoj Prabhakaran, Mike Rosulek
2010/097
Parallel Enumeration of Shortest Lattice Vectors
Özgür Dagdelen, Michael Schneider
2010/096
Secret Sharing Extensions based on the Chinese Remainder Theorem
Kamer Kaya, Ali Aydın Selçuk
2010/095
Plaintext-Dependent Decryption: A Formal Security Treatment of SSH-CTR
Kenneth G. Paterson, Gaven J. Watson
2010/094
A Random Number Generator Based on Isogenies Operations
He Debiao, Chen Jianhua, Hu Jin
2010/093
New Impossible Differential Attacks on AES
Zheng Yuan
2010/092
Security Weaknesses in Two Certificateless Signcryption Schemes
S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Rangan
2010/091
Distinguishers for the Compression Function and Output Transformation of Hamsi-256
Jean-Philippe Aumasson, Emilia Käsper, Lars Ramkilde Knudsen, Krystian Matusiewicz, Rune Odegaard, Thomas Peyrin, Martin Schläffer
2010/090
Solving a 676-bit Discrete Logarithm Problem in GF(3^{6n})
Takuya Hayashi, Naoyuki Shinohara, Lihua Wang, Shin'ichiro Matsuo, Masaaki Shirase, Tsuyoshi Takagi
2010/089
Interactive Locking, Zero-Knowledge PCPs, and Unconditional Cryptography
Vipul Goyal, Yuval Ishai, Mohammad Mahmoody, Amit Sahai
2010/088
An Efficient and Parallel Gaussian Sampler for Lattices
Chris Peikert
2010/087
MQ^*-IP: An Identity-based Identification Scheme without Number-theoretic Assumptions
Christopher Wolf, Bart Preneel
2010/086
A Framework for Efficient Signatures, Ring Signatures and Identity Based Encryption in the Standard Model
Zvika Brakerski, Yael Tauman Kalai
2010/085
Pair-wise Cryptographic Models for Secure Data Exchange in P2P Database Management Systems
Sk. Md. Mizanur Rahman, Mehedi Masud, Carlisle Adams, Khalil El-Khatib, Hussein Mouftah, Eiji Okamoto
2010/084
Attribute-based Authenticated Key Exchange
M. Choudary Gorantla, Colin Boyd, Juan Manuel González Nieto
2010/083
One Round Group Key Exchange with Forward Security in the Standard Model
M. Choudary Gorantla, Colin Boyd, Juan Manuel González Nieto
2010/082
Predicate-Based Key Exchange
James Birkett, Douglas Stebila
2010/081
The Eris hybrid cipher
Sandy Harris
2010/080
Secrecy-Oriented First-Order Logical Analysis of Cryptographic Protocols
Gergei Bana, Koji Hasebe, Mitsuhiro Okada
2010/079
From Dust to Dawn: Practically Efficient Two-Party Secure Function Evaluation Protocols and their Modular Design
Vladimir Kolesnikov, Ahmad-Reza Sadeghi, Thomas Schneider
2010/078
Multiple Bytes Differential Fault Analysis on CLEFIA
Xin-jie ZHAO, Tao WANG, Jing-zhe GAO
2010/077
ECC2K-130 on Cell CPUs
Joppe W. Bos, Thorsten Kleinjung, Ruben Niederhagen, Peter Schwabe
2010/076
Private and Continual Release of Statistics
T-H. Hubert Chan, Elaine Shi, Dawn Song
2010/075
A New Scheme for Zero Knowledge Proof based on Multivariate Quadratic Problem and Quaternion Algebra
Mehdi Vasef
2010/074
Concurrent Knowledge Extraction in the Public-Key Model
Andrew C. Yao, Moti Yung, Yunlei Zhao
2010/073
Related-Key Boomerang Attack on Block Cipher SQUARE
Bonwook Koo, Yongjin Yeom, Junghwan Song
2010/072
Approximating Addition by XOR: how to go all the way
Didier Alquié
2010/071
2-round Substitution-Permutation and 3-round Feistel Networks have bad Algebraic Degree
Didier Alquié
2010/070
Strongly Unforgeable Signatures and Hierarchical Identity-based Signatures from Lattices without Random Oracles
Markus Rückert
2010/069
Type-II Optimal Polynomial Bases
Daniel J. Bernstein, Tanja Lange
2010/068
Okamoto-Tanaka Revisited: Fully Authenticated Diffie-Hellman with Minimal Overhead
Rosario Gennaro, Hugo Krawczyk, Tal Rabin
2010/067
A Pairing-Based DAA Scheme Further Reducing TPM Resources
Ernie Brickell, Jiangtao Li
2010/066
Some Observations on TWIS Block Cipher
Bozhan Su, Wenling Wu, Lei Zhang, Yanjun Li
2010/065
An Anonymous ID-based Encryption Revisited
Zhengjun Cao
2010/064
New Advances on Privacy-Preserving Policy Reconciliation
Ulrike Meyer, Susanne Wetzel, Sotiris Ioannidis
2010/063
Differential Fault Analysis on SMS4 Using a Single Fault
Ruilin Li, Bing Sun, Chao Li, Jianxiong You
2010/062
Differential Cryptanalysis of SMS4 Block Cipher
Bozhan Su, Wenling Wu, Wentao Zhang
2010/061
Privacy-Preserving Matching Protocols for Attributes and Strings
Pu Duan, Sanmin Liu, Weiqin Ma, Guofei Gu, Jyh-Charn Liu
2010/060
Insecure ``Provably Secure Network Coding'' and Homomorphic Authentication Schemes for Network Coding
Yongge Wang
2010/059
A New Framework for RFID Privacy
Robert H. Deng, Yingjiu Li, Andrew C. Yao, Moti Yung, Yunlei Zhao
2010/058
Solinas primes of small weight for fixed sizes
José de Jesús Angel Angel, Guillermo Morales-Luna
2010/057
Message Recovery and Pseudo-Preimage Attacks on the Compression Function of Hamsi-256
Cagdas Calik, Meltem Sonmez Turan
2010/056
Improved Cache Trace Attack on AES and CLEFIA by Considering Cache Miss and S-box Misalignment
Xin-jie ZHAO, Tao WANG
2010/055
Credential Authenticated Identification and Key Exchange
Jan Camenisch, Nathalie Casati, Thomas Gross, Victor Shoup
2010/054
An Improved Timing Attack with Error Detection on RSA-CRT
Cai-Sen CHEN, Tao Wang, Jun-Jian Tian
2010/053
Logical cryptoanalysis on the example of the cryptosystem DES
A. D. Plotnikov
2010/052
Cryptanalysis and Improvement of a New Gateway-Oriented Password-Based Authenticated Key Exchange Protocol
FuShan Wei, QingFeng Cheng, ChuanGui Ma
2010/051
A Principle for Cryptographic Protocols Beyond Security, Less Parameters
Zhengjun Cao
2010/050
Authenticating Aggregate Range Queries over Multidimensional Dataset
Jia XU, Ee-Chien CHANG
2010/049
On Symmetric Encryption and Point Obfuscation
Ran Canetti, Yael Tauman Kalai, Mayank Varia, Daniel Wichs
2010/048
An enhanced ID-based remote mutual authentication with key agreement protocol for mobile devices on elliptic curve cryptosystem
He Debiao, Chen Jianhua, Hu Jin
2010/047
Lower Bounds for Straight Line Factoring
Daniel R. L. Brown
2010/046
A New Chaos-Based Cryptosystem for Secure Transmitted Images
Abir AWAD
2010/045
Efficient chaotic permutations for image encryption algorithms
Abir AWAD
2010/044
A New Chaotic Image Encryption Algorithm using a New Way of Permutation Methods
Abir AWAD
2010/043
Differential and invertibility properties of BLAKE (full version)
Jean-Philippe Aumasson, Jian Guo, Simon Knellwolf, Krystian Matusiewicz, Willi Meier
2010/042
A modified eCK model with stronger security for tripartite authenticated key exchange
Qingfeng Cheng, Chuangui Ma, Fushan Wei
2010/041
The Effects of the Omission of Last Round's MixColumns on AES
Orr Dunkelman, Nathan Keller
2010/040
Batch Groth-Sahai
Olivier Blazy, Georg Fuchsbauer, Malika Izabachène, Amandine Jambert, Hervé Sibert, Damien Vergnaud
2010/039
On Exponential Sums, Nowton identities and Dickson Polynomials over Finite Fields
Xiwang Cao, Lei Hu
2010/038
Fault Resistant RSA Signatures: Chinese Remaindering in Both Directions
Arnaud Boscher, Helena Handschuh, Elena Trichina
2010/037
Estimating the Size of the Image of Deterministic Hash Functions to Elliptic Curves
Pierre-Alain Fouque, Mehdi Tibouchi
2010/036
An Enhanced Remote User Authentication Scheme
Keerti Srivastava, Amit K Awasthi, R. C. Mittal
2010/035
Between Hashed DH and Computational DH: Compact Encryption from Weaker Assumption
Goichiro Hanaoka, Kaoru Kurosawa
2010/034
On the order of the polynomial $x^p-x-a$
Xiwang Cao
2010/033
Simple and Efficient Public-Key Encryption from Computational Diffie-Hellman in the Standard Model
Kristiyan Haralambiev, Tibor Jager, Eike Kiltz, Victor Shoup
2010/032
An Information Theoretic Perspective on the Differential Fault Analysis against AES
Yang Li, Shigeto Gomisawa, Kazuo Sakiyama, Kazuo Ohta
2010/031
Class Invariants by the CRT Method
Andreas Enge, Andrew V. Sutherland
2010/030
On the Complexity of the Herding Attack and Some Related Attacks on Hash Functions
Simon R. Blackburn, Douglas R. Stinson, Jalaj Upadhyay
2010/029
On Achieving the "Best of Both Worlds" in Secure Multiparty Computation
Yuval Ishai, Jonathan Katz, Eyal Kushilevitz, Yehuda Lindell, Erez Petrank
2010/028
A secure anonymous communication scheme in vehicular ad hoc networks from pairings
Jue-Sam Chou, Yalin Chen
2010/027
A novel k-out-of-n Oblivious Transfer Protocols Based on Bilinear Pairings
Yalin Chen, Jue-Sam Chou, Xian-Wu Hou
2010/026
Further Improved Differential Fault Analysis on Camellia by Exploring Fault Width and Depth
Xin-jie Zhao, Tao Wang
2010/025
New Methodologies for Differential-Linear Cryptanalysis and Its Extensions
Jiqiang Lu
2010/024
Authentication schemes from actions on graphs, groups, or rings
Dima Grigoriev, Vladimir Shpilrain
2010/023
Differential Fault Analysis on AES with 192 and 256-Bit Keys
Junko Takahashi, Toshinori Fukunaga
2010/022
Enhanced Security Notions for Dedicated-Key Hash Functions: Definitions and Relationships
Mohammad Reza Reyhanitabar, Willy Susilo, Yi Mu
2010/021
A note on ``Improved Fast Correlation Attacks on Stream Ciphers"
Kitae Jeong, Yuseop Lee, Jaechul Sung, Seokhie Hong
2010/020
Number of Jacobi quartic curves over finite fields
Rongquan Feng, Hongfeng Wu
2010/019
Related-Key Boomerang and Rectangle Attacks
Jongsung Kim, Seokhie Hong, Bart Preneel, Eli Biham, Orr Dunkelman, Nathan Keller
2010/018
Scalability and Security Conflict for RFID Authentication Protocols
Imran Erguler, Emin Anarim
2010/017
A new one-time signature scheme from syndrome decoding
Paulo S. L. M. Barreto, Rafael Misoczki
2010/016
Advanced Meet-in-the-Middle Preimage Attacks: First Results on Full Tiger, and Improved Results on MD4 and SHA-2
Jian Guo, San Ling, Christian Rechberger, Huaxiong Wang
2010/015
Towards Side-Channel Resistant Block Cipher Usage or Can We Encrypt Without Side-Channel Countermeasures?
Jorge Guajardo, Bart Mennink
2010/014
A Unified Method for Improving PRF Bounds for a Class of Blockcipher based MACs
Mridul Nandi
2010/013
A Practical-Time Attack on the A5/3 Cryptosystem Used in Third Generation GSM Telephony
Orr Dunkelman, Nathan Keller, Adi Shamir
2010/012
Differential Cache Trace Attack Against CLEFIA
Chester Rebeiro, Debdeep Mukhopadhyay
2010/011
Related Key Cryptanalysis of the LEX Stream Cipher
Mainack Mondal, Debdeep Mukhopadhyay
2010/010
Evaluation of Hardware Performance for the SHA-3 Candidates Using SASEBO-GII
Kazuyuki Kobayashi, Jun Ikegami, Shin’ichiro Matsuo, Kazuo Sakiyama, Kazuo Ohta
2010/009
The Lower Bounds on the Second Order Nonlinearity of Cubic Boolean Functions
Xuelian Li, Yupu Hu, Juntao Gao
2010/008
A DAA Scheme Requiring Less TPM Resources
Liqun Chen
2010/007
Efficient Asynchronous Verifiable Secret Sharing and Multiparty Computation
Arpita Patra, Ashish Choudhary, C. Pandu Rangan
2010/006
Factorization of a 768-bit RSA modulus
Thorsten Kleinjung, Kazumaro Aoki, Jens Franke, Arjen Lenstra, Emmanuel Thomé, Joppe Bos, Pierrick Gaudry, Alexander Kruppa, Peter Montgomery, Dag Arne Osvik, Herman te Riele, Andrey Timofeev, Paul Zimmermann
2010/005
Skew-Frobenius map on twisted Edwards curve
Mingqiang Wang, Xiaoyun Wang, Tao Zhan, Yuliang Zheng
2010/004
Halving on Binary Edwards Curves
Qiping Lin, Fangguo Zhang
2010/003
Efficient Online/Offline Identity-Based Signature for Wireless Sensor Network
Joseph K. Liu, Joonsang Baek, Jianying Zhou, Yanjiang Yang, Jun Wen Wong
2010/002
Practical ID-based Encryption for Wireless Sensor Network
Cheng-Kang Chu, Joseph K. Liu, Jianying Zhou, Feng Bao, Robert H. Deng
2010/001
Transfinite Cryptography
Jacques Patarin
2009/638
Reducing Elliptic Curve Logarithm to Logarithm in a Finite Field $\mathbb{F}_q$ for Some Orders
Wei Yu, Kunpeng Wang, Bao Li
2009/637
Efficient Characteristic Set Algorithms for Equation Solving in Finite Fields and Application in Analysis of Stream Ciphers
Xiao-shan Gao, Zhenyu Huang
2009/636
Obtaining More Karatsuba-Like Formulae over The Binary Field
Haining Fan, Ming Gu, Jiaguang Sun, Kwok-Yan Lam
2009/635
Flexible Quasi-Dyadic Code-Based Public-Key Encryption and Signature
Kazukuni Kobara
2009/634
Attacks on Hash Functions based on Generalized Feistel - Application to Reduced-Round Lesamnta and SHAvite-3_{512}
Charles Bouillaguet, Orr Dunkelman, Gaëtan Leurent, Pierre-Alain Fouque
2009/633
Traitor-Tracing on Binary Strings
Michael J. Collins
2009/632
Cryptanalysis of Secure Message Transmission Protocols with Feedback
Qiushi Yang, Yvo Desmedt
2009/631
Improvement of Das's Two-Factor Authentication Protocol in Wireless Sensor Networks
DaeHun Nyang, Mun-Kyu Lee
2009/630
Information-Theoretically Secure Protocols and Security Under Composition
Eyal Kushilevitz, Yehuda Lindell, Tal Rabin
2009/629
A Comparative Analysis of Delay Based PUF Implementations on FPGA
Sergey Morozov, Abhranil Maiti, Patrick Schaumont
2009/628
Using Sphinx to Improve Onion Routing Circuit Construction
Aniket Kate, Ian Goldberg
2009/627
A Unified Method for Finding Impossible Differentials of Block Cipher Structures
Yiyuan Luo, Zhongming Wu, Xuejia Lai, Guang Gong
2009/626
Approximate Integer Common Divisor Problem relates to Implicit Factorization
Santanu Sarkar, Subhamoy Maitra
2009/625
Cryptographic Accumulators for Authenticated Hash Tables
Charalampos Papamanthou, Roberto Tamassia, Nikos Triandopoulos
2009/624
Security Analysis of the PACE Key-Agreement Protocol
Jens Bender, Marc Fischlin, Dennis Kuegler
2009/623
Universally Constructing 12-th Degree Extension Field for Ate Pairing
Masaaki Shirase
2009/622
A Strong Blind Signature Scheme over Braid Groups
WEI Yun, XIONG Guo-Hua, BAO Wan-Su, ZHANG Xing-Kai
2009/621
On the Analysis of Cryptographic Assumptions in the Generic Ring Model
Tibor Jager, Jörg Schwenk
2009/620
Security of ECQV-Certified ECDSA Against Passive Adversaries
Daniel R. L. Brown, Matthew J. Campagna, Scott A. Vanstone
2009/619
A Family of Weak Keys in HFE (and the Corresponding Practical Key-Recovery)
Charles Bouillaguet, Pierre-Alain Fouque, Antoine Joux, Joana Treger
2009/618
Data-Depend Hash Algorithm
ZiJie Xu, Ke Xu
2009/617
An efficient ID- based directed signature scheme from bilinear pairings
B. Umaprasada Rao, P. Vasudeva Reddy, T. Gowri
2009/616
Fully Homomorphic Encryption over the Integers
Marten van Dijk, Craig Gentry, Shai Halevi, Vinod Vaikuntanathan
2009/615
Faster Pairing Computations on Curves with High-Degree Twists
Craig Costello, Tanja Lange, Michael Naehrig
2009/614
Secure Multiparty AES (full paper)
Ivan Damgård, Marcel Keller
2009/613
Classification of Elliptic/hyperelliptic Curves with Weak Coverings against GHS Attack without Isogeny Condition
Tsutomu Iijima, Fumiyuki Momose, Jinhui Chao
2009/612
On the Impossibility of Batch Update for Cryptographic Accumulators
Philippe Camacho, Alejandro Hevia
2009/611
Golden Fish: An Intelligent Stream Cipher Fuse Memory Modules
Lan Luo, QiongHai Dai, ZhiGuang Qin, ChunXiang Xu
2009/610
Security Analysis of A Remote User Authentication Protocol by Liao and Wang
Dang Nguyen Duc, Kwangjo Kim
2009/609
Grouping-Proof Protocol for RFID Tags: Security Definition and Scalable Construction
Dang Nguyen Duc, Kwangjo Kim
2009/608
Non-Malleable Codes
Stefan Dziembowski, Krzysztof Pietrzak, Daniel Wichs
2009/607
Efficient Client Puzzles based on Repeated-Squaring
Ghassan O. Karame, Srdjan Capkun
2009/606
On a weakness of the Tu-Deng function and its repair
Claude Carlet
2009/605
Solving the Shortest Lattice Vector Problem in Time 2^2.465n
Xavier Pujol, Damien Stehle
2009/604
Composition of Zero-Knowledge Proofs with Efficient Provers
Eleanor Birrell, Salil Vadhan
2009/603
An FPGA Technologies Area Examination of the SHA-3 Hash Candidate Implementations
Brian Baldwin, William P. Marnane
2009/602
Secure Ranging With Message Temporal Integrity
Nils Ole Tippenhauer, Kasper Bonne Rasmussen, Srdjan Čapkun
2009/601
Parallel Shortest Lattice Vector Enumeration on Graphics Cards
Jens Hermans, Michael Schneider, Johannes Buchmann, Frederik Vercauteren, Bart Preneel
2009/600
Constructing Certificateless Encryption and ID-Based Encryption from ID-Based Key Agreement
D. Fiore, R. Gennaro, N. P. Smart
2009/599
Groth--Sahai proofs revisited
E. Ghadafi, N. P. Smart, B. Warinschi
2009/598
On the Design and Implementation of an Efficient DAA Scheme
L. Chen, D. Page, N. P. Smart
2009/597
Twisted Jacobi Intersections Curves
Rongquan Feng, Menglong Nie, Hongfeng Wu
2009/596
Could SFLASH be repaired?
Jintai Ding, Vivien Dubois, Bo-Yin Yang, Owen Chia-Hsin Chen, Chen-Mou Cheng
2009/595
Efficiency Limitations for $\Sigma$-Protocols for Group Homomorphisms
Endre Bangerter, Jan Camenisch, Stephan Krenn
2009/594
Efficient Set Operations in the Presence of Malicious Adversaries
Carmit Hazay, Kobbi Nissim
2009/593
Enabling Efficient Fuzzy Keyword Search over Encrypted Data in Cloud Computing
Jin Li, Qian Wang, Cong Wang, Ning Cao, Kui Ren, Wenjing Lou
2009/592
From Passive to Covert Security at Low Cost
Ivan Damgård, Martin Geisler, Jesper Buus Nielsen
2009/591
Embedded SFE: Offloading Server and Network using Hardware Tokens
Kimmo Järvinen, Vladimir Kolesnikov, Ahmad-Reza Sadeghi, Thomas Schneider
2009/590
More Constructions of Lossy and Correlation-Secure Trapdoor Functions
David Mandell Freeman, Oded Goldreich, Eike Kiltz, Alon Rosen, Gil Segev
2009/589
Information-set decoding for linear codes over Fq
Christiane Peters
2009/588
Confidential Signatures and Deterministic Signcryption
Alexander W. Dent, Marc Fischlin, Mark Manulis, Martijn Stam, Dominique Schroder
2009/587
Poly-Dragon: An efficient Multivariate Public Key Cryptosystem
Rajesh P. Singh, A. Saikia, B. K. Sarma
2009/586
A mean value formula for elliptic curves
Rongquan Feng, Hongfeng Wu
2009/585
An Improved Differential Fault Attack on Camellia
ZHAO Xin-jie, WANG Tao
2009/584
Scan-based Attacks on Linear Feedback Shift Register Based Stream Ciphers
Yu Liu, Kaijie Wu, Ramesh Karri
2009/583
Differential-Algebraic Algorithms for the Isomorphism of Polynomials Problem
Charles Bouillaguet, Jean-Charles Faugère, Pierre-Alain Fouque, Ludovic Perret
2009/582
A Game-Based Definition of Coercion-Resistance and its Applications
Ralf Kuesters, Tomasz Truderung, Andreas Vogt
2009/581
A Diagonal Fault Attack on the Advanced Encryption Standard
Dhiman Saha, Debdeep Mukhopadhyay, Dipanwita RoyChowdhury
2009/580
A complete set of addition laws\\for incomplete Edwards curves
Daniel J. Bernstein, Tanja Lange
2009/579
Privacy-Preserving Public Auditing for Secure Cloud Storage
Cong Wang, Sherman S. -M. Chow, Qian Wang, Kui Ren, Wenjing Lou
2009/578
Efficient and Provably Secure Certificateless Signcryption from Bilinear Maps
Wenjian Xie, Zhang Zhang
2009/577
On the nonlinearity profile of the Dillon function
Claude Carlet
2009/576
Public-Key Cryptographic Primitives Provably as Secure as Subset Sum
Vadim Lyubashevsky, Adriana Palacio, Gil Segev
2009/575
Differential Fault Analysis of the Advanced Encryption Standard using a Single Fault
Michael Tunstall, Debdeep Mukhopadhyay
2009/574
Voting with unconditional privacy: CFSY for booth voting
Jeroen van de Graaf
2009/573
New Addition Operation and Its Application for Scalar Multiplication on Hessian Curves over Prime Fields
Leibo Li, Mingqiang Wang, Zhanjiang Xia
2009/572
On the Equivalence of Two Models for Key-Dependent-Message Encryption
Alexander W. Dent
2009/571
Fully Homomorphic Encryption with Relatively Small Key and Ciphertext Sizes
N. P. Smart, F. Vercauteren
2009/570
Achieving Oblivious Transfer Capacity of Generalized Erasure Channels in the Malicious Model
Adriana C. B. Pinto, Rafael Dowsley, Kirill Morozov, Anderson C. A. Nascimento
2009/569
Secure Network Coding Over the Integers
Rosario Gennaro, Jonathan Katz, Hugo Krawczyk, Tal Rabin
2009/568
Ephemeral key compromise attack on the IB-KA protocol
Qingfeng Cheng, Chuangui Ma
2009/567
Properties of the Discrete Differential with Cryptographic Applications
Daniel Smith-Tone
2009/566
New Cryptosystems From CSP-Based Self-Distributive Systems
Licheng Wang, Lihua Wang, Zhenfu Cao, Eiji Okamoto, Jun Shao
2009/565
Faster Squaring in the Cyclotomic Subgroup of Sixth Degree Extensions
Robert Granger, Michael Scott
2009/564
Optimal pairing revisited
Mingqiang Wang, Puwen Wei, Haifeng Zhang, Yuliang Zheng
2009/563
A Family of $p$-ary Binomial Bent Functions
Dabin Zheng, Xiangyong Zeng, Lei Hu
2009/562
How to pair with a human
Stefan Dziembowski
2009/561
Improvements on two password-based authentication protocols
Yalin Chen, Jue-Sam Chou, Chun-Hui Huang
2009/560
On the Security Vulnerabilities of a Hash Based Strong Password Authentication Scheme
Manoj Kumar
2009/559
New Integral Distinguisher for Rijndael-256
Yuechuan Wei, Bing Sun, Chao Li
2009/558
Quantifying Trust
Mariusz Jakubowski, Ramarathnam Venkatesan, Yacov Yacobi
2009/557
Towards a Theory of Trust Based Collaborative Search
Yacov Yacobi
2009/556
Constructing Tower Extensions for the implementation of Pairing-Based Cryptography
Naomi Benger, Michael Scott
2009/555
An enhanced password authenticated key agreement protocol for wireless mobile network
Zhigang Gao, Dengguo Feng
2009/554
ON A COMBINATORIAL CONJECTURE
T. W. CUSICK, YUAN LI, PANTELIMON STANICA
2009/553
Cryptanalysis of a key exchange scheme based on block matrices
Maria Isabel Gonzalez Vasco, Angel L. Perez del Pozo, Pedro Taborda Duarte
2009/552
Preimage Attacks on Reduced DHA-256
Jinmin Zhong, Xuejia Lai
2009/551
A Novel Design Method of Stream Ciphers Based on Table-Element Permutation
Hongbo Zou
2009/550
How to Construct Cryptosystems and Hash Functions in Weakened Random Oracle Models
Yusuke Naito, Lei Wang, Kazuo Ohta
2009/549
Making Collusion-Secure Codes (More) Robust against Bit Erasure
Koji Nuida
2009/548
A NOTE ON YAO'S THEOREM ABOUT PSEUDORANDOM GENERATORS
Stéphane BALLET, Robert ROLLAND
2009/547
Non-Interactive Verifiable Computing: Outsourcing Computation to Untrusted Workers
Rosario Gennaro, Craig Gentry, Bryan Parno
2009/546
Construction of A New Class of Linear Multivariate Public Key Cryptosystem, K(I)SE(1)PKC
Masao Kasahara
2009/545
Fuzzy extractors for continuous distributions
Ileana Buhan, Jeroen Doumen, Pieter Hartel
2009/544
Connections between Quaternary and Binary Bent Functions
Patrick Solé, Natalia Tokareva
2009/543
A Formal Framework for Cryptanalyzing RFID Distance Bounding Protocols
Gildas Avoine, Muhammed Ali Bingol, Suleyman Kardas, Cedric Lauradoux, Benjamin Martin
2009/542
Analysis of Intermediate Field Systems
Olivier Billet, Jacques Patarin, Yannick Seurin
2009/541
Breaking ECC2K-130
Daniel V. Bailey, Lejla Batina, Daniel J. Bernstein, Peter Birkner, Joppe W. Bos, Hsieh-Chung Chen, Chen-Mou Cheng, Gauthier van Damme, Giacomo de Meulenaer, Luis Julian Dominguez Perez, Junfeng Fan, Tim Güneysu, Frank Gurkaynak, Thorsten Kleinjung, Tanja Lange, Nele Mentens, Ruben Niederhagen, Christof Paar, Francesco Regazzoni, Peter Schwabe, Leif Uhsadel, Anthony Van Herrewege, Bo-Yin Yang
2009/540
Converting Pairing-Based Cryptosystems from Composite-Order Groups to Prime-Order Groups
David Mandell Freeman
2009/539
Covering Radius of Two-dimensional Lattices
Yupeng Jiang, Yingpu Deng, Yanbin Pan
2009/538
Side-Channel Analysis of Cryptographic Software via Early-Terminating Multiplications
Johann Großschädl, Elisabeth Oswald, Dan Page, Michael Tunstall
2009/537
Cryptanalysis of two knapsack public-key cryptosystems
Jingguo Bi, Xianmeng Meng, Lidong Han
2009/536
Practical remote mutual authentication with key agreement scheme for mobile devices on elliptic curve cryptosystem
S. Wu
2009/535
Weakness of a three-party password-based authenticated key exchange protocol
S. Wu
2009/534
Weaknesses and improvement of three-party authenticated key exchange protocol using elliptic curve cryptography
S. Wu
2009/533
Finding composite order ordinary elliptic curves using the Cocks-Pinch method
D. Boneh, K. Rubin, A. Silverberg
2009/532
Building Efficient Fully Collusion-Resilient Traitor Tracing and Revocation Schemes
Sanjam Garg, Abishek Kumarasubramanian, Amit Sahai, Brent Waters
2009/531
Super-Sbox Cryptanalysis: Improved Attacks for AES-like permutations
Henri Gilbert, Thomas Peyrin
2009/530
A New Proposal Against the Main of Generic Attacks
Xigen. Yao
2009/529
Oblivious Transfer with Access Control
Jan Camenisch, Maria Dubovitskaya, Gregory Neven
2009/528
New Fault Attack on Elliptic Curve Scalar Multiplication
Alexey Chilikov, Oleg Taraskin
2009/527
An Efficient Adaptive-Deniable-Concurrent Non-malleable Commitment Scheme
Seiko Arita
2009/526
Improved Related-Key Boomerang Attacks on Round-Reduced Threefish-512
Jiazhe Chen, Keting Jia
2009/525
On Quantifying the Resistance of Concrete Hash Functions to Generic Multi-Collision Attacks
Somindu C. Ramanna, Palash Sarkar
2009/524
Chosen-Ciphertext Security from Slightly Lossy Trapdoor Functions
Petros Mol, Scott Yilek
2009/523
Differential Addition in generalized Edwards Coordinates
Benjamin Justus, Daniel Loebenberger
2009/522
Isogenies of Elliptic Curves: A Computational Approach
Daniel Shumow
2009/521
An Efficient Secure Oblivious Transfer
Hung-Min Sun, Yalin Chen, Jue-Sam Chou
2009/520
Universally Composable Incoercibility
Dominique Unruh, Jörn Müller-Quade
2009/519
Secure Message Transmission with Small Public Discussion
Juan Garay, Clint Givens, Rafail Ostrovsky
2009/518
Efficient Strong Designated Verifier Signature Schemes without Random Oracles or Delegatability
Qiong Huang, Guomin Yang, Duncan S. Wong, Willy Susilo
2009/517
New Constructions of Convertible Undeniable Signature Schemes without Random Oracles
Qiong Huang, Duncan S. Wong
2009/516
Lightweight Cryptography - Cryptographic Engineering for a Pervasive World
Axel Poschmann
2009/515
Blake-Wilson, Johnson and Menezes Protocol Revisited
Hai Huang, Zhenfu Cao
2009/514
Generic One Round Group Key Exchange in the Standard Model
M. Choudary Gorantla, Colin Boyd, Juan Manuel Gonzalez Nieto, Mark Manulis
2009/513
On the round complexity of black-box constructions of commitments secure against selective opening attacks
David Xiao
2009/512
Public-Key Encryption in the Bounded-Retrieval Model
Joel Alwen, Yevgeniy Dodis, Moni Naor, Gil Segev, Shabsi Walfish, Daniel Wichs
2009/511
Bounded Key-Dependent Message Security
Boaz Barak, Iftach Haitner, Dennis Hofheinz, Yuval Ishai
2009/510
High-Speed Hardware Implementations of BLAKE, Blue Midnight Wish, CubeHash, ECHO, Fugue, Grøstl, Hamsi, JH, Keccak, Luffa, Shabal, SHAvite-3, SIMD, and Skein
Stefan Tillich, Martin Feldhofer, Mario Kirschbaum, Thomas Plos, Jörn-Marc Schmidt, Alexander Szekely
2009/509
Practical Key Recovery Attacks On Two McEliece Variants
Valerie Gauthier Umana, Gregor Leander
2009/508
On the Efficiency of Classical and Quantum Oblivious Transfer Reductions
Severin Winkler, Juerg Wullschleger
2009/507
Efficient Privacy-Preserving Face Recognition
Ahmad-Reza Sadeghi, Thomas Schneider, Immo Wehrenberg
2009/506
An Investigation of the Enhanced Target Collision Resistance Property for Hash Functions
Mohammad Reza Reyhanitabar, Willy Susilo, Yi Mu
2009/505
Authenticated Key Exchange Protocols with Enhanced Freshness Properties
Hai Huang, Zhenfu Cao
2009/504
Insecure ``Provable Secure Network Coding''
Yongge Wang
2009/503
Fault Attacks Against EMV Signatures
Jean-Sebastien Coron, David Naccache, Mehdi Tibouchi
2009/502
On second order nonlinearities of cubic monomial Boolean functions
Ruchi Gode, Sugata Gangopadhyay
2009/501
Fast Implementations of AES on Various Platforms
Joppe W. Bos, Dag Arne Osvik, Deian Stefan
2009/500
Key Recovery Attack on QuiSci
Nils Reimers
2009/499
Underlying Assumptions and Designated Verifier Signatures
Chifumi Sato, Takeshi Okamoto, Eiji Okamoto
2009/498
NTRU based group oriented signature
Chunbo Ma, Jun Ao
2009/497
Cube Attack on Courtois Toy Cipher
Piotr Mroczkowski, Janusz Szmidt
2009/496
Anonymous Fuzzy Identity-based Encryption for Similarity Search
Ye Zhang, Nikos Mamoulis, David W. Cheung, S. M. Yiu, W. K. Wong
2009/495
Security Weakness in Two Authenticated Key Exchange Protocols
Qingfeng Cheng, Chuangui Ma
2009/494
A Framework for Universally Composable Non-Committing Blind Signatures
Masayuki Abe, Miyako Ohkubo
2009/493
Remarks on Some Quantum Cryptographic Schemes
Zhengjun Cao
2009/492
Efficient Statistical Asynchronous Verifiable Secret Sharing and Multiparty Computation with Optimal Resilience
Arpita Patra, Ashish Choudhary, C. Pandu Rangan
2009/491
Practical Private Set Intersection Protocols with Linear Computational and Bandwidth Complexity
Emiliano De Cristofaro, Gene Tsudik
2009/490
Cryptanalysis of Multiple-Server Password-Authenticated Key
Sang-Gon Lee
2009/489
Impossible Boomerang Attack for Block Cipher Structures
Jiali Choy, Huihui Yap
2009/488
Little Dragon Two: An efficient Multivariate Public Key Cryptosystem
Rajesh P Singh, A. Saikia, B. K. Sarma
2009/487
Error Decodable Secret Sharing and One-Round Perfectly Secure Message Transmission for General Adversary Structures
Keith M. Martin, Maura B. Paterson, Douglas R. Stinson
2009/486
Efficient Pseudorandom Functions From the Decisional Linear Assumption and Weaker Variants
Allison Lewko, Brent Waters
2009/485
Black-Box Circular-Secure Encryption Beyond Affine Functions
Zvika Brakerski, Shafi Goldwasser, Yael Kalai
2009/484
New Pseudo-Near-Collision Attack on Reduced-Round of Hamsi-256
Meiqin Wang, Xiaoyun Wang, Keting Jia, Wei Wang
2009/483
On the Security of UOV
Jean-Charles Faugère, Ludovic Perret
2009/482
New Techniques for Dual System Encryption and Fully Secure HIBE with Short Ciphertexts
Allison Lewko, Brent Waters
2009/481
PPS: Privacy Preserving Statistics using RFID Tags
Erik-Oliver Blass, Kaoutar Elkhiyaoui, Refik Molva
2009/480
On Cryptographic Protocols Employing Asymmetric Pairings -- The Role of $\Psi$ Revisited
Sanjit Chatterjee, Alfred Menezes
2009/479
Preimage Attacks on 41-Step SHA-256 and 46-Step SHA-512
Yu Sasaki, Lei Wang, Kazumaro Aoki
2009/478
Pseudo-cryptanalysis of the Original Blue Midnight Wish
Søren S. Thomsen
2009/477
Preimages for Step-Reduced SHA-2
Jian Guo, Krystian Matusiewicz
2009/476
On the Security of PAS (Predicate-based Authentication Service)
Shujun Li, Hassan Jameel Asghar, Josef Pieprzyk, Ahmad-Reza Sadeghi, Roland Schmitz, Huaxiong Wang
2009/475
Double-Exponentiation in Factor-4 Groups and its Applications
Koray Karabina
2009/474
Resettable Public-Key Encryption: How to Encrypt on a Virtual Machine
Scott Yilek
2009/473
A Simple Power Analysis Attack on the Serpent Key Schedule
Kevin J. Compton, Brian Timm, Joel VanLaven
2009/472
Cryptanalysis of a Message Recognition Protocol by Mashatan and Stinson
Madeline Gonzalez, Rainer Steinwandt
2009/471
Improving the Berlekamp algorithm for binomials \boldmath$x^{n} - a$
Ryuichi Harasawa, Yutaka Sueyoshi, Aichi Kudo, Liang Cui
2009/470
On The Communication Complexity of Perfectly Secure Message Transmission in Directed Networks
Arpita Patra, Ashish Choudhary, C. Pandu Rangan
2009/469
Additive Combinatorics and Discrete Logarithm Based Range Protocols
Rafik Chaabouni, Helger Lipmaa, abhi shelat
2009/468
Password Based Key Exchange with Hidden Elliptic Curve Public Parameters
Julien Bringer, Herve Chabanne, Thomas Icart
2009/467
The LPN Problem with Auxiliary Input
Yu Yu
2009/466
The Certicom Challenges ECC2-X
Daniel V. Bailey, Brian Baldwin, Lejla Batina, Daniel J. Bernstein, Peter Birkner, Joppe W. Bos, Gauthier van Damme, Giacomo de Meulenaer, Junfeng Fan, Tim Güneysu, Frank Gurkaynak, Thorsten Kleinjung, Tanja Lange, Nele Mentens, Christof Paar, Francesco Regazzoni, Peter Schwabe, Leif Uhsadel
2009/465
Readers Behaving Badly: Reader Revocation in PKI-Based RFID Systems
Rishab Nithyanand, Gene Tsudik, Ersin Uzun
2009/464
On Key Authentic Degree of Cryptosystem
WANG Yong, WANG Huangdeng
2009/463
On Linear Cryptanalysis with Many Linear Approximations
Benoit Gérard, Jean-Pierre Tillich
2009/462
Certificateless KEM and Hybrid Signcryption Schemes Revisited
S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Rangan
2009/461
A Framework for Non-Interactive Instance-Dependent Commitment Schemes (NIC)
Bruce Kapron, Lior Malka, Venkatesh Srinivasan
2009/460
Asymptotic enumeration of correlation-immune boolean functions
E. Rodney Canfield, Zhicheng Gao, Catherine Greenhill, Brendan D. McKay, Robert W. Robinson
2009/459
Efficient Oblivious Polynomial Evaluation with Simulation-Based Security
Carmit Hazay, Yehuda Lindell
2009/458
Security Analysis and Design of Proxy Signature Schemes over Braid Groups
Wei Yun, Xiong Guo-hua, Zhang Xing-kai, Bao Wan-su
2009/457
A remark on the computation of cube roots in finite fields
Nozomu Nishihara, Ryuichi Harasawa, Yutaka Sueyoshi, Aichi Kudo
2009/456
An Automata-Theoretic Interpretation of Iterated Hash Functions - Application to Multicollisions
Kimmo Halunen, Juha Kortelainen, Tuomas Kortelainen
2009/455
Identity-Based Hybrid Signcryption
Fagen Li, Masaaki Shirase, Tsuyoshi Takagi
2009/454
An Efficient Convertible Undeniable Signature Scheme with Delegatable Verification
Jacob C. N. Schuldt, Kanta Matsuura
2009/453
A Note on Linear Approximations of BLUE MIDNIGHT WISH Cryptographic Hash Function
Vlastimil Klima, Petr Susil
2009/452
Cryptanalysis of the Niederreiter Public Key Scheme Based on GRS Subcodes
Christian Wieschebrink
2009/451
Efficient Certificateless KEM in the Standard Model
Georg Lippold, Colin Boyd, Juan González Nieto
2009/450
On Hierarchical Threshold Secret Sharing
Ali Aydin Selcuk, Kerem Kaskaloglu, Ferruh Ozbudak
2009/449
One for All - All for One: Unifying Standard DPA Attacks
Stefan Mangard, Elisabeth Oswald, Francois-Xavier Standaert
2009/448
Precise Bounded-Concurrent Zero-Knowledge in Almost Constant Rounds
Ning Ding, Dawu Gu, Bart Preneel
2009/447
ROSSLER NONLINEAR DYNAMICAL MACHINE FOR CRYPTOGRAPHY APPLICATIONS
Sunil Pandey, Praveen Kaushik, Dr. S. C. Shrivastava
2009/446
Ntr¹u-like Public Key Cryptosystems beyond Dedekind Domain Up to Alternative Algebra
Ehsan Malekian, Ali Zakerolhosseini
2009/445
Computing Hilbert class polynomials with the Chinese Remainder Theorem
Andrew V. Sutherland
2009/444
Secure and Efficient HB-CM Entity Authentication Protocol
Zhijun Li, Guang Gong, Zhiguang Qin
2009/443
Rebound Attack on the Full LANE Compression Function
Krystian Matusiewicz, Maria Naya-Plasencia, Ivica Nikolic, Yu Sasaki, Martin Schläffer
2009/442
Fuzzy Privacy Preserving Peer-to-Peer Reputation Management
Rishab Nithyanand, Karthik Raman
2009/441
An Efficient Two-Party Identity-Based Key Exchange Protocol based on ECDLP
Jayaprakash Kar, Banshidhar Majhi
2009/440
A Multivariate Signature Scheme with an almost cyclic public key
Albrecht Petzoldt, Johannes Buchmann
2009/439
A Fast Mental Poker Protocol
Tzer-jen Wei, Lih-Chung Wang
2009/438
Improved Cryptanalysis of Skein
Jean-Philippe Aumasson, Cagdas Calik, Willi Meier, Onur Ozen, Raphael C. -W. Phan, Kerem Varici
2009/437
On the Relations Between Diffie-Hellman and ID-Based Key Agreement from Pairings
Shengbao Wang
2009/436
On the Connection between Signcryption and One-pass Key Establishment
M. Choudary Gorantla, Colin Boyd, Juan Manuel González Nieto
2009/435
Efficient Confirmer Signatures from the ``Signature of a Commitment'' Paradigm
Laila El Aimani
2009/434
Tight Bounds for Protocols with Hybrid Security
Matthias Fitzi, Dominik Raub
2009/433
Communication Optimal Multi-Valued Asynchronous Byzantine Agreement with Optimal Resilience
Arpita Patra, C. Pandu Rangan
2009/432
Practical Distributed Key Generation Scheme
Chen Huiyan, Li Zichen, Fang Yong
2009/431
On the Design of Trivium
Yun Tian, Gongliang Chen, Jianhua Li
2009/430
One-time-password-authenticated key exchange
Kenneth G. Paterson, Douglas Stebila
2009/429
Precise Time and Space Simulatable Zero-Knowledge
Ning Ding, Dawu Gu
2009/428
Efficiently from Semi-honest to Malicious OT via OLFE
Jürg Wullschleger
2009/427
Efficient Verifiable Escrow and Fair Exchange with Trusted Hardware
Stephen R. Tate, Roopa Vishwanathan
2009/426
Cheating Detection and Cheater Identification in CRT-based Secret Sharing Schemes
Daniel Pasaila, Vlad Alexa, Sorin Iftene
2009/425
Cryptanalysis and Security Enhancement on the Generation of Mu-Varadharajan Electronic Voting Protocol
Vahid Jahandideh, Amir S. Mortazavi, Yaser Baseri, Javad Mohajeri
2009/424
Double Voter Perceptible Blind Signature Based Electronic Voting Protocol
Yaser Baseri, Amir S. Mortazavi, Maryam Rajabzadeh Asaar, Mohsen Pourpouneh, Javad Mohajeri
2009/423
Utilizing postponed ephemeral and pseudo-static keys in tripartite and identity-based key agreement protocols
Atsushi Fujioka, Koutarou Suzuki, Berkant Ustaoglu
2009/422
Attacks on {RFID}-Based Electronic Voting Systems
Yossef Oren, Avishai Wool
2009/421
How to Construct Identity-Based Signatures without the Key Escrow Problem
Tsz Hon Yuen, Willy Susilo, Yi Mu
2009/420
Higher-order Masking and Shuffling for Software Implementations of Block Ciphers
Matthieu Rivain, Emmanuel Prouff, Julien Doget
2009/419
An Efficient Method for Random Delay Generation in Embedded Software
Jean-Sébastien Coron, Ilya Kizhvatov
2009/418
Subtleties in the Definition of IND-CCA: When and How Should Challenge-Decryption be Disallowed?
Mihir Bellare, Dennis Hofheinz, Eike Kiltz
2009/417
More Differential Paths of TIB3
Harry Wiggins, Philip Hawkes, Gregory G. Rose, Cameron McDonald
2009/416
KronCrypt - A New Symmetric Cryptosystem Based on Kronecker's Approximation Theorem
Carsten Elsner, Martin Schmidt
2009/415
Attacks Against Permute-Transform-Xor Compression Functions and Spectral Hash
Ethan Heilman
2009/414
Security Bounds for the Design of Code-based Cryptosystems
Matthieu Finiasz, Nicolas Sendrier
2009/413
Three Improved Algorithms for Multi-path Key Establishment in Sensor Networks Using Protocols for Secure Message Transmission
Jiang Wu, Douglas R. Stinson
2009/412
Distinguishing Attacks on Stream Ciphers Based on Arrays of Pseudo-random Words
Nathan Keller, Stephen D. Miller
2009/411
Improved Garbled Circuit Building Blocks and Applications to Auctions and Computing Minima
Vladimir Kolesnikov, Ahmad-Reza Sadeghi, Thomas Schneider
2009/410
Authenticated Broadcast with a Partially Compromised Public-Key Infrastructure
S. Dov Gordon, Jonathan Katz, Ranjit Kumaresan, Arkady Yerukhimovich
2009/409
A Tree Based Recursive Scheme for Space Efficient Secret Sharing
Abhishek Parakh, Subhash Kak
2009/408
A Secure and Efficient Authenticated Diffie–Hellman Protocol
Augustin P. Sarr, Philippe Elbaz–Vincent, Jean–Claude Bajard
2009/407
Single Block Attacks and Statistical Tests on CubeHash
Benjamin Bloom, Alan Kaminsky
2009/406
On-line Non-transferable Signatures Revisited
Jacob C. N. Schuldt, Kanta Matsuura
2009/405
Generic Attacks on Misty Schemes -5 rounds is not enough-
Valerie Nachef, Jacques Patarin, Joana Treger
2009/404
Pairing-Friendly Elliptic Curves With Various Discriminants
Woo Sug Kang, Ki Taek Kim
2009/403
On Generic Constructions of Designated Confirmer Signatures (The ``Encryption of a Signature'' Paradigm Revisited)
Laila El Aimani
2009/402
AIDA Breaks BIVIUM (A&B) in 1 Minute Dual Core CPU Time
Michael Vielhaber
2009/401
Longest Common Subsequence as Private Search
Mark Gondree, Payman Mohassel
2009/400
Identity-Based Chameleon Hash Scheme Without Key Exposure
Xiaofeng Chen, Fangguo Zhang, Haibo Tian, Kwangjo Kim
2009/399
Leakage-Resilient Storage
Francesco Davì, Stefan Dziembowski, Daniele Venturi
2009/398
Fast Architectures for the $\eta_T$ Pairing over Small-Characteristic Supersingular Elliptic Curves
Jean-Luc Beuchat, Jérémie Detrey, Nicolas Estibals, Eiji Okamoto, Francisco Rodríguez-Henríquez
2009/397
Linear Cryptanalysis of Reduced-Round PRESENT
Joo Yeon Cho
2009/396
Computational Indistinguishability Amplification: Tight Product Theorems for System Composition
Ueli Maurer, Stefano Tessaro
2009/395
First CPIR Protocol with Data-Dependent Computation
Helger Lipmaa
2009/394
Provably Secure Convertible Undeniable Signatures with Unambiguity
Le Trieu Phong, Kaoru Kurosawa, Wakaha Ogata
2009/393
Permutation Polynomials modulo $p^n$}
Rajesh P Singh, Soumen Maity
2009/392
Computational Soundness for Key Exchange Protocols with Symmetric Encryption
Ralf Kuesters, Max Tuengerthal
2009/391
Threshold Decryption and Zero-Knowledge Proofs for Lattice-Based Cryptosystems
Rikke Bendlin, Ivan Damgård
2009/390
Sub-linear Size Pairing-based Non-interactive Zero-Knowledge Arguments
Jens Groth
2009/389
On the Security of 1024-bit RSA and 160-bit Elliptic Curve Cryptography
Joppe W. Bos, Marcelo E. Kaihara, Thorsten Kleinjung, Arjen K. Lenstra, Peter L. Montgomery
2009/388
A Simple Secret Sharing Scheme for Hierarchical Threshold Access Structures
Kerem Kaskaloglu, Ferruh Ozbudak
2009/387
Securing Plastic Money Using an RFID Based Protocol Stack
Rishab Nithyanand
2009/386
QTRU: A Lattice Attack Resistant Version of NTRU
Ehsan Malekian, Ali Zakerolhosseini, Atefeh Mashatan
2009/385
Dual System Encryption: Realizing Fully Secure IBE and HIBE under Simple Assumptions
Brent Waters
2009/384
Practical Attacks on NESHA-256
Orr Dunkelman, Tor E. Bjørstad
2009/383
A Registration Scheme to Allocate a Unique Identification Number
Manoj Kumar
2009/382
Linearization Framework for Collision Attacks: Application to CubeHash and MD6
Eric Brier, Shahram Khazaei, Willi Meier, Thomas Peyrin
2009/381
A short Note on Discrete Log Problem in $\mathbbF_p$
Habeeb Syed
2009/380
Untraceable Tags based on Mild Assumptions
Carlo Blundo, Angelo De Caro, Giuseppe Persiano
2009/379
Protecting Circuits from Computationally Bounded and Noisy Leakage
Sebastian Faust, Tal Rabin, Leonid Reyzin, Eran Tromer, Vinod Vaikuntanathan
2009/378
Detectable correlations in Edon-R
Peter Novotney, Niels Ferguson
2009/377
Chosen-Ciphertext Secure RSA-type Cryptosystems
Benoit Chevallier-Mames, Marc Joye
2009/376
Cryptanalysis of the Tillich-Zémor hash function
Markus Grassl, Ivana Ilic, Spyros Magliveras, Rainer Steinwandt
2009/375
Forgotten Secret Recovering Scheme and Fuzzy Vault Scheme Constructed Based on Systematic Error-Correcting Codes
Masao KASAHARA
2009/374
Key Recovery Attacks of Practical Complexity on AES Variants With Up To 10 Rounds
Alex Biryukov, Orr Dunkelman, Nathan Keller, Dmitry Khovratovich, Adi Shamir
2009/373
Utility Dependence in Correct and Fair Rational Secret Sharing
Gilad Asharov, Yehuda Lindell
2009/372
More on Key Wrapping
Rosario Gennaro, Shai Halevi
2009/371
Attribute-Sets: A Practically Motivated Enhancement to Attribute-Based Encryption
Rakesh Bobba, Himanshu Khurana, Manoj Prabhakaran
2009/370
A study of pairing computation for elliptic curves with embedding degree 15
Nadia El Mrabet, Nicolas Guillermin, Sorina Ionica
2009/369
Quantum readout of Physical Unclonable Functions: Remote authentication without trusted readers and authenticated Quantum Key Exchange without initial shared secrets
Boris Skoric
2009/368
A Simulation-Based Treatment of Authenticated Message Exchange
Klaas Ole Kuertz, Henning Schnoor, Thomas Wilke
2009/367
Non-delegatable Identity-based Designated Verifier Signature
Qiong Huang, Willy Susilo, Duncan S. Wong
2009/366
Adaptive Zero-Knowledge Proofs and Adaptively Secure Oblivious Transfer
Yehuda Lindell, Hila Zarosim
2009/365
Space Efficient Secret Sharing: A Recursive Approach
Abhishek Parakh, Subhash Kak
2009/364
Position Based Cryptography
Nishanth Chandran, Vipul Goyal, Ryan Moriarty, Rafail Ostrovsky
2009/363
Some Lattices Attacks on DSA and ECDSA
Dimitrios Poulakis
2009/362
Toward a Generic Construction of Convertible Undeniable Signatures from Pairing-Based Signatures
Laila El Aimani
2009/361
On the Security of a Proxy Blind Signature Scheme over Braid Groups
Manoj Kumar
2009/360
Cryptanalysis of a Generalized Unbalanced Feistel Network Structure
Ruilin Li, Bing Sun, Chao Li, Longjiang Qu
2009/359
Bonsai Trees (or, Arboriculture in Lattice-Based Cryptography)
Chris Peikert
2009/358
MAC Precomputation with Applications to Secure Memory
Juan A. Garay, Vladimir Kolesnikov, Rae McLellan
2009/357
Impossible Differential Cryptanalysis of FOX
Zhongming Wu, Xuejia Lai, Bo Zhu, Yiyuan Luo
2009/356
A Domain Extender for the Ideal Cipher
Jean-Sebastien Coron, Yevgeniy Dodis, Avradip Mandal, Yannick Seurin
2009/355
Asynchronous Distributed Private-Key Generators for Identity-Based Cryptography
Aniket Kate, Ian Goldberg
2009/354
Cache Timing Attacks on Camellia Block Cipher
ZHAO Xin-jie, WANG Tao, ZHENG Yuan-yuan
2009/353
Comparing SessionStateReveal and EphemeralKeyReveal for Diffie-Hellman protocols (extended version)
Berkant Ustaoglu
2009/352
On the Duality of Probing and Fault Attacks
Berndt M. Gammel, Stefan Mangard
2009/351
How to Delegate a Lattice Basis
David Cash, Dennis Hofheinz, Eike Kiltz
2009/350
Game Theoretic Resistance to Denial of Service Attacks Using Hidden Difficulty Puzzles
Harikrishna Narasimhan, Venkatanathan Varadarajan, C. Pandu Rangan
2009/349
Compact Hardware Implementations of the SHA-3 Candidates ARIRANG, BLAKE, Grøstl, and Skein
Stefan Tillich, Martin Feldhofer, Wolfgang Issovits, Thomas Kern, Hermann Kureck, Michael Mühlberghuber, Georg Neubauer, Andreas Reiter, Armin Köfler, Mathias Mayrhofer
2009/348
A provably secure really source hiding designated verifier signature scheme based on random oracle model
Huang-Ta Huang, Jue-Sam Chou
2009/347
An Efficient Concurrent Repetition Theorem
Douglas Wikström
2009/346
Security Analysis of the GF-NLFSR Structure and Four-Cell Block Cipher
Wenling Wu, Lei Zhang, Liting Zhang, Wentao Zhang
2009/345
Anonymous ID Based Signcryption Scheme for Multiple Receivers
Sunder Lal, Prashant Kushwah
2009/344
Comments on Shao-Cao's Unidirectional Proxy Re-Encryption Scheme from PKC 2009
Xi Zhang, Min-Rong Chen, Xia Li
2009/343
Partitioning Multivariate Polynomial Equations via Vertex Separators for Algebraic Cryptanalysis and Mathematical Applications
Kenneth Koon-Ho Wong, Gregory V. Bard, Robert H. Lewis
2009/342
FPGA Implementations of SHA-3 Candidates:CubeHash, Grøstl, L{\sc ane}, Shabal and Spectral Hash
Brian Baldwin, Andrew Byrne, Mark Hamilton, Neil Hanley, Robert P. McEvoy, Weibo Pan, William P. Marnane
2009/341
Leakage Resilient Cryptography in Practice
Francois-Xavier Standaert, Olivier Pereira, Yu Yu, Jean-Jacques Quisquater, Moti Yung, Elisabeth Oswald
2009/340
Efficient Indifferentiable Hashing into Ordinary Elliptic Curves
Eric Brier, Jean-Sebastien Coron, Thomas Icart, David Madore, Hugues Randriam, Mehdi Tibouchi
2009/339
A Novel ID-based Electronic Cash System from Pairings
Jue-Sam Chou, Yalin Chen, Ming-Hsun Cho, Hung-Min Sun
2009/338
Security weaknesses in two multi-server password based authentication protocols
Jue-Sam Chou, Chun-Hui Huang, Cheng-Chung Ding
2009/337
A New Lattice-Based Cryptosystem Mixed with a Knapsack
Yanbin Pan, Yingpu Deng, Yupeng Jiang, Ziran Tu
2009/336
Partial Signatures and their Applications
Mihir Bellare, Shanshan Duan
2009/335
Related-Key Rectangle Attack of the Full 80-Round HAS-160 Encryption Mode
Ewan Fleischmann, Michael Gorski, Stefan Lucks
2009/334
Attacking Reduced Rounds of the ARIA Block Cipher
Ewan Fleischmann, Michael Gorski, Stefan Lucks
2009/333
Hard Fault Analysis of Trivium
Yupu Hu, Fengrong Zhang, Yiwei Zhang
2009/332
Untraceable RFID protocols are not trivially composable: Attacks on the revision of EC-RAC
Ton van Deursen, Sasa Radomirovic
2009/331
Security Notions and Generic Constructions for Client Puzzles
L. Chen, P. Morrissey, N. P. Smart, B. Warinschi
2009/330
NTRU, quaternion algebra, public key cryptography
Ehsan Malekian, Ali Zakerolhosseini, Atefeh
2009/329
Efficient Approximation of Higher Order Boolean function in a Low Order Function
Mehreen Afzal, Ashraf Masood
2009/328
Flowchart description of security primitives for Controlled Physical Unclonable Functions
Boris Skoric, Marc X. Makkes
2009/327
Simple Adaptive Oblivious Transfer Without Random Oracle
Kaoru Kurosawa, Ryo Nojima
2009/326
The Application of Polynomials over the Field of Two Elements to a Problem in Intellectual Property
Gregory V. Bard
2009/325
Characterizing Padding Rules of MD Hash Functions Preserving Collision Security
Mridul Nandi
2009/324
Group-Oriented Fair Exchange of Signatures
Qiong Huang, Duncan S. Wong, Willy Susilo
2009/323
Factoring Unbalanced Moduli with Known Bits
Eric Brier, David Naccache, Mehdi Tibouchi
2009/322
Certifying Assembly with Formal Cryptographic Proofs: the Case of BBS
Reynald Affeldt, David Nowak, Kiyoshi Yamada
2009/321
Tweakable Enciphering Schemes From Stream Ciphers With IV
Palash Sarkar
2009/320
Automorphic Signatures in Bilinear Groups and an Application to Round-Optimal Blind Signatures
Georg Fuchsbauer
2009/319
Comments and Improvements on Chameleon Hashing Without Key Exposure Based on Factoring
Xiaofeng Chen, Haibo Tian, Fangguo Zhang
2009/318
The Fermat factorization method revisited
Robert ERRA, Christophe GRENIER
2009/317
Related-key Cryptanalysis of the Full AES-192 and AES-256
Alex Biryukov, Dmitry Khovratovich
2009/316
An Efficient Password Security of Key Exchange Protocol based on ECDLP
Jayaprakash Kar, Banshidhar Majhi
2009/315
Breaking RSA-based PIN Encryption with thirty ciphertext validity queries
N. P. Smart
2009/314
Secure Two-Party Computation is Practical
B. Pinkas, T. Schneider, N. P. Smart, S. Williams
2009/313
Identity Based Group Signatures from Hierarchical Identity-Based Encryption
Nigel P. Smart, Bogdan Warinschi
2009/312
Jacobi Quartic Curves Revisited
Huseyin Hisil, Kenneth Koon-Ho Wong, Gary Carter, Ed Dawson
2009/311
Multi Party Distributed Private Matching, Set Disjointness and Cardinality Set Intersection with Information Theoretic Security
Sathya Narayanan G, Aishwarya T, Anugrah Agrawal, Arpita Patra, Ashish Choudhary, Pandu Rangan C
2009/310
RFID distance bounding protocol with mixed challenges to prevent relay attacks
Chong Hee Kim, Gildas Avoine
2009/309
Fault Attacks on RSA Signatures with Partially Unknown Messages
Jean-Sebastien Coron, Antoine Joux, Ilya Kizhvatov, David Naccache, Pascal Paillier
2009/308
A note on the Certificateless Multi-receiver Signcryption Scheme
S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Rangan
2009/307
Anonymous Signatures Revisited
Vishal Saraswat, Aaram Yun
2009/306
Authentic Time-Stamps for Archival Storage
Alina Oprea, Kevin D. Bowers
2009/305
Improved generic algorithms for 3-collisions
Antoine Joux, Stefan Lucks
2009/304
Factor-4 and 6 Compression of Cyclotomic Subgroups
Koray Karabina
2009/303
Key extraction from general non-discrete signals
E. Verbitskiy, P. Tuyls, C. Obi, B. Schoenmakers, B. Skoric
2009/302
Cryptanalysis of ESSENCE
Maria Naya-Plasencia, Andrea Röck, Jean-Philippe Aumasson, Yann Laigle-Chapuy, Gaëtan Leurent, Willi Meier, Thomas Peyrin
2009/301
A Probabilistic Secret Sharing Scheme for a Compartmented Access Structure
Yuyin Yu, Mingsheng Wang
2009/300
Universally Composable Contributory Group Key Exchange
M. Choudary Gorantla, Colin Boyd, Juan Manuel Gonzàlez Nieto
2009/299
On the security of oscillator-based random number generators
Mathieu Baudet, David Lubicz, Julien Micolod, André Tassiaux
2009/298
Cryptanalysis of Certificateless Signcryption Schemes and an Efficient Construction Without Pairing
S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Rangan
2009/297
A New Improved Distinguisher for HC-128
Subhabrata Sen, Rudradev Sengupta, Subhamoy Maitra, Goutam Paul, Shashwat Raizada
2009/296
Perfectly Balanced Functions in Symbolic Dynamics
O. A. Logachev, A. A. Salnikov, S. V. Smyshlyaev, V. V. Yashchenko
2009/295
Defending Against Key Abuse Attacks in KP-ABE Enabled Broadcast Systems
Shucheng Yu, Kui Ren, Wenjing Lou, Jin Li
2009/294
Low Latency High Bandwidth Anonymous Overlay Network with Anonymous Routing
Roman Schlegel, Duncan S. Wong
2009/293
Enhancing Attribute-based Encryption with Attribute Hierarchy
Jin Li, Qian Wang, Cong Wang, Kui Ren
2009/292
Implementing Wagner's generalized birthday attack against the SHA-3 round-1 candidate FSB
Daniel J. Bernstein, Tanja Lange, Ruben Niederhagen, Christiane Peters, Peter Schwabe
2009/291
Modeling Key Compromise Impersonation Attacks on Group Key Exchange Protocols
M. Choudary Gorantla, Colin Boyd, Juan Manuel González Nieto
2009/290
Security Analysis of Aggregate signature and Batch verification signature schemes
S. Sharmila Deva Selvi, S. Sree Vivek, J. Shriram, S. Kalaivani, C. Pandu Rangan
2009/289
Analysis of the End-by-Hop Protocol for Secure Aggregation in Sensor Networks
Erik Zenner
2009/288
Efficient Key Exchange with Tight Security Reduction
Jiang Wu, Berkant Ustaoglu
2009/287
Generic Attacks on Alternating Unbalanced Feistel Schemes
Valerie Nachef
2009/286
On Privacy Losses in the Trusted Agent Model (Abstract)
Paulo Mateus, Serge Vaudenay
2009/285
Efficient Public Key Encryption Based on Ideal Lattices
Damien Stehlé, Ron Steinfeld, Keisuke Tanaka, Keita Xagawa
2009/284
Privacy-aware Attribute-based Encryption with User Accountability
Jin Li, Kui Ren, Bo Zhu, Zhiguo Wan
2009/283
Short and Stateless Signatures from the RSA Assumption
Susan Hohenberger, Brent Waters
2009/282
Leakage-Resilient Signatures
Sebastian Faust, Eike Kiltz, Krzysztof Pietrzak, Guy Rothblum
2009/281
Enabling Public Verifiability and Data Dynamics for Storage Security
Qian Wang, Cong Wang, Jin Li, Kui Ren, Wenjing Lou
2009/280
Universally Anonymous IBE based on the Quadratic Residuosity Assumption
Giuseppe Ateniese, Paolo Gasti
2009/279
Algebraic Side-Channel Attacks
Mathieu Renauld, Francois-Xavier Standaert
2009/278
Towards Electrical, Integrated Implementations of SIMPL Systems
Ulrich Rührmair, Qingqing Chen, Paolo Lugli, Ulf Schlichtmann, Martin Stutzmann, György Csaba
2009/277
On the Foundations of Physical Unclonable Functions
Ulrich Rührmair, Jan Sölter, Frank Sehnke
2009/276
Multi-core Implementation of the Tate Pairing over Supersingular Elliptic Curves
Jean-Luc Beuchat, Emmanuel López-Trejo, Luis Martínez-Ramos, Shigeo Mitsunari, Francisco Rodríguez-Henríquez
2009/275
Algebraic Attacks specialized to \(\mathbb{F}_2\) (Diplomarbeit)
Thomas Dullien
2009/274
A Collision-resistance Hash Function DIHA2
Xigen. Yao
2009/273
Universally Composable and Statistically Secure Verifiable Secret Sharing Scheme Based on Pre-Distributed Data
Rafael Dowsley, Jörn Müller-Quade, Akira Otsuka, Goichiro Hanaoka, Hideki Imai, Anderson C. A. Nascimento
2009/272
A Conjecture on Binary String and Its Applications on Constructing Boolean Functions of Optimal Algebraic Immunity
Ziran Tu, Yingpu Deng
2009/271
Reducing the Ciphertext Size of Dolev-Dwork-Naor like Public Key Cryptosystems
Rafael Dowsley, Goichiro Hanaoka, Hideki Imai, Anderson C. A. Nascimento
2009/270
Information-Theoretically Secure Oblivious Polynomial Evaluation in the Commodity-Based Model
Rafael Tonicelli, Rafael Dowsley, Goichiro Hanaoka, Hideki Imai, Jörn Müller-Quade, Akira Otsuka, Anderson C. A. Nascimento
2009/269
Side-channel attacks based on linear approximations
Thomas Roche, Cédric Tavernier
2009/268
Dealer-Free Dynamic Secret Sharing Schemes with Unconditional Security
Mehrdad Nojoumian, Douglas R. Stinson
2009/267
Simulation based security in the applied pi calculus
Stéphanie Delaune, Steve Kremer, Olivier Pereira
2009/266
Pseudorandomness Analysis of the Lai-Massey Scheme
Yiyuan Luo, Xuejia Lai, Zheng Gong, Zhongming Wu
2009/265
Revisiting the Indifferentiability of PGV Hash Functions
Yiyuan Luo, Zheng Gong, Ming Duan, Bo Zhu, Xuejia Lai
2009/264
Proposal of PPS Multivariate Public Key Cryptosystems
Shigeo Tsujii, Kohtaro Tadaki, Masahito Gotaishi, Ryo Fujita, Masao Kasahara
2009/263
General Error Decodable Secret Sharing Scheme and Its Application
Kaoru Kurosawa
2009/262
Computationally Secure Two-Round Authenticated Message Exchange
Klaas Ole Kuertz, Henning Schnoor, Thomas Wilke
2009/261
Security of Cyclic Double Block Length Hash Functions including Abreast-DM
Ewan Fleischmann, Michael Gorski, Stefan Lucks
2009/260
A Study on RAM Requirements of Various SHA-3 Candidates on Low-cost 8-bit CPUs
Kota Ideguchi, Toru Owada, Hirotaka Yoshida
2009/259
Differential Path for SHA-1 with complexity $O(2^{52})$
Cameron McDonald, Philip Hawkes, Josef Pieprzyk
2009/258
FACTORIZATION WITH GENUS 2 CURVES
Romain COSSET
2009/257
FORMAT CONTROLLING ENCRYPTION USING DATATYPE PRESERVING ENCRYPTION
Ulf T. Mattsson
2009/256
Multiple Linear Cryptanalysis of Reduced-Round SMS4 Block Cipher
Zhiqiang Liu, Dawu Gu, Jing Zhang
2009/255
SIMPL Systems: On a Public Key Variant of Physical Unclonable Functions
Ulrich Rührmair
2009/254
Improvement of One Quantum Encryption Scheme
Zhengjun Cao
2009/253
Formally and Practically Relating the CK, CK-HMQV, and eCK Security Models for Authenticated Key Exchange
Cas J. F. Cremers
2009/252
Sparse Boolean equations and circuit lattices
Igor Semaev
2009/251
Format-Preserving Encryption
Mihir Bellare, Thomas Ristenpart, Phillip Rogaway, Till Stegers
2009/250
Modifications in the Design of Trivium to Increase its Security Level
Mehreen Afzal, Ashraf Masood
2009/249
Symbolic Encryption with Pseudorandom Keys
Daniele Micciancio
2009/248
Cryptanalysis of the MST_3 Public Key Cryptosystem
Simon R. Blackburn, Carlos Cid, Ciaran Mullan
2009/247
On the Necessary and Sufficient Assumptions for UC Computation
Ivan Damgård, Jesper Buus Nielsen, Claudio Orlandi
2009/246
On-Chip Electric Waves: An Analog Circuit Approach to Physical Uncloneable Functions
György Csaba, Xueming Ju, Qingqing Chen, Wolfgang Porod, Jürgen Schmidhuber, Ulf Schlichtmann, Paolo Lugli, Ulrich Rührmair
2009/245
Cryptanalysis of the Birational Permutation Signature Scheme over a Non-commutative Ring
Naoki Ogura, Shigenori Uchiyama
2009/244
Tardos Fingerprinting Codes in the Combined Digit Model
Boris Skoric, Stefan Katzenbeisser, Hans Georg Schaathun, Mehmet U. Celik
2009/243
Faster Pairings on Special Weierstrass Curves
Craig Costello, Huseyin Hisil, Colin Boyd, Juan Manuel Gonzalez Nieto, Kenneth Koon-Ho Wong
2009/242
Examples of differential multicollisions for 13 and 14 rounds of AES-256
Alex Biryukov, Dmitry Khovratovich, Ivica Nikolić
2009/241
Distinguisher and Related-Key Attack on the Full AES-256 (Extended Version)
Alex Biryukov, Dmitry Khovratovich, Ivica Nikolić
2009/240
Group Testing and Batch Verification
Gregory M. Zaverucha, Douglas R. Stinson
2009/239
Protecting the NOEKEON Cipher Against SCARE Attacks in FPGAs by using Dynamic Implementations
Julien Bringer, Herve Chabanne, Jean-Luc Danger
2009/238
Attacks on Round-Reduced BLAKE
LI Ji, XU Liangyu
2009/237
Remarks on One Arbitrated Quantum-signature Scheme
Zhengjun Cao
2009/236
Elliptic curves with weak coverings over cubic extensions of finite fields with odd characteristics
Fumiyuki Momose, Jinhui Chao
2009/235
Breaking and Fixing of an Identity Based Multi-Signcryption Scheme
S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Rangan
2009/234
On the Randomness and Regularity of Reduced EDON-$\mathcal{R}$ Compression Function
Rune Steinsmo Ødegård, Danilo Gligoroski
2009/233
A strategy for recovering roots of bivariate polynomials modulo a prime
Paula Bustillo, Domingo Gomez, Jaime Gutierrez, Alvar Ibeas
2009/232
MeshHash2
Björn Fay
2009/231
Practical DPA Attacks on MDPL
Elke De Mulder, Benedikt Gierlichs, Bart Preneel, Ingrid Verbauwhede
2009/230
Adaptively Secure Broadcast
Martin Hirt, Vassilis Zikas
2009/229
Hardware Implementations of a Variant of the Zémor-Tillich Hash Function: Can a Provably Secure Hash Function be very efficient ?
Giacomo de Meulenaer, Christophe Petit, Jean-Jacques Quisquater
2009/228
Revisiting Higher-Order DPA Attacks: Multivariate Mutual Information Analysis
Benedikt Gierlichs, Lejla Batina, Bart Preneel, Ingrid Verbauwhede
2009/227
Computational soundness, co-induction, and encryption cycles
Daniele Micciancio
2009/226
How to Hash into Elliptic Curves
Thomas Icart
2009/225
The Security of Abreast-DM in the Ideal Cipher Model
Jooyoung Lee, Daesung Kwon
2009/224
Pseudo-Cryptanalysis of Luffa
Keting Jia, Yvo Desmedt, Lidong Han, Xiaoyun Wang
2009/223
How To Find Weak Input Differences For MD5 Collision Attacks
Tao Xie, Dengguo Feng
2009/222
PET SNAKE: A Special Purpose Architecture to Implement an Algebraic Attack in Hardware
Willi Geiselmann, Kenneth Matheis, Rainer Steinwandt
2009/221
Boneh-Boyen signatures and the Strong Diffie-Hellman problem
David Jao, Kayo Yoshida
2009/220
Signature Schemes with Bounded Leakage Resilience
Jonathan Katz
2009/219
Strongly Secure Certificateless Key Agreement
Georg Lippold, Colin Boyd, Juan González Nieto
2009/218
Efficient FPGA Implementations of High-Dimensional Cube Testers on the Stream Cipher Grain-128
Jean-Philippe Aumasson, Itai Dinur, Luca Henzen, Willi Meier, Adi Shamir
2009/217
Pseudo-Random Functions and Parallelizable Modes of Operations of a Block Cipher
Palash Sarkar
2009/216
Tweakable Enciphering Schemes Using Only the Encryption Function of a Block Cipher
Palash Sarkar
2009/215
A Simple and Generic Construction of Authenticated Encryption With Associated Data
Palash Sarkar
2009/214
An Optimally Fair Coin Toss
Tal Moran, Moni Naor, Gil Segev
2009/213
Elliptic Curves in Montgomery Form with B=1 and Their Low Order Torsion
Richard Moloney, Gary McGuire, Michael Markowitz
2009/212
A Flyweight RFID Authentication Protocol
Mike Burmester, Jorge Munilla
2009/211
Bringing Zero-Knowledge Proofs of Knowledge to Practice
Endre Bangerter, Stefania Barzan, Stephan Krenn, Ahmad-Reza Sadeghi, Thomas Schneider, Joe-Kai Tsay
2009/210
Sufficient conditions for sound tree and sequential hashing modes
Guido Bertoni, Joan Daemen, Michael Peeters, Gilles Van Assche
2009/209
On Directed Transitive Signature
Jia Xu, Ee-Chien Chang, Jianying Zhou
2009/208
PUBLIC KEY CRYPTOGRAPHY USING PERMUTATION P-POLYNOMIALS OVER FINITE FIELDS
Rajesh P Singh, B. K. Sarma, A. Saikia
2009/207
Unconditionally Secure Social Secret Sharing Scheme
Mehrdad Nojoumian, Douglas R. Stinson, Morgan Grainger
2009/206
On Optimized FPGA Implementations of the SHA-3 Candidate Groestl
Bernhard Jungk, Steffen Reith, Juergen Apfelbeck
2009/205
Related Message Attacks to Public Key Encryption Schemes: Relations among Security Notions
Maria Isabel Gonzalez Vasco, Angel L. Perez del Pozo
2009/204
GUC-Secure Join Operator in Distributed Relational Database
TIAN Yuan
2009/203
Practical Cryptanalysis of ISO/IEC 9796-2 and EMV Signatures
Jean-Sebastien Coron, David Naccache, Mehdi Tibouchi, Ralf-Philipp Weinmann
2009/202
A GENERALIZED FRAMEWORK FOR CRISP COMMITMENT SCHEMES
Alawi A. Al-Saggaf, Acharya H. S.
2009/201
Enhanced Cryptanalysis of Substitution Cipher Chaining mode (SCC-128)
Mohamed Abo El-Fotouh, Klaus Diepold
2009/200
A Survey on the Evolution of Cryptographic Protocols in ePassports
Rishab Nithyanand
2009/199
Indifferentiability with Distinguishers: Why Shabal\Does Not Require Ideal Ciphers
Emmanuel Bresson, Anne Canteaut, Benoit Chevallier-Mames, Christophe Clavier, Thomas Fuhr, Aline Gouget, Thomas Icart, Jean-Francois Misarsky, Maria Naya-Plasencia, Pascal Paillier, Thomas Pornin, Jean-Rene Reinhard, Celine Thuillet, Marion Videau
2009/198
DAA: Fixing the pairing based protocols
L Chen, P. Morrissey, N. P. Smart
2009/197
Practical pseudo-collisions for hash functions ARIRANG-224/384
Jian Guo, Krystian Matusiewicz, Lars R. Knudsen, San Ling, Huaxiong Wang
2009/196
Analysis of one quantum bit string commitment
Zhengjun Cao
2009/195
Secure Evaluation of Private Linear Branching Programs with Medical Applications
Mauro Barni, Pierluigi Failla, Vladimir Kolesnikov, Riccardo Lazzeretti, Ahmad-Reza Sadeghi, Thomas Schneider
2009/194
Analysis and Enhance of Anonymous Signcryption Scheme
Mingwu Zhang, Yusheng Zhong, Pengcheng Li, Bo Yang
2009/193
Generalization of Barreto et al ID based Signcryption Scheme
Sunder Lal, Prashant Kushwah
2009/192
Linkability of Blind Signature Schemes over Braid Groups
Manoj Kumar
2009/191
New logic minimization techniques with applications to cryptology.
Joan Boyar, Rene Peralta
2009/190
The discrete logarithm problem in the group of non-singular circulant matrices
Ayan Mahalanobis
2009/189
Efficient Unidirectional Proxy Re-Encryption
Sherman S. M. Chow, Jian Weng, Yanjiang Yang, Robert H. Deng
2009/188
Breaking and Building of Group Inside Signature
S. Sree Vivek, S. Sharmila Deva Selvi, S. Gopinath, C. Pandu Rangan
2009/187
Compact McEliece Keys from Goppa Codes
Rafael Misoczki, Paulo S. L. M. Barreto
2009/186
Statistics of Random Permutations and the Cryptanalysis of Periodic Block Ciphers
Nicolas T. Courtois, Gregory V. Bard, Shaun V. Ault
2009/185
All-or-Nothing Transforms as a Countermeasure to Differential Side-Channel Analysis
Robert P. McEvoy, Michael Tunstall, Claire Whelan, Colin C. Murphy, William P. Marnane
2009/184
Cryptanalysis of Dynamic SHA(2)
Jean-Philippe Aumasson, Orr Dunkelman, Sebastiaan Indesteege, Bart Preneel
2009/183
Proactive Linear Integer Secret Sharing
Rune Thorbek
2009/182
Extended Substitution Cipher Chaining mode (ESCC)
Mohamed Abo El-Fotouh, Klaus Diepold
2009/181
PSP: Private and Secure Payment with RFID
Erik-Oliver Blass, Anil Kurmus, Refik Molva, Thorsten Strufe
2009/180
Collaborative, Privacy-Preserving Data Aggregation at Scale
Haakon Ringberg, Benny Applebaum, Michael J. Freedman, Matthew Caesar, Jennifer Rexford
2009/179
Near-Collision Attack on the Compression Function of Dynamic SHA2
Hongbo Yu, Xiaoyun Wang
2009/178
Cryptographic Properties and Application of a Generalized Unbalanced Feistel Network Structure (Revised Version)
Jiali Choy, Guanhan Chew, Khoongming Khoo, Huihui Yap
2009/177
Salvaging Merkle-Damgard for Practical Applications
Yevgeniy Dodis, Thomas Ristenpart, Thomas Shrimpton
2009/176
A novel multi-server authentication protocol
Yalin Chen, Chun-Hui Huang, Jue-Sam Chou
2009/175
Concrete Security for Entity Recognition: The Jane Doe Protocol (Full Paper)
Stefan Lucks, Erik Zenner, Andre Weimerskirch, Dirk Westhoff
2009/174
Making the Diffie-Hellman Protocol Identity-Based
Dario Fiore, Rosario Gennaro
2009/173
Fast Multibase Methods and Other Several Optimizations for Elliptic Curve Scalar Multiplication
Patrick Longa, Catherine Gebotys
2009/172
A new Protocol for 1-2 Oblivious Transfer
Bjoern Grohmann
2009/171
On the Theory and Practice of Personal Digital Signatures
Ivan Damgård, Gert Læssøe Mikkelsen
2009/170
Analysis of Property-Preservation Capabilities of the ROX and ESh Hash Domain Extenders
Mohammad Reza Reyhanitabar, Willy Susilo, Yi Mu
2009/169
Floating Fault analysis of Trivium under Weaker Assumptions
Hu Yupu, Gao Juntao, Liu Qing
2009/168
A Second Pre-image Attack Against Elliptic Curve Only Hash (ECOH)
Michael A. Halcrow, Niels Ferguson
2009/167
A new approach for FCSRs
François Arnault, Thierry Berger, Cédric Lauradoux, Marine Minier, Benjamin Pousse
2009/166
I shall love you up to the death
Valerie Nachef, Jacques Patarin
2009/165
Securing RSA against Fault Analysis by Double Addition Chain Exponentiation
Matthieu Rivain
2009/164
CCA-Secure Proxy Re-Encryption without Pairings
Jun Shao, Zhenfu Cao
2009/163
A New Key-Agreement-Protocol
Bjoern Grohmann
2009/162
Certificateless Hybrid Signcryption
Fagen Li, Masaaki Shirase, Tsuyoshi Takagi
2009/161
Built-in Determined Sub-key Correlation Power Analysis
Yuichi Komano, Hideo Shimizu, Shinichi Kawamura
2009/160
Leakage-Resilient Public-Key Cryptography in the Bounded-Retrieval Model
Joel Alwen, Yevgeniy Dodis, Daniel Wichs
2009/159
Hardware Implementation of the SHA-3 Candidate Skein
Stefan Tillich
2009/158
Security Analysis of a Proxy Signature Scheme over Braid Groups
Manoj Kumar
2009/157
Efficient Halving for Genus 3 Curves over Binary Fields
Peter Birkner, Nicolas Thériault
2009/156
A Deterministic Approach of Merging of Blocks in Transversal Design based Key Predistribution
Anupam Pattanayak, B. Majhi
2009/155
Faster Computation of the Tate Pairing
Christophe Arene, Tanja Lange, Michael Naehrig, Christophe Ritzenthaler
2009/154
Algorithms to solve massively under-defined systems of multivariate quadratic equations
Yasufumi Hashimoto
2009/153
A new bound for t−wise almost universal hash functions
Long Hoang Nguyen, A. W. Roscoe
2009/152
FaceTrust: Assessing the Credibility of Online Personas via Social Networks
Michael Sirivianos
2009/151
Euclid's Algorithm, Guass' Elimination and Buchberger's Algorithm
Shaohua Zhang
2009/150
Efficient group authentication protocols based on human interaction
Long Hoang Nguyen, A. W. Roscoe
2009/149
Secure EPC Gen2 compliant Radio Frequency Identification
Mike Burmester, Breno de Medeiros, Jorge Munilla, Alberto Peinado
2009/148
Secret Handshake: Strong Anonymity Definition and Construction
Yutaka Kawai, Kazuki Yoneyama, Kazuo Ohta
2009/147
Preimage Attack on ARIRANG
Deukjo Hong, Woo-Hwan Kim, Bonwook Koo
2009/146
Transferable Constant-Size Fair E-Cash
Georg Fuchsbauer, David Pointcheval, Damien Vergnaud
2009/145
Security of Permutation-based Compression Function lp 231
Jooyoung Lee, Daesung Kwon
2009/144
On the security of Identity Based Ring Signcryption Schemes
S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Rangan
2009/143
Multiple and Unlinkable Public Key Encryption without Certificates
Soyoung Park, Sang-Ho Lee, Joohan Lee
2009/142
Chosen-ciphertext Secure Encryption from Hard Algebraic Set Systems
Ronald Cramer, Dennis Hofheinz, Eike Kiltz
2009/141
Ideal Hierarchical Secret Sharing Schemes
Oriol Farras, Carles Padro
2009/140
The Analysis of Galois Substitution Counter Mode (GSCM)
Mohamed Abo El-Fotouh, Klaus Diepold
2009/139
Certificateless Group Oriented Signature Secure Against Key Replacement Attack
Chunbo Ma, Jun Ao
2009/138
A Hybrid RFID Protocol against Tracking Attacks
Jen-Chun Chang, Hsin-Lung Wu
2009/137
The Dark Side of Security by Obscurity and Cloning MiFare Classic Rail and Building Passes Anywhere, Anytime
Nicolas T. Courtois
2009/136
How to Extract and Expand Randomness: A Summary and Explanation of Existing Results
Yvonne Cliff, Colin Boyd, Juan Gonzalez Nieto
2009/135
Practical Key Recovery Attack against Secret-prefix Edon-R
Gaëtan Leurent
2009/134
A First Order Recursive Construction of Boolean Function with Optimum Algebraic Immunity
Yindong Chen, Peizhong Lu
2009/133
Signature Schemes with Bounded Leakage Resilience
Jonathan Katz
2009/132
A New Lattice for Implicit Factoring
Yanbin Pan, Yingpu Deng
2009/131
Key Predistribution Schemes in Distributed Wireless Sensor Network using Combinatorial Designs Revisited
Anupam Pattanayak, B. Majhi
2009/130
Constructions of Even-variable Boolean Function with Optimum Algebraic Immunity
Yindong Chen, Peizhong Lu
2009/129
Faster and Timing-Attack Resistant AES-GCM
Emilia Kasper, Peter Schwabe
2009/128
Attacks on a Lightweight Cipher Based on a Multiple Recursive Generator
Lu Xiao, Gregory G. Rose
2009/127
Side Channel Cube Attacks on Block Ciphers
Itai Dinur, Adi Shamir
2009/126
Threshold Attribute-Based Signatures and Their Application to Anonymous Credential Systems
Siamak F Shahandashti, Reihaneh Safavi-Naini
2009/125
A Full Key Recovery Attack on HMAC-AURORA-512
Yu Sasaki
2009/124
Practical Secure Evaluation of Semi-Private Functions
Annika Paus, Ahmad-Reza Sadeghi, Thomas Schneider
2009/123
On the Complexity of Integer Factorization
N. A. Carella
2009/122
Hardware Accelerator for the Tate Pairing in Characteristic Three Based on Karatsuba-Ofman Multipliers
Jean-Luc Beuchat, Jérémie Detrey, Nicolas Estibals, Eiji Okamoto, Francisco Rodríguez-Henríquez
2009/121
Optimized Public Key Infrastructure -- A PKI to Support Efficient Document's Signatures
Martín Augusto Gagliotti Vigil, Ricardo Felipe Custódio, Nelson da Silva, Ricardo Moraes
2009/120
On the Complexity of Khovratovich et.al's Preimage Attack on Edon-R
Danilo Gligoroski, Rune Steinsmo Ødegård
2009/119
A Continuous Fault Countermeasure for AES Providing a Constant Error Detection Rate
Marcel Medwed
2009/118
A2BE: Accountable Attribute-Based Encryption for Abuse Free Access Control
Jin Li, Kui Ren, Kwangjo Kim
2009/117
Changing probabilities of differentials and linear sums via isomorphisms of ciphers
Alexander Rostovtsev
2009/116
Information Theoretically Secure Multi Party Set Intersection Re-Visited
Arpita Patra, Ashish Choudhary, C. Pandu Rangan
2009/115
Scalable Compilers for Group Key Establishment : Two/Three Party to Group
S. Sree Vivek, S. Sharmila Deva Selvi, Deepanshu Shukla, C. Pandu Rangan
2009/114
Weakness of Key Predistribution Scheme Proposed by J. Dong et al.
Anupam Pattanayak, B. Majhi
2009/113
Attacks on AURORA-512 and the Double-Mix Merkle-Damgaard Transform
Niels Ferguson, Stefan Lucks
2009/112
A 2nd-Preimage Attack on AURORA-512
Yu Sasaki
2009/111
Short Chosen-Prefix Collisions for MD5 and the Creation of a Rogue CA Certificate
Marc Stevens, Alexander Sotirov, Jacob Appelbaum, Arjen Lenstra, David Molnar, Dag Arne Osvik, Benne de Weger
2009/110
On the Security of Stream Cipher CryptMT v3
Haina Zhang, Xiaoyun Wang
2009/109
Cryptanalysis of Stream Cipher Grain Family
Haina Zhang, Xiaoyun Wang
2009/108
Further Results on Implicit Factoring in Polynomial Time
Santanu Sarkar, Subhamoy Maitra
2009/107
Compact E-Cash and Simulatable VRFs Revisited
Mira Belenkiy, Melissa Chase, Markulf Kohlweiss, Anna Lysyanskaya
2009/106
A Collision Attack on AURORA-512
Yu Sasaki
2009/105
Public-Key Cryptosystems Resilient to Key Leakage
Moni Naor, Gil Segev
2009/104
1024 - A High Security Software Oriented Block Cipher
Dieter Schmidt
2009/103
Constructing pairing-friendly hyperelliptic curves using Weil restriction
David Mandell Freeman, Takakazu Satoh
2009/102
A Step Towards QC Blind Signatures
Raphael Overbeck
2009/101
Encryption Schemes Secure under Selective Opening Attack
Mihir Bellare, Scott Yilek
2009/100
Computing the endomorphism ring of an ordinary elliptic curve over a finite field
Gaetan Bisson, Andrew V. Sutherland
2009/099
A Single Initialization Server for Multi-Party Cryptography
Hugue Blier, Alain Tapp
2009/098
Attacking Cryptographic Schemes Based on "Perturbation Polynomials"
Martin Albrecht, Craig Gentry, Shai Halevi, Jonathan Katz
2009/097
Identification of Multiple Invalid Signatures in Pairing-based Batched Signatures
Brian J. Matt
2009/096
A note on the security of MST3
M. I. Gonzalez Vasco, A. L. Perez del Pozo, P. Taborda Duarte
2009/095
Enhanced Privacy ID from Bilinear Pairing
Ernie Brickell, Jiangtao Li
2009/094
On the Lower Bounds of the Second Order Nonlinearity of some Boolean Functions
Sugata Gangopadhyay, Sumanta Sarkar, Ruchi Telang
2009/093
Cascade Encryption Revisited
Peter Gazi, Ueli Maurer
2009/092
Reducing RFID Reader Load with the Meet-in-the-Middle Strategy
Jung Hee Cheon, Jeongdae Hong, Gene Tsudik
2009/091
Knapsack Cryptosystem on Elliptic Curves
Koichiro Noro, Kunikatsu Kobayashi
2009/090
A Brief History of Provably-Secure Public-Key Encryption
Alexander W. Dent
2009/089
A Provably Secure And Efficient Countermeasure Against Timing Attacks
Boris Köpf, Markus Dürmuth
2009/088
Lossy Encryption: Constructions from General Assumptions and Efficient Selective Opening Chosen Ciphertext Security
Brett Hemenway, Benoit Libert, Rafail Ostrovsky, Damien Vergnaud
2009/087
Unconditionally Secure Asynchronous Multiparty Computation with Quadratic Communication Per Multiplication Gate
Arpita Patra, Ashish Choudhary, C. Pandu Rangan
2009/086
Point Compression for Koblitz Elliptic Curves
P. N. J. Eagle, Steven D. Galbraith, John Ong
2009/085
UC-Secure Source Routing Protocol
Tao Feng, Xian Guo, Jianfeng Ma, Xinghua Li
2009/084
Simulation without the Artificial Abort: Simplified Proof and Improved Concrete Security for Waters' IBE Scheme
Mihir Bellare, Thomas Ristenpart
2009/083
Multi-authority attribute based encryption with honest-but-curious central authority
Vladimir Bozovic, Daniel Socek, Rainer Steinwandt, Viktoria I. Villanyi
2009/082
The Case for Quantum Key Distribution
Douglas Stebila, Michele Mosca, Norbert Lütkenhaus
2009/081
Ensuring Data Storage Security in Cloud Computing
Cong Wang, Qian Wang, Kui Ren, Wenjing Lou
2009/080
CoSP: A General Framework For Computational Soundness Proofs
Michael Backes, Dennis Hofheinz, Dominique Unruh
2009/079
From Dolev-Yao to Strong Adaptive Corruption: Analyzing Security in the Presence of Compromising Adversaries
David Basin, Cas Cremers
2009/078
Attacks on the DECT authentication mechanisms
Stefan Lucks, Andreas Schuler, Erik Tews, Ralf-Philipp Weinmann, Matthias Wenzel
2009/077
On the Security of Iterated Hashing based on Forgery-resistant Compression Functions
Charles Bouillaguet, Orr Dunkelman, Pierre-Alain Fouque, Antoine Joux
2009/076
Construction of large families of pseudorandom subsets using elliptic curves
Zhixiong Chen, Chenhuang Wu
2009/075
Security of Practical Cryptosystems Using Merkle-Damgard Hash Function in the Ideal Cipher Model
Yusuke Naito, Kazuki Yoneyama, Lei Wang, Kazuo Ohta
2009/074
Computational Oblivious Transfer and Interactive Hashing
Kirill Morozov, George Savvides
2009/073
Automatic Approach of Provable Security and its Application for OAEP+
GU Chun-Xiang, Guang Yan, ZHU Yue-Fei
2009/072
Implementing cryptographic pairings: a magma tutorial
Luis J Dominguez Perez, Ezekiel J Kachisa, Michael Scott
2009/071
Secret sharing on trees: problem solved
Laszlo Csirmaz, Gabor Tardos
2009/070
Low Complexity Cubing and Cube Root Computation over $\F_{3^m}$ in Polynomial Basis
Omran Ahmadi, Francisco Rodríguez-Henriquez
2009/069
Optimistic Fair Exchange with Multiple Arbiters
Alptekin Kupcu, Anna Lysyanskaya
2009/068
Overview of Turbo-Code Reconstruction Techniques
Johann Barbier, Eric Filiol
2009/067
On fractional correlation immunity of majority functions
Chuan-Kun Wu
2009/066
Adaptive Preimage Resistance and Permutation-based Hash Functions
Jooyoung Lee, Je Hong Park
2009/065
Foundations of Non-Malleable Hash and One-Way Functions
Alexandra Boldyreva, David Cash, Marc Fischlin, Bogdan Warinschi
2009/064
On the Data Complexity of Statistical Attacks Against Block Ciphers (full version)
Céline Blondeau, Benoît Gérard
2009/063
CCZ-equivalence and Boolean functions
Lilya Budaghyan, Claude Carlet
2009/062
On Deterministic Polynomial-Time Equivalence of Computing the CRT-RSA Secret Keys and Factoring
Subhamoy Maitra, Santanu Sarkar
2009/061
Security Enhancement of Various MPKCs by 2-layer Nonlinear Piece In Hand Method
Shigeo Tsujii, Kohtaro Tadaki, Ryou Fujita, Masahito Gotaishi, Toshinobu Kaneko
2009/060
Comparing Two Pairing-Based Aggregate Signature Schemes
Sanjit Chatterjee, Darrel Hankerson, Edward Knapp, Alfred Menezes
2009/059
On the impossibility of graph secret sharing
Laszlo Csirmaz
2009/058
On Generalization of Cheon's Algorithm
Takakazu Satoh
2009/057
Anonymity in Shared Symmetric Key Primitives
Gregory M. Zaverucha, Douglas R. Stinson
2009/056
Designing an ASIP for Cryptographic Pairings over Barreto-Naehrig Curves
David Kammler, Diandian Zhang, Peter Schwabe, Hanno Scharwaechter, Markus Langenberg, Dominik Auras, Gerd Ascheid, Rainer Leupers, Rudolf Mathar, Heinrich Meyr
2009/055
Universally Composable Symmetric Encryption
Ralf Kuesters, Max Tuengerthal
2009/054
On the Security of Tandem-DM
Ewan Fleischmann, Michael Gorski, Stefan Lucks
2009/053
New commutative semifields defined by PN multinomials
Lilya Budaghyan, Tor Helleseth
2009/052
ON THE SECURITY OF TWO RING SIGNCRYPTION SCHEMES
S. Sree Vivek, S. Sharmila Deva Selvi, C. Pandu Rangan
2009/051
Enhanced Target Collision Resistant Hash Functions Revisited
Mohammad Reza Reyhanitabar, Willy Susilo, Yi Mu
2009/050
On the Portability of Generalized Schnorr Proofs
Jan Camenisch, Aggelos Kiayias, Moti Yung
2009/049
Extensions of the Cube Attack based on Low Degree Annihilators
Aileen Zhang, Chu-Wee Lim, Khoongming Khoo, Wei Lei, Josef Pieprzyk
2009/048
A Trade-Off Between Collision Probability and Key Size in Universal Hashing Using Polynomials
Palash Sarkar
2009/047
On Approximating Addition by Exclusive OR
Palash Sarkar
2009/046
Traceability Codes
Simon R. Blackburn, Tuvi Etzion, Siaw-Lynn Ng
2009/045
Efficient Protocols for Set Intersection and Pattern Matching with Security Against Malicious and Covert Adversaries
Carmit Hazay, Yehuda Lindell
2009/044
Un-Trusted-HB: Security Vulnerabilities of Trusted-HB
Dmitry Frumkin, Adi Shamir
2009/043
Image Encryption by Pixel Property Separation
Karthik Chandrashekar Iyer, Aravinda Subramanya
2009/042
On CCZ-equivalence and its use in secondary constructions of bent functions
Lilya Budaghyan, Claude Carlet
2009/041
Proofs of Retrievability via Hardness Amplification
Yevgeniy Dodis, Salil Vadhan, Daniel Wichs
2009/040
How to Prove the Security of Practical Cryptosystems with Merkle-Damgård Hashing by Adopting Indifferentiability
Yusuke Naito, Kazuki Yoneyama, Lei Wang, Kazuo Ohta
2009/039
Key Insulation and Intrusion Resilience Over a Public Channel
Mihir Bellare, Shanshan Duan, Adriana Palacio
2009/038
On Algebraic Relations of Serpent S-Boxes
Bhupendra Singh, Lexy Alexander, Sanjay Burman
2009/037
Common Modulus Attacks on Small Private Exponent RSA and Some Fast Variants (in Practice)
M. Jason Hinek, Charles C. Y. Lam
2009/036
Constructions of Truly Practical Secure Protocols using Standard Smartcards
Carmit Hazay, Yehuda Lindell
2009/035
Key-Exposure Free Chameleon Hashing and Signatures Based on Discrete Logarithm Systems
Xiaofeng Chen, Fangguo Zhang, Haibo Tian, Baodian Wei, Kwangjo Kim
2009/034
On a Conditional Collision Attack on NaSHA-512
S. Markovski, A. Mileva, V. Dimitrova, D. Gligoroski
2009/033
NESHA-256, NEw 256-bit Secure Hash Algorithm (Extended Abstract)
Yaser Esmaeili Salehani, Amir Tabatabaei, Mohammad Reza Sohizadeh Abyaneh, Mehdi Mohammad Hassanzadeh
2009/032
A Fast Implementation of $\eta_T$ Pairing in Characteristic Three on Intel Core 2 Duo Processor
MITSUNARI Shigeo
2009/031
Adaptively Secure Two-Party Computation with Erasures
Yehuda Lindell
2009/030
An efficient fuzzy extractor for limited noise
B. Skoric, P. Tuyls
2009/029
Nofish - A new stream cipher
Marius Oliver Gheorghita
2009/028
Realizing Hash-and-Sign Signatures under Standard Assumptions
Susan Hohenberger, Brent Waters
2009/027
Security of Verifiably Encrypted Signatures
Markus Rückert, Dominique Schröder
2009/026
Collision Attacks on NaSHA-384/512
Zhimin Li, Licheng Wang, Daofeng Li, Yixian Yang
2009/025
Short Redactable Signatures Using Random Trees
Ee-Chien Chang, Chee Liang Lim, Jia Xu
2009/024
On Second-Order Fault Analysis Resistance for CRT-RSA Implementations
Emmanuelle Dottax, Christophe Giraud, Matthieu Rivain, Yannick Sierra
2009/023
Polynomial Runtime and Composability
Dennis Hofheinz, Dominique Unruh, Jörn Müller-Quade
2009/022
Correctness of Li Generalization of RSA Cryptosystem
Roman Popovych
2009/021
Comparing With RSA
Julien Cathalo, David Naccache, Jean-Jacques Quisquater
2009/020
Applying Time-Memory-Data Trade-Off to Meet-in-the-Middle Attack
Jiali Choy, Khoongming Khoo, Chuan-Wen Loe
2009/019
Communication-Efficient Private Protocols for Longest Common Subsequence
Matthew Franklin, Mark Gondree, Payman Mohassel
2009/018
Huge 2ndpreimages and collisions of khichidi-1
prasanth Kumar Thandra, S. A. V. Satya Murty
2009/017
Anonymous signature scheme
Chunbo Ma, Jun Ao
2009/016
Fast elliptic-curve cryptography on the Cell Broadband Engine
Neil Costigan, Peter Schwabe
2009/015
Cube Attacks on Trivium
S S Bedi, N Rajesh Pillai
2009/014
Key Predistribution Techniques for Grid-Based Wireless Sensor Networks
Simon R. Blackburn, Tuvi Etzion, Keith M. Martin, Maura B. Paterson
2009/013
Comparison-Based Key Exchange and the Security of the Numeric Comparison Mode in Bluetooth v2.1
Yehuda Lindell
2009/012
Avoid Mask Re-use in Masked Galois Multipliers
D. Canright
2009/011
A Very Compact "Perfectly Masked" S-Box for AES (corrected)
D. Canright, Lejla Batina
2009/010
Optimal Multicast Group Communication
Zhibin Zhou, Dijiang Huang
2009/009
Hybrid-Secure MPC: Trading Information-Theoretic Robustness for Computational Privacy
Christoph Lucas, Dominik Raub, Ueli Maurer
2009/008
A note on Agrawal conjecture
Roman Popovych
2009/007
Homomorphic Trapdoor Commitments to Group Elements
Jens Groth
2009/006
Huge Multicollisions and Multipreimages of Hash Functions BLENDER-n
Vlastimil Klima
2009/005
Impossible Differential Cryptanalysis of Pelican, MT-MAC-AES and PC-MAC-AES
Wei Wang, Xiaoyun Wang, Guangwu Xu
2009/004
On Stateless Schemes for Message Authentication Using Pseudorandom Functions
Palash Sarkar
2009/003
Separating two roles of hashing in one-way message authentication
L. H. Nguyen, A. W. Roscoe
2009/002
Thermocommunication
Julien Brouchier, Nora Dabbous, Tom Kean, Carol Marsh, David Naccache
2009/001
A Hardware Analysis of Twisted Edwards Curves for an Elliptic Curve Cryptosystem
Brian Baldwin, Richard Moloney, Andrew Byrne, Gary McGuire, William P. Marnane
2008/545
Resolving the Simultaneous Resettability Conjecture and a New Non-Black-Box Simulation Strategy
Vipul Goyal, Amit Sahai
2008/544
Comments on two multi-server authentication protocols
Yalin Chen, Chun-Hui Huang, Jue-Sam Chou
2008/543
Odd-Char Multivariate Hidden Field Equations
Chia-Hsin Owen Chen, Ming-Shing Chen, Jintai Ding, Fabian Werner, Bo-Yin Yang
2008/542
Distinguishing Attack and Second-Preimage Attack on the CBC-like MACs
Keting Jia, Xiaoyun Wang, Zheng Yuan, Guangwu Xu
2008/541
Resettably-Sound Resettable Zero Knowledge Arguments for NP
Yi Deng
2008/540
New Impossible Differential Attacks on AES
Jiqiang Lu, Orr Dunkelman, Nathan Keller, Jongsung Kim
2008/539
An Accumulator Based on Bilinear Maps and Efficient Revocation for Anonymous Credentials
Jan Camenisch, Markulf Kohlweiss, Claudio Soriente
2008/538
Supporting Non-membership Proofs with Bilinear-map Accumulators
Ivan Damgård, Nikos Triandopoulos
2008/537
A Secure Threshold Anonymous Password-Authenticated Key Exchange Protocol
SeongHan Shin, Kazukuni Kobara, Hideki Imai
2008/536
Predicate Privacy in Encryption Systems
Emily Shen, Elaine Shi, Brent Waters
2008/535
A Recursive Threshold Visual Cryptography Scheme
Abhishek Parakh, Subhash Kak
2008/534
Somewhat Non-Committing Encryption and Efficient Adaptively Secure Oblivious Transfer
Juan A. Garay, Daniel Wichs, Hong-Sheng Zhou
2008/533
Collusion-Free Multiparty Computation in the Mediated Model
Jonathan Katz, Yehuda Lindell
2008/532
Semi-free start collision attack on Blender
Xu Liangyu, Li Ji
2008/531
Collision Attack on the Waterfall Hash Function
Scott Fluhrer
2008/530
Fast hashing to G2 on pairing friendly curves
Michael Scott, Naomi Benger, Manuel Charlemagne, Luis J. Dominguez Perez, Ezekiel J. Kachisa
2008/529
A Hardware Interface for Hashing Algorithms
Zhimin Chen, Sergey Morozov, Patrick Schaumont
2008/528
Encrypting Proofs on Pairings and Its Application to Anonymity for Signatures
Georg Fuchsbauer, David Pointcheval
2008/527
Properties of Cryptographic Hash Functions
Michal Rjaško
2008/526
Novel Precomputation Schemes for Elliptic Curve Cryptosystems
Patrick Longa, Catherine Gebotys
2008/525
On The Diffie-Hellman Assumption
R. Bhaskar, K. Chandrasekaran, S. Lokam, P. L. Montgomery, R. Venkatesan, Y. Yacobi
2008/524
Round-Optimal Zero-Knowledge Proofs of Knowledge for NP
Li Hongda, Feng dengguo, Li Bao, Xue Haixia
2008/523
Privacy Preserving Multiset Union with ElGamal Encryption
Jeongdae Hong, Jung Woo Kim, Jihye Kim, Kunsoo Park, Jung Hee Cheon
2008/522
Twisted Edwards Curves Revisited
Huseyin Hisil, Kenneth Koon-Ho Wong, Gary Carter, Ed Dawson
2008/521
Generating Shorter Bases for Hard Random Lattices
Joel Alwen, Chris Peikert
2008/520
Cryptanalysis of the Hash Function LUX-256
Shuang Wu, Dengguo Feng, Wenling Wu
2008/519
Collision attack on NaSHA-512
Li Ji, Xu Liangyu, Guan Xu
2008/518
A NEW HASH ALGORITHM$:$ Khichidi$-$1
Natarajan Vijayarangan
2008/517
Improving the Rules of the DPA Contest
Francois-Xavier Standaert, Philippe Bulens, Giacomo de Meulenaer, Nicolas Veyrat-Charvillon
2008/516
Distinguishing and Forgery Attacks on Alred and Its AES-based Instance Alpha-MAC
Zheng Yuan, Keting Jia, Wei Wang, Xiaoyun Wang
2008/515
Cryptanalysis of RadioGatun
Thomas Fuhr, Thomas Peyrin
2008/514
Noncommutative Polly Cracker-type cryptosystems and chosen-ciphertext security
Tapan Rai, Stanislav Bulygin
2008/513
Improved Cryptanalysis of SHAMATA-BC
Adem Atalay, Orhun Kara, Ferhat Karakoç
2008/512
A new class of Bent functions in Polynomial Forms
Sihem Mesnager
2008/511
Classification of the SHA-3 Candidates
Ewan Fleischmann, Christian Forler, Michael Gorski
2008/510
Reconstructing RSA Private Keys from Random Key Bits
Nadia Heninger, Hovav Shacham
2008/509
Chosen-Ciphertext Secure Proxy Re-Encryption without Pairings
Jian Weng, Robert H. Deng, Shengli Liu, Kefei Chen, Junzuo Lai, Xuan Wang
2008/508
Some Formal Solutions in Side-channel Cryptanalysis - An Introduction
Fabrice J. P. R. Pautot
2008/507
A non-delegatable identity-based strong designated verifier signature scheme
Bin Wang
2008/506
Unconditionally Secure Message Transmission in Arbitrary Directed Synchronous Networks Tolerating Generalized Mixed Adversary
Kannan Srinathan, Arpita Patra, Ashish Choudhary, C. Pandu Rangan
2008/505
--Withdrawn--
removed
2008/504
The $n^c$-Unique Shortest Vector Problem is Hard
Vadim Lyubashevsky
2008/503
Non-Malleable Extractors and Symmetric Key Cryptography from Weak Secrets
Yevgeniy Dodis, Daniel Wichs
2008/502
Extended Access Structures and Their Cryptographic Applications
Vanesa Daza, Javier Herranz, Paz Morillo, Carla Rafols
2008/501
Some Observations on SHAMATA
Ewan Fleischmann, Michael Gorski
2008/500
Strongly Secure Authenticated Key Exchange Protocol Based on Computational Diffie-Hellman Problem
Hai Huang, Zhenfu Cao
2008/499
Some Observations on HC-128
Subhamoy Maitra, Goutam Paul, Shashwat Raizada
2008/498
Small Odd Prime Field Multivariate PKCs
Anna Chen, Ming-Shing Chen, Tien-Ren Chen, Chen-Mou Cheng, Jintai Ding, Eric Kuo, Frost Li, Bo-Yin Yang
2008/497
On the Correctness of An Approach Against Side-channel attacks
Peng Wang, Dengguo Feng, Wenling Wu, Liting Zhang
2008/496
Constructing Variable-Length PRPs and SPRPs from Fixed-Length PRPs
Debra L. Cook, Moti Yung, Angelos Keromytis
2008/495
Non-Malleable Obfuscation
Ran Canetti, Mayank Varia
2008/494
Key Agreement from Close Secrets over Unsecured Channels
Bhavana Kanukurthi, Leonid Reyzin
2008/493
Secure Parameters for SWIFFT
Johannes Buchmann, Richard Lindner
2008/492
Modeling Computational Security in Long-Lived Systems, Version 2
Ran Canetti, Ling Cheung, Dilsun Kaynar, Nancy Lynch, Olivier Pereira
2008/491
A CM construction for curves of genus 2 with p-rank 1
Laura Hitt O'Connor, Gary McGuire, Michael Naehrig, Marco Streng
2008/490
On the final exponentiation for calculating pairings on ordinary elliptic curves
Michael Scott, Naomi Benger, Manuel Charlemagne, Luis J. Dominguez Perez, Ezekiel J. Kachisa
2008/489
HAIL: A High-Availability and Integrity Layer for Cloud Storage
Kevin D. Bowers, Ari Juels, Alina Oprea
2008/488
Efficient Rational Secret Sharing in Standard Communication Networks
Georg Fuchsbauer, Jonathan Katz, David Naccache
2008/487
Secure Certificateless Public Key Encryption without Redundancy
Yinxia Sun, Futai Zhang
2008/486
Inside the Hypercube
Jean-Philippe Aumasson, Eric Brier, Willi Meier, María Naya-Plasencia, Thomas Peyrin
2008/485
Fast Point Multiplication Formulae on Elliptic Curves of Weierstrass Form
Rongquan Feng, Zilong Wang, Hongfeng Wu
2008/484
Sharp lower bounds on the extractable randomness from non-uniform sources
Boris Skoric, Chibuzo Obi, Evgeny Verbitskiy, Berry Schoenmakers
2008/483
Sharing DSS by the Chinese Remainder Theorem
Kamer Kaya, Ali Aydın Selçuk
2008/482
The Generic Hardness of Subset Membership Problems under the Factoring Assumption
Tibor Jager, Jörg Schwenk
2008/481
Public-Key Cryptosystems from the Worst-Case Shortest Vector Problem
Chris Peikert
2008/480
ECM on Graphics Cards
Daniel J. Bernstein, Tien-Ren Chen, Chen-Mou Cheng, Tanja Lange, Bo-Yin Yang
2008/479
Formal Proof of Relative Strengths of Security between ECK2007 Model and other Proof Models for Key Agreement Protocols
Jinyue Xia, Jiandong Wang, Liming Fang, Yongjun Ren, Shizhu Bian
2008/478
Attribute-Based Encryption with Key Cloning Protection
M. J. Hinek, S. Jiang, R. Safavi-Naini, S. F. Shahandashti
2008/477
On a New Formal Proof Model for RFID Location Privacy (Extended Version)
Ton van Deursen, Sasa Radomirovic
2008/476
The $F_f$-Family of Protocols for RFID-Privacy and Authentication
Erik-Oliver Blass, Anil Kurmus, Refik Molva, Guevara Noubir, Abdullatif Shikfa
2008/475
Sphinx: A Compact and Provably Secure Mix Format
George Danezis, Ian Goldberg
2008/474
Access Controls for Oblivious and Anonymous Systems
Scott Coull, Matthew Green, Susan Hohenberger
2008/473
Exploring Cipherspace: Combining stream ciphers and block ciphers
Sandy Harris
2008/472
Practical attacks against WEP and WPA
Martin Beck, Erik Tews
2008/471
Automatic Generation of Sound Zero-Knowledge Protocols
Endre Bangerter, Jan Camenisch, Stephan Krenn, Ahmad-Reza Sadeghi, Thomas Schneider
2008/470
From Weaknesses to Secret Disclosure in a Recent Ultra-Lightweight RFID Authentication Protocol
Paolo D'Arco, Alfredo De Santis
2008/469
Classification and Generation of Disturbance Vectors for Collision Attacks against SHA-1
Stephane Manuel
2008/468
A CCA2 Secure Variant of the McEliece Cryptosystem
Nico Döttling, Rafael Dowsley, Jörn Müller-Quade, Anderson C. A. Nascimento
2008/467
Cryptanalysis of EnRUPT
Dmitry Khovratovich, Ivica Nikolic
2008/466
Combined (identity-based) public key schemes
Maria Isabel Gonzalez Vasco, Florian Hess, Rainer Steinwandt
2008/465
Secure Arithmetic Computation with No Honest Majority
Yuval Ishai, Manoj Prabhakaran, Amit Sahai
2008/464
Vortex: A New Family of One Way Hash Functions based on Rijndael Rounds and Carry-less Multiplication
Michael Kounavis, Shay Gueron
2008/463
Key-Private Proxy Re-Encryption
Giuseppe Ateniese, Karyn Benson, Susan Hohenberger
2008/462
Unconditionally Secure Multiparty Set Intersection Re-Visited
Arpita Patra, Ashish Choudhary, C. Pandu Rangan
2008/461
On Communication Complexity of Perfectly Reliable and Secure Communication in Directed Networks
Arpita Patra, Ashish Choudhary, Kannan Srinathan, C. Pandu Rangan
2008/460
Various Security Analysis of a pfCM-MD Hash Domain Extension and Applications based on the Extension
Donghoon Chang, Seokhie Hong, Jaechul Sung, Sangjin Lee
2008/459
A variant of Wiener's attack on RSA
Andrej Dujella
2008/458
Complete Fairness in Multi-Party Computation Without an Honest Majority
S. Dov Gordon, Jonathan Katz
2008/457
On the Composability of Statistically Secure Bit Commitments
Rafael Dowsley, Jeroen van de Graaf, Jörn Müller-Quade, Anderson C. A. Nascimento
2008/456
The Diffie-Hellman problem and generalization of Verheul's theorem
Dustin Moody
2008/455
New hash function designs
Igor Semaev
2008/454
Complexity of Multiparty Computation Problems: The Case of 2-Party Symmetric Secure Function Evaluation
Hemanta K. Maji, Manoj Prabhakaran, Mike Rosulek
2008/453
Generalized Universal Circuits for Secure Evaluation of Private Functions with Application to Data Classification
Ahmad-Reza Sadeghi, Thomas Schneider
2008/452
Injective Trapdoor Functions are Necessary and Sufficient for CCA2 Secure Public-Key Cryptosystems
Rui Xue, Dengguo Feng
2008/451
Algebraic Cryptanalysis of MQQ Public Key Cryptosystem by MutantXL
Mohamed Saied Emam Mohamed, Jintai Ding, Johannes Buchmann
2008/450
On the Security of Fully Collusion Resistant Traitor Tracing Schemes
Yongdong WU, Robert H. Deng
2008/449
A New Variant of the Cramer-Shoup KEM Secure against Chosen Ciphertext Attack
Joonsang Baek, Willy Susilo, Joseph K. Liu, Jianying Zhou
2008/448
Authenticated Adversarial Routing
Yair Amir, Paul Bunn, Rafail Ostrovsky
2008/447
Divisible On-line/Off-line Signatures
Chong-zhi Gao, Baodian Wei, Dongqing Xie, Chunming Tang
2008/446
Secure Random Key Pre-Distribution Against Semi-Honest Adversaries
Mike Burmester, Reihaneh Safavi-Naini, Gelareh Taban
2008/445
Cryptanalysis of the Improved Cellular Message Encryption Algorithm
Thomas Chardin, Raphaël Marinier
2008/444
Elliptic divisibility sequences and the elliptic curve discrete logarithm problem
Rachel Shipsey, Christine Swart
2008/443
Key differentiation attacks on stream ciphers
Enes Pasalic
2008/442
Fast Arithmetic on ATmega128 for Elliptic Curve Cryptography
Anton Kargl, Stefan Pyka, Hermann Seuschek
2008/441
How Risky is the Random-Oracle Model?
Gaetan Leurent, Phong Q. Nguyen
2008/440
Robust Encryption
Michel Abdalla, Mihir Bellare, Gregory Neven
2008/439
Linear equivalence between elliptic curves in Weierstrass and Hesse form
Alexander Rostovtsev
2008/438
New Related-Key Boomerang Attacks on AES
Michael Gorski, Stefan Lucks
2008/437
Divisibility, Smoothness and Cryptographic Applications
David Naccache, Igor Shparlinski
2008/436
BGKM: An Efficient Secure Broadcasting Group Key Management Scheme
Zhibin Zhou, Dijiang Huang
2008/435
Obtaining and solving systems of equations in key variables only for the small variants of AES
Stanislav Bulygin, Michael Brickenstein
2008/434
The computational SLR: a logic for reasoning about computational indistinguishability
Yu Zhang
2008/433
On differences of quadratic residues
Guillermo Morales-Luna
2008/432
Dynamic Provable Data Possession
C. Chris Erway, Alptekin Kupcu, Charalampos Papamanthou, Roberto Tamassia
2008/431
Usable Optimistic Fair Exchange
Alptekin Kupcu, Anna Lysyanskaya
2008/430
Cryptographic Protocol Composition via the Authentication Tests
Joshua D. Guttman
2008/429
Public-Key Encryption with Efficient Amortized Updates
Nishanth Chandran, Rafail Ostrovsky, William E. Skeith III
2008/428
Delegatable Anonymous Credentials
Mira Belenkiy, Jan Camenisch, Melissa Chase, Markulf Kohlweiss, Anna Lysyanskaya, Hovav Shacham
2008/427
LEGO for Two Party Secure Computation
Jesper Buus Nielsen, Claudio Orlandi
2008/426
On Kasami Bent Functions
Deepmala Sharma, Sugata Gangopadhyay
2008/425
Efficient Asynchronous Multiparty Computation with Optimal Resilience
Arpita Patra, Ashish Choudhury, C. Pandu Rangan
2008/424
Asynchronous Byzantine Agreement with Optimal Resilience
Arpita Patra, Ashish Choudhury, C. Pandu Rangan
2008/423
Searchable encryption with decryption in the standard model
Dennis Hofheinz, Enav Weinreb
2008/422
A New Approach for Algebraically Homomorphic Encryption
Frederik Armknecht, Ahmad-Reza Sadeghi
2008/421
Truly Efficient 2-Round Perfectly Secure Message Transmission Scheme
Kaoru Kurosawa, Kazuhiro Suzuki
2008/420
Oblivious Transfer from Weak Noisy Channels
Jürg Wullschleger
2008/419
Parsing ambiguities in authentication and key establishment protocols
Liqun Chen, Chris J. Mitchell
2008/418
Privacy-Enhancing First-Price Auctions Using Rational Cryptography
Peter Bro Miltersen, Jesper Buus Nielsen, Nikos Triandopoulos
2008/417
On the security of pairing-friendly abelian varieties over non-prime fields
Naomi Benger, Manuel Charlemagne, David Freeman
2008/416
Almost-Asynchronous MPC with Faulty Minority
Zuzana Beerliova-Trubiniova, Martin Hirt, Jesper Buus Nielsen
2008/415
Asynchronous Multiparty Computation: Theory and Implementation
Ivan Damgård, Martin Geisler, Mikkel Krøigaard, Jesper Buus Nielsen
2008/414
On the Number of Synchronous Rounds Required for Byzantine Agreement
Matthias Fitzi, Jesper Buus Nielsen
2008/413
Password Mistyping in Two-Factor-Authenticated Key Exchange
Vladimir Kolesnikov, Charles Rackoff
2008/412
Key Predistribution for Homogeneous Wireless Sensor Networks with Group Deployment of Nodes
Keith M. Martin, Maura B. Paterson, Douglas R. Stinson
2008/411
Cryptanalysis of LU Decomposition-based Key Pre-distribution Scheme for Wireless Sensor Networks
Bo Zhu, Yanfei Zheng, Yaowei Zhou, Kefei Chen
2008/410
On the Role of PKG for Proxy Re-encryption in Identity Based Setting
Xu an Wang, Xiaoyuan Yang, Fagen Li
2008/409
A New $(k,n)$-Threshold Secret Sharing Scheme and Its Extension
Jun Kurihara, Shinsaku Kiyomoto, Kazuhide Fukushima, Toshiaki Tanaka
2008/408
The Enigmatique Toolkit
Christopher Billings
2008/407
Indifferentiable Security Analysis of choppfMD, chopMD, a chopMDP, chopWPH, chopNI, chopEMD, chopCS, and chopESh Hash Domain Extensions
Donghoon Chang, Jaechul Sung, Seokhie Hong, Sangjin Lee
2008/406
An asymptotically optimal RFID protocol against relay attacks
Gildas Avoine, Aslan Tchamkerten
2008/405
Slid Pairs in Salsa20 and Trivium
Deike Priemuth-Schmid, Alex Biryukov
2008/404
Pairing with Supersingular Trace Zero Varieties Revisited
Emanuele Cesena
2008/403
SPICE Simulation of a "Provably Secure" True Random Number Generator
Markus Dichtl, Bernd Meyer, Hermann Seuschek
2008/402
Algebraic Cryptanalysis of Curry and Flurry using Correlated Messages
Jean-Charles Faugère, Ludovic Perret
2008/401
Two New Efficient CCA-Secure Online Ciphers: MHCBC and MCBC
Mridul Nandi
2008/400
Comments on two password based protocols
Yalin Chen, Hung-Min Sun, Chun-Hui Huang, Jue-Sam Chou
2008/399
Round Efficient Unconditionally Secure Multiparty Computation Protocol
Arpita Patra, Ashish Choudhary, C. Pandu Rangan
2008/398
Generating genus two hyperelliptic curves over large characteristic finite fields
Takakazu Satoh
2008/397
A Framework for the Development Playfair Cipher Considering Probability of Occurrence of Characters in English Literature
Uttam Kr. Mondal, Satyendra Nath Mandal, J. PalChoudhury
2008/396
Analysis of RC4 and Proposal of Additional Layers for Better Security Margin
Subhamoy Maitra, Goutam Paul
2008/395
New Applications of Differential Bounds of the SDS Structure
Jiali Choy, Khoongming Khoo
2008/394
Attribute-Based Ring Signatures
Jin Li, Kwangjo Kim
2008/393
How Far Must You See To Hear Reliably
Pranav K Vasishta, Anuj Gupta, Prasant Gopal, Piyush Bansal, Rishabh Mukherjee, Poornima M, Kannan Srinathan, Kishore Kothapalli
2008/392
GUC-Secure Set-Intersection Computation
TIAN Yuan, WANG Ying
2008/391
Could The 1-MSB Input Difference Be The Fastest Collision Attack For MD5 ?
Tao Xie, FanBao Liu, DengGuo Feng
2008/390
Elliptic Curve Cryptography: The Serpentine Course of a Paradigm Shift
Ann Hibner Koblitz, Neal Koblitz, Alfred Menezes
2008/389
Optimal Subset-Difference Broadcast Encryption with Free Riders
Murat Ak, Kamer Kaya, Ali Aydin Selcuk
2008/388
Double-Base Number System for Multi-Scalar Multiplications
Christophe Doche, David R. Kohel, Francesco Sica
2008/387
--Withdrawn--
--withdrawn--
2008/386
Shared Key Encryption by the State Machine with Two-Dimensional Random Look-up Table
Michael Lifliand
2008/385
Cube Attacks on Tweakable Black Box Polynomials
Itai Dinur, Adi Shamir
2008/384
Improving the Boneh-Franklin Traitor Tracing Scheme
Pascal Junod, Alexandre Karlov, Arjen K. Lenstra
2008/383
Hierarchical Identity Based Encryption with Polynomially Many Levels
Craig Gentry, Shai Halevi
2008/382
Authenticated Wireless Roaming via Tunnels: Making Mobile Guests Feel at Home
Mark Manulis, Damien Leroy, Francois Koeune, Olivier Bonaventure, Jean-Jacques Quisquater
2008/381
New AES software speed records
Daniel J. Bernstein, Peter Schwabe
2008/380
Dynamic Threshold Cryptosystem without Group Manager
Andreas Noack, Stefan Spitz
2008/379
A Characterization of Chameleon Hash Functions and New, Efficient Designs
Mihir Bellare, Todor Ristov
2008/378
Additively Homomorphic Encryption with d-Operand Multiplications
Carlos Aguilar Melchor, Philippe Gaborit, Javier Herranz
2008/377
TRIVIUM's output partially autocancels
Michael Vielhaber
2008/376
Session-state Reveal is stronger than Ephemeral Key Reveal: Attacking the NAXOS Authenticated Key Exchange protocol
Cas J. F. Cremers
2008/375
A public key encryption scheme secure against key dependent chosen plaintext and adaptive chosen ciphertext attacks
Jan Camenisch, Nishanth Chandran, Victor Shoup
2008/374
Chosen Ciphertext Security with Optimal Ciphertext Overhead
Masayuki Abe, Eike Kiltz, Tatsuaki Okamoto
2008/373
Analysis and Improvement of Authenticatable Ring Signcryption Scheme
Fagen Li, Masaaki Shirase, Tsuyoshi Takagi
2008/372
Enumeration of Balanced Symmetric Functions over GF(p)
Shaojing Fu, Chao Li, Longjiang Qu, Ping Li
2008/371
Unconditionally Reliable Message Transmission in Directed Hypergraphs
Kannan Srinathan, Arpita Patra, Ashish Choudhary, C. Pandu Rangan
2008/370
Compartmented Threshold RSA Based on the Chinese Remainder Theorem
Sorin Iftene, Stefan Ciobaca, Manuela Grindei
2008/369
New Directions in Cryptanalysis of Self-Synchronizing Stream Ciphers
Shahram Khazaei, Willi Meier
2008/368
Side Channel Attack Resistant Implementation of Multi-Power RSA using Hensel Lifting
Varad Kirtane, C. Pandu Rangan
2008/367
Threshold Homomorphic Encryption in the Universally Composable Cryptographic Library
Peeter Laud, Long Ngo
2008/366
Unique Shortest Vector Problem for max norm is NP-hard
Than Quang Khoat, Nguyen Hong Tan
2008/365
Entropy Bounds for Traffic Confirmation
Luke O'Connor
2008/364
Zcipher Algorithm Specification
Ilya O Levin
2008/363
An argument for Hamiltonicity
Vadym Fedyukovych
2008/362
The Cost of False Alarms in Hellman and Rainbow Tradeoffs
Jin Hong
2008/361
IEEE P1363.1 Draft 10: Draft Standard for Public Key Cryptographic Techniques Based on Hard Problems over Lattices.
William Whyte, Nick Howgrave-Graham, Jeff Hoffstein, Jill Pipher, Joseph H. Silverman, Phil Hirschhorn
2008/360
An Approach to ensure Information Security through 252-Bit Integrated Encryption System (IES)
Saurabh Dutta, Jyotsna Kumar mandal
2008/359
Argument of knowledge of a bounded error
Vadym Fedyukovych
2008/358
History-Independent Cuckoo Hashing
Moni Naor, Gil Segev, Udi Wieder
2008/357
A protocol for K-multiple substring matching
Vadym Fedyukovych, Vitaliy Sharapov
2008/356
Using Commutative Encryption to Share a Secret
Saied Hosseini Khayat
2008/355
An argument for rank metric
Vadym Fedyukovych
2008/354
On DDos Attack against Proxy in Re-encryption and Re-signature
Xu an Wang
2008/353
Weaknesses in HENKOS Stream Cipher
Prasanth Kumar Thandra, S. A. V. Satya Murty, R Balasubramanian
2008/352
On Notions of Security for Deterministic Encryption, and Efficient Constructions without Random Oracles
Alexandra Boldyreva, Serge Fehr, Adam O'Neill
2008/351
Flaws in Some Self-Healing Key Distribution Schemes with Revocation
Vanesa Daza, Javier Herranz, German Saez
2008/350
Higher Order Differential Cryptanalysis of Multivariate Hash Functions
Yiyuan Luo, Xuejia Lai
2008/349
Time-Area Optimized Public-Key Engines: MQ-Cryptosystems as Replacement for Elliptic Curves?
Andrey Bogdanov, Thomas Eisenbarth, Andy Rupp, Christopher Wolf
2008/348
Iterative Probabilistic Reconstruction of RC4 Internal States
Jovan Golic, Guglielmo Morgari
2008/347
Information Leakage in Optimal Anonymized and Diversified Data
Chengfang Fang, Ee-Chien Chang
2008/346
Remote Integrity Check with Dishonest Storage Server
Ee-Chien Chang, Jia Xu
2008/345
An Efficient Authenticated Key Exchange Protocol with a Tight Security Reduction
Jooyoung Lee, Choon Sik Park
2008/344
Authenticated Key Exchange Secure under the Computational Diffie-Hellman Assumption
Jooyoung Lee, Je Hong Park
2008/343
Efficient RFID authentication protocols based on pseudorandom sequence generators
Jooyoung Lee, Yongjin Yeom
2008/342
Cryptanalysis of Li et al.'s Identity-Based Threshold Signcryption Scheme
S. Sharmila Deva Selvi, S. Sree Vivek, Neha Jain, Pandu Rangan Chandrasekaran
2008/341
An Efficient Identity-Based Signcryption Scheme for Multiple Receivers
S. Sharmila Deva Selvi, S. Sree Vivek, Rahul Srinivasan, Pandu Rangan Chandrasekaran
2008/340
On construction of signature schemes based on birational permutations over noncommutative rings
Yasufumi Hashimoto, Kouichi Sakurai
2008/339
High Performance Implementation of a Public Key Block Cipher - MQQ, for FPGA Platforms
Mohamed El-Hadedy, Danilo Gligoroski, Svein J. Knapskog
2008/338
An improvement of discrete Tardos fingerprinting codes
Koji Nuida, Satoshi Fujitsu, Manabu Hagiwara, Takashi Kitagawa, Hajime Watanabe, Kazuto Ogawa, Hideki Imai
2008/337
Modified Huang-Wang's Convertible Nominative Signature Scheme
Wei Zhao, Dingfeng Ye
2008/336
New attacks on ISO key establishment protocols
Anish Mathuria, G. Sriram
2008/335
Public Key Cryptography from Different Assumptions
Boaz Barak, Avi Wigderson
2008/334
Analyzing the Galbraith-Lin-Scott Point Multiplication Method for Elliptic Curves over Binary Fields
Darrel Hankerson, Koray Karabina, Alfred Menezes
2008/333
Explicit hard instances of the shortest vector problem
Johannes Buchmann, Richard Lindner, Markus Rückert, Michael Schneider
2008/332
Efficient Key Distribution Schemes for Large Scale Mobile Computing Applications
Mahalingam Ramkumar
2008/331
A Secure Remote User Authentication Scheme with Smart Cards
Manoj Kumar
2008/330
Chosen ciphertext secure public key encryption under DDH assumption with short ciphertext
Xianhui Lu, Xuejia Lai, Dake He
2008/329
SMS4 Encryption Algorithm for Wireless Networks
Whitfield Diffie, George Ledin (translators)
2008/328
Attribute-Based Signatures: Achieving Attribute-Privacy and Collusion-Resistance
Hemanta Maji, Manoj Prabhakaran, Mike Rosulek
2008/327
Blind HIBE and its Applications to Identity-Based Blind Signature and Blind Decryption
Le Trieu Phong, Wakaha Ogata
2008/326
Two attacks on a sensor network key distribution scheme of Cheng and Agrawal
M. B. Paterson, D. R. Stinson
2008/325
Revisit of Group-based Unidirectional Proxy Re-encryption Scheme
Chunbo Ma, Jun Ao
2008/324
RSA-TBOS Signcryption with Proxy Re-encryption.
Varad Kirtane, C. Pandu Rangan
2008/323
A new identity based proxy signature scheme
Bin Wang
2008/322
Lattice-based Blind Signatures
Markus Rückert
2008/321
A correction to ``Efficient and Secure Comparison for On-Line Auctions''
Ivan Damgård, Martin Geisler, Mikkel Krøigaard
2008/320
Public Key Block Cipher Based on Multivariate Quadratic Quasigroups
Danilo Gligoroski, Smile Markovski, Svein J. Knapskog
2008/319
Yet Another Secure Distance-Bounding Protocol
Ventzislav Nikov, Marc Vauclair
2008/318
Attacking and defending the McEliece cryptosystem
Daniel J. Bernstein, Tanja Lange, Christiane Peters
2008/317
Elliptic Curves Scalar Multiplication Combining Multi-base Number Representation with Point halving
Abdulwahed M. Ismail, Mohamad Rushdan
2008/316
Signing a Linear Subspace: Signature Schemes for Network Coding
Dan Boneh, David Freeman, Jonathan Katz, Brent Waters
2008/315
RSA Cryptanalysis with Increased Bounds on the Secret Exponent using Less Lattice Dimension
Santanu Sarkar, Subhamoy Maitra, Sumanta Sarkar
2008/314
Scratch, Click & Vote: E2E voting over the Internet
Miroslaw Kutylowski, Filip Zagorski
2008/313
A new almost perfect nonlinear function which is not quadratic
Yves Edel, Alexander Pott
2008/312
Improved efficiency of Kiltz07-KEM
Xianhui Lu, Xuejia Lai, Dake He
2008/311
Treatment of the Initial Value in Time-Memory-Data Tradeoff Attacks on Stream Ciphers
Orr Dunkelman, Nathan Keller
2008/310
Attacks on RFID Protocols
T. van Deursen, S. Radomirovic
2008/309
Revocation Systems with Very Small Private Keys
Allison Lewko, Amit Sahai, Brent Waters
2008/308
Strongly-Resilient and Non-Interactive Hierarchical Key-Agreement in MANETs
Rosario Gennaro, Shai Halevi, Hugo Krawczyk, Tal Rabin, Steffen Reidt, Stephen D. Wolthusen
2008/307
Full Security:Fuzzy Identity Based Encryption
Liming Fang, Jinyue Xia
2008/306
Combinatorial batch codes
M. B. Paterson, D. R. Stinson, R. Wei
2008/305
Identity-Based Directed Signature Scheme from Bilinear Pairings
Xun Sun, Jian-hua Li, Gong-liang Chen, Shu-tang Yang
2008/304
A New Randomness Extraction Paradigm for Hybrid Encryption
Eike Kiltz, Krzysztof Pietrzak, Martijn Stam, Moti Yung
2008/303
Complete Fairness in Secure Two-Party Computation
S. Dov Gordon, Carmit Hazay, Jonathan Katz, Yehuda Lindell
2008/302
Secure Biometric Authentication With Improved Accuracy
M. Barbosa, S. Cauchie, T. Brouard, S. Melo de Sousa
2008/301
Accountability of Perfect Concurrent Signature
Yunfeng Li, Dake He, Xianhui Lu
2008/300
Cheon's algorithm, pairing inversion and the discrete logarithm problem
David J. Mireles Morales
2008/299
An analysis of the infrastructure in real function fields
David J. Mireles Morales
2008/298
Nonlinear Piece In Hand Perturbation Vector Method for Enhancing Security of Multivariate Public Key Cryptosystems
Ryou Fujita, Kohtaro Tadaki, Shigeo Tsujii
2008/297
Attack on Kang et al.'s Identity-Based Strong Designated Verifier Signature Scheme
Hongzhen Du, Qiaoyan Wen
2008/296
Cryptanalysis of Short Exponent RSA with Primes Sharing Least Significant Bits
Hung-Min Sun, Mu-En Wu, Ron Steinfeld, Jian Guo, Huaxiong Wang
2008/295
Foundations of Group Key Management – Framework, Security Model and a Generic Construction
Naga Naresh Karuturi, Ragavendran Gopalakrishnan, Rahul Srinivasan, Pandu Rangan Chandrasekaran
2008/294
A New Message Recognition Protocol for Ad Hoc Pervasive Networks
Atefeh Mashatan, Douglas R. Stinson
2008/293
Maximizing data survival in Unattended Wireless Sensor Networks against a focused mobile adversary
Roberto Di Pietro, Luigi V. Mancini, Claudio Soriente, Angelo Spognardi, Gene Tsudik
2008/292
Another approach to pairing computation in Edwards coordinates
Sorina Ionica, Antoine Joux
2008/291
How to Protect Yourself without Perfect Shredding
Ran Canetti, Dror Eiger, Shafi Goldwasser, Dah-Yoh Lim
2008/290
Ciphertext-Policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realization
Brent Waters
2008/289
Sharemind: a framework for fast privacy-preserving computations
Dan Bogdanov, Sven Laur, Jan Willemson
2008/288
How to Launch A Birthday Attack Against DES
Zhengjun Cao
2008/287
Authenticated Byzantine Generals in Dual Failure Model
Anuj Gupta, Prasant Gopal, Piyush Bansal, Kannan Srinathan
2008/286
One-Up Problem for (EC)DSA
Daniel R. L. Brown
2008/285
Hybrid Binary-Ternary Joint Sparse Form and its Application in Elliptic Curve Cryptography
Jithra Adikari, Vassil Dimitrov, Laurent Imbert
2008/284
Breaking the Akiyama-Goto cryptosystem
P. Ivanov, J. F. Voloch
2008/283
Attacks on Singelee and Preneel's protocol
Jorge Munilla, Alberto Peinado
2008/282
Survival in the Wild: Robust Group Key Agreement in Wide-Area Networks
Jihye Kim, Gene Tsudik
2008/281
Linear and Differential Cryptanalysis of Reduced SMS4 Block Cipher
Taehyun Kim, Jongsung Kim, Seokhie Hong, Jaechul Sung
2008/280
FPGA and ASIC Implementations of the $\eta_T$ Pairing in Characteristic Three
Jean-Luc Beuchat, Hiroshi Doi, Kaoru Fujita, Atsuo Inomata, Piseth Ith, Akira Kanaoka, Masayoshi Katouno, Masahiro Mambo, Eiji Okamoto, Takeshi Okamoto, Takaaki Shiga, Masaaki Shirase, Ryuji Soga, Tsuyoshi Takagi, Ananda Vithanage, Hiroyasu Yamamoto
2008/279
Delegating Capabilities in Predicate Encryption Systems
Elaine Shi, Brent Waters
2008/278
An Improved Robust Fuzzy Extractor
Bhavana Kanukurthi, Leonid Reyzin
2008/277
A strategy for any DAA Issuer and an additional verification by a Host
Vadym Fedyukovych
2008/276
Signcryption with Proxy Re-encryption
Chandrasekar S., Ambika K., Pandu Rangan C.
2008/275
Certificate-Based Signature Schemes without Pairings or Random Oracles
Joseph K. Liu, Joonsang Baek, Willy Susilo, Jianying Zhou
2008/274
Twisted Ate Pairing on Hyperelliptic Curves and Applications
Fangguo Zhang
2008/273
White-Box Cryptography: Formal Notions and (Im)possibility Results
Amitabh Saxena, Brecht Wyseur, Bart Preneel
2008/272
A New Hash Family Obtained by Modifying the SHA-2 Family
Somitra Kumar Sanadhya, Palash Sarkar
2008/271
A Combinatorial Analysis of Recent Attacks on Step Reduced SHA-2 Family
Somitra Kumar Sanadhya, Palash Sarkar
2008/270
New Collision attacks Against Up To 24-step SHA-2
Somitra Kumar Sanadhya, Palash Sarkar
2008/269
Searching for Low Weight Codewords in Linear Binary Codes
Somitra Kumar Sanadhya, Palash Sarkar
2008/268
Adaptive Security in Broadcast Encryption Systems
Craig Gentry, Brent Waters
2008/267
Deterministic Encryption: Definitional Equivalences and Constructions without Random Oracles
Mihir Bellare, Marc Fischlin, Adam O'Neill, Thomas Ristenpart
2008/266
Information-Theoretically Secure Voting Without an Honest Majority
Anne Broadbent, Alain Tapp
2008/265
Efficient Hyperelliptic Arithmetic using Balanced Representation for Divisors
Steven D. Galbraith, Michael Harrison, David J. Mireles Morales
2008/264
Secure Computability of Functions in the IT setting with Dishonest Majority and Applications to Long-Term Security
Robin Künzler, Jörn Müller-Quade, Dominik Raub
2008/263
Slide Attacks on a Class of Hash Functions
Michael Gorski, Stefan Lucks, Thomas Peyrin
2008/262
Statistically Reliable and Secure Message Transmission in Directed Networks
Arpita Patra, Ashish Choudhury, C. Pandu Rangan
2008/261
The Hidden Root Problem
F. Vercauteren
2008/260
Breaking RSA Generically is Equivalent to Factoring
Divesh Aggarwal, Ueli Maurer
2008/259
2-Adic Complexity of a Sequence Obtained from a Periodic Binary Sequence by Either Inserting or Deleting k Symbols within One Period
ZHAO Lu, WEN Qiao-yan
2008/258
ON A CRYPTOGRAPHIC IDENTITY IN OSBORN LOOPS
JAIYEOLA Temitope Gbolahan, ADENIRAN John Olushola
2008/257
ON MIDDLE UNIVERSAL $m$-INVERSE QUASIGROUPS AND THEIR APPLICATIONS TO CRYPTOGRAPHY
JAIYEOLA Temitope Gbolahan
2008/256
ON MIDDLE UNIVERSAL WEAK AND CROSS INVERSE PROPERTY LOOPS WITH EQUAL LENGHT OF INVERES CYCLES
JAIYEOLA Temitope Gbolahan
2008/255
Embedding in Two Least Significant Bits with Wet Paper Coding
Xin Liao, Qiao-yan Wen
2008/254
An Efficient Identity-based Ring Signcryption Scheme
Zhenchao ZHU, Yuqing ZHANG, Fengjiao WANG
2008/253
Multi-Recipient Signcryption for Secure Wireless Group Communication
Yiliang Han, Xiaolin Gui, Xu'an Wang
2008/252
Provable Security of Digital Signatures in the Tamper-Proof Device Model
Nick Varnovsky
2008/251
Universally Composable Security Analysis of TLS---Secure Sessions with Handshake and Record Layer Protocols
Sebastian Gajek, Mark Manulis, Olivier Pereira, Ahmad-Reza Sadeghi, Jörg Schwenk
2008/250
Pairings on hyperelliptic curves with a real model
Steven Galbraith, Xibin Lin, David Mireles
2008/249
Construction of Resilient Functions with Multiple Cryptographic Criteria
Shaojing Fu, Chao Li, Bing sun
2008/248
Cryptanalysis of a client-to-client password-authenticated key agreement protocol
Fengjiao Wang, Yuqing Zhang
2008/247
Cryptanalysis of Bohio et al.'s ID-Based Broadcast Signcryption (IBBSC) Scheme for Wireless Ad-hoc Networks
S. Sharmila Deva Selvi, S. Sree Vivek, Naga Naresh Karuturi, Ragavendran Gopalakrishnan, Pandu Rangan Chandrasekaran
2008/246
The Random Oracle Model and the Ideal Cipher Model are Equivalent
Jean-Sebastien Coron, Jacques Patarin, Yannick Seurin
2008/245
Cryptanalysis of an Authentication Scheme Using Truncated Polynomials
Markus Grassl, Rainer Steinwandt
2008/244
New balanced Boolean functions satisfying all the main cryptographic criteria
Claude Carlet, Keqin Feng
2008/243
On the economic payoff of forensic systems when used to trace Counterfeited Software and content
Yacov Yacobi
2008/242
Enumeration of Homogeneous Rotation Symmetric functions over GF(p)
Shaojing Fu Chao Li Bing Sun
2008/241
Practical Attacks on HB and HB+ Protocols
Zbigniew Golebiewski, Krzysztof Majcher, Filip Zagorski, Marcin Zawada
2008/240
Leakage-Resilient Cryptography in the Standard Model
Stefan Dziembowski, Krzysztof Pietrzak
2008/239
Recognition in Ad Hoc Pervasive Networks
Atefeh Mashatan, Douglas R. Stinson
2008/238
On the Provable Security of Multi-Receiver Signcryption Schemes
S. Sharmila Deva Selvi, S. Sree Vivek, Ragavendran Gopalakrishnan, Naga Naresh Karuturi, C. Pandu Rangan
2008/237
Local Affinity Based Inversion of Filter Generators
O. A. Logachev, D. S. Nazarova
2008/236
A Modular Security Analysis of the TLS Handshake Protocol
P. Morrissey, N. P. Smart, B. Warinschi
2008/235
Constant-Round Concurrent Non-Malleable Commitments and Decommitments
Rafail Ostrovsky, Giuseppe Persiano, Ivan Visconti
2008/234
On the CCA1-Security of Elgamal and Damgård's Elgamal
Helger Lipmaa
2008/233
On Resettably-Sound Resttable Zero Knowledege Arguments
Yi Deng, Dongdai Lin
2008/232
Perfectly Secure Message Transmission Tolerating Mixed Adversary
Arpita Patra, Ashish Choudhury, Ashwinkumar B. V, Kannan Srinathan, C. Pandu Rangan
2008/231
A Novel Probabilistic Passive Attack on the Protocols HB and HB+
Jose Carrijo, Rafael Tonicelli, Hideki Imai, Anderson C. A. Nascimento
2008/230
A New Collision Differential For MD5 With Its Full Differential Path
Tao Xie, DengGuo Feng, FanBao Liu
2008/229
Identification and Privacy: Zero-Knowledge is not Enough
Julien Bringer, Herve Chabanne, Thomas Icart
2008/228
Revisiting Wiener's Attack -- New Weak Keys in RSA
Subhamoy Maitra, Santanu Sarkar
2008/227
New Impossible Differential Cryptanalysis of ARIA
Ruilin Li, Bing Sun, Peng Zhang, Chao Li
2008/226
Proxy Key Re-encapsulation Mechanism for Group Communications
Chunbo Ma, Jun Ao
2008/225
Provably Secure ID-Based Broadcast Signcryption (IBBSC) Scheme
S. Sharmila Deva Selvi, S. Sree Vivek, Ragavendran Gopalakrishnan, Naga Naresh Karuturi, C. Pandu Rangan
2008/224
An ID-based Authenticated Key Exchange Protocol Based on Bilinear Diffie-Hellman Problem
Hai Huang, Zhenfu Cao
2008/223
On the Security of a Visual Cryptography Scheme for Color Images
Bert W. Leung, Felix Y. Ng, Duncan S. Wong
2008/222
Encryption-On-Demand: Practical and Theoretical Considerations
Gideon Samid
2008/221
Efficient Conversion of Secret-shared Values Between Different Fields
Ivan Damgard, Rune Thorbek
2008/220
Essentially Optimal Universally Composable Oblivious Transfer
Ivan Damgård, Jesper Buus Nielsen, Claudio Orlandi
2008/219
Analysis and Details of the Random Cipher Output Mode Of Operation Primitives
Dan P. Milleville
2008/218
Efficient arithmetic on elliptic curves using a mixed Edwards-Montgomery representation
Wouter Castryck, Steven Galbraith, Reza Rezaeian Farashahi
2008/217
Oracle-Assisted Static Diffie-Hellman Is Easier Than Discrete Logarithms
Antoine Joux, Reynald Lercier, David Naccache, Emmanuel Thomé
2008/216
A New Multi-Linear Universal Hash Family
Palash Sarkar
2008/215
On Implementation of GHS Attack against Elliptic Curve Cryptosystems over Cubic Extension Fields of Odd Characteristics
Naoki Hashizume, Fumiyuki Momose, Jinhui Chao
2008/214
Multi-Factor Password-Authenticated Key Exchange
Douglas Stebila, Poornaprajna Udupi, Sheueling Chang
2008/213
The Multireceiver Commitment Schemes
Shuhong Wang
2008/212
Reducing the Complexity of the Weil Pairing Computation
Chang-An Zhao, Fangguo Zhang, Dongqing Xie
2008/211
Efficient Chosen Ciphertext Secure Public Key Encryption under the Computational Diffie-Hellman Assumption
Goichiro Hanaoka, Kaoru Kurosawa
2008/210
Complexity Analysis of a Fast Modular Multiexponentiation Algorithm
Haimin Jin, Duncan S. Wong, Yinlong Xu
2008/209
Computing Bilinear Pairings on Elliptic Curves with Automorphisms
Chang-An Zhao, Dongqing Xie, Fangguo Zhang, Jingwei Zhang, Bing-Long Chen
2008/208
Remarks on the Attack of Fouque et al. against the {\ell}IC Scheme
Naoki Ogura, Shigenori Uchiyama
2008/207
Efficient Receipt-Free Ballot Casting Resistant to Covert Channels
Ben Adida, C. Andrew Neff
2008/206
Partial Fairness in Secure Two-Party Computation
Dov Gordon, Jonathan Katz
2008/205
On Software Parallel Implementation of Cryptographic Pairings
Philipp Grabher, Johann Groszschaedl, Dan Page
2008/204
Cryptanalysis of the Cai-Cusick Lattice-based Public-key Cryptosystem
Yanbin Pan, Yingpu Deng
2008/203
Privacy-Preserving Matching of DNA Profiles
Fons Bruekers, Stefan Katzenbeisser, Klaus Kursawe, Pim Tuyls
2008/202
Polynomials for Ate Pairing and $\mathbf{Ate}_{i}$ Pairing
Zhitu Su, Hui Li, JianFeng Ma
2008/201
How To Ensure Forward and Backward Untraceability of RFID Identification Schemes By Using A Robust PRBG
J. Wu, D. R. Stinson
2008/200
On The Security of The ElGamal Encryption Scheme and Damgard’s Variant
J. Wu, D. R. Stinson
2008/199
Simultaneous field divisions: an extension of Montgomery's trick
David G. Harris
2008/198
Security needs in embedded systems
Anoop MS
2008/197
Secure Multiparty Computation for Privacy-Preserving Data Mining
Yehuda Lindell, Benny Pinkas
2008/196
A New Family of Perfect Nonlinear Binomials
Zhengbang Zha, Gohar M. Kyureghyan, Xueli Wang
2008/195
An Efficient and Provably-Secure Identity-based Signcryption Scheme for Multiple PKGs
Jin Zhengping, Zuo Huijuan, Du hongzhen, Wen Qiaoyan
2008/194
Endomorphisms for faster elliptic curve cryptography on a large class of curves
Steven D. Galbraith, Xibin Lin, Michael Scott
2008/193
A Tamper-Evident Voting Machine Resistant to Covert Channels
Wei Han, Tao Hao, Dong Zheng, Ke-fei Chen, Xiaofeng Chen
2008/192
Investigating the DPA-Resistance Property of Charge Recovery Logics
Amir Moradi, Mehrdad Khatir, Mahmoud Salmasizadeh, Mohammad T. Manzuri Shalmani
2008/191
None
--withdrawn--
2008/190
User-Sure-and-Safe Key Retrieval
Daniel R. L. Brown
2008/189
How to Build a Hash Function from any Collision-Resistant Function
Thomas Ristenpart, Thomas Shrimpton
2008/188
Information Leakage of Flip-Flops in DPA-Resistant Logic Styles
Amir Moradi, Thomas Eisenbarth, Axel Poschmann, Carsten Rolfes, Christof Paar, Mohammad T. Manzuri Shalmani, Mahmoud Salmasizadeh
2008/187
An Efficient and Provably Secure ID-Based Threshold Signcryption Scheme
Fagen Li, Yong Yu
2008/186
Privacy-Preserving Audit and Extraction of Digital Contents
Mehul A. Shah, Ram Swaminathan, Mary Baker
2008/185
A New Approach to Secure Logging
Di Ma, Gene Tsudik
2008/184
On the Secure Obfuscation of Deterministic Finite Automata
W. Erik Anderson
2008/183
Preimage Attacks on 3-Pass HAVAL and Step-Reduced MD5
Jean-Philippe Aumasson, Willi Meier, Florian Mendel
2008/182
Restricted Adaptive Oblivious Transfer
Javier Herranz
2008/181
Proofs of Knowledge with Several Challenge Values
Grzegorz Stachowiak
2008/180
Imaginary quadratic orders with given prime factor of class number
Alexander Rostovtsev
2008/179
An Efficient ID-based Ring Signature Scheme from Pairings
Chunxiang Gu, Yuefei Zhu
2008/178
Optimal Discretization for High-Entropy Graphical Passwords
Kemal Bicakci
2008/177
Algebraic Techniques in Differential Cryptanalysis
Martin Albrecht, Carlos Cid
2008/176
New construction of Boolean functions with maximun algebraic immunity
Wang yongjuan, Fan shuqin, Han wenbao
2008/175
Proofs of Retrievability: Theory and Implementation
Kevin D. Bowers, Ari Juels, Alina Oprea
2008/174
Non-Linear Reduced Round Attacks Against SHA-2 Hash family
Somitra Kumar Sanadhya, Palash Sarkar
2008/173
Full Cryptanalysis of LPS and Morgenstern Hash Function
Christophe Petit, Kristin Lauter, Jean-Jacques Quisquater
2008/172
The Round Complexity of Verifiable Secret Sharing Revisited
Arpita Patra, Ashish Choudhary, Tal Rabin, C. Pandu Rangan
2008/171
Binary Edwards Curves
Daniel J. Bernstein, Tanja Lange, Reza Rezaeian Farashahi
2008/170
Cryptanalysing the Critical Group: Efficiently Solving Biggs's Discrete Logarithm Problem
Simon R. Blackburn
2008/169
Understanding Phase Shifting Equivalent Keys and Exhaustive Search
Côme Berbain, Aline Gouget, Hervé Sibert
2008/168
Possibility and impossibility results for selective decommitments
Dennis Hofheinz
2008/167
Non-black-box Techniques Are Not Necessary for Constant Round Non-malleable Protocols
Omkant Pandey
2008/166
Algebraic Attacks on the Crypto-1 Stream Cipher in MiFare Classic and Oyster Cards
Nicolas T. Courtois, Karsten Nohl, Sean O'Neil
2008/165
Improved lower bound on the number of balanced symmetric functions over GF(p)
Pinhui Ke
2008/164
On the (Im)Possibility of Key Dependent Encryption
Iftach Haitner, Thomas Holenstein
2008/163
Universally Composable Adaptive Oblivious Transfer
Matthew Green, Susan Hohenberger
2008/162
Formally Bounding the Side-Channel Leakage in Unknown-Message Attacks
Michael Backes, Boris Köpf
2008/161
Modular polynomials for genus 2
Reinier Broker, Kristin Lauter
2008/160
A Proxy Signature Scheme over Braid Groups
Girraj Kumar Verma
2008/159
A non-interactive deniable authentication scheme based on designated verifier proofs
Bin Wang
2008/158
DISH: Distributed Self-Healing in Unattended Sensor Networks
Di Ma, Gene Tsudik
2008/157
Secure Online Elections in Practice
Lucie Langer, Axel Schmidt, Johannes Buchmann
2008/156
On Black-Box Ring Extraction and Integer Factorization
Kristina Altmann, Tibor Jager, Andy Rupp
2008/155
A Generalized Brezing-Weng Algorithm for Constructing Pairing-Friendly Ordinary Abelian Varieties
David Freeman
2008/154
The Walsh Spectrum of a New Family of APN Functions
Yue Zhou, Chao Li
2008/153
Redundant $\tau$-adic Expansions II: Non-Optimality and Chaotic Behaviour
Clemens Heuberger
2008/152
Computational soundness of symbolic zero-knowledge proofs
Michael Backes, Dominique Unruh
2008/151
Impossible Differential Cryptanalysis of CLEFIA
Bing Sun, Ruilin Li, Mian Wang, Ping Li, Chao Li
2008/150
Robust Combiners for Software Hardening
Amir Herzberg, Haya Shulman
2008/149
Toy Factoring by Newton's Method
Daniel R. L. Brown
2008/148
Redundant $\tau$-adic Expansions I: Non-Adjacent Digit Sets and their Applications to Scalar Multiplication
Roberto M. Avanzi, Clemens Heuberger, Helmut Prodinger
2008/147
A Real-World Attack Breaking A5/1 within Hours
Timo Gendrullis, Martin Novotny, Andy Rupp
2008/146
Dynamic SHA-2
Xu Zijie
2008/145
Fast Multiple Point Multiplication on Elliptic Curves over Prime and Binary Fields using the Double-Base Number System
Jithra Adikari, Vassil S. Dimitrov, Pradeep K. Mishra
2008/144
A Note on Differential Privacy: Defining Resistance to Arbitrary Side Information
Shiva Prasad Kasiviswanathan, Adam Smith
2008/143
Certificateless Signcryption
M. Barbosa, P. Farshim
2008/142
Attacking Reduced Round SHA-256
Somitra Kumar Sanadhya, Palash Sarkar
2008/141
Unconditionally Reliable and Secure Message Transmission in Undirected Synchronous Networks: Possibility, Feasibility and Optimality
Arpita Patra, Ashish Choudhury, C. Pandu Rangan, Kannan Srinathan
2008/140
Reducing Complexity Assumptions for Oblivious Transfer
K. Y. Cheong, Takeshi Koshiba
2008/139
Chosen-Ciphertext Secure Fuzzy Identity-Based Key Encapsulation without ROM
Liming Fang, Jiandong Wang, Yongjun Ren, Jinyue Xia, Shizhu Bian
2008/138
Oblivious Transfer Based on the McEliece Assumptions
Rafael Dowsley, Jeroen van de Graaf, Jörn Müller-Quade, Anderson C. A. Nascimento
2008/137
More Discriminants with the Brezing-Weng Method
Gaetan Bisson, Takakazu Satoh
2008/136
Constant-Size Dynamic $k$-TAA
Man Ho Au, Willy Susilo, Yi Mu
2008/135
Unbalanced Digit Sets and the Closest Choice Strategy for Minimal Weight Integer Representations
Clemens Heuberger, James A. Muir
2008/134
Efficient Lossy Trapdoor Functions based on the Composite Residuosity Assumption
Alon Rosen, Gil Segev
2008/133
The arithmetic of characteristic 2 Kummer surfaces
P. Gaudry, D. Lubicz
2008/132
A Framework for the Sound Specification of Cryptographic Tasks
Juan A. Garay, Aggelos Kiayias, Hong-Sheng Zhou
2008/131
Collisions and other Non-Random Properties for Step-Reduced SHA-256
Sebastiaan Indesteege, Florian Mendel, Bart Preneel, Christian Rechberger
2008/130
Analysis of Step-Reduced SHA-256
Florian Mendel, Norbert Pramstaller, Christian Rechberger, Vincent Rijmen
2008/129
Controlling access to personal data through Accredited Symmetrically Private Information Retrieval
Mohamed Layouni
2008/128
A Chosen IV Attack Using Phase Shifting Equivalent Keys against DECIM v2
Hidehiko Nakagami, Ryoichi Teramura, Toshihiro Ohigashi, Hidenori Kuwakado, Masakatu Morii
2008/127
A Pipelined Karatsuba-Ofman Multiplier over GF($3^{97}$) Amenable for Pairing Computation
Nidia Cortez-Duarte, Francisco Rodríguez-Henríquez, Jean-Luc Beuchat, Eiji Okamoto
2008/126
Machine Learning Attacks Against the ASIRRA CAPTCHA
Philippe Golle
2008/125
Pairing Lattices
Florian Hess
2008/124
A Simple Derivation for the Frobenius Pseudoprime Test
Daniel Loebenberger
2008/123
Secure Adiabatic Logic: a Low-Energy DPA-Resistant Logic Style
Mehrdad Khatir, Amir Moradi
2008/122
TinyECCK: Efficient Elliptic Curve Cryptography Implementation over $GF(2^m)$ on 8-bit MICAz Mote
Seog Chung Seo, Dong-Guk Han, Seokhie Hong
2008/121
New proofs for old modes
Mark Wooding
2008/120
Public key encryption and encryption emulation attacks
Denis Osin, Vladimir Shpilrain
2008/119
Linear Bandwidth Naccache-Stern Encryption
Benoit Chevallier-Mames, David Naccache, Jacques Stern
2008/118
Setting Speed Records with the (Fractional) Multibase Non-Adjacent Form Method for Efficient Elliptic Curve Scalar Multiplication
Patrick Longa, Catherine Gebotys
2008/117
Exponentiation in pairing-friendly groups using homomorphisms
Steven D. Galbraith, Michael Scott
2008/116
Chosen-Ciphertext Security via Correlated Products
Alon Rosen, Gil Segev
2008/115
A Comparison Between Hardware Accelerators for the Modified Tate Pairing over $\mathbb{F}_{2^m}$ and $\mathbb{F}_{3^m}$
Jean-Luc Beuchat, Nicolas Brisebarre, Jérémie Detrey, Eiji Okamoto, Francisco Rodríguez-Henríquez
2008/114
Scalable and Efficient Provable Data Possession
Giuseppe Ateniese, Roberto Di Pietro, Luigi V. Mancini, Gene Tsudik
2008/113
Open Source Is Not Enough. Attacking the EC-package of Bouncycastle version 1.x_132
Daniel Mall, Qing Zhong
2008/112
Democratic Group Signatures with Threshold Traceability
Dong Zheng, Xiangxue Li, Changshe Ma, Kefei Chen, Jianhua Li
2008/111
THE DESIGN OF BOOLEAN FUNCTIONS BY MODIFIED HILL CLIMBING METHOD
Yuriy Izbenko, Vladislav Kovtun, Alexandr Kuznetsov
2008/110
On the Design of Secure and Fast Double Block Length Hash Functions
Zheng Gong, Xuejia Lai, Kefei Chen
2008/109
Collisions for Round-Reduced LAKE
Florian Mendel, Martin Schläffer
2008/108
New Differential-Algebraic Attacks and Reparametrization of Rainbow
Jintai Ding, Bo-Yin Yang, Owen Chen, Ming-Shing Chen, Doug Cheng
2008/107
Private Branching Programs: On Communication-Efficient Cryptocomputing
Helger Lipmaa
2008/106
Knapsack cryptosystems built on NP-hard instances
Laurent Evain
2008/105
Cryptanalysis of White-Box Implementations
W. Michiels, P. Gorissen, H. D. L. Hollmann
2008/104
Simplified Security Notions of Direct Anonymous Attestation and a Concrete Scheme from Pairings
Ernie Brickell, Liqun Chen, Jiangtao Li
2008/103
Identity-Based Proxy Re-encryption Schemes with Multiuse, Unidirection, and CCA Security
Jun Shao, Dongsheng Xing, Zhenfu Cao
2008/102
Degradation and Amplification of Computational Hardness
Shai Halevi, Tal Rabin
2008/101
Probabilistic Verifiable Secret Sharing Tolerating Adaptive Adversary
Arpita Patra, Ashish Choudhary, AshwinKumar B. V, C. Pandu Rangan
2008/100
Accelerating the Scalar Multiplication on Elliptic Curve Cryptosystems over Prime Fields
Patrick Longa
2008/099
The Elliptic Curve Discrete Logarithm Problem and Equivalent Hard Problems for Elliptic Divisibility Sequences
Kristin E. Lauter, Katherine E. Stange
2008/098
On Security Notions for Verifiable Encrypted Signature
Xu-An Wang, Xiaoyuan Yang, Yiliang Han
2008/097
Fairness with an Honest Minority and a Rational Majority
Shien Jin Ong, David Parkes, Alon Rosen, Salil Vadhan
2008/096
Optimal Pairings
F. Vercauteren
2008/095
Strongly Unforgeable ID-based Signatures Without Random Oracles
Chifumi Sato, Takeshi Okamoto, Eiji Okamoto
2008/094
Universally Composable Undeniable Signature
Kaoru Kurosawa, Jun Furukawa
2008/093
New ID-based Fair Blind Signatures
Girraj Kumar Verma
2008/092
An Efficient SPRP-secure Construction based on Pseudo Random Involution
Mridul Nandi
2008/091
A Generic Method to Extend Message Space of a Strong Pseudorandom Permutation
Mridul Nandi
2008/090
Improving upon HCTR and matching attacks for Hash-Counter-Hash approach
Mridul Nandi
2008/089
An improved preimage attack on MD2
Søren S. Thomsen
2008/088
A Public Key Encryption In Standard Model Using Cramer-Shoup Paradigm
Mahabir Prasad Jhanwar, Rana Barua
2008/087
Towards a Theory of White-Box Security
Amir Herzberg, Haya Shulman, Amitabh Saxena, Bruno Crispo
2008/086
Efficient Perfectly Reliable and Secure Communication Tolerating Mobile Adversary
Arpita Patra, Ashish Choudhary, Madhu Gayatri, C. Pandu Rangan
2008/085
All Pairings Are in a Group
Chang-An Zhao, Fangguo Zhang, Jiwu Huang
2008/084
ID based generalized signcryption
Sunder Lal, Prashant Kushwah
2008/083
On the Security of Chien's Ultralightweight RFID Authentication Protocol
Hung-Min Sun, Wei-Chih Ting, King-Hang Wang
2008/082
Improving the Farnel, Threeballot, and Randell-Ryan Voting Schemes
Roberto Araujo, Peter Y. A. Ryan
2008/081
Template Attacks on ECDSA
Marcel Medwed, Elisabeth Oswald
2008/080
Pairing-Based Onion Routing with Improved Forward Secrecy
Aniket Kate, Greg Zaverucha, Ian Goldberg
2008/079
Homomorphic Encryption with CCA Security
Manoj Prabhakaran, Mike Rosulek
2008/078
A Short Proof of the PRP/PRF Switching Lemma
Donghoon Chang, Mridul Nandi
2008/077
Nonlinear Piece In Hand Matrix Method for Enhancing Security of Multivariate Public Key Cryptosystems
Shigeo Tsujii, Kohtaro Tadaki, Ryou Fujita
2008/076
Results from a Search for the Best Linear Approximation of a Block Cipher
Kashif Ali, Howard M. Heys
2008/075
On the Strength of the Concatenated Hash Combiner when All the Hash Functions are Weak
Jonathan J. Hoch, Adi Shamir
2008/074
On the Chikazawa-Inoue ID based key system
Bae Eun Jung, Hee Jean Kim
2008/073
Compact Proofs of Retrievability
Hovav Shacham, Brent Waters
2008/072
The SIP Security Enhanced by Using Pairing-assisted Massey-Omura Signcryption
Alexandre M. Deusajute, Paulo S. L. M. Barreto
2008/071
Blockcipher Based Hashing Revisited
Martijn Stam
2008/070
Generators of Jacobians of Genus Two Curves
Christian Robenhagen Ravnshoj
2008/069
HENKOS Cryptanalysis-Related keys attack
Marius Oliver Gheorghita
2008/068
Multiparty Computation Goes Live
Peter Bogetoft, Dan Lund Christensen, Ivan Damgard, Martin Geisler, Thomas Jakobsen, Mikkel Krøigaard, Janus Dam Nielsen, Jesper Buus Nielsen, Kurt Nielsen, Jakob Pagter, Michael Schwartzbach, Tomas Toft
2008/067
The Twin Diffie-Hellman Problem and Applications
David Cash, Eike Kiltz, Victor Shoup
2008/066
High Performance Architecture for Elliptic Curve Scalar Multiplication over GF(2^m)
Junjie Jiang, Jing Chen, Jian Wang, Duncan S. Wong, Xiaotie Deng
2008/065
Infringing and Improving Password Security of a Three-Party Key Exchange Protocol
Junghyun Nam
2008/064
Remarks on the NFS complexity
Pavol Zajac
2008/063
Efficient Sequential Aggregate Signed Data
Gregory Neven
2008/062
Computing Hilbert Class Polynomials
Juliana Belding, Reinier Broker, Andreas Enge, Kristin Lauter
2008/061
Abelian varieties with prescribed embedding degree
David Freeman, Peter Stevenhagen, Marco Streng
2008/060
Fast Algorithms for Arithmetic on Elliptic Curves Over Prime Fields
Nicholas T. Sullivan
2008/059
Buying random votes is as hard as buying no-votes
Stefan Popoveniuc, Jonathan Stanton
2008/058
Physical Cryptanalysis of KeeLoq Code Hopping Applications
Thomas Eisenbarth, Timo Kasper, Amir Moradi, Christof Paar, Mahmoud Salmasizadeh, Mohammad T. Manzuri Shalmani
2008/057
Software Implementation of Genus-2 Hyperelliptic Curve Cryptosystems Over Prime Fields
Vladislav Kovtun, Jan Pelzl, Alexandr Kuznetsov
2008/056
Fast explicit formulae for genus 2 hyperelliptic curves using projective coordinates (Updated)
Vladislav Kovtun, Thomas Wollinger
2008/055
cryptanalysis and Improvement of a Recently Proposed Remote User Authentication Scheme Using Smart Cards
S. Sharmila Deva Selvi, S. Sree Vivek
2008/054
Variants of the Distinguished Point Method for Cryptanalytic Time Memory Trade-offs (Full version)
Jin Hong, Kyung Chul Jeong, Eun Young Kwon, In-Sok Lee, Daegun Ma
2008/053
Breaking One-Round Key-Agreement Protocols in the Random Oracle Model
Miroslava Sotakova
2008/052
New Multibase Non-Adjacent Form Scalar Multiplication and its Application to Elliptic Curve Cryptosystems (extended version)
Patrick Longa, Ali Miri
2008/051
New Composite Operations and Precomputation Scheme for Elliptic Curve Cryptosystems over Prime Fields (full version)
Patrick Longa, Ali Miri
2008/050
Multi-PKG ID based signcryption
Sunder Lal, Prashant Kushwah
2008/049
An Efficient Protocol for Secure Two-Party Computation in the Presence of Malicious Adversaries
Yehuda Lindell, Benny Pinkas
2008/048
Improved Cryptanalysis of APOP-MD4 and NMAC-MD4 using New Differential Paths
Donghoon Chang, Jaechul Sung, Seokhie Hong, Sangjin Lee
2008/047
Fair Traceable Multi-Group Signatures
Vicente Benjumea, Seung Geol Choi, Javier Lopez, Moti Yung
2008/046
David and Goliath Commitments: UC Computation for Asymmetric Parties Using Tamper-Proof Hardware
Tal Moran, Gil Segev
2008/045
Threshold RSA for Dynamic and Ad-Hoc Groups
Rosario Gennaro, Shai Halevi, Hugo Krawczyk, Tal Rabin
2008/044
Unidirectional Key Distribution Across Time and Space with Applications to RFID Security
Ari Juels, Ravikanth Pappu, Bryan Parno
2008/043
Cryptanalysis of CRUSH hash structure
Nasour Bagheri, Majid Naderi, Babak Sadeghiyan
2008/042
Trusted-HB: a low-cost version of HB+ secure against Man-in-The-Middle attacks
Julien Bringer, Herve Chabanne
2008/041
A New Proxy Identity-Based Signcryption Scheme for Partial Delegation of Signing Rights
Hassan Elkamchouchi, Yasmine Abouelseoud
2008/040
Efficient and Generalized Pairing Computation on Abelian Varieties
Eunjeong Lee, Hyang-Sook Lee, Cheol-Min Park
2008/039
New Results on Unconditionally Secure Multireceiver Manual Authentication
Shuhong Wang, Reihaneh Safavi-Naini
2008/038
A New Blind Identity-Based Signature Scheme with Message Recovery
Hassan Elkamchouchi, Yasmine Abouelseoud
2008/037
Anonymous Consecutive Delegation of Signing Rights: Unifying Group and Proxy Signatures
Georg Fuchsbauer, David Pointcheval
2008/036
Generic Attacks on Feistel Schemes
Jacques Patarin
2008/035
Efficient Fully-Simulatable Oblivious Transfer
Yehuda Lindell
2008/034
Perfectly Hiding Commitment Scheme with Two-Round from Any One-Way Permutation
Chunming Tang, Dingyi Pei, Zhuojun Liu, Zheng-an Yao, Mingsheng Wang
2008/033
Lower Bounds on Signatures From Symmetric Primitives
Boaz Barak, Mohammad Mahmoody
2008/032
Merkle's Key Agreement Protocol is Optimal: An $O(n^2)$ Attack on any Key Agreement from Random Oracles
Boaz Barak, Mohammad Mahmoody
2008/031
Authenticating with Attributes
Dalia Khader
2008/030
Detection of Algebraic Manipulation with Applications to Robust Secret Sharing and Fuzzy Extractors
Ronald Cramer, Yevgeniy Dodis, Serge Fehr, Carles Padró, Daniel Wichs
2008/029
Non-Cyclic Subgroups of Jacobians of Genus Two Curves
Christian Robenhagen Ravnshoj
2008/028
HB#: Increasing the Security and Efficiency of HB+
Henri Gilbert, Matthew J. B. Robshaw, Yannick Seurin
2008/027
Blind Signature Scheme over Braid Groups
Girraj Kumar Verma
2008/026
Pairing-friendly Hyperelliptic Curves with Ordinary Jacobians of Type $y^2=x^5+ax$
Mitsuru Kawazoe, Tetsuya Takahashi
2008/025
Non-Cyclic Subgroups of Jacobians of Genus Two Curves with Complex Multiplication
Christian Robenhagen Ravnshoj
2008/024
Identity Based Strong Bi-Designated Verifier Proxy Signature Schemes
Sunder Lal, Vandani Verma
2008/023
General Certificateless Encryption and Timed-Release Encryption
Sherman S. M. Chow, Volker Roth, Eleanor G. Rieffel
2008/022
Computing Almost Exact Probabilities of Differential Hash Collision Paths by Applying Appropriate Stochastic Methods
M. Gebhardt, G. Illies, W. Schindler
2008/021
Block Ciphers Implementations Provably Secure Against Second Order Side Channel Analysis
Matthieu Rivain, Emmanuelle Dottax, Emmanuel Prouff
2008/020
CCA2 Secure IBE: Standard Model Efficiency through Authenticated Symmetric Encryption
Eike Kiltz, Yevgeniy Vahlis
2008/019
Computing Pairings Using x-Coordinates Only
Steven D. Galbraith, Xibin Lin
2008/018
Disjunctive Multi-Level Secret Sharing
Mira Belenkiy
2008/017
New State Recovery Attack on RC4
Alexander Maximov, Dmitry Khovratovich
2008/016
ECM using Edwards curves
Daniel J. Bernstein, Peter Birkner, Tanja Lange, Christiane Peters
2008/015
Practical Short Signature Batch Verification
Anna Lisa Ferrara, Matthew Green, Susan Hohenberger, Michael Østergaard Pedersen
2008/014
Simulatable Adaptive Oblivious Transfer
Jan Camenisch, Gregory Neven, abhi shelat
2008/013
Twisted Edwards Curves
Daniel J. Bernstein, Peter Birkner, Marc Joye, Tanja Lange, Christiane Peters
2008/012
The Encrypted Elliptic Curve Hash
Daniel R. L. Brown
2008/011
A simple generalization of the {E}l{G}amal cryptosystem to non-abelian groups II
Ayan Mahalanobis
2008/010
A Proof of Security in $O(2^n)$ for the Xor of Two Random Permutations\\ -- Proof with the ``$H_{\sigma}$ technique''--
Jacques Patarin
2008/009
Generic Attacks for the Xor of k random permutations
Jacques Patarin
2008/008
Factoring Polynomials for Constructing Pairing-friendly Elliptic Curves
Zhitu su, Hui Li, Jianfeng Ma
2008/007
Efficient One-round Key Exchange in the Standard Model
Colin Boyd, Yvonne Cliff, Juan M. Gonzalez Nieto, Kenneth G. Paterson
2008/006
Joint State Theorems for Public-Key Encryption and Digital Signature Functionalities with Local Computation
Ralf Kuesters, Max Tuengerthal
2008/005
Information Theoretic Evaluation of Side-Channel Resistant Logic Styles
Francois Mace, Francois-Xavier Standaert, Jean-Jacques Quisquater
2008/004
Efficient Tweakable Enciphering Schemes from (Block-Wise) Universal Hash Functions
Palash Sarkar
2008/003
On Collisions of Hash Functions Turbo SHA-2
Vlastimil Klima
2008/002
Fuzzy Identity Based Signature
Piyi Yang, Zhenfu Cao, Xiaolei Dong
2008/001
Security Proof for the Improved Ryu-Yoon-Yoo Identity-Based Key Agreement Protocol
Shengbao Wang, Zhenfu Cao, Kim-Kwang Raymond Choo, Lihua Wang
2007/482
TinyPBC: Pairings for Authenticated Identity-Based Non-Interactive Key Distribution in Sensor Networks
Leonardo B. Oliveira, Michael Scott, Julio López, Ricardo Dahab
2007/481
MAC-free variant of KD04
Xianhui Lu, Xuejia Lai, Dake He
2007/480
Differential Fault Analysis on the AES Key Schedule
Junko Takahashi, Toshinori Fukunaga
2007/479
An Efficient Identification Protocol and the Knowledge-of-Exponent Assumption
J. Wu, D. R. Stinson
2007/478
Impossibility Results for Universal Composability in Public-Key Models and with Fixed Inputs
Dafna Kidron, Yehuda Lindell
2007/477
Algebraic Side-Channel Collision Attacks on AES
Andrey Bogdanov, Andrey Pyshkin
2007/476
Dynamic SHA
Xu Zijie
2007/475
Obtaining Universally Composable Security: Towards the Bare Bones of Trust
Ran Canetti
2007/474
Notes on the Wang et al. $2^{63}$ SHA-1 Differential Path
Martin Cochran
2007/473
Authenticated Key Exchange and Key Encapsulation Without Random Oracles
Tatsuaki Okamoto
2007/472
New Features of Latin Dances: Analysis of Salsa, ChaCha, and Rumba
Jean-Philippe Aumasson, Simon Fischer, Shahram Khazaei, Willi Meier, Christian Rechberger
2007/471
Attacks on the WEP protocol
Erik Tews
2007/470
Faster Multi-Exponentiation through Caching: Accelerating (EC)DSA Signature Verification
Bodo Möller, Andy Rupp
2007/469
ID-Based Group Password-Authenticated Key Exchange
Xun Yi, Raylin Tso, Eiji Okamoto
2007/468
On the hash function of ODH assumption
Xianhui Lu, Xuejia Lai, Dake He, Guomin Li
2007/467
Interactive and Noninteractive Zero Knowledge are Equivalent in the Help Model
André Chailloux, Dragos Florin Ciocan, Iordanis Kerenidis, Salil Vadhan
2007/466
Improved Impossible Differential Cryptanalysis of CLEFIA
Wei Wang, Xiaoyun Wang
2007/465
A Synthetic Indifferentiability Analysis of Some Block-Cipher-Based Hash Functions
Zheng Gong, Xuejia Lai, Kefei Chen
2007/464
Secure Computation Without Authentication
Boaz Barak, Ran Canetti, Yehuda Lindell, Rafael Pass, Tal Rabin
2007/463
Efficient GF(3m) Multiplication Algorithm for eta T Pairing
Gen Takahashi, Fumitaka Hoshino, Tetsutaro Kobayashi
2007/462
Construction of Universal Designated-Verifier Signatures and Identity-Based Signatures from Standard Signatures
Siamak F Shahandashti, Reihaneh Safavi-Naini
2007/461
Verifiable Attribute-based Encryption
Qiang Tang, Dongyao Ji
2007/460
Guarantees for Customers of Incentive Anonymizing Networks
Timothy Atkinson, Marius Silaghi
2007/459
Practical Anonymous Divisible E-Cash From Bounded Accumulators
Man Ho Au, Willy Susilo, Yi Mu
2007/458
Saving Private Randomness in One-Way Functions and Pseudorandom Generators
Nenad Dedic, Danny Harnik, Leonid Reyzin
2007/457
Comparing Implementation Efficiency of Ordinary and Squared Pairings
Christine Abegail Antonio, Tanaka Satoru, Ken Nakamula
2007/456
Precise Zero-Knowledge in Concurrent Setting
Ning Ding, Dawu Gu
2007/455
Analysis and optimization of elliptic-curve single-scalar multiplication
Daniel J. Bernstein, Tanja Lange
2007/454
Efficient Certificateless Signatures Suitable for Aggregation
Rafael Castro, Ricardo Dahab
2007/453
On the Relations Between Non-Interactive Key Distribution, Identity-Based Encryption and Trapdoor Discrete Log Groups
Kenneth G. Paterson, Sriramkrishnan Srinivasan
2007/452
Constructing Brezing-Weng pairing friendly elliptic curves using elements in the cyclotomic field
Ezekiel J. Kachisa, Edward F. Schaefer, Michael Scott
2007/451
Precise Concurrent Zero Knowledge
Omkant Pandey, Rafael Pass, Amit Sahai, Wei-Lung Dustin Tseng, Muthuramakrishnan Venkitasubramaniam
2007/450
Short Group Signature without Random Oracles
Xiaohui Liang, Zhenfu Cao, Jun Shao, Huang Lin
2007/449
Generic Attacks on Unbalanced Feistel Schemes with Expanding Functions
Jacques Patarin, Valérie Nachef, Côme Berbain
2007/448
Generalized Correlation and Higher Order Nonlinearity for Probabilistic Algebraic Attacks Description
Sergiy Pometun
2007/447
Weak adaptive chosen ciphertext secure hybrid encryption scheme
Xianhui Lu, Xuejia Lai, Dake He, Guomin Li
2007/446
A Lattice-Based Computationally-Efficient Private Information Retrieval Protocol
Carlos AGUILAR MELCHOR, Philippe GABORIT
2007/445
Proposal of a new efficient public key system for encryption and digital signatures
Gerold Grünauer
2007/444
Tight bounds between algebraic immunity and nonlinearities of high orders
Lobanov Mikhail
2007/443
Template Attacks with a Power Model
Moulay Abdelaziz EL AABID, Sylvain GUILLEY, Philippe HOOGVORST
2007/442
Another Look at Non-Standard Discrete Log and Diffie-Hellman Problems
Neal Koblitz, Alfred Menezes
2007/441
Faster Group Operations on Elliptic Curves
Huseyin Hisil, Kenneth Koon-Ho Wong, Gary Carter, Ed Dawson
2007/440
An Improved Remote User Authentication Scheme using Bilinear Pairings
Sunder Lal, K. K. Goyal
2007/439
Multiparty Key Agreement Using Bilinear Map
Nam-Su Jho, Myung-Hwan Kim, Do Won Hong, Byung-Gil Lee
2007/438
Ordered Multisignatures and Identity-Based Sequential Aggregate Signatures, with Applications to Secure Routing
Alexandra Boldyreva, Craig Gentry, Adam O'Neill, Dae Hyun Yum
2007/437
Reconfigurable Hardware Implementations of Tweakable Enciphering Schemes
Cuauhtemoc Mancillas-Lopez, Debrup Chakraborty, Francisco Rodriguez-Henriquez
2007/436
New Attacks on the Stream Cipher TPy6 and Design of New Ciphers the TPy6-A and the TPy6-B
Gautham Sekar, Souradyuti Paul, Bart Preneel
2007/435
Irreducibility to the One-More Evaluation Problems: More May Be Less
Daniel R. L. Brown
2007/434
Computing the Ate Pairing on Elliptic Curves with Embedding Degree $k=9$
Xibin Lin, Chang-An Zhao, Fangguo Zhang, Yanming Wang
2007/433
An (Almost) Constant-Effort Solution-Verification Proof-of-Work Protocol based on Merkle Trees
Fabien Coelho
2007/432
Trapdoors for Hard Lattices and New Cryptographic Constructions
Craig Gentry, Chris Peikert, Vinod Vaikuntanathan
2007/431
Notions of Efficiency in Simulation Paradigm
Tzer-jen Wei
2007/430
Cryptanalysis of LASH
Scott Contini, Krystian Matusiewicz, Josef Pieprzyk, Ron Steinfeld, Jian Guo, San Ling, Huaxiong Wang
2007/429
On compressible pairings and their computation
Michael Naehrig, Paulo S. L. M. Barreto, Peter Schwabe
2007/428
Isogenies and the Discrete Logarithm Problem on Jacobians of Genus 3 Hyperelliptic Curves
Benjamin Smith
2007/427
Idempotents in the Neighbourhood of Patterson-Wiedemann Functions having Walsh Spectra Zeros
Sumanta Sarkar, Subhamoy Maitra
2007/426
Implementing Cryptographic Pairings over Curves of Embedding Degrees 8 and 10
Christine Abegail Antonio, Satoru Tanaka, Ken Nakamula
2007/425
On prime-order elliptic curves with embedding degrees k=3,4 and 6
Koray Karabina, Edlyn Teske
2007/424
When e-th Roots Become Easier Than Factoring
Antoine Joux, David Naccache, Emmanuel Thomé
2007/423
Finding Low Weight Polynomial Multiples Using Lattices
Laila El Aimani, Joachim von zur Gathen
2007/422
Structural Identity-Based Encryption
Man Ho Au, Siu-Ming Yiu
2007/421
The role of help in Classical and Quantum Zero-Knowledge
André Chailloux, Iordanis Kerenidis
2007/420
A Critical Analysis and Improvement of AACS Drive-Host Authentication
Jiayuan Sui, Douglas R. Stinson
2007/419
Cryptanalysis of the Random Number Generator of the Windows Operating System
Leo Dorrendorf, Zvi Gutterman, Benny Pinkas
2007/418
An Improved Remote User Authentication Scheme with Smart Cards using Bilinear Pairings
Amit K Awasthi
2007/417
Algorithms and Arithmetic Operators for Computing the $\eta_T$ Pairing in Characteristic Three
Jean-Luc Beuchat, Nicolas Brisebarre, Jérémie Detrey, Eiji Okamoto, Masaaki Shirase, Tsuyoshi Takagi
2007/416
Compression Function Design Principles Supporting Variable Output Lengths from a Single Small Function
Donghoon Chang, Mridul Nandi, Jesang Lee, Jaechul Sung, Seokhie Hong
2007/415
Cryptanalytic Flaws in Oh et al.'s ID-Based Authenticated Key Agreement Protocol
Meng-Hui Lim, Sanggon Lee, Hoonjae Lee
2007/414
Optimizing double-base elliptic-curve single-scalar multiplication
Daniel J. Bernstein, Peter Birkner, Tanja Lange, Christiane Peters
2007/413
Breaking ONE.FIVIUM by AIDA an Algebraic IV Differential Attack
Michael Vielhaber
2007/412
Proposing a Master One-Way Function
Gideon Samid
2007/411
Cryptanalysis on Improved One-round Lin-Li's Tripartite Key Agreement Protocol
Meng-Hui Lim, Sanggon Lee, Hoonjae Lee
2007/410
Inverted Edwards coordinates
Daniel J. Bernstein, Tanja Lange
2007/409
Building a Collision-Resistant Compression Function from Non-Compressing Primitives
Thomas Shrimpton, Martijn Stam
2007/408
Differential Cryptanalysis of PRESENT
Meiqin Wang
2007/407
Provably Secure Grouping-proofs for RFID tags
Mike Burmester, Breno de Medeiros, Rossana Motta
2007/406
Modeling Computational Security in Long-Lived Systems
Ran Canetti, Ling Cheung, Dilsun Kaynar, Nancy Lynch, Olivier Pereira
2007/405
Secure PRNGs from Specialized Polynomial Maps over Any $F_q$
Michael Feng-Hao Liu, Chi-Jen Lu, Bo-Yin Yang, Jintai Ding
2007/404
Predicate Encryption Supporting Disjunctions, Polynomial Equations, and Inner Products
Jonathan Katz, Amit Sahai, Brent Waters
2007/403
Turbo SHA-2
Danilo Gligoroski, Svein Johan Knapskog
2007/402
Robust, Anonymous RFID Authentication with Constant Key-Lookup
Mike Burmester, Breno de Medeiros, Rossana Motta
2007/401
Another Look at Automated Theorem-Proving
Neal Koblitz
2007/400
REMARKS ON IBE SCHEME OF WANG AND CAO
Sunder Lal, Priyam Sharma
2007/399
Ceremony Design and Analysis
Carl Ellison
2007/398
A Short Signature Scheme in the Standard Model
Li Kang, Xiaohu Tang, Xianhui Lu, Jia Fan
2007/397
On the security defects of an image encryption scheme
Chengqing Li, Shujun Li, Muhammad Asim, Juana Nunez, Gonzalo Alvarez, Guanrong Chen
2007/396
Proxy Re-Signature Schemes without Random Oracles
Jun Shao, Zhenfu Cao, Licheng Wang, Xiaohui Liang
2007/395
Second Preimage Attacks on Dithered Hash Functions
Charles Bouillaguet, Pierre-Alain Fouque, Adi Shamir, Sebastien Zimmer
2007/394
Almost-everywhere Secure Computation
Juan A. Garay, Rafail Ostrovsky
2007/393
Overlap-free Karatsuba-Ofman Polynomial Multiplication Algorithms
Haining Fan, Jiaguang Sun, Ming Gu, Kwok-Yan Lam
2007/392
Efficient Computationally Private Information Retrieval From Anonymity or Trapdoor Groups
Jonathan Trostle, Andy Parrish
2007/391
A novel public key crypto system based on semi-modules over quotient semi-rings
Reza Ebrahimi Atani, Shahabaddin Ebrahimi Atani, Sattar Mirzakuchaki
2007/390
Implementing Cryptographic Pairings over Barreto-Naehrig Curves
Augusto Jun Devegili, Michael Scott, Ricardo Dahab
2007/389
Interactive and Noninteractive Zero Knowledge Coincide in the Help Model
Dragos Florin Ciocan, Salil Vadhan
2007/388
On Ciphertext Undetectability
Peter Gazi, Martin Stanek
2007/387
Analysis of Local Optima in Block Ciphers
John A. Clark, Juan M. E. Tapiador
2007/386
(Convertible) Undeniable Signatures without Random Oracles
Tsz Hon Yuen, Man Ho Au, Joseph K. Liu, Willy Susilo
2007/385
On the insecurity of interchanged use of OFB and CBC modes of operation
Danilo Gligoroski
2007/384
Non-Interactive Anonymous Credentials
Mira Belenkiy, Melissa Chase, Markulf Kohlweiss, Anna Lysyanskaya
2007/383
Cryptanalysis on Improved Chou et al.'s ID-Based Deniable Authentication Protocol
Meng-Hui Lim, Sanggon Lee, Hoonjae Lee
2007/382
Oblivious Transfer via McEliece's PKC and Permuted Kernels
K. Kobara, K. Morozov, R. Overbeck
2007/381
Cryptanalysis of Two New Instances of TTM Cryptosystem
Xuyun Nie, Xin Jiang, Lei Hu, Jintai Ding
2007/380
X-FCSR: a new software oriented stream cipher based upon FCSRs
Francois Arnault, Thierry P. Berger, Cédric Lauradoux, Marine Minier
2007/379
On The Inequivalence Of Ness-Helleseth APN Functions
Xiangyong Zeng, Lei Hu, Yang Yang, Wenfeng Jiang
2007/378
Algebraic Structure Defectoscopy
Sean O'Neil
2007/377
Fast Point Multiplication on Elliptic Curves of Even Order
Rongquan Feng, Hongfeng Wu
2007/376
An Efficient Range-Bounded Commitment Scheme
Zhengjun Cao
2007/375
Further Musings on the Wang et al. MD5 Collision: Improvements and Corrections on the Work of Hawkes, Paddon, and Rose
Gregory Hirshman
2007/374
On Factoring Arbitrary Integers with Known Bits
Mathias Herrmann, Alexander May
2007/373
A Meet-in-the-Middle Collision Attack Against the New FORK-256
Markku-Juhani O. Saarinen
2007/372
On the Authentication of One Popular Signcryption Scheme
Zhengjun Cao
2007/371
Group-oriented encryption secure against collude attack
Chunbo Ma, Jun Ao, Jianhua Li
2007/370
FURTHER PROPERTIES OF SEVERAL CLASSES OF BOOLEAN FUNCTIONS WITH OPTIMUM ALGEBRAIC IMMUNITY
Claude Carlet, Xiangyong Zeng, Chunlei Li, Lei Hu
2007/369
Universally Composable Multi-Party Computation with an Unreliable Common Reference String
Vipul Goyal, Jonathan Katz
2007/368
Reducing Trust in the PKG in Identity Based Cryptosystems
Vipul Goyal
2007/367
Cryptanalysis of Rational Multivariate Public Key Cryptosystems
Jintai Ding, John Wagner
2007/366
Breaking the Symmetry: a Way to Resist the New Differential Attack
Jintai Ding, Bo-Yin Yang, Chen-Mou Cheng, Owen Chen, Vivien Dubois
2007/365
Pairings on Jacobians of Hyperelliptic Curves
Christian Robenhagen Ravnshoj
2007/364
A Proof of Security of a Mesh Security Architecture
Doug Kuhlman, Ryan Moriarty, Tony Braskich, Steve Emeott, Mahesh Tripunitara
2007/363
Fuzzy Private Matching (Extended Abstract)
Łukasz Chmielewski, Jaap-Henk Hoepman
2007/362
Statistical Testing for Disk Encryption Modes of Operations
Mohamed Abo El-Fotouh, Klaus Diepold
2007/361
Proxy Re-encryption Systems for Identity-based Encryption
Toshihiko Matsuo
2007/360
Sufficient Conditions for Intractability over Black-Box Groups: Generic Lower Bounds for Generalized DL and DH Problems
Andy Rupp, Gregor Leander, Endre Bangerter, Ahmad-Reza Sadeghi, Alexander W. Dent
2007/359
Intrusion-Resilient Secret Sharing
Stefan Dziembowski, Krzysztof Pietrzak
2007/358
Improving the Round Complexity of VSS in Point-to-Point Networks
Jonathan Katz, Chiu-Yuen Koo, Ranjit Kumaresan
2007/357
A Note on Signature Standards
Michael Braun, Anton Kargl
2007/356
A Block Cipher based PRNG Secure Against Side-Channel Key Recovery
Christophe Petit, Francois-Xavier Standaert, Olivier Pereira, Tal G. Malkin, Moti Yung
2007/355
Secret sharing on the infinite ladder
Laszlo Csirmaz
2007/354
Identity-Committable Signatures and Their Extension to Group-Oriented Ring Signatures
Cheng-Kang Chu, Wen-Guey Tzeng
2007/353
Multiparty Computation to Generate Secret Permutations
Chris Studholme, Ian Blake
2007/352
New Local Collisions for the SHA-2 Hash Family
Somitra Kumar Sanadhya, Palash Sarkar
2007/351
A Linear Lower Bound on the Communication Complexity of Single-Server Private Information Retrieval
Iftach Haitner, Jonathan J. Hoch, Gil Segev
2007/350
On Tweaking Luby-Rackoff Blockciphers
David Goldenberg, Susan Hohenberger, Moses Liskov, Elizabeth Crump Schwartz, Hakan Seyalioglu
2007/349
Statistically Hiding Sets
Manoj Prabhakaran, Rui Xue
2007/348
A Framework for Efficient and Composable Oblivious Transfer
Chris Peikert, Vinod Vaikuntanathan, Brent Waters
2007/347
Lai-Massey Scheme and Quasi-Feistel Networks
Aaram Yun, Je Hong Park, Jooyoung Lee
2007/346
Secure multi-party computation on incomplete networks
Shailesh Vaya
2007/345
Analysis of Underlying Assumptions in NIST DRBGs
Wilson Kan
2007/344
Security Analysis of WAPI Authentication and Key Exchange Protocol
Liufei Wu, Yuqing Zhang, FengjiaoWang
2007/343
Updated standards for validating elliptic curves
Laura Hitt
2007/342
A New Security Model for Cross-Realm C2C-PAKE Protocol
Fengjiao Wang, Yuqing Zhang
2007/341
Multi-Party Indirect Indexing and Applications
Matthew Franklin, Mark Gondree, Payman Mohassel
2007/340
Efficient Implementation of the Pairing on Mobilephones using BREW
Motoi Yoshitomi, Tsuyoshi Takagi, Shinsaku Kiyomoto, Toshiaki Tanaka
2007/339
On the security of a class of image encryption schemes
Chengqing Li, Guanrong Chen
2007/338
VHASH Security
Wei Dai, Ted Krovetz
2007/337
Mobile Phones as Secure Gateways for Message-Based Ubiquitous Communication (Revised)
W. Bamberger, O. Welter, S. Spitz, M. Marhöfer
2007/336
A Major Vulnerability in RSA Implementations due to MicroArchitectural Analysis Threat
Onur Aciicmez, Werner Schindler
2007/335
Encryption Techniques for Secure Database Outsourcing
Sergei Evdokimov, Oliver Guenther
2007/334
New Constructions for UC Secure Computation using Tamper-proof Hardware
Nishanth Chandran, Vipul Goyal, Amit Sahai
2007/333
Towards Key-Dependent Message Security in the Standard Model
Dennis Hofheinz, Dominique Unruh
2007/332
Universally Composable Multiparty Computation with Partially Isolated Parties
Ivan Damgaard, Jesper Buus Nielsen, Daniel Wichs
2007/331
Isolated Proofs of Knowledge and Isolated Zero Knowledge
Ivan Damgaard, Jesper Buus Nielsen, Daniel Wichs
2007/330
Remote Power Analysis of {RFID} Tags
Yossi Oren
2007/329
A Tunable Broadcast Encryption Scheme
David Lubicz, Thomas Sirvent
2007/328
A Tight High-Order Entropic Quantum Uncertainty Relation With Applications
Ivan Damgaard, Serge Fehr, Renato Renner, Louis Salvail, Christian Schaffner
2007/327
Secure Identification and QKD in the Bounded-Quantum-Storage Model
Ivan Damgaard, Serge Fehr, Louis Salvail, Christian Schaffner
2007/326
Efficient Password-based Authenticated Key Exchange without Public Information
Jun Shao, Zhenfu Cao, Licheng Wang, Rongxing Lu
2007/325
Faster and Shorter Password-Authenticated Key Exchange
Rosario Gennaro
2007/324
Towards provable security for route discovery protocols in mobile ad hoc networks
Mike Burmester, Breno de Medeiros
2007/323
Attribute-Based Encryption with Non-Monotonic Access Structures
Rafail Ostrovsky, Amit Sahai, Brent Waters
2007/322
Identifying Ideal Lattices
Jintai Ding, Richard Lindner
2007/321
Balanced Boolean Functions with Nonlinearity > 2^{n-1} - 2^{(n-1)/2}
Selcuk Kavut, Melek Diker Yucel
2007/320
On the Big Gap Between $|p|$ and $|q|$ in DSA
Zhengjun Cao
2007/319
A New Security Definition for Public Key Encryption Schemes and Its Applications
Guomin Yang, Duncan S. Wong, Qiong Huang, Xiaotie Deng
2007/318
On the complexity of side-channel attacks on AES-256 -- methodology and quantitative results on cache attacks
Michael Neve, Kris Tiri
2007/317
Improving Upon the TET Mode of Operation
Palash Sarkar
2007/316
SECURITY PROOF FOR SHENGBAO WANG’S IDENTITY-BASED ENCRYPTION SCHEME
Sunder Lal, Priyam Sharma
2007/315
Security under Key-Dependent Inputs
Shai Halevi, Hugo Krawczyk
2007/314
Formal Certification of Code-Based Cryptographic Proofs
G. Barthe, B. Grëgoire, R. Janvier, S. Zanella Bëguelin
2007/313
Perfect Forward Secure Identity-Based Authenticated Key Agreement Protocol in the Escrow Mode
Shengbao Wang, Zhenfu Cao, Zhaohui Cheng, Kim-Kwang Raymond Choo
2007/312
Secure Similarity Search
Hyun-A Park, Bum Han Kim, Dong Hoon Lee, Yon Dohn Chung, Justin Zhan
2007/311
A Refined Algorithm for the $\eta_T$ Pairing Calculation in Characteristic Three
Jean-Luc Beuchat, Masaaki Shirase, Tsuyoshi Takagi, Eiji Okamoto
2007/310
A Note on Point Multiplication on Supersingular Elliptic Curves over Ternary Fields
Kwang Ho Kim
2007/309
Balanced Boolean Function on 13-variables having Nonlinearity strictly greater than the Bent Concatenation Bound
Subhamoy Maitra
2007/308
Generalized Rotation Symmetric and Dihedral Symmetric Boolean Functions - 9 variable Boolean Functions with Nonlinearity 242
Selcuk Kavut, Melek Diker Yucel
2007/307
Locally Invertible Boolean Mappings
Oleg A. Logachev
2007/306
Novel Approaches for Improving the Power Consumption Models in Correlation Analysis
Thanh-Ha Le, Quoc-Thinh Nguyen-Vuong, Cécile Canovas, Jessy Clédière
2007/305
On Non-Randomness of the Permutation after RC4 Key Scheduling
Goutam Paul, Subhamoy Maitra, Rohit Srivastava
2007/304
A Bound on the Size of Separating Hash Families
Simon R. Blackburn, Tuvi Etzion, Douglas R. Stinson, Gregory M. Zaverucha
2007/303
A Forward Secure Remote User Authentication Scheme
Manoj Kumar
2007/302
Compression Functions Suitable for the Multi-Property-Preserving Transform
Hidenori Kuwakado, Masakatu Morii
2007/301
On Asymptotic Behavior of the Ratio Between the Numbers of Binary Primitive and Irreducible Polynomials
Yuri Borissov, Moon Ho Lee, Svetla Nikova
2007/300
A Note on Automata-based Dynamic Convolutional Cryptosystems
Renji Tao
2007/299
Optimizing Multiprecision Multiplication for Public Key Cryptography
Michael Scott, Piotr Szczechowiak
2007/298
The Security of the Extended Codebook (XCB) Mode of Operation
David A. McGrew, Scott R. Fluhrer
2007/297
Secret sharing on infinite graphs
Laszlo Csirmaz
2007/296
Construction of Efficient and Secure Pairing Algorithm and its Application
Doo Ho Choi, Dong-Guk Han, Howon Kim
2007/295
Linearization Attacks Against Syndrome Based Hashes
Markku-Juhani O. Saarinen
2007/294
Improved Privacy of the Tree-Based Hash protocols using Physically Unclonable Function
Julien Bringer, Herve Chabanne, Thomas Icart
2007/293
Fully Resilient Traitor Tracing Scheme using Key Update
Eun Sun Yoo, Koutarou Suzuki, Myung-Hwan Kim
2007/292
Improved security analysis of OMAC
Mridul Nandi
2007/291
Relations Among Notions of Plaintext Awareness
James Birkett, Alexander W. Dent
2007/290
Construction of Rotation Symmetric Boolean Functions with Maximum Algebraic Immunity on Odd Number of Variables
Sumanta Sarkar, Subhamoy Maitra
2007/289
Zero-Knowledge in the Applied Pi-calculus and Automated Verification of the Direct Anonymous Attestation Protocol
Michael Backes, Matteo Maffei, Dominique Unruh
2007/288
Secure Hybrid Encryption from Weakened Key Encapsulation
Dennis Hofheinz, Eike Kiltz
2007/287
The Effectiveness of Receipt-Based Attacks on ThreeBallot
Kevin Henry, Douglas R. Stinson, Jiayuan Sui
2007/286
Faster addition and doubling on elliptic curves
Daniel J. Bernstein, Tanja Lange
2007/285
Solving MRHS linear equations
Håvard Raddum, Igor Semaev
2007/284
No title
No Author
2007/283
Provably Secure Framework for Information Aggregation is Sensor Networks
Mark Manulis, Joerg Schwenk
2007/282
Analysis of countermeasures against access driven cache attacks on AES
Johannes Blömer, Volker Krummel
2007/281
A Pollard-like pseudorandom number generator over EC
Grzegorz Wojtenko
2007/280
On solving sparse algebraic equations over finite fields II
Igor Semaev
2007/279
Lossy Trapdoor Functions and Their Applications
Chris Peikert, Brent Waters
2007/278
A Framework for Iterative Hash Functions - HAIFA
Eli Biham, Orr Dunkelman
2007/277
Cryptanalysis of a class of cryptographic hash functions
Praveen Gauravaram, John Kelsey
2007/276
Prolific Codes with the Identifiable Parent Property
Simon R. Blackburn, Tuvi Etzion, Siaw-Lynn Ng
2007/275
`Good' Pseudo-Random Binary Sequences from Elliptic Curves
Zhixiong CHEN, Guozhen XIAO
2007/274
Group-based Proxy Re-encryption scheme
Chunbo Ma, Jun Ao, Jianhua Li
2007/273
Two-Tier Signatures, Strongly Unforgeable Signatures, and Fiat-Shamir without Random Oracles
Mihir Bellare, Sarah Shoup
2007/272
Cryptanalysis of a Hash Function Proposed at ICISC 2006
Willi Geiselmann, Rainer Steinwandt
2007/271
Hash Functions in the Dedicated-Key Setting: Design Choices and MPP Transforms
Mihir Bellare, Thomas Ristenpart
2007/270
Secret Ballot Elections with Unconditional Integrity
David Chaum, Jeroen van de Graaf, Peter Y. A. Ryan, Poorvi L. Vora
2007/269
Voting with Unconditional Privacy by Merging Prêt-à-Voter and PunchScan
Jeroen van de Graaf
2007/268
Affine Precomputation with Sole Inversion in Elliptic Curve Cryptography
Erik Dahmen, Katsuyuki Okeya, Daniel Schepers
2007/267
CRUST: Cryptographic Remote Untrusted Storage without Public Keys
Erel Geron, Avishai Wool
2007/266
Filling the Gap between Voters and Cryptography in e-Voting
Wei Han, Dong Zheng, Ke-fei Chen
2007/265
Which Languages Have 4-Round Zero-Knowledge Proofs?
Jonathan Katz
2007/264
The Power of Proofs-of-Possession: Securing Multiparty Signatures against Rogue-Key Attacks
Thomas Ristenpart, Scott Yilek
2007/263
Efficiency Improvement for NTRU
Johannes Buchmann, Martin Döring, Richard Lindner
2007/262
Certificateless Public Key Encryption Secure against Malicious KGC Attacks in the Standard Model
Yong Ho Hwang, Joseph K. Liu, Sherman S. M. Chow
2007/261
New Form of Permutation Bias and Secret Key Leakage in Keystream Bytes of RC4
Subhamoy Maitra, Goutam Paul
2007/260
An Efficient One-move Nominative Signature Scheme
Dennis Y. W. Liu, Qiong Huang, Duncan S. Wong
2007/259
Algebraic Immunity Hierarchy of Boolean Functions
Ziran Tu, Yingpu Deng
2007/258
UICE: A High-Performance Cryptographic Module for SoC and RFID Applications
Ulrich Kaiser
2007/257
A Forward-Secure Signature with Backward-Secure Detection
Dai-Rui Lin, Chih-I Wang
2007/256
Aspects of Pairing Inversion
S. D. Galbraith, F. Hess, F. Vercauteren
2007/255
Efficient Identity Based Signature in Standard Model
S. Narayan
2007/254
Fully Secure Proxy Re-Encryption without Random Oracles
Jun Shao, Zhenfu Cao, Licheng Wang, Xiaohui Liang
2007/253
Choosing the correct elliptic curve in the CM method
K. Rubin, A. Silverberg
2007/252
A Verifiable Voting Protocol based on Farnel
Roberto Araujo, Ricardo Felipe Custodio, Jeroen van de Graaf
2007/251
A Cryptographic Model for Branching Time Security Properties -- the Case of Contract Signing Protocols
Vëronique Cortier, Ralf Kuesters, Bogdan Warinschi
2007/250
Efficient and Provably-Secure Certificateless Short Signature Scheme from Bilinear Pairings
Hongzhen Du, Qiaoyan Wen
2007/249
Randomness Extraction via Delta-Biased Masking in the Presence of a Quantum Attacker
Serge Fehr, Christian Schaffner
2007/248
1. AES seems weak. 2. Linear time secure cryptography
Warren D. Smith
2007/247
A Note on the Ate Pairing
Chang-An Zhao, Fangguo Zhang, Jiwu Huang
2007/246
BEDA: Button-Enabled Device Pairing
Claudio Soriente, Gene Tsudik, Ersin Uzun
2007/245
Incorporating Temporal Capabilities in Existing Key Management Schemes
Mikhail J. Atallah, Marina Blanton, Keith B. Frikken
2007/244
A Note on the Relay Attacks on e-passports: The Case of Czech e-passports
Martin Hlavac, Tomas Rosa
2007/243
PORs: Proofs of Retrievability for Large Files
Ari Juels, Burton S. Kaliski Jr.
2007/242
Time-Memory-Data Trade-off Attack on Stream Ciphers based on Maiorana-McFarland Functions
Khoongming Khoo, Guanhan Chew, Guang Gong, Hian-Kiat Lee
2007/241
Attribute Based Group Signature with Revocation
Dalia Khader
2007/240
A Four-Component Framework for Designing and Analyzing Cryptographic Hash Algorithms
George I. Davida, Jeremy A. Hansen
2007/239
Making Large Hash Functions From Small Compression Functions
William R. Speirs, Ian Molloy
2007/238
Long-lived digital integrity using short-lived hash functions
Stuart Haber
2007/237
Forward-secure Key Evolution in Wireless Sensor Networks
Marek Klonowski, Mirosław Kutyłowski, Michał Ren, Katarzyna Rybarczyk
2007/236
Certificateless Ring Signatures
Sherman S. M. Chow, Wun-She Yap
2007/235
Blind Identity-Based Encryption and Simulatable Oblivious Transfer
Matthew Green, Susan Hohenberger
2007/234
Provable-Security Analysis of Authenticated Encryption in Kerberos
Alexandra Boldyreva, Virendra Kumar
2007/233
On Simulatability Soundness and Mapping Soundness of Symbolic Cryptography
Michael Backes, Markus Duermuth, Ralf Kuesters
2007/232
A new paradigm of chosen ciphertext secure public key encryption scheme
Xianhui Lu, Xuejia Lai, Dake He
2007/231
Secure Two-Party k-Means Clustering
Paul Bunn, Rafail Ostrovsky
2007/230
New Weaknesses in the Keystream Generation Algorithms of the Stream Ciphers TPy and Py
Gautham Sekar, Souradyuti Paul, Bart Preneel
2007/229
Domain Extension of Public Random Functions: Beyond the Birthday Barrier
Ueli Maurer, Stefano Tessaro
2007/228
AN OPTIMIZED HARDWARE ARCHITECTURE OF MONTGOMERY MULTIPLICATION ALGORITHM
Miaoqing Huang, Kris Gaj, Soonhak Kwon, Tarek El-Ghazawi
2007/227
Related-Key Statistical Cryptanalysis
Darakhshan J. Mir, Poorvi L. Vora
2007/226
Generalized mix functions and orthogonal equitable rectangles
Douglas R. Stinson
2007/225
On the Forgeability of Wang-Tang-Li's ID-Based Restrictive Partially Blind Signature
Shengli Liu, Xiaofeng Chen, Fangguo Zhang
2007/224
A Novel Mutual Authentication Scheme Based on Quadratic Residues for RFID Systems
Jue-Sam Chou, Guey-Chuen Lee, Chung-Ju Chan
2007/223
On the Impossibility of Highly-Efficient Blockcipher-Based Hash Functions
John Black, Martin Cochran, Thomas Shrimpton
2007/222
Towards Security Limits in Side-Channel Attacks
Francois-Xavier Standaert, Eric Peeters, Cedric Archambeau, Jean-Jacques Quisquater
2007/221
Generalized Key Delegation for Hierarchical Identity-Based Encryption
Michel Abdalla, Eike Kiltz, Gregory Neven
2007/220
A New Provably Secure Authentication and Key Agreement Mechanism for SIP Using Certificateless Public-key Cryptography
Fengjiao WANG, Yuqing ZHANG
2007/219
A New Provably Secure Authentication and Key Agreement Protocol for SIP Using ECC
Liufei Wu, Yuqing Zhang, Fengjiao Wang
2007/218
Differential Cryptanalysis in Stream Ciphers
Eli Biham, Orr Dunkelman
2007/217
Identity-Based Broadcast Encryption
Ryuichi Sakai, Jun Furukawa
2007/216
Unlinkable Divisible Digital Cash without Trusted Third Party
Pawel Pszona, Grzegorz Stachowiak
2007/215
Extending Oblivious Transfers Efficiently - How to get Robustness Almost for Free
Jesper Buus Nielsen
2007/214
Matrix Power S-Box Construction
Eligijus Sakalauskas, Kestutis Luksys
2007/213
Unlinkable Randomizable Signature and Its Application in Group Signature
Sujing Zhou, Dongdai Lin
2007/212
The constructing of $3$-resilient Boolean functions of $9$ variables with nonlinearity $240$.
Andrey Khalyavin
2007/211
Scalable Storage Scheme from Forward Key Rotation
Chunbo Ma, Jun Ao, Jianhua Li
2007/210
Efficient chosen ciphertext secure PKE scheme with short ciphertext
Xianhui Lu, Xuejia Lai, Dake He, Guomin Li
2007/209
Bilateral Unknown Key-Share Attacks in Key Agreement Protocols
Liqun Chen, Qiang Tang
2007/208
RC4 State Information at Any Stage Reveals the Secret Key
Goutam Paul, Subhamoy Maitra
2007/207
On an Improved Correlation Analysis of Stream Ciphers Using Muti-Output Boolean Functions and the Related Generalized Notion of Nonlinearity
Claude Carlet, Khoongming Khoo, Chu-Wee Lim, Chuan-Wen Loe
2007/206
Automatic Search of Differential Path in MD4
Pierre-Alain Fouque, Gaetan Leurent, Phong Nguyen
2007/205
A kilobit special number field sieve factorization
Kazumaro Aoki, Jens Franke, Thorsten Kleinjung, Arjen Lenstra, Dag Arne Osvik
2007/204
Dragon-MAC: Securing Wireless Sensor Networks with Authenticated Encryption
Shu Yun Lim, Chuan Chin Pu, Hyo Taek Lim, Hoon Jae Lee
2007/203
Kipnis-Shamir's Attack on HFE Revisited
Xin Jiang, Jintai Ding, Lei Hu
2007/202
Provable Data Possession at Untrusted Stores
Giuseppe Ateniese, Randal Burns, Reza Curtmola, Joseph Herring, Lea Kissner, Zachary Peterson, Dawn Song
2007/201
The BBG HIBE Has Limited Delegation
Hovav Shacham
2007/200
ProSiBIR: Proactive Signer-Base Intrusion Resilient Signatures
Philip Atzemoglou, Tal Malkin
2007/199
A Framework for Game-Based Security Proofs
David Nowak
2007/198
Mutual Information Analysis -- A Universal Differential Side-Channel Attack
Benedikt Gierlichs, Lejla Batina, Pim Tuyls
2007/197
On-Line Ciphers and the Hash-CBC Constructions
Mihir Bellare, Alexandra Boldyreva, Lars Knudsen, Chanathip Namprempre
2007/196
An Efficient Certificateless Signature Scheme
Rafael Castro, Ricardo Dahab
2007/195
Verifying Statistical Zero Knowledge with Approximate Implementations
Ling Cheung, Sayan Mitra, Olivier Pereira
2007/194
Enhanced Privacy ID: A Direct Anonymous Attestation Scheme with Enhanced Revocation Capabilities
Ernie Brickell, Jiangtao Li
2007/193
Some Identity Based Strong Bi-Designated Verifier Signature Schemes
Sunder Lal, Vandani Verma
2007/192
Optimal Irreducible Polynomials for GF(2^m) Arithmetic
Michael Scott
2007/191
Deniable Internet Key-Exchange
Andrew C. C. Yao, Frances F. Yao, Yunlei Zhao, Bin Zhu
2007/190
Some General Results on Chosen-ciphertext Anonymity in Public-key Encryption
Tian Yuan
2007/189
An Improved One-Round ID-Based Tripartite Authenticated Key Agreement Protocol
Meng-Hui Lim, Sanggon Lee
2007/188
A Proof of Revised Yahalom Protocol in the Bellare and Rogaway (1993) Model
Kim-Kwang Raymond Choo
2007/187
Executing Modular Exponentiation on a Graphics Accelerator
Andrew Moss, Dan Page, Nigel Smart
2007/186
Fully Anonymous Group Signatures without Random Oracles
Jens Groth
2007/185
New FORK-256
Deukjo Hong, Donghoon Chang, Jaechul Sung, Sangjin Lee, Seokhie Hong, Jesang Lee, Dukjae Moon, Sungtaek Chee
2007/184
Provable password-based tripartite key agreement protocol
Chunbo Ma, Jun Ao, Jianhua Li
2007/183
Provably Secure Ciphertext Policy ABE
Ling Cheung, Calvin Newport
2007/182
Optimistic Fair Exchange in a Multi-user Setting
Yevgeniy Dodis, Pil Joong Lee, Dae Hyun Yum
2007/181
A New Method for Speeding Up Arithmetic on Elliptic Curves over Binary Fields
Kwang Ho Kim, So In Kim
2007/180
A Novel Secure Session Key Generation using two-level architecture For Cluster-Based Ad Hoc Networks Based On ID-Based Bilinear Paring
Jue-Sam Chou, Yalin Chen, Tsung-Heng Chen
2007/179
New Fast Algorithms for Arithmetic on Elliptic Curves over Fields of Characteristic Three
Kwang Ho Kim, So In Kim, Ju Song Choe
2007/178
Utility Sampling for Trust Metrics in PKI
Dakshi Agrawal and Charanjit Jutla
2007/177
Space-Efficient Identity Based Encryption Without Pairings
Dan Boneh, Craig Gentry, Michael Hamburg
2007/176
Seven-Property-Preserving Iterated Hashing: ROX
Elena Andreeva, Gregory Neven, Bart Preneel, Thomas Shrimpton
2007/175
Embedding Degree of Hyperelliptic Curves with Complex Multiplication
Christian Robenhagen Ravnshoj
2007/174
Counting hyperelliptic curves that admit a Koblitz model
Cevahir Demirkiran, Enric Nart
2007/173
Provable Secure Generalized Signcryption
Xu An Wang, Xiaoyuan Yang, Yiliang Han
2007/172
Batch Verification of Short Signatures
Jan Camenisch, Susan Hohenberger, Michael Østergaard Pedersen
2007/171
Chosen-Ciphertext Secure Proxy Re-Encryption
Ran Canetti, Susan Hohenberger
2007/170
Clone Resistant Mutual Authentication for Low-Cost RFID Technology
Stephane Lemieux, Adrian Tang
2007/169
On the Security of Protocols with Logarithmic Communication Complexity
Michael Backes, Dominique Unruh
2007/168
Random Oracles and Auxiliary Input
Dominique Unruh
2007/167
Public Key Broadcast Encryption with Low Number of Keys and Constant Decryption Time (Version 2)
Yi-Ru Liu, Wen-Guey Tzeng
2007/166
Enhancing Security of a Group Key Exchange Protocol for Users with Individual Passwords
Junghyun Nam
2007/165
Inductive Proof Method for Computational Secrecy
Arnab Roy, Anupam Datta, Ante Derek, John C. Mitchell
2007/164
Yet Another MicroArchitectural Attack: Exploiting I-cache
Onur Aciicmez
2007/163
Secure Deniable Authenticated Key Establishment for Internet Protocols
Meng-Hui Lim, Sanggon Lee, Youngho Park, Sangjae Moon
2007/162
Bingo Voting: Secure and coercion-free voting using a trusted random number generator
Jens-Matthias Bohli, Joern Mueller-Quade, Stefan Roehrich
2007/161
Collusion-Resistant Group Key Management Using Attribute-Based Encryption
Ling Cheung, Joseph A. Cooley, Roger Khazan, Calvin Newport
2007/160
Analysis of Collusion-Attack Free ID-Based Non-Interactive Key Sharing
Muxiang Zhang
2007/159
Attribute Based Group Signatures
Dalia Khader
2007/158
A Simple Security Analysis of Hash-CBC and a New Efficient One-Key Online Cipher
Mridul Nandi
2007/157
ConSum v0: An Experimental Cipher
David A. Madore
2007/156
Computational Semantics for Basic Protocol Logic - A Stochastic Approach
Gergei Bana, Koji Hasebe, Mitsuhiro Okada
2007/155
Efficient Non-interactive Proof Systems for Bilinear Groups
Jens Groth, Amit Sahai
2007/154
Edon--${\cal R}(256,384,512)$ -- an Efficient Implementation of Edon--${\cal R}$ Family of Cryptographic Hash Functions
Danilo Gligoroski, Svein Johan Knapskog
2007/153
Cryptographic Hardness based on the Decoding of Reed-Solomon Codes
Aggelos Kiayias, Moti Yung
2007/152
CTC2 and Fast Algebraic Attacks on Block Ciphers Revisited
Nicolas T. Courtois
2007/151
Deterministic History-Independent Strategies for Storing Information on Write-Once Memories
Tal Moran, Moni Naor, Gil Segev
2007/150
Generators of Jacobians of Hyperelliptic Curves
Christian Robenhagen Ravnshoj
2007/149
Towards Generating Secure Keys for Braid Cryptography
Ki Hyoung Ko, Jang Won Lee, Tony Thomas
2007/148
Practical Compact E-Cash
Man Ho Au, Willy Susilo, Yi Mu
2007/147
Using decision problems in public key cryptography
Vladimir Shpilrain, Gabriel Zapata
2007/146
Time Capsule Signature: Efficient and Provably Secure Constructions
Bessie C. Hu, Duncan S. Wong, Qiong Huang, Guomin Yang, Xiaotie Deng
2007/145
Finding Collisions in Interactive Protocols -- A Tight Lower Bound on the Round Complexity of Statistically-Hiding Commitments
Iftach Haitner, Jonathan J. Hoch, Omer Reingold, Gil Segev
2007/144
Two New Examples of TTM
T. Moh
2007/143
Offline/Online Mixing
Ben Adida, Douglas Wikström
2007/142
An Enhanced One-round Pairing-based Tripartite Authenticated Key Agreement Protocol
Meng-Hui Lim, Sanggon Lee, Youngho Park, Hoonjae Lee
2007/141
Practical Cryptanalysis of SFLASH
Vivien Dubois, Pierre-Alain Fouque, Adi Shamir, Jacques Stern
2007/140
Hidden Identity-Based Signatures
Aggelos Kiayias, Hong-Sheng Zhou
2007/139
The Delivery and Evidences Layer
Amir Herzberg, Igal Yoffe
2007/138
Efficient Pairing Computation on Curves
Rongquan Feng, Hongfeng Wu
2007/137
Multivariates Polynomials for Hashing
Jintai Ding, Bo-yin Yang
2007/136
Fair Exchange Signature Schemes
Jingwei Liu, Rong Sun, Weidong Kou, Xinmei Wang
2007/135
Efficient ID-based Signature Without Trusted PKG
Jingwei Liu, Rong Sun, Weidong Kou, Xinmei Wang
2007/134
Estimation of keys stored in CMOS cryptographic device after baking by using the charge shift
Osman Kocar
2007/133
New Communication-Efficient Oblivious Transfer Protocols Based on Pairings
Helger Lipmaa
2007/132
Equivocal Blind Signatures and Adaptive UC-Security
Aggelos Kiayias, Hong-Sheng Zhou
2007/131
Noninteractive Manual Channel Message Authentication Based On eTCR Hash Functions
Mohammad Reza Reyhanitabar, Shuhong Wang, Reihaneh Safavi-Naini
2007/130
Some Results on Anonymity in Hybrid Encryption
Tian Yuan, Chen Zhi-Yu, Jin Yuee, Jin Feng, Ma Huihui
2007/129
An Algebraic Analysis of Trivium Ciphers based on the Boolean Satisfiability Problem
Cameron McDonald, Chris Charnes, Josef Pieprzyk
2007/128
Computationally Sound Mechanized Proofs of Correspondence Assertions
Bruno Blanchet
2007/127
CCA2-Secure Threshold Broadcast Encryption with Shorter Ciphertexts
Vanesa Daza, Javier Herranz, Paz Morillo, Carla Ràfols
2007/126
An Interesting Member ID-based Group Signature
Sujing Zhou, Dongdai Lin
2007/125
Attacking the IPsec Standards in Encryption-only Configurations
Jean Paul Degabriele, Kenneth G. Paterson
2007/124
Rebuttal of overtaking VEST
Benjamin Gittins, Howard Landman
2007/123
Obtaining a secure and efficient key agreement protocol from (H)MQV and NAXOS
Berkant Ustaoglu
2007/122
On the Security of three Versions of the WAI Protocol in Chinese WLAN Implementation Plan
Qiang Tang
2007/121
Certificateless Encryption Schemes Strongly Secure in the Standard Model
Alexander W. Dent, Benoit Libert, Kenneth G. Paterson
2007/120
Breaking 104 bit WEP in less than 60 seconds
Erik Tews, Ralf-Philipp Weinmann, Andrei Pyshkin
2007/119
Rerandomizable RCCA Encryption
Manoj Prabhakaran, Mike Rosulek
2007/118
Smooth Projective Hashing and Two-Message Oblivious Transfer
Shai Halevi, Yael Tauman Kalai
2007/117
Improving the lower bound on the higher order nonlinearity of Boolean functions with prescribed algebraic immunity
Sihem Mesnager
2007/116
A Zero-Knowledge Identification and Key Agreement Protocol
D. R. Stinson, J. Wu
2007/115
Quadratic Almost Perfect Nonlinear Functions With Many Terms
Carl Bracken, Eimear Byrne, Nadya Markin, Gary McGuire
2007/114
High Efficiency Feedback Shift Register: $\sigma-$LFSR
Guang Zeng, Wenbao Han, Kaicheng He
2007/113
An Enhanced ID-based Deniable Authentication Protocol on Pairings
Meng-Hui Lim, Sanggon Lee, Youngho Park, Hoonjae Lee
2007/112
Decomposed Attack for the Jacobian of a Hyperelliptic Curve over an Extension Field
Koh-ichi Nagao
2007/111
Privacy-Preserving Distributed Set Intersection
Qingsong Ye, Huaxiong Wang, Christophe Tartary
2007/110
Construction of Pairing-Friendly Elliptic Curves
Woo Sug Kang
2007/109
How to Enrich the Message Space of a Cipher
Thomas Ristenpart, Phillip Rogaway
2007/108
An Improved Distinguisher for Dragon
Joo Yeon Cho, Josef Pieprzyk
2007/107
Knapsack Public-Key Cryptosystem Using Chinese Remainder Theorem
Yasuyuki MURAKAMI, Takeshi NASAKO
2007/106
A generalization of Secret Sharing Scheme on the Basis of Recovering Algorithm, K-RA
Masao KASAHARA
2007/105
Isodual Reduction of Lattices
Nicholas A. Howgrave-Graham
2007/104
Cryptanalysis of White-Box DES Implementations with Arbitrary External Encodings
Brecht Wyseur, Wil Michiels, Paul Gorissen, Bart Preneel
2007/103
Another Look at Square Roots and Traces (and Quadratic Equations) in Fields of Even Characteristic
Roberto Avanzi
2007/102
On the Role of Scheduling in Simulation-Based Security
Ran Canetti, Ling Cheung, Nancy Lynch, Olivier Pereira
2007/101
Practical Password Recovery on an MD5 Challenge and Response
Yu Sasaki, Go Yamamoto, Kazumaro Aoki
2007/100
Practical Identity-Based Encryption (IBE) in Multiple PKG Environments and Its Applications
Shengbao Wang, Zhenfu Cao
2007/099
Inferring sequences produced by a linear congruential generator on elliptic curves missing high--order bits
Jaime Gutierrez, Alvar Ibeas
2007/098
Classes of Quadratic APN Trinomials and Hexanomials and Related Structures
Lilya Budaghyan, Claude Carlet
2007/097
Large Cyclic Subgroups of Jacobians of Hyperelliptic Curves
Christian Robenhagen Ravnshøj
2007/096
Somos Sequence Near-Addition Formulas and Modular Theta Functions
R. Wm. Gosper, Rich Schroeppel
2007/095
Generic Certificateless Encryption in the Standard Model
Qiong Huang, Duncan S. Wong
2007/094
Mesh Signatures : How to Leak a Secret with Unwitting and Unwilling Participants
Xavier Boyen
2007/093
HAPADEP: Human Asisted Pure Audio Device Pairing
Claudio Soriente, Gene Tsudik, Ersin Uzun
2007/092
PRIME POINTS ON ELLIPTIC CURVES AND ITS IMPACT ON ECDLP
Grzegorz Wojtenko
2007/091
Arithmetic Operators for Pairing-Based Cryptography
Jean-Luc Beuchat, Nicolas Brisebarre, Jérémie Detrey, Eiji Okamoto
2007/090
On the security of an image encryption scheme
Chengqing Li, Shujun Li, Muhammad Asim, Juana Nunez, Gonzalo Alvarez, Guanrong Chen
2007/089
Black-Box Extension Fields and the Inexistence of Field-Homomorphic One-Way Permutations
Ueli Maurer, Dominik Raub
2007/088
An Algorithm for Finding Small Roots of Multivariate Polynomials over the Integers
Domingo Gomez, Jaime Gutierrez, Alvar Ibeas
2007/087
Improvement on a Digital Signature Scheme without using One-way Hash and Message Redundancy
Jie Liu, Jianhua Li
2007/086
Non-Interactive Proofs for Integer Multiplication
Ivan Damgard, Rune Thorbek
2007/085
MultiCollision Attack on the Compression Functions of MD4 and 3-Pass HAVAL
Hongbo Yu, Xiaoyun Wang
2007/084
Constant Size Ciphertext HIBE in the Augmented Selective-ID Model and its Extensions
Sanjit Chatterjee, Palash Sarkar
2007/083
Public Key Encryption Which is Simultaneously a Locally-Decodable Error-Correcting Code
Brett Hemenway, Rafail Ostrovsky
2007/082
Deniable Authentication on the Internet
Shaoquan Jiang
2007/081
Revisiting an Efficient Elliptic Curve Key Agreement Protocol
Maurizio Adriano Strangio
2007/080
Weakly only Unforgeable Signature and Its Application in Group Signature
Sujing Zhou, Dongdai Lin
2007/079
How To Find Many Collisions of 3-Pass HAVAL
Kazuhiro Suzuki, Kaoru Kurosawa
2007/078
MPC vs. SFE: Perfect Security in a Unified Corruption Model
Zuzana Beerliova-Trubiniova, Matthias Fitzi, Martin Hirt, Ueli Maurer, Vassilis Zikas
2007/077
On bent functions with zero second derivatives
Sugata Gangopadhyay
2007/076
Almost Secure (1-Round, n-Channel) Message Transmission Scheme
Kaoru Kurosawa, Kazuhiro Suzuki
2007/075
Weaknesses in the Pseudorandom Bit Generation Algorithms of the Stream Ciphers TPypy and TPy
Gautham Sekar, Souradyuti Paul, Bart Preneel
2007/074
A Cramer-Shoup Encryption Scheme from the Linear Assumption and from Progressively Weaker Linear Variants
Hovav Shacham
2007/073
Public Key Encryption that Allows PIR Queries
Dan Boneh, Eyal Kushilevitz, Rafail Ostrovsky, William E. Skeith III
2007/072
A Hybrid Approach to Concurrent Error Detection for a Compact ASIC Implementation of the Advanced Encryption Standard
Namin Yu, Howard M. Heys
2007/071
Knowledge-Binding Commitments with Applications in Time-Stamping (Full Version)
Ahto Buldas, Sven Laur
2007/070
Two Linear Distinguishing Attacks on VMPC and RC4A and Weakness of RC4 Family of Stream Ciphers (Corrected)
Alexander Maximov
2007/069
Nominative Signature: Application, Security Model and Construction
Dennis Y. W. Liu, Duncan S. Wong, Xinyi Huang, Guilin Wang, Qiong Huang, Yi Mu, Willy Susilo
2007/068
Efficient Hierarchical Identity Based Signature in the Standard Model
Man Ho Au, Joseph K. Liu, Tsz Hon Yuen, Duncan S. Wong
2007/067
withdrawn
withdrawn
2007/066
Low-Density Attack Revisited
Tetsuya Izu, Jun Kogure, Takeshi Koshiba, Takeshi Shimoyama
2007/065
How to Derive Lower Bound on Oblivious Transfer Reduction
Kaoru Kurosawa, Wataru Kishimoto, Takeshi Koshiba
2007/064
Algebraic Lower Bounds for Computing on Encrypted Data
Rafail Ostrovsky, William E. Skeith III
2007/063
Constructing new APN functions from known ones
Lilya Budaghyan, Claude Carlet, Gregor Leander
2007/062
Algebraic and Slide Attacks on KeeLoq
Nicolas T. Courtois, Gregory V. Bard, David Wagner
2007/061
Accelerating SSL using the Vector processors in IBM's Cell Broadband Engine for Sony's Playstation 3
Neil Costigan, Michael Scott
2007/060
Security Against Covert Adversaries: Efficient Protocols for Realistic Adversaries
Yonatan Aumann, Yehuda Lindell
2007/059
A Survey of Single Database PIR: Techniques and Applications
Rafail Ostrovsky, William E. Skeith III
2007/058
The simplest method for constructing APN polynomials EA-inequivalent to power functions
Lilya Budaghyan
2007/057
Constructing pairing-friendly genus 2 curves over prime fields with ordinary Jacobians
David Freeman
2007/056
Enforcing Semantic Integrity on Untrusted Clients in Networked Virtual Environments
Somesh Jha, Stefan Katzenbeisser, Christian Schallhart, Helmut Veith, Stephen Chenney
2007/055
Cryptanalysis of the KeeLoq block cipher
Andrey Bogdanov
2007/054
Cryptanalysis of Stream Ciphers Based on Arrays and Modular Addition
Souradyuti Paul
2007/053
Compiler Assisted Elliptic Curve Cryptography
M. Barbosa, A. Moss, D. Page
2007/052
Forward-Secure Sequential Aggregate Authentication
Di Ma, Gene Tsudik
2007/051
Forward-secure RFID Authentication and Key Exchange
Tri van Le, Mike Burmester, Breno de Medeiros
2007/050
Special block cipher family DN and new generation SNMAC-type hash function family HDN
Vlastimil KLIMA
2007/049
Security Arguments for a Class of ID-based Signatures
jin zhou, ya-juan zhang, yue-fei zhu
2007/048
A Security Analysis of the NIST SP 800-90 Elliptic Curve Random Number Generator
Daniel R. L. Brown, Kristian Gjøsteen
2007/047
New Constructions of Fuzzy Identity-Based Encryption
Joonsang Baek, Willy Susilo, Jianying Zhou
2007/046
Direct Reduction of String (1,2)-OT to Rabin's OT
Kaoru Kurosawa, Takeshi Koshiba
2007/045
A Coprocessor for the Final Exponentiation of the $\eta_T$ Pairing in Characteristic Three
Jean-Luc Beuchat, Nicolas Brisebarre, Masaaki Shirase, Tsuyoshi Takagi, Eiji Okamoto
2007/044
Design and Primitive Specification for Shannon
Philip Hawkes, Cameron McDonald, Michael Paddon, Gregory Rose, Miriam Wiggers de Vries
2007/043
Reflection Attacks on Product Ciphers
Orhun Kara
2007/042
Authorship Proof for Textual Document
J. Wu, D. R. Stinson
2007/041
Symmetric Tardos fingerprinting codes for arbitrary alphabet sizes
B. Skoric, S. Katzenbeisser, M. U. Celik
2007/040
Efficient Quintuple Formulas for Elliptic Curves and Efficient Scalar Multiplication Using Multibase Number Representation
Pradeep Kumar Mishra, Vassil Dimitrov
2007/039
New Branch Prediction Vulnerabilities in OpenSSL and Necessary Software Countermeasures
Onur Aciicmez, Shay Gueron, Jean-Pierre Seifert
2007/038
Multiple Modular Additions and Crossword Puzzle Attack on NLSv2
Joo Yeon Cho, Josef Pieprzyk
2007/037
Best Quadratic Approximations of Cubic Boolean Functions
Nicholas Kolokotronis, Konstantinos Limniotis, Nicholas Kalouptsidis
2007/036
Chosen-Ciphertext Secure Key-Encapsulation Based on Gap Hashed Diffie-Hellman
Eike Kiltz
2007/035
Cryptanalysis of white box DES implementations
Louis Goubin, Jean-Michel Masereel, Michael Quisquater
2007/034
A New Type of Cipher: DICING_CSB
Li An-Ping
2007/033
From Selective-ID to Full Security: The Case of the Inversion-Based Boneh-Boyen IBE Scheme
Eike Kiltz
2007/032
An improved collision probability for CBC-MAC and PMAC
Avradip Mandal, Mridul Nandi
2007/031
Improved Security Analysis of PMAC
Mridul Nandi, Avradip Mandal
2007/030
Formal Security Treatments for IBE-to-Signature Transformation: Relations among Security Notions
Yang Cui, Eiichiro Fujisaki, Goichiro Hanaoka, Hideki Imai, Rui Zhang
2007/029
A General Construction of Tweakable Block Ciphers and Different Modes of Operations
Debrup Chakraborty, Palash Sarkar
2007/028
HCH: A New Tweakable Enciphering Scheme Using the Hash-Counter-Hash Approach
Debrup Chakraborty, Palash Sarkar
2007/027
Verifying Data Integrity with Few Queries to Untrusted Memory
Nachiketh R. Potlapally
2007/026
Cryptanalysis and Improvement of an Elliptic Curve Diffie-Hellman Key Agreement Protocol
Shengbao Wang, Zhenfu Cao, Maurizio Adriano Strangio, Lihua Wang
2007/025
Private Locally Decodable Codes
Rafail Ostrovsky, Omkant Pandey, Amit Sahai
2007/024
Efficient Methods for Conversion and Solution of Sparse Systems of Low-Degree Multivariate Polynomials over GF(2) via SAT-Solvers
Gregory V. Bard, Nicolas T. Courtois, Chris Jefferson.
2007/023
Efficient Hybrid Encryption from ID-Based Encryption
Masayuki Abe, Yang Cui, Hideki Imai, Eike Kiltz
2007/022
On Perfectly Balanced Boolean Functions
O. A. Logachev
2007/021
Two Trivial Attacks on Trivium
Alexander Maximov, Alex Biryukov
2007/020
TinyTate: Identity-Based Encryption for Sensor Networks
Leonardo B. Oliveira, Diego Aranha, Eduardo Morais, Felipe Daguano, Julio Lo'pez, Ricardo Dahab
2007/019
Fast Digital Signature Schemes as Secure as Diffie-Hellman Assumptions
Changshe Ma, Jian Weng, Dong Zheng
2007/018
Strongly-Secure Identity-based Key Agreement and Anonymous Extension
Sherman S. M. Chow, Kim-Kwang Raymond Choo
2007/017
Group Decryption
Bo Qin, Qianhong Wu, Willy Susilo, Yi Mu, Yumin Wang
2007/016
VEST Ciphers
Sean O'Neil, Benjamin Gittins, Howard A. Landman
2007/015
Group Encryption
Aggelos Kiayias, Yiannis Tsiounis, Moti Yung
2007/014
Invertible Universal Hashing and the TET Encryption Mode
Shai Halevi
2007/013
Optimised versions of the Ate and Twisted Ate Pairings
Seiichi Matsuda, Naoki Kanayama, Florian Hess, Eiji Okamoto
2007/012
Interactive two-channel message authentication based on interactive-collision Resistant hash functions
Atefeh Mashatan, Douglas R. Stinson
2007/011
Universally Composable Key-evolving Signature
Jin Zhou, TingMao Chang, YaJuan Zhang, YueFei Zhu
2007/010
Computing endomorphism rings of Jacobians of genus 2 curves over finite fields
David Freeman, Kristin Lauter
2007/009
New Public Key Cryptosystems Using Polynomials over Non-commutative Rings
Zhenfu Cao, Xiaolei Dong, Licheng Wang
2007/008
Security analysis of the variant of the self-shrinking generator proposed at ICISC 2006
Dong Hoon Lee, Je Hong Park, Jaewoo Han
2007/007
One-Round ID-Based Blind Signature Scheme without ROS Assumption
Wei Gao, Xueli Wang, Guilin Wang, Fei Li
2007/006
Efficient Dynamic k-Times Anonymous Authentication
Lan Nguyen
2007/005
Privacy-Protecting Coupon System Revisited
Lan Nguyen
2007/004
Cryptanalysis of Hwang-Chang’s a Time-Stamp Protocol for Digital Watermarking
Jue-Sam Chou, Yalin Chen, Chung-Ju Chan
2007/003
The Energy Cost of Cryptographic Key Establishment in Wireless Sensor Networks
Johann Groszschaedl, Alexander Szekely, Stefan Tillich
2007/002
Cryptanalysis of An Oblivious Polynomial Evaluation Protocol Based On Polynomial Reconstruction Problem
Huang Lin, Zhenfu Cao
2007/001
Families of genus 2 curves with small embedding degree
Laura Hitt
2006/486
Inductive Trace Properties for Computational Security
Arnab Roy, Anupam Datta, Ante Derek, John C. Mitchell
2006/485
Indifferentiability of Single-Block-Length and Rate-1 Compression Functions
Hidenori Kuwakado, Masakatu Morii
2006/484
A New Identity Based Encryption Scheme From Pairing
Xianhui Lu, Dake He, Guomin Li
2006/483
New Constructions for Provably-Secure Time-Bound Hierarchical Key Assignment Schemes
Alfredo De Santis, Anna Lisa Ferrara, Barbara Masucci
2006/482
Countermeasures for the Simple Branch Prediction Analysis
Giovanni Agosta, Gerardo Pelosi
2006/481
A Practical Limit of Security Proof in the Ideal Cipher Model : Possibility of Using the Constant As a Trapdoor In Several Double Block Length Hash Functions
Donghoon Chang
2006/480
Cryptanalysis of REESSE1+ Public Key Cryptosystem
Shengli Liu, Fangguo Zhang
2006/479
Efficient Provably-Secure Hierarchical Key Assignment Schemes
Alfredo De Santis, Anna Lisa Ferrara, Barbara Masucci
2006/478
Near-Collision Attack and Collision-Attack on Double Block Length Compression Functions based on the Block Cipher IDEA
Donghoon Chang
2006/477
Dynamic Cryptographic Hash Functions
William R. Speirs II, Samuel S. Wagstaff Jr.
2006/476
Password-Authenticated Multi-Party Key Exchange with Different Passwords
Jeong Ok Kwon, Ik Rae Jeong, Kouichi Sakurai, Dong Hoon Lee
2006/475
New Technique for Solving Sparse Equation Systems
Håvard Raddum, Igor Semaev
2006/474
Speeding up the Bilinear Pairings Computation on Curves with Automorphisms
Chang-An Zhao, Fangguo Zhang, Jiwu Huang
2006/473
Identity-Based Proxy Re-encryption
Matthew Green, Giuseppe Ateniese
2006/472
A Framework for Interactive Argument Systems using Quasigroupic Homorphic Commitment
Luis Teixeira d'Aguiar Norton Brandao
2006/471
Multiplication and Squaring on Pairing-Friendly Fields
Augusto Jun Devegili, Colm Ó~hÉigeartaigh, Michael Scott, Ricardo Dahab
2006/470
On the security of a group key agreement protocol
Qiang Tang
2006/469
An Attack on Disguised Elliptic Curves
David Mireles
2006/468
White Box Cryptography: Another Attempt
Julien Bringer, Herve Chabanne, Emmanuelle Dottax
2006/467
Do We Need to Vary the Constants? (Methodological Investigation of Block-Cipher Based Hash Functions)
Donghoon Chang, Moti Yung
2006/466
Prime Order Primitive Subgroups in Torus-Based Cryptography
Jason E. Gower
2006/465
Security and Composition of Cryptographic Protocols: A Tutorial
Ran Canetti
2006/464
Remarks on "Analysis of One Popular Group Signature Scheme'' in Asiacrypt 2006
Giuseppe Ateniese, Jan Camenisch, Marc Joye, Gene Tsudik
2006/463
Obfuscation for Cryptographic Purposes
Dennis Hofheinz, John Malone-Lee, Martijn Stam
2006/462
Improved Collision and Preimage Resistance Bounds on PGV Schemes
Lei Duo, Chao Li
2006/461
On Post-Modern Cryptography
Oded Goldreich
2006/460
Preimage Attacks On Provably Secure FFT Hashing proposed at Second Hash Workshop in 2006
Donghoon Chang
2006/459
Recursive lower bounds on the nonlinearity profile of Boolean functions and their applications
Claude Carlet
2006/458
Copyrighting Public-key Functions and Applications to Black-box Traitor Tracing
Aggelos Kiayias, Moti Yung
2006/457
Linear Approximating to Integer Addition
Li An-Ping
2006/456
Indistinguishability Amplification
Ueli Maurer, Krzysztof Pietrzak, Renato Renner
2006/455
On Achieving the ''Best of Both Worlds'' in Secure Multiparty Computation
Jonathan Katz
2006/454
How to Win the Clone Wars: \\ Efficient Periodic n-Times Anonymous Authentication
Jan Camenisch, Susan Hohenberger, Markulf Kohlweiss, Anna Lysyanskaya, Mira Meyerovich
2006/453
Key Replacement Attack on a Certificateless Signature Scheme
Zhenfeng Zhang, Dengguo Feng
2006/452
Hybrid Protocol For Password-based Key Exchange in Three-party Setting
TingMao Chang, Jin Zhou, YaJuan Zhang, YueFei Zhu
2006/451
Combined Differential, Linear and Related-Key Attacks on Block Ciphers and MAC Algorithms
Jongsung Kim
2006/450
Secure Cryptographic Workflow in the Standard Model
M. Barbosa, P. Farshim
2006/449
Robust Computational Secret Sharing and a Unified Account of Classical Secret-Sharing Goals
Mihir Bellare, Phillip Rogaway
2006/448
Universally Composable and Forward Secure RFID Authentication and Key Exchange
Tri van Le, Mike Burmester, Breno de Medeiros
2006/447
Towards a Separation of Semantic and CCA Security for Public Key Encryption
Yael Gertner, Tal Malkin, Steven Myers
2006/446
New Identity-Based Authenticated Key Agreement Protocols from Pairings (without Random Oracles)
Shengbao Wang, Zhenfu Cao, Kim-Kwang Raymond Choo
2006/445
A class of quadratic APN binomials inequivalent to power functions
Lilya Budaghyan, Claude Carlet, Gregor Leander
2006/444
Lattices that Admit Logarithmic Worst-Case to Average-Case Connection Factors
Chris Peikert, Alon Rosen
2006/443
Scalable Authenticated Tree Based Group Key Exchange for Ad-Hoc Groups
Yvo Desmedt, Tanja Lange, Mike Burmester
2006/442
An attack on the certificateless signature scheme from EUC Workshops 2006
Je Hong Park
2006/441
General Distinguishing Attacks on NMAC and HMAC with Birthday Attack Complexity
Donghoon Chang, Mridul Nandi
2006/440
A New Type of Group Signature Scheme
Jun Zhong Dake He
2006/439
A New Type of Group Blind Signature Scheme Based on Bilinear Pairings
Jun Zhong Dake He
2006/438
On the pseudo-random generator ISAAC
Jean-Philippe Aumasson
2006/437
On Zigzag Functions and Related Objects in New Metric
An Braeken, Ventzislav Nikov, Svetla Nikova
2006/436
Statistically-Hiding Commitment from Any One-Way Function
Iftach Haitner, Omer Reingold
2006/435
Searching for Shapes in Cryptographic Protocols (extended version)
Shaddin F. Doghmi, Joshua D. Guttman, F. Javier Thayer
2006/434
Balanced Boolean Functions with (more than) Maximum Algebraic Immunity
Deepak Kumar Dalai, Subhamoy Maitra
2006/433
Information Theoretic Bounds on Authentication Systems in Query Model
Reihaneh Safavi-Naini, Peter Wild
2006/432
Universally Composable Security with Global Setup
Ran Canetti, Yevgeniy Dodis, Rafael Pass, Shabsi Walfish
2006/431
Some Efficient Algorithms for the Final Exponentiation of $\eta_T$ Pairing
Masaaki Shirase, Tsuyoshi Takagi, Eiji Okamoto
2006/430
From Weak to Strong Watermarking
Nicholas Hopper, David Molnar, David Wagner
2006/429
On a new invariant of Boolean functions
Sugata Gangopadhyay, Deepmala Sharma
2006/428
Another class of quadratic APN binomials over $\F_{2^n}$: the case $n$ divisible by 4
Lilya Budaghyan, Claude Carlet, Gregor Leander
2006/427
Pairing-friendly elliptic curves with small security loss by Cheon's algorithm
Aya Comuta, Mitsuru Kawazoe, Tetsuya Takahashi
2006/426
The Bilinear Pairing-based Accumulator Proposed at CT-RSA'05 is not Collision Resistant
Christophe Tartary, Huaxiong Wang
2006/425
A protocol
anoymous
2006/424
Security Analysis of Voice-over-IP Protocols
Prateek Gupta, Vitaly Shmatikov
2006/423
Perfect NIZK with Adaptive Soundness
Masayuki Abe, Serge Fehr
2006/422
Long-term Security and Universal Composability
Joern Mueller-Quade, Dominique Unruh
2006/421
Universally Composable Three-Party Key Distribution
Jin Zhou, TingMao Chang, YaJuan Zhang, YueFei Zhu
2006/420
The REESSE1+ Public Key Cryptosystem v 2.21
Shenghui Su, Shuwang Lv
2006/419
Some New Hidden Ideal Cryptosystems
Ilia Toli
2006/418
Analysis of Privacy-Preserving Element Reduction of Multiset
Jae Hong Seo, HyoJin Yoon, Seongan Lim, Jung Hee Cheon, Dowon Hong
2006/417
The Recent Attack of Nie et al On TTM is Faulty
T. Moh
2006/416
Authenticated Interleaved Encryption
Claude Castelluccia
2006/415
On the Minimal Embedding Field
Laura Hitt
2006/414
Zero Knowledge and Soundness are Symmetric
Shien Jin Ong, Salil Vadhan
2006/413
Preimage Attack on Parallel FFT-Hashing
Donghoon Chang
2006/412
Preimage Attacks on CellHash, SubHash and Strengthened Versions of CellHash and SubHash
Donghoon Chang
2006/411
Preimage Attack on Hashing with Polynomials proposed at ICISC'06
Donghoon Chang
2006/410
Galois Field Commitment Scheme
Alexandre Pinto, André Souto, Armando Matos, Luís Antunes
2006/409
A NEW MAC: LAMA
Li An-Ping
2006/408
A Generic Construction of CCA-Secure Cryptosystems without NIZKP for a Bounded Number of Decryption Queries
Goichiro Hanaoka, Hideki Imai
2006/407
Cryptography in the Multi-string Model
Jens Groth, Rafail Ostrovsky
2006/406
Redundancy of the Wang-Yu Sufficient Conditions
Yuto Nakano, Hidenori Kuwakado, Masakatu Morii
2006/405
Universally Composable Blind Signatures in the Plain Model
Aslak Bakke Buan, Kristian Gøsteen, Lillian Kråkmo
2006/404
Faugere's F5 Algorithm Revisited
Till Stegers
2006/403
Non-Wafer-Scale Sieving Hardware for the NFS: Another Attempt to Cope with 1024-bit
Willi Geiselmann, Rainer Steinwandt
2006/402
Algebraic Cryptanalysis of the Data Encryption Standard
Nicolas T. Courtois, Gregory V. Bard
2006/401
On the cost of cryptanalytic attacks
Jean-Philippe Aumasson
2006/400
Concurrent Statistical Zero-Knowledge Arguments for NP from One Way Functions
Vipul Goyal, Ryan Moriarty, Rafail Ostrovsky, Amit Sahai
2006/399
Multi-Property-Preserving Hash Domain Extension and the EMD Transform
Mihir Bellare, Thomas Ristenpart
2006/398
The Layered Games Framework for Specifications and Analysis of Security Protocols
Amir Herzberg, Igal Yoffe
2006/397
Revisiting the Efficiency of Malicious Two-Party Computation
David P. Woodruff
2006/396
Security Protocols with Isotropic Channels
Madhukar Anand, Eric Cronin, Micah Sherr, Matt Blaze, Sampath Kannan
2006/395
Security-Focused Survey on Group Key Exchange Protocols
Mark Manulis
2006/394
Identity Based Strong Designated Verifier Proxy Signature Schemes
Sunder Lal, Vandani Verma
2006/393
The Identity Escrow (Group Signature) Scheme at CT-RSA'05 Is Not Non-frameable
Sujing Zhou, Dongdai Lin
2006/392
The Tate Pairing via Elliptic Nets
Katherine E. Stange
2006/391
A Note on Bounded Chosen Ciphertext Security from Black-box Semantical Security
Ronald Cramer, Dennis Hofheinz, Eike Kiltz
2006/390
Revisit of CS98
Xianhui Lu, Xuejia Lai, Dake He, Guomin Li
2006/389
Traceable Ring Signature
Eiichiro Fujisaki, Koutarou Suzuki
2006/388
Survey on Security Requirements and Models for Group Key Exchange
Mark Manulis
2006/387
A Note on the Security of NTRUSign
Phong Q. Nguyen
2006/386
The Wrestlers Protocol: A simple, practical, secure, deniable protocol for key-exchange
Mark Wooding
2006/385
On Security Models and Compilers for Group Key Exchange Protocols
Emmanuel Bresson, Mark Manulis, Joerg Schwenk
2006/384
Design and Analysis of a Hash Ring-iterative Structure
Shenghui Su, Yixian Yang, Bo Yang, Shaolan Zhang
2006/383
Traitor tracing scheme with constant ciphertext rate against powerful pirates
Thomas Sirvent
2006/382
Provisioning Protected Resource Sharing in Multi-Hop Wireless Networks
E-yong Kim, Hwangnam Kim, Kunsoo Park
2006/381
Cryptanalysis on an Algorithm for Efficient Digital Signatures
Fuw-Yi Yang
2006/380
On Security of Sovereign Joins
Einar Mykletun, Gene Tsudik
2006/379
Security Bounds for the NIST Codebook-based Deterministic Random Bit Generator
Matthew J. Campagna
2006/378
A New Key Exchange Primitive Based on the Triple Decomposition Problem
Yesem Kurt
2006/377
Efficient Chosen-Ciphertext Secure Identity-Based Encryption with Wildcards
James Birkett, Alexander W. Dent, Gregory Neven, Jacob Schuldt
2006/376
A New Concept of Hash Functions SNMAC Using a Special Block Cipher and NMAC/HMAC Constructions
Vlastimil KLIMA
2006/375
Distortion maps for genus two curves
Steven D. Galbraith, Jordi Pujolàs, Christophe Ritzenthaler, Benjamin Smith
2006/374
Robust Final-Round Cache-Trace Attacks Against AES
Joseph Bonneau
2006/373
Self-Generated-Certificate Public Key Cryptography and Certificateless Signature / Encryption Scheme in the Standard Model
Joseph K. Liu, Man Ho Au, Willy Susilo
2006/372
A taxonomy of pairing-friendly elliptic curves
David Freeman, Michael Scott, Edlyn Teske
2006/371
Hardware Implementation of the $\eta_T$ Pairing in Characteristic 3
Robert Ronan, Colm o hEigeartaigh, Colin Murphy, Tim Kerins, Paulo S. L. M. Barreto
2006/370
A DoS Attack Against the Integrity-Less ESP (IPSec)
Ventzislav Nikov
2006/369
RadioGatún, a belt-and-mill hash function
Guido Bertoni, Joan Daemen, Michaël Peeters, Gilles Van Assche
2006/368
Practical Hierarchical Identity Based Encryption and Signature schemes Without Random Oracles
Man Ho Au, Joseph K. Liu, Tsz Hon Yuen, Duncan S. Wong
2006/367
An Attack on a Certificateless Signature Scheme
Xuefei Cao, Kenneth G. Paterson, Weidong Kou
2006/366
A Latency-Free Election Scheme
Kristian Gjøsteen
2006/365
Revisit of KD04
Xianhui Lu, Xuejia Lai, Dake He, Guomin Li
2006/364
Spelling-Error Tolerant, Order-Independent Pass-Phrases via the Damerau-Levenshtein String-Edit Distance Metric
Gregory V. Bard
2006/363
A Weakness in Some Oblivious Transfer and Zero-Knowledge Protocols
Ventzislav Nikov, Svetla Nikova, Bart Preneel
2006/362
Construction of a Hybrid (Hierarchical) Identity-Based Encryption Protocol Secure Against Adaptive Attacks
Palash Sarkar, Sanjit Chatterjee
2006/361
Generic Construction of (Identity-based) Perfect Concurrent Signatures
Sherman S. M. Chow, Willy Susilo
2006/360
Target Collisions for MD5 and Colliding X.509 Certificates for Different Identities
Marc Stevens, Arjen Lenstra, Benne de Weger
2006/359
On Probabilistic versus Deterministic Provers in the Definition of Proofs Of Knowledge
Mihir Bellare, Oded Goldreich
2006/358
Public Key Encryption with Keyword Search based on K-Resilient IBE
Dalia Khader
2006/357
Cryptanalysis of a homomorphic public-key cryptosystem over a finite group
Su-Jeong Choi, Simon R. Blackburn, Peter R. Wild
2006/356
Black-Box Knowledge Extraction Revisited: Universal Approach with Precise Bounds
Emilia Käsper, Sven Laur, Helger Lipmaa
2006/355
Concurrent Non-Malleable Zero Knowledge
Boaz Barak, Manoj Prabhakaran, Amit Sahai
2006/354
A new stream cipher: DICING
Li An-Ping
2006/353
Analysis and Improvements of Two Identity-Based Perfect Concurrent Signature Schemes
Zhenjie Huang, Kefei Chen, Yumin Wang
2006/352
Foundations of Secure E-Commerce: The Order Layer
Amir Herzberg, Igal Yoffe
2006/351
On the Power of Simple Branch Prediction Analysis
Onur Aciicmez, Cetin Kaya Koc, Jean-Pierre Seifert
2006/350
Impossible Differential Cryptanalysis of ARIA and Camellia
Wenling Wu, Wentao Zhang, Dengguo Feng
2006/349
A Note On Side-Channels Resulting From Dynamic Compilation
D. Page
2006/348
Non-Trivial Black-Box Combiners for Collision-Resistant Hash-Functions don't Exist
Krzysztof Pietrzak
2006/347
Classification of Weil Restrictions Obtained by (2,...,2) Coverings of P^1
Fumiyuki Momose, Jinhui Chao
2006/346
Generic Transformation to Strongly Unforgeable Signatures
Qiong Huang, Duncan S. Wong, Yiming Zhao
2006/345
Private and Efficient Stable Marriages (Matching)
T. Atkinson, R. Bartak, M. -C. Silaghi, E. Tuleu, M. Zanker
2006/344
A Subject-Delegated Decryption Scheme with ``Tightly" Limited Authority
Lihua Wang, Takeshi Okamoto, Masahiro Mambo, Eiji Okamoto
2006/343
Verifiably Encrypted Signature Scheme with Threshold Adjudication
M. Choudary Gorantla, Ashutosh Saxena
2006/342
A Novel Secure Electronic Voting Protocol Based On Bilinear Pairings
Jue-Sam Chou, Yalin Chen, Jin-Cheng Huang
2006/341
MV3: A new word based stream cipher using rapid mixing and revolving buffers
Nathan Keller, Stephen D. Miller, Ilya Mironov, Ramarathnam Venkatesan
2006/340
Cryptanalyses of Some Multimedia Encryption Schemes
Chengqing Li
2006/339
A New family of Ideal Multipartite Access Structure Based on MSP
Jun Xu, Jiwen Zeng, Xiaomin Zha
2006/338
Efficient and Provably Secure Multi-Recipient Signcryption from Bilinear Pairings
Fagen Li, Yupu Hu, Shuanggen Liu
2006/337
An Efficient and Secure Two-flow Zero-Knowledge Identification Protocol
D. R. Stinson, J. Wu
2006/336
High Order Linearization Equation (HOLE) Attack on Multivariate Public Key Cryptosystems
Jintai Ding, Lei Hu, Xuyun Nie, Jianyu li, John Wagner
2006/335
A ID-Based Deniable Authentication Protocol on pairings
Jue-Sam Chou, Yalin Chen, Jin-Cheng Huang
2006/334
Colliding Message Pair for 53-Step HAS-160
Florian Mendel
2006/333
Discrete Logarithms in Generalized Jacobians
S. D. Galbraith, B. A. Smith
2006/332
Improved Efficiency for Private Stable Matching
Matthew Franklin, Mark Gondree, Payman Mohassel
2006/331
On the Security of Generalized Jacobian Cryptosystems
Isabelle Dechene
2006/330
Extended Double-Base Number System with applications to Elliptic Curve Cryptography
Christophe Doche, Laurent Imbert
2006/329
Designated Verifier Signature Scheme Based on Braid Groups
Shi-hua Zou, Ji-wen Zeng, Jun-jie Quan
2006/328
Anonymous Secure Communication in Wireless Mobile Ad-hoc Networks
Sk. Md. Mizanur Rahman, Atsuo Inomata, Takeshi Okamoto, Masahiro Mambo, Eiji Okamoto
2006/327
An Algorithm for the $\eta_T$ Pairing Calculation in Characteristic Three and its Hardware Implementation
Jean-Luc Beuchat, Masaaki Shirase, Tsuyoshi Takagi, Eiji Okamoto
2006/326
Analyzing the HB and HB+ Protocols in the ``Large Error'' Case
Jonathan Katz, Adam Smith
2006/325
Invisible Designated Confirmer Signatures without Random Oracles
Victor K. Wei
2006/324
The Average Transmission Overhead of Broadcast Encryption
Sarang Aravamuthan, Sachin Lodha
2006/323
Computational Soundness of Formal Indistinguishability and Static Equivalence
Gergei Bana, Payman Mohassel, Till Stegers
2006/322
Algebraic Immunity of S-boxes Based on Power Mappings: Analysis and Construction
Yassir Nawaz, Kishan Chand Gupta, Guang Gong
2006/321
Efficient Pseudorandom Generators Based on the DDH Assumption
Reza Rezaeian Farashahi, Berry Schoenmakers, Andrey Sidorenko
2006/320
CMSS -- An Improved Merkle Signature Scheme
Johannes Buchmann, Luis Carlos Coronado Garcia, Erik Dahmen, Martin Doering, Elena Klintsevich
2006/319
Forgery and Partial Key-Recovery Attacks on HMAC and NMAC Using Hash Collisions
Scott Contini, Yiqun Lisa Yin
2006/318
Chameleon-Based Deniable Authenticated Key Agreement Protocol
Chunbo Ma, Jun Ao, Jianhua Li
2006/317
Weaknesses of the FORK-256 compression function
Krystian Matusiewicz, Scott Contini, Josef Pieprzyk
2006/316
A Parallelization of ECDSA Resistant to Simple Power Analysis Attacks
Sarang Aravamuthan, Viswanatha Rao Thumparthy
2006/315
On the Necessity of Rewinding in Secure Multiparty Computation
Michael Backes, Joern-Mueller Quade, Dominique Unruh
2006/314
Concurrently Non-Malleable Zero Knowledge in the Authenticated Public-Key Model
Yi Deng, Giovanni Di Crescenzo, Dongdai Lin
2006/313
Efficient Scalar Multiplication and Security against Power Analysis in Cryptosystems based on the NIST Elliptic Curves Over Prime Fields
Lars Elmegaard-Fessel
2006/312
ElGamal type signature schemes for n-dimensional vector spaces
Iwan M. Duursma, SeungKook Park
2006/311
Analysis of Some Attacks on Awasthi and Lal's Proxy Blind Signature Scheme
Bennian Dou, Chungen Xu
2006/310
A d-Sequence based Recursive Random Number Generator
Abhishek Parakh
2006/309
Attribute-Based Encryption for Fine-Grained Access Control of Encrypted Data
Vipul Goyal, Omkant Pandey, Amit Sahai, Brent Waters
2006/308
Efficient ID-based Threshold Signature Schemes without Pairings
Jun Shao, Zhenfu Cao, Licheng Wang
2006/307
Note on Design Criteria for Rainbow-Type Multivariates
Jintai Ding, Lei Hu, Bo-Yin Yang, Jiun-Ming Chen
2006/306
Revisiting the Security Model for Timed-Release Public-Key Encryption with Pre-Open Capability
Alexander W. Dent, Qiang Tang
2006/305
Provably Sublinear Point Multiplication on Koblitz Curves and its Hardware Implementation
V. S. Dimitrov, K. U. Jaervinen, M. J. Jacobson Jr., W. F. Chan, Z. Huang
2006/304
Identity-Based Encryption Gone Wild
Michel Abdalla, Dario Catalano, Alexander W. Dent, John Malone-Lee, Gregory Neven, Nigel P. Smart
2006/303
Zero-knowledge-like Proof of Cryptanalysis of Bluetooth Encryption
Eric Filiol
2006/302
Noninteractive two-channel message authentication based on hybrid-collision resistant hash functions.
Atefeh Mashatan, Douglas R. Stinson
2006/301
New features for JPEG Steganalysis
Johann Barbier, Éric Filiol, Kichenakoumar Mayoura
2006/300
Attacks and Modifications of CJC's E-voting Scheme
Bennian Dou, Chun-hua Chen, Roberto Araujo
2006/299
Efficient Implementation of Tate Pairing on a Mobile Phone using Java
Yuto Kawahara, Tsuyoshi Takagi, Eiji Okamoto
2006/298
A Fully Collusion Resistant Broadcast, Trace, and Revoke System
Dan Boneh, Brent Waters
2006/297
Forward-Secure Signatures with Untrusted Update
Xavier Boyen, Hovav Shacham, Emily Shen, Brent Waters
2006/296
On the Generic Construction of Identity-Based Signatures with Additional Properties
David Galindo, Javier Herranz, Eike Kiltz
2006/295
Visual secret sharing scheme with autostereogram
Feng Yi, Daoshun Wang, Yiqi Dai
2006/294
The Collision Intractability of MDC-2 in the Ideal Cipher Model
John P Steinberger
2006/293
Fast Algorithms for the Free Riders Problem in Broadcast Encryption
Zulfikar Ramzan, David P. Woodruff
2006/292
Ideal Multipartite Secret Sharing Schemes
Oriol Farras, Jaume Marti-Farre, Carles Padro
2006/291
Hard Homogeneous Spaces
Jean-Marc Couveignes
2006/290
On Authentication with HMAC and Non-Random Properties
Christian Rechberger, Vincent Rijmen
2006/289
Efficient Ring Signatures without Random Oracles
Hovav Shacham, Brent Waters
2006/288
Predicting Secret Keys via Branch Prediction
Onur Aciicmez, Jean-Pierre Seifert, Cetin Kaya Koc
2006/287
Conjunctive, Subset, and Range Queries on Encrypted Data
Dan Boneh, Brent Waters
2006/286
Shorter Verifier-Local Revocation Group Signatures From Bilinear Maps
Sujing Zhou, Dongdai Lin
2006/285
Unrestricted Aggregate Signatures
Mihir Bellare, Chanathip Namprempre, Gregory Neven
2006/284
Constant Round Group Key Exchange with Logarithmic Computational Complexity
Junghyun Nam, Youngsook Lee, Dongho Won
2006/283
Does Privacy Require True Randomness?
Carl Bosley, Yevgeniy Dodis
2006/282
Chosen Ciphertext Secure Broadcast Threshold Encryption (resp. Threshold-Traitor Tracing)
Victor K. Wei, Fangguo Zhang
2006/281
Formalizing Human Ignorance: Collision-Resistant Hashing without the Keys
Phillip Rogaway
2006/280
Deniable Authentication and Key Exchange
Mario Di Raimondo, Rosario Gennaro, Hugo Krawczyk
2006/279
On (Hierarchical) Identity Based Encryption Protocols with Short Public Parameters \\ (With an Exposition of Waters' Artificial Abort Technique)
Sanjit Chatterjee, Palash Sarkar
2006/278
Fundamental problems in provable security and cryptography
Alexander W. Dent
2006/277
On Expected Probabilistic Polynomial-Time Adversaries -- A suggestion for restricted definitions and their benefits
Oded Goldreich
2006/276
Mitigating Dictionary Attacks on Password-Protected Local Storage
Ran Canetti, Shai Halevi, Michael Steiner
2006/275
A New Mode of Encryption Providing A Tweakable Strong Pseudo-Random
Debrup Chakraborty, Palash Sarkar
2006/274
An Improved Remote User Authentication Scheme with Smart Cards using Bilinear Pairings
Debasis Giri, P. D. Srivastava
2006/273
Secure Positioning of Mobile Terminals with Simplex Radio Communication
Mikio Fujii
2006/272
Efficient Use of Random Delays
Olivier Benoit, Michael Tunstall
2006/271
Modes of Encryption Secure against Blockwise-Adaptive Chosen-Plaintext Attack
Gregory V. Bard
2006/270
Formal Analysis and Systematic Construction of Two-factor Authentication Scheme
Guomin Yang, Duncan S. Wong, Huaxiong Wang, Xiaotie Deng
2006/269
An Analysis of the Hermes8 Stream Ciphers
Steve Babbage, Carlos Cid, Norbert Pramstaller, Havard Raddum
2006/268
On the Equivalence of Several Security Notions of Key Encapsulation Mechanism
Waka Nagao, Yoshifumi Manabe, Tatsuaki Okamoto
2006/267
Stateful Public-Key Cryptosystems: How to Encrypt with One 160-bit Exponentiation
Mihir Bellare, Tadayoshi Kohno, Victor Shoup
2006/266
Computationally Sound Secrecy Proofs by Mechanized Flow Analysis
Michael Backes, Peeter Laud
2006/265
Some (in)sufficient conditions for secure hybrid encryption.
Javier Herranz, Dennis Hofheinz, Eike Kiltz
2006/264
A Simple and Unified Method of Proving Unpredictability
Mridul Nandi
2006/263
Efficient FPGA Implementations and Cryptanalysis of Automata-based Dynamic Convolutional Cryptosystems
Dragos Trinca
2006/262
Logical Concepts in Cryptography
Simon Kramer
2006/261
Using Wiedemann's algorithm to compute the immunity against algebraic and fast algebraic attacks
Frederic Didier
2006/260
A Note On Game-Hopping Proofs
Alexander W. Dent
2006/259
Simplified Submission of Inputs to Protocols
Douglas Wikstrom
2006/258
Cryptanalysis of a Cognitive Authentication Scheme
Philippe Golle, David Wagner
2006/257
Efficient Divisor Class Halving on Genus Two Curves
Peter Birkner
2006/256
Constant-Round Concurrent NMWI and its relation to NMZK
Rafail Ostrovsky, Giuseppe Persiano, Ivan Visconti
2006/255
Malicious KGC Attacks in Certificateless Cryptography
Man Ho Au, Jing Chen, Joseph K. Liu, Yi Mu, Duncan S. Wong, Guomin Yang
2006/254
Applications of SAT Solvers to Cryptanalysis of Hash Functions
Ilya Mironov, Lintao Zhang
2006/253
Hard Instances of the Constrained Discrete Logarithm Problem
Ilya Mironov, Anton Mityagin, Kobbi Nissim
2006/252
On the Resilience of Key Agreement Protocols to Key Compromise Impersonation
Maurizio A. Strangio
2006/251
Accelerating Cryptanalysis with the Method of Four Russians
Gregory V. Bard
2006/250
Linear Cryptanalysis of CTC
Orr Dunkelman, Nathan Keller
2006/249
Enumeration of 9-variable Rotation Symmetric Boolean Functions having Nonlinearity > 240
Selcuk Kavut, Subhamoy Maitra, Sumanta Sarkar, Melek D. Yucel
2006/248
Disguising tori and elliptic curves
Steven D. Galbraith
2006/247
Factoring Class Polynomials over the Genus Field
Marcel Martin
2006/246
ON THE POSTQUANTUM CIPHER SCHEME
Jaroslav HRUBY
2006/245
Secure and Efficient Threshold Key Issuing Protocol for ID-based Cryptosystems
K. Phani Kumar, G. Shailaja, Ashutosh Saxena
2006/244
Length-based cryptanalysis: The case of Thompson's Group
Dima Ruinskiy, Adi Shamir, Boaz Tsaban
2006/243
Side Channel Attacks and Countermeasures on Pairing Based Cryptosystems over Binary Fields
Tae Hyun Kim, Tsuyoshi Takagi, Dong-Guk Han, Ho Won Kim, Jongin Lim
2006/242
The Probability Advantages of Two Linear Expressions in Symmetric Ciphers
Haina Zhang, Shaohui Wang, Xiaoyun Wang
2006/241
A Stronger Definition for Anonymous Electronic Cash
Marten Trolin
2006/240
Computing Zeta Functions of Nondegenerate Curves
W. Castryck, J. Denef, F. Vercauteren
2006/239
Resettable Zero Knowledge in the Bare Public-Key Model under Standard Assumption
Yi Deng, Dongdai Lin
2006/238
Searchable Index Schemes for Groups : Security vs. Efficiency
Hyun-A Park, Yu Jeong Lee, Dong Hoon Lee
2006/237
Side Channel Analysis of Practical Pairing Implementations: Which Path is More Secure?
Claire Whelan, Mike Scott
2006/236
Online/Offline Signatures and Multisignatures for AODV and DSR Routing Security
Shidi Xu, Yi Mu, Willy Susilo, Xiaofeng Chen, Xinyi Huang, Fangguo Zhang
2006/235
Application of ECM to a Class of RSA keys
Abderrahmane Nitaj
2006/234
RFID Security: Tradeoffs between Security and Efficiency
Ivan Damgård, Michael Østergaard
2006/233
A simple generalization of El-Gamal cryptosystem to non-abelian groups
Ayan Mahalanobis
2006/232
Improvement to AKS algorithm
Roman Popovych
2006/231
A handy multi-coupon system
Sebastien Canard, Aline Gouget, Emeline Hufschmitt
2006/230
Another Look at Generic Groups
Neal Koblitz, Alfred Menezes
2006/229
Another Look at "Provable Security". II
Neal Koblitz, Alfred Menezes
2006/228
Non-Malleable Encryption: Equivalence between Two Notions, and an Indistinguishability-based Characterization
Mihir Bellare, Amit Sahai
2006/227
An Elliptic Curve Processor Suitable For RFID-Tags
L. Batina, J. Guajardo, T. Kerins, N. Mentens, P. Tuyls, I. Verbauwhede
2006/226
The Fairness of Perfect Concurrent Signatures
Guilin Wang, Feng Bao, Jianying Zhou
2006/225
Provably-Secure Time-Bound Hierarchical Key Assignment Schemes
Giuseppe Ateniese, Alfredo De Santis, Anna Lisa Ferrara, Barbara Masucci
2006/224
Generalizations of the Karatsuba Algorithm for Efficient Implementations
André Weimerskirch, Christof Paar
2006/223
What Hashes Make RSA-OAEP Secure?
Daniel R. L. Brown
2006/222
Decoding Interleaved Gabidulin Codes and Ciphertext-Security for GPT variants
R. Overbeck
2006/221
Deterministic Authenticated-Encryption: A Provable-Security Treatment of the Key-Wrap Problem
Phillip Rogaway, Thomas Shrimpton
2006/220
Multi-Dimensional Montgomery Ladders for Elliptic Curves
Daniel R. L. Brown
2006/219
Cryptographically Sound Security Proofs for Basic and Public-Key Kerberos
Michael Backes, Iliano Cervesato, Aaron D. Jaggard, Andre Scedrov, Joe-Kai Tsay
2006/218
Computationally Sound Symbolic Secrecy in the Presence of Hash Functions
Veronique Cortier, Steve Kremer, Ralf Kuesters, Bogdan Warinschi
2006/217
Statistical Analysis of the MARS Block Cipher
Andrey Pestunov
2006/216
Fast and Secure Elliptic Curve Scalar Multiplication Over Prime Fields Using Special Addition Chains
Meloni Nicolas
2006/215
Cryptanalysis of an Image Scrambling Scheme without Bandwidth Expansion
Shujun Li, Chengqing Li, Kowk-Tung Lo, Guanrong Chen
2006/214
Password-Authenticated Group Key Establishment from Smooth Projective Hash Functions
Jens-Matthias Bohli, Maria Isabel Gonzalez Vasco, Rainer Steinwandt
2006/213
Luby-Rackoff Ciphers from Weak Round Functions?
Ueli Maurer, Yvonne Anne Oswald, Krzysztof Pietrzak, Johan Sjödin
2006/212
Reverse SSL: Improved Server Performance and DoS Resistance for SSL Handshakes
Kemal BICAKCI, Bruno Crispo, Andrew S. Tanenbaum
2006/211
A Survey of Certificateless Encryption Schemes and Security Models
Alexander W. Dent
2006/210
Searchable Symmetric Encryption: Improved Definitions and Efficient Constructions
Reza Curtmola, Juan Garay, Seny Kamara, Rafail Ostrovsky
2006/209
Minimal Weight and Colexicographically Minimal Integer Representations
Clemens Heuberger, James A. Muir
2006/208
Private Information Retrieval Using Trusted Hardware
Shuhong Wang, Xuhua Ding, Robert Deng, Feng Bao
2006/207
The Kurosawa-Desmedt Key Encapsulation is not Chosen-Ciphertext Secure
Javier Herranz, Dennis Hofheinz, Eike Kiltz
2006/206
On the Provable Security of an Efficient RSA-Based Pseudorandom Generator
Ron Steinfeld, Josef Pieprzyk, Huaxiong Wang
2006/205
ID-Based Ring Signature Scheme secure in the Standard Model
Man Ho Au, Joseph K. Liu, Y. H. Yuen, Duncan S. Wong
2006/204
Towards Minimizing Memory Requirement for Implementation of Hyperelliptic Curve Crytosystems
Pradeep Kumar Mishra, Pinakpani Pal, Palash Sarkar.
2006/203
Generalization of the Selective-ID Security Model for HIBE Protocols
Sanjit Chatterjee, Palash Sarkar
2006/202
Ate pairing for $y^{2}=x^{5}-\alpha x$ in characteristic five
Ryuichi Harasawa, Yutaka Sueyoshi, Aichi Kudo
2006/201
Efficient Tate Pairing Computation Using Double-Base Chains
Chang'an Zhao, Fangguo Zhang, Jiwu Huang
2006/200
Improvement of recently proposed Remote User Authentication Schemes
Guanfei Fang, Genxun huang
2006/199
Identity-based Key Agreement Protocols From Pairings
L. Chen, Z. Cheng, N. P. Smart
2006/198
Cryptographically Private Support Vector Machines
Sven Laur, Helger Lipmaa, Taneli Mielikäinen
2006/197
A Novel Algorithm for Solving the LPN Problem and its Application to Security Evaluation of the HB Protocol for RFID Authentication
Marc P. C. Fossorier, Miodrag J. Mihaljevic, Hideki Imai, Yang Cui, Kanta Matsuura
2006/196
On ZK-Crypt, Book Stack, and Statistical Tests
S. Doroshenko, A. Fionov, A. Lubkin, V. Monarev, B. Ryabko
2006/195
An Efficient ID-based Digital Signature with Message Recovery Based on Pairing
Raylin Tso, Chunxiang Gu, Takeshi Okamoto, Eiji Okamoto
2006/194
Self-Generated-Certificate Public Key Cryptosystem
Joseph K. Liu, Man Ho Au
2006/193
(Hierarchical Identity-Based) Threshold Ring Signatures
Victor K. Wei, Tsz Hon Yuen
2006/192
DPA attacks on keys stored in CMOS cryptographic devices through the influence of the leakage behavior
Osman Kocar
2006/191
A PUBLIC KEY CRYPTOSYSTEM BASED ON PELL EQUATION
Sahadeo Padhye
2006/190
Cryptanalysis of the Dual Elliptic Curve Pseudorandom Generator
Berry Schoenmakers, Andrey Sidorenko
2006/189
Unconditionally secure chaffing and winnowing with short authentication tags
D. R. Stinson
2006/188
New Blockcipher Modes of Operation with Beyond the Birthday Bound Security
Tetsu Iwata
2006/187
On the Security of HMAC and NMAC Based on HAVAL, MD4, MD5, SHA-0 and SHA-1
Jongsung Kim, Alex Biryukov, Bart Preneel, Seokhie Hong
2006/186
Deterministic and Efficiently Searchable Encryption
Mihir Bellare, Alexandra Boldyreva, Adam O'Neill
2006/185
Statistical Zero-Knowledge Arguments for NP from Any One-Way Function
Minh-Huyen Nguyen, Shien Jin Ong, Salil Vadhan
2006/184
On Signatures of Knowledge
Melissa Chase, Anna Lysyanskaya
2006/183
Information-Theoretic Conditions for Two-Party Secure Function Evaluation
Claude Crépeau, George Savvides, Christian Schaffner, Jürg Wullschleger
2006/182
On the Limits of Point Function Obfuscation
Arvind Narayanan, Vitaly Shmatikov
2006/181
There exist Boolean functions on $n$ (odd) variables having nonlinearity $> 2^{n-1} - 2^{\frac{n-1}{2}}$ if and only if $n > 7$
Selçuk Kavut, Subhamoy Maitra, Melek D. Yücel
2006/180
Divisibility of the Hamming Weight by $2^k$ and Monomial Criteria for Boolean Functions
Dmitry Khovratovich
2006/179
FPGA Accelerated Tate Pairing Based Cryptosystems over Binary Fields
Chang Shu, Soonhak Kwon, Kris Gaj
2006/178
A New Cryptosystem Based On Hidden Order Groups
Amitabh Saxena, Ben Soh
2006/177
On the (Im-)Possibility of Extending Coin Toss
Dennis Hofheinz, Joern Mueller-Quade, Dominique Unruh
2006/176
Counting points on elliptic curves in medium characteristic
Antoine Joux, Reynald Lercier
2006/175
Tight Bounds for Unconditional Authentication Protocols in the Manual Channel and Shared Key Models
Moni Naor, Gil Segev, Adam Smith
2006/174
Frobenius expansion and the Diffie Hellman problem
V. R. Sule
2006/173
Some Practical Public-Key Encryption Schemes in both Standard Model and Random Oracle Model
Le Trieu Phong, Ogata Wakaha
2006/172
On Computing Products of Pairings
R Granger, N. P. Smart
2006/171
Key confirmation and adaptive corruptions in the protocol security logic
Prateek Gupta, Vitaly Shmatikov
2006/170
Visual Cryptography Schemes with Optimal Pixel Expansion
Carlo Blundo, Stelvio Cimato, Alfredo De Santis
2006/169
Simplified pairing computation and security implications
Steven D. Galbraith, Colm O hEigeartaigh, Caroline Sheedy
2006/168
How Fast can be Algebraic Attacks on Block Ciphers ?
Nicolas T. Courtois
2006/167
Towards Trustworthy e-Voting using Paper Receipts
Yunho Lee, Kwangwoo Lee, Seungjoo Kim, Dongho Won
2006/166
General Secret Sharing Based on the Chinese Remainder Theorem
Sorin Iftene
2006/165
Pairings for Cryptographers
S. D. Galbraith, K. G. Paterson, N. P. Smart
2006/164
Classification of Signature-only Signature Models
Zhengjun Cao
2006/163
Achieving a log(n) Speed Up for Boolean Matrix Operations and Calculating the Complexity of the Dense Linear Algebra step of Algebraic Stream Cipher Attacks and of Integer Factorization Methods
Gregory V. Bard
2006/162
A Summary of McEliece-Type Cryptosystems and their Security
D. Engelbert, R. Overbeck, A. Schmidt
2006/161
Cryptanalysis of 4-Pass HAVAL
Zhangyi Wang, Huanguo Zhang, Zhongping Qin, Qingshu Meng
2006/160
A Built-in Decisional Function and Security Proof of ID-based Key Agreement Protocols from Pairings
L. Chen, Z. Cheng, N. P. Smart
2006/159
Repairing a Security-Mediated Certificateless Encryption Scheme from PKC 2006
Joonsang Baek, Guilin Wang
2006/158
An Efficient ID-based Proxy Signature Scheme from Pairings
Chunxiang Gu, Yuefei Zhu
2006/157
An efficient way to access an array at a secret index
Timothy Atkinson, Marius C. Silaghi
2006/156
The Hardness of the DHK Problem in the Generic Group Model
Alexander W. Dent
2006/155
Independent Zero-Knowledge Sets
Rosario Gennaro, Silvio Micali
2006/154
New Public Key Authentication Frameworks with Lite Certification Authority
Xiaolei Dong, Licheng Wang, Zhenfu Cao
2006/153
On the Relationships Between Notions of Simulation-Based Security
Anupam Datta, Ralf Kuesters, John C. Mitchell, Ajith Ramanathan
2006/152
Pairing based Mutual Authentication Scheme Using Smart Cards
G. Shailaja, K. Phani Kumar, Ashutosh Saxena
2006/151
Simulation-Based Security with Inexhaustible Interactive Turing Machines
Ralf Kuesters
2006/150
Demonstrating data possession and uncheatable data transfer
Décio Luiz Gazzoni Filho, Paulo Sérgio Licciardi Messeder Barreto
2006/149
A method of construction of balanced functions with optimum algebraic immunity
C. Carlet
2006/148
Computational Indistinguishability between Quantum States and Its Cryptographic Application
Akinori Kawachi, Takeshi Koshiba, Harumichi Nishimura, Tomoyuki Yamakami
2006/147
New Integrated proof Method on Iterated Hash Structure and New Structures
Duo Lei
2006/146
Completeness of Formal Hashes in the Standard Model
Flavio D. Garcia, Peter van Rossum
2006/145
PUBLIC-KEY CRYPTOSYSTEM BASED ON ISOGENIES
Alexander Rostovtsev, Anton Stolbunov
2006/144
Implementing Cryptographic Pairings on Smartcards
Michael Scott, Neil Costigan, Wesam Abdulwahab
2006/143
Blinded Fault Resistant Exponentiation
Guillaume Fumaroli, David Vigilant
2006/142
Rational Secret Sharing, Revisited
S. Dov Gordon, Jonathan Katz
2006/141
Linear Sequential Circuit Approximation of Grain and Trivium Stream Ciphers
Shahram Khazaei, Mahdi M. Hasanzadeh, Mohammad S. Kiaei
2006/140
GVG-RP: A Net-centric Negligibility-based Security Model for Self-organizing Networks
Jiejun Kong
2006/139
A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks (extended version)
Francois-Xavier Standaert, Tal G. Malkin, Moti Yung
2006/138
Trace-Driven Cache Attacks on AES
Onur Ac\i{}içmez, Çetin Kaya Koç
2006/137
Defining Strong Privacy for RFID
Ari Juels, Stephen A. Weis
2006/136
A Challenging but Feasible Blockwise-Adaptive Chosen-Plaintext Attack on SSL
Gregory V. Bard
2006/135
The Design Principle of Hash Function with Merkle-Damgård Construction
Duo Lei, Da Lin, Li Chao, Keqin Feng, Longjiang Qu
2006/134
Identity Based Strong Designated Verifier Signature Scheme
K. Phani Kumar, G. Shailaja, Ashutosh Saxena
2006/133
Low Complexity Bit-Parallel Square Root Computation over GF($2^m$) for all Trinomials
Francisco Rodríguez-Henríquez, Guillermo Morales-Luna, Julio López-Hernández
2006/132
Conditional Reactive Simulatability
Michael Backes, Markus Duermuth, Dennis Hofheinz, Ralf Kuesters
2006/131
Provably Secure Ubiquitous Systems: Universally Composable RFID Authentication Protocols
Mike Burmester, Tri van Le, Breno de Medeiros
2006/130
Simulatable Security and Polynomially Bounded Concurrent Composition
Dennis Hofheinz, Dominique Unruh
2006/129
Some Remarks on the TKIP Key Mixing Function of IEEE 802.11i
Wei Han, Dong Zheng, Ke-fei Chen
2006/128
On the existence of distortion maps on ordinary elliptic curves
Denis Charles
2006/127
A New Cryptanalytic Time/Memory/Data Trade-off Algorithm
Sourav Mukhopadhyay, Palash Sarkar
2006/126
ECGSC: Elliptic Curve based Generalized Signcryption Scheme
Yiliang Han, Xiaoyuan Yang
2006/125
Fast computation of Tate pairing on general divisors of genus 3 hyperelliptic curves
Eunjeong Lee, Hyang-Sook Lee, Yoonjin Lee
2006/124
Fast Elliptic Scalar Multiplication using New Double-base Chain and Point Halving
K. W. Wong, Edward C. W. Lee, L. M. Cheng, Xiaofeng Liao
2006/123
Designated Confirmer Signatures Revisited
Douglas Wikström
2006/122
Chosen-Ciphertext Secure Identity-Based Encryption in the Standard Model with short Ciphertexts
Eike Kiltz
2006/121
Counting Prime Numbers with Short Binary Signed Representation
José de Jesús Angel Angel, Guillermo Morales-Luna
2006/120
Key Privacy for Identity Based Encryption
Jason E. Holt
2006/119
Repairing Attacks on a Password-Based Group Key Agreement
Ratna Dutta, Rana Barua
2006/118
On construction of non-normal Boolean functions
Sugata Gangopadhyay, Deepmala Sharma
2006/117
Conjectured Security of the ANSI-NIST Elliptic Curve RNG
Daniel R. L. Brown
2006/116
Second Preimages for Iterated Hash Functions Based on a b-Block Bypass
Mario Lamberger, Norbert Pramstaller, Vincent Rijmen
2006/115
Fast exponentiation via prime finite field isomorphism
Alexander Rostovtsev
2006/114
Tate pairing for $y^{2}=x^{5}-\alpha x$ in Characteristic Five
Ryuichi Harasawa, Yutaka Sueyoshi, Aichi Kudo
2006/113
A New Construction of Time Capsule Signature
Miaomiao Zhang, Gongliang Chen, Jianhua Li, Licheng Wang, Haifeng Qian
2006/112
Entity Authentication and Authenticated Key Exchange with Tree Parity Machines
Markus Volkmer
2006/111
Attacking LCCC Batch Verification of RSA Signatures
Martin Stanek
2006/110
The Eta Pairing Revisited
F. Hess, N. P. Smart, F. Vercauteren
2006/109
A Simpler Sieving Device: Combining ECM and TWIRL
Willi Geiselmann, Fabian Januszewski, Hubert Koepfer, Jan Pelzl, Rainer Steinwandt
2006/108
Efficient Public Key Encryption with Keyword Search Schemes from Pairings
Chunxiang Gu, Yuefei Zhu, Yajuan Zhang
2006/107
The number field sieve for integers of low weight
Oliver Schirokauer
2006/106
Further Refinement of Pairing Computation Based on Miller's Algorithm
Chao-Liang Liu, Gwoboa Horng, Te-Yu Chen
2006/105
Tunnels in Hash Functions: MD5 Collisions Within a Minute
Vlastimil Klima
2006/104
Fast Collision Attack on MD5
Marc Stevens
2006/103
Security of VSH in the Real World
Markku-Juhani O. Saarinen
2006/102
Efficient Blind and Partially Blind Signatures Without Random Oracles
Tatsuaki Okamoto
2006/101
Information-theoretic analysis of coating PUFs
B. Skoric, S. Maubach, T. Kevenaar, P. Tuyls
2006/100
A Shorter Group Signature with Verifier-Location Revocation and Backward Unlinkability
Zhou Sujing, Lin Dongdai
2006/099
An Efficient Single-Key Pirates Tracing Scheme Using Cover-Free Families
Dongvu Tonien, Reihaneh Safavi-Naini
2006/098
Gröbner Basis Based Cryptanalysis of SHA-1
Makoto Sugita, Mitsuru Kawazoe, Hideki Imai
2006/097
A Cryptographic Tour of the IPsec Standards
Kenneth G. Paterson
2006/096
Sequential Aggregate Signatures and Multisignatures without Random Oracles
Steve Lu, Rafail Ostrovsky, Amit Sahai, Hovav Shacham, Brent Waters
2006/095
MAC Reforgeability
John Black, Martin Cochran
2006/094
Cryptanalysis of the MEM Mode of Operation
Peng Wang, Dengguo Feng, Wenling Wu
2006/093
RSA and a higher degree diophantine equation
Abderrahmane Nitaj
2006/092
Cryptanalysis of RSA with constrained keys
Abderrahmane Nitaj
2006/091
The Complexity of Online Memory Checking
Moni Naor, Guy Rothblum
2006/090
Secure Sketch for Multi-Sets
Ee-Chien Chang, Vadym Fedyukovych, Qiming Li
2006/089
A Tree-based Model of Unicast Stream Authentication
Goce Jakimoski, Yvo Desmedt
2006/088
On the Feasibility of Consistent Computations
Sven Laur, Helger Lipmaa
2006/087
Analysis of the SPV Secure Routing Protocol: Weaknesses and Lessons
Barath Raghavan, Saurabh Panjwani, Anton Mityagin
2006/086
Analysis of the Linux Random Number Generator
Zvi Gutterman, Benny Pinkas, Tzachy Reinman
2006/085
Anonymous Hierarchical Identity-Based Encryption (Without Random Oracles)
Xavier Boyen, Brent Waters
2006/084
Cryptography from Anonymity
Yuval Ishai, Eyal Kushilevitz, Rafail Ostrovsky, Amit Sahai
2006/083
Browsers Defenses Against Phishing, Spoofing and Malware
Amir Herzberg
2006/082
Parsimonious Asynchronous Byzantine-Fault-Tolerant Atomic Broadcast
HariGovind V. Ramasamy, Christian Cachin
2006/081
Tamper-Evident, History-Independent, Subliminal-Free Data Structures on PROM Storage -or- How to Store Ballots on a Voting Machine
David Molnar, Tadayoshi Kohno, Naveen Sastry, David Wagner
2006/080
Efficient Identity-based Signatures Secure in the Standard Model
Kenneth G. Paterson, Jacob C. N. Schuldt
2006/079
Towards Provably Secure Group Key Agreement Building on Group Theory
Jens-Matthias Bohli, Benjamin Glas, Rainer Steinwandt
2006/078
Verifiable Random Permutations
Yevgeniy Dodis, Prashant Puniya
2006/077
On Secret Sharing Schemes, Matroids and Polymatroids
Jaume Marti-Farre, Carles Padro
2006/076
A Cryptosystem Based on Hidden Order Groups and Its Applications in Highly Dynamic Group Key Agreement
Amitabh Saxena, Ben Soh
2006/075
ON THE WEIL SUM EVALUATION OF CENTRAL POLYNOMIAL IN MULTIVARIATE QUADRATIC CRYPTOSYSTEM
TOMOHIRO HARAYAMA
2006/074
How to Construct Sufficient Condition in Searching Collisions of MD5
Yu Sasaki, Yusuke Naito, Jun Yajima, Takeshi Shimoyama, Noboru Kunihiro, Kazuo Ohta
2006/073
Stronger Security of Authenticated Key Exchange
Brian LaMacchia, Kristin Lauter, Anton Mityagin
2006/072
Cryptanalysis of the Bluetooth E0 Cipher using OBDD's
Yaniv Shaked, Avishai Wool
2006/071
A Fast and Key-Efficient Reduction of Chosen- Ciphertext to Known-Plaintext Security
Ueli Maurer, Johan Sjödin
2006/070
The experimental distinguishing attack on RC4
Sergey Doroshenko, Boris Ryabko
2006/069
Automated Security Proofs with Sequences of Games
Bruno Blanchet, David Pointcheval
2006/068
Limits of the Reactive Simulatability/UC of Dolev-Yao Models with Hashes
Michael Backes, Birgit Pfitzmann, Michael Waidner
2006/067
Scalar Multiplication on Koblitz Curves using Double Bases
Roberto Avanzi, Francesco Sica
2006/066
Simple and Flexible Private Revocation Checking
John Solis, Gene Tsudik
2006/065
On Expected Constant-Round Protocols for Byzantine Agreement
Jonathan Katz, Chiu-Yuen Koo
2006/064
Perturbing and Protecting a Traceable Block Cipher
Julien Bringer, Hervé Chabanne, Emmanuelle Dottax
2006/063
Provably Secure Universal Steganographic Systems
Boris Ryabko, Daniil Ryabko
2006/062
A New Mode of Encryption Secure Against Symmetric Nonce Respecting Adversaries
Debrup Chakraborty, Palash Sarkar
2006/061
--Withdrawn--
Praveen Gauravaram, William Millan, Ed Dawson, Kapali Viswanathan
2006/060
An Efficient ID-based Signature Scheme from Pairings
Chunxiang Gu, Yuefei Zhu, Xiaoyu Pan
2006/059
High Security Pairing-Based Cryptography Revisited
R. Granger, D. Page, N. P. Smart
2006/058
Symbolic and Cryptographic Analysis of the Secure WS-ReliableMessaging Scenario
Michael Backes, Sebastian Mödersheim, Birgit Pfitzmann, Luca Viganò
2006/057
Key Exchange Using Passwords and Long Keys
Vladimir Kolesnikov, Charles Rackoff
2006/056
Key Exchange Protocols: Security Definition, Proof Method and Applications
Anupam Datta, Ante Derek, John C. Mitchell, Bogdan Warinschi
2006/055
Multicollision Attacks on some Generalized Sequential Hash Functions
M. Nandi, D. R. Stinson
2006/054
How to Build a Low-Cost, Extended-Range RFID Skimmer
Ilan Kirschenbaum, Avishai Wool
2006/053
Cryptanalysis of the CFVZ cryptosystem
J. J. Climent, E. Gorla, J. Rosenthal
2006/052
Software mitigations to hedge AES against cache-based software side channel vulnerabilities
Ernie Brickell, Gary Graunke, Michael Neve, Jean-Pierre Seifert
2006/051
Proposal for Piece In Hand Matrix Ver.2: General Concept for Enhancing Security of Multivariate Public Key Cryptosystems
Shigeo Tsujii, Kohtaro Tadaki, Ryou Fujita
2006/050
Secure Device Pairing based on a Visual Channel
Nitesh Saxena, Jan-Erik Ekberg, Kari Kostiainen, N. Asokan
2006/049
Crossword Puzzle Attack on NLS
Joo Yeon Cho, Josef Pieprzyk
2006/048
New Results on Multipartite Access Structures
Javier Herranz, German Saez
2006/047
Cryptographically Sound Theorem Proving
Christoph Sprenger, Michael Backes, David Basin, Birgit Pfitzmann, Michael Waidner
2006/046
Efficient Primitives from Exponentiation in Zp
Shaoquan Jiang
2006/045
Fully Collusion Resistant Traitor Tracing
Dan Boneh, Amit Sahai, Brent Waters
2006/044
Linear Integer Secret Sharing and Distributed Exponentiation
Ivan Damgard, Rune Thorbek
2006/043
New Proofs for NMAC and HMAC: Security Without Collision-Resistance
Mihir Bellare
2006/042
Application of LFSRs for Parallel Sequence Generation in Cryptologic Algorithms
Sourav Mukhopadhyay, Palash Sarkar
2006/041
Reactively Simulatable Certified Mail
Birgit Pfitzmann, Matthias Schunter, Michael Waidner
2006/040
Linkable Democratic Group Signatures
Mark Manulis, Ahmad-Reza Sadeghi, Joerg Schwenk
2006/039
Two-Round AES Differentials
Joan Daemen, Vincent Rijmen
2006/038
Zhuang-Zi: A New Algorithm for Solving Multivariate Polynomial Equations over a Finite Field
Jintai Ding, Jason E. Gower, Dieter S. Schmidt
2006/037
Message Authentication on 64-bit Architectures
Ted Krovetz
2006/036
Vector Stream Cipher Instant Key Recovery
Sean O'Neil
2006/035
Parallel Itoh-Tsujii Multiplicative Inversion Algorithm for a Special Class of Trinomials
Francisco Rodríguez-Henríquez, Guillermo Morales-Luna, Nazar A. Saqib, Nareli Cruz-Cortés
2006/034
Direct Chosen-Ciphertext Secure Identity-Based Key Encapsulation without Random Oracles
Eike Kiltz, David Galindo
2006/033
Arithmetic of Generalized Jacobians
Isabelle Déchène
2006/032
Reducing the Number of Homogeneous Linear Equations in Finding Annihilators
Deepak Kumar Dalai, Subhamoy Maitra
2006/031
On a Variation of Kurosawa-Desmedt Encryption Scheme
Le Trieu Phong, Wakaha Ogata
2006/030
Improved cryptanalysis of Py
Paul Crowley
2006/029
Authenticated Hybrid Encryption for Multiple Recipients
Stéphanie Alt
2006/028
Cryptanalysis of recently proposed Remote User Authentication Schemes
Thulasi Goriparthi, Manik Lal Das, Atul Negi, Ashutosh Saxena
2006/027
Finding Low Degree Annihilators for a Boolean Function Using Polynomial Algorithms
Vladimir Bayev
2006/026
Constructing Pairing-Friendly Elliptic Curves with Embedding Degree 10
David Freeman
2006/025
Signatures for Network Coding
Denis Charles, Kamal Jain, Kristin Lauter
2006/024
Improving the Decoding Efficiency of Private Search
George Danezis, Claudia Diaz
2006/023
A Method to Implement Direct Anonymous Attestation
HE GE
2006/021
Cryptographic hash functions from expander graphs
Denis Charles, Eyal Goren, Kristin Lauter
2006/020
Scrambling Adversarial Errors Using Few Random Bits, Optimal Information Reconciliation, and Better Private Codes
Adam Smith
2006/019
Hermes8 : A Low-Complexity Low-Power Stream Cipher
Ulrich Kaiser
2006/018
Notion of Algebraic Immunity and Its evaluation Related to Fast Algebraic Attacks
Deepak Kumar Dalai, Kishan Chand Gupta, Subhamoy Maitra
2006/017
Threshold and Proactive Pseudo-Random Permutations
Yevgeniy Dodis, Aleksandr Yampolskiy, Moti Yung
2006/016
Message Modification for Step 21-23 on SHA-0
Yusuke Naito, Yu Sasaki, Takeshi Shimoyama, Jun Yajima, Noboru Kunihiro, Kazuo Ohta
2006/015
A Family of Dunces: Trivial RFID Identification and Authentication Protocols
Gene Tsudik
2006/014
Sound Computational Interpretation of Symbolic Hashes in the Standard Model
Flavio D. Garcia, Peter van Rossum
2006/013
Comments on a Provably Secure Three-Party Password-Based Authenticated Key Exchange Protocol Using Weil Pairings
Hung-Yu Chien
2006/012
Certificate-Based Encryption Without Random Oracles
Paz Morillo, Carla Ràfols
2006/011
Formal Proof for the Correctness of RSA-PSS
Christina Lindenberg, Kai Wirt, Johannes Buchmann
2006/010
Finding Characteristic Polynomials with Jump Indices
Steve Babbage, Matthew Dodd
2006/009
Breaking and Fixing Public-Key Kerberos
Iliano Cervesato, Aaron D. Jaggard, Andre Scedrov, Joe-Kay Tsay, Christopher Walstad
2006/008
A Simple Left-to-Right Algorithm for the Computation of the Arithmetic Weight of Integers
James A. Muir
2006/007
Further Discussions on the Security of a Nominative Signature Scheme
Lifeng Guo, Guilin Wang, Duncan S. Wong
2006/006
Group Key Agreement for Ad Hoc Networks
Lijun Liao
2006/005
Pairing Calculation on Supersingular Genus 2 Curves
Colm O hEigeartaigh, Michael Scott
2006/004
Provably Secure Subsitution of Cryptographic Tools
Lea Kissner, David Molnar
2006/003
Sequential and Parallel Cascaded Convolutional Encryption with Local Propagation: Toward Future Directions in Symmetric Cryptography
Dragos Trinca
2006/002
Geometric constructions of optimal linear perfect hash families
S. G. Barwick, W. -A. Jackson.
2006/001
Homomorphic Cryptosystems and their Applications
Doerte K. Rappe
2005/469
A lower bound on the higher order nonlinearity of algebraic immune functions
C. Carlet
2005/468
Blind Attacks on Engineering Samples
Vanessa Gratzer, David Naccache
2005/467
A Probabilistic Hoare-style logic for Game-based Cryptographic Proofs (Extended Version)
Ricardo Corin, Jerry den Hartog
2005/466
Cryptanalysis of the Yang -Wang's password authentication schemes
Jue-Sam Chou, Ming-De Yang, Guey-Chuen Lee
2005/465
A sequence approach to constructing perfect hash families
S. G. Barwick, W. -A. Jackson
2005/464
Equivalent Keys in Multivariate Quadratic Public Key Systems
Christopher Wolf, Bart Preneel
2005/463
More short signatures without random oracles
Victor K. Wei, Tsz Hon Yuen
2005/462
A Simplified Quadratic Frobenius Primality Test
Martin Seysen
2005/461
Parallel and Concurrent Security of the HB and HB+ Protocols
Jonathan Katz, Ji Sun Shin
2005/460
One-Time HNP or Attacks on a Flawed El Gamal Revisited
Tomas Rosa
2005/459
A Practical Attack on the Root Problem in Braid Groups
Anja Groch, Dennis Hofheinz, Rainer Steinwandt
2005/458
Seifert's RSA Fault Attack: Simplified Analysis and Generalizations
James A. Muir
2005/457
Weakness of shim¡¦s New ID-based tripartite multiple-key agreement protocol
Jue-Sam Chou, Chu-Hsing Lin, Chia-Hung Chiu
2005/456
A Secure Scheme for Authenticated Encryption
Fuw-Yi Yang
2005/455
Enhancing CK-Model for Key Compromise Impersonation Resilience and Identity-based Key Exchange
Robert W. Zhu, Xiaojian Tian, Duncan S. Wong
2005/454
Efficient Arithmetic on Subfield Elliptic Curves over Small Odd Characteristics
Keisuke Hakuta, Hisayoshi Sato, Tsuyoshi Takagi
2005/453
Further Constructions of Almost Resilient Functions
Pinhui Ke, Jie Zhang, Qiaoyan Wen
2005/452
Using Probabilistic I/O Automata to Analyze an Oblivious Transfer Protocol
Ran Canetti, Ling Cheung, Dilsun Kaynar, Moses Liskov, Nancy Lynch, Olivier Pereira, Roberto Segala
2005/451
Weaknesses of the Boyd-Mao Deniable Authenticated key Establishment for Internet Protocols
Jue-Sam Chou, Yalin Chen, Ming-De Yang
2005/450
Improvement of Manik et al.¡¦s remote user authentication scheme
Jue-Sam Chou, Yalin Chen, Jyun-Yu Lin
2005/449
On the Boolean functions With Maximum Possible Algebraic Immunity : Construction and A Lower Bound of the Count
Longjiang Qu, Guozhu Feng, Chao Li
2005/448
On the (In)security of Stream Ciphers Based on Arrays and Modular Addition (Full Version)
Souradyuti Paul, Bart Preneel
2005/447
A new key exchange protocol based on the decomposition problem
Vladimir Shpilrain, Alexander Ushakov
2005/446
Democratic Group Signatures on Example of Joint Ventures
Mark Manulis
2005/445
An Anonymous Authentication Scheme for Trusted Computing Platform
HE GE
2005/444
Privacy-Preserving Polling using Playing Cards
Sid Stamm, Markus Jakobsson
2005/443
Revised: Block Cipher Based Hash Function Construction From PGV
Duo Lei
2005/442
One-Time Signatures Revisited: Have They Become Practical?
Dalit Naor, Amir Shenhav, Avishai Wool
2005/441
Tight bound between nonlinearity and algebraic immunity
Mikhail Lobanov
2005/440
HB++: a Lightweight Authentication Protocol Secure against Some Attacks
Julien Bringer, Hervé Chabanne, Emmanuelle Dottax
2005/439
A note on the n-spendable extension of Ferguson's single-term off-line coins
T. C. Lam
2005/438
Minimal Assumptions for Efficient Mercurial Commitments
Yevgeniy Dodis
2005/437
On Boolean functions with maximum algebraic immunity
Enes Pasalic
2005/436
A Note on the Kasami Power Function
Doreen Hertel
2005/435
Concurrent Blind Signatures without Random Oracles
Aggelos Kiayias, Hong-Sheng Zhou
2005/434
Prompted User Retrieval of Secret Entropy: The Passmaze Protocol
Daniel R. L. Brown
2005/433
Proxy Re-Signatures: New Definitions, Algorithms, and Applications
Giuseppe Ateniese, Susan Hohenberger
2005/432
On the Security of Kaweichel
Dieter Schmidt
2005/431
Is it possible to have CBE from CL-PKE?
Bo Gyeong Kang, Je Hong Park
2005/430
F-HASH: Securing Hash Functions Using Feistel Chaining
Duo Lei
2005/429
Signature from a New Subgroup Assumption
Victor K. Wei
2005/428
Loud and Clear: Human-Verifiable Authentication Based on Audio
Michael T. Goodrich, Michael Sirivianos, John Solis, Gene Tsudik, Ersin Uzun
2005/427
Solutions to Key Exposure Problem in Ring Signature
Joseph K. Liu, Duncan S. Wong
2005/426
On the Security of a Certificateless Public-Key Encryption
Zhenfeng Zhang, Dengguo Feng
2005/425
Improved Collision Attack on Hash Function MD5
Jie Liang, Xuejia Lai
2005/424
Efficient Mutual Data Authentication Using Manually Authenticated Strings
Sven Laur, N. Asokan, Kaisa Nyberg
2005/423
ID-based signature and Key-insulated threshold signature
Jin Li, Fangguo Zhang
2005/422
On Anonymity of Group Signatures
Zhou Sujing, Lin Dongdai
2005/421
Key-dependent Message Security under Active Attacks -- BRSIM/UC-Soundness of Symbolic Encryption with Key Cycles
Michael Backes, Birgit Pfitzmann, Andre Scedrov
2005/420
Efficient Scalar Multiplication by Isogeny Decompositions
Christophe Doche, Thomas Icart, David R. Kohel
2005/419
Unified Point Addition Formulæ and Side-Channel Attacks
Douglas Stebila, Nicolas Thériault
2005/418
Generic On-Line/Off-Line Threshold Signatures
Chris Crutchfield, David Molnar, David Turner, David Wagner
2005/417
Correlation-Resistant Storage via Keyword-Searchable Encryption
Lucas Ballard, Matthew Green, Breno de Medeiros, Fabian Monrose
2005/416
Cryptography in Theory and Practice: The Case of Encryption in IPsec
Kenneth G. Paterson, Arnold K. L. Yau
2005/415
A Presentation on VEST Hardware Performance, Chip Area Measurements, Power Consumption Estimates and Benchmarking in Relation to the AES, SHA-256 and SHA-512
Benjamin Gittins, Howard A. Landman, Sean O'Neil, Ron Kelson
2005/414
Authenticated Encryption Mode of VEST Ciphers
Sean O'Neil, Benjamin Gittins
2005/413
VEST Hardware-Dedicated Stream Ciphers
Sean O'Neil, Benjamin Gittins, Howard A. Landman
2005/412
Constant-Size Hierarchical Identity-Based Signature/Signcryption without Random Oracles
Tsz Hon Yuen, Victor K. Wei
2005/411
More Compact E-Cash with Efficient Coin Tracing
Victor K. Wei
2005/410
Short (resp. Fast) CCA2-Fully-Anonymous Group Signatures using IND-CPA-Encrypted Escrows
Victor K. Wei
2005/409
Intrusion-Resilient Authentication in the Limited Communication Model
David Cash, Yan Zong Ding, Wenke Lee, Richard Lipton
2005/408
Compartmented Secret Sharing Based on the Chinese Remainder Theorem
Sorin Iftene
2005/407
Anonymous Signature Schemes
Guomin Yang, Duncan S. Wong, Xiaotie Deng, Huaxiong Wang
2005/406
Relations amount Statistical Security Notions - or - Why Exponential Adversaries are Unlimited
Dominique Unruh
2005/405
Building Better Signcryption Schemes with Tag-KEMs
Tor E. Bjørstad, Alexander W. Dent
2005/404
Preventing Attacks on Machine Readable Travel Documents (MRTDs)
Gaurav S. Kc, Paul A. Karger
2005/403
Collisions in the Original Version of a Chaotic Hash Function
Scott Contini
2005/402
Some Analysis of Radix-r Representations
Dong-Guk Han, Tsuyoshi Takagi
2005/401
A Computationally Sound Mechanized Prover for Security Protocols
Bruno Blanchet
2005/400
Improved Collision Attack on MD5
Yu Sasaki, Yusuke Naito, Noboru Kunihiro, Kazuo Ohta
2005/399
On affine rank of spectrum support for plateaued function
Yuriy Tarannikov
2005/398
Preliminary Analysis of DHA-256
IAIK Krypto Group
2005/397
Enhancing the MD-Strengthening and Designing Scalable Families of One-Way Hash Algorithms
Neil Kauer, Tony Suarez, Yuliang Zheng
2005/396
Design and Analysis of a Robust and Efficient Block Cipher using Cellular Automata
Pallavi Joshi, Debdeep Mukhopadhyay, Dipanwita RoyChowdhury
2005/395
Secure Group Key Establishment Revisited
Jens-Matthias Bohli, Maria Isabel Gonzalez Vasco, Rainer Steinwandt
2005/394
How to Shuffle in Public
Ben Adida, Douglas Wikström
2005/393
Multivariate Quadratic Polynomials in Public Key Cryptography
Christopher Wolf
2005/392
An Efficient Variant of RSA Cryptosystem
Sahadeo Padhye
2005/391
Some thoughts on Collision Attacks in the Hash Functions MD5, SHA-0 and SHA-1
Praveen Gauravaram, William Millan, Juanma Gonzalez Nieto
2005/390
3C- A Provably Secure Pseudorandom Function and Message Authentication Code.A New mode of operation for Cryptographic Hash Function
Praveen Gauravaram, William Millan, Juanma Gonzalez Nieto, Edward Dawson
2005/389
How to Generate Universally Verifiable Signatures in Ad-Hoc Networks
KyungKeun Lee, JoongHyo Oh, SangJae Moon
2005/388
Side-Channel Attacks: Ten Years After Its Publication and the Impacts on Cryptographic Module Security Testing
YongBin Zhou, DengGuo Feng
2005/387
On highly nonlinear S-boxes and their inability to thwart DPA attacks (completed version)
C. Carlet
2005/386
A New Short Signature Scheme Without Random Oracles from Bilinear Pairings
Fangguo Zhang, Xiaofeng Chen, Willy Susilo, Yi Mu
2005/385
Practical Group Signatures without Random Oracles
Giuseppe Ateniese, Jan Camenisch, Susan Hohenberger, Breno de Medeiros
2005/384
Some Explicit Formulae of NAF and its Left-to-Right Analogue
Dong-Guk Han, Tetsuya Izu, Tsuyoshi Takagi
2005/383
Key Mixing in Block Ciphers through Addition modulo $2^n$
Debdeep Mukhopadhyay, Dipanwita RoyChowdhury
2005/382
One-Wayness Equivalent to General Factoring
Kaoru Kurosawa, Tsuyoshi Takagi
2005/381
Compact Group Signatures Without Random Oracles
Xavier Boyen, Brent Waters
2005/380
Breaking RSA May Be As Difficult As Factoring
Daniel R. L. Brown
2005/379
Handling Expected Polynomial-Time Strategies in Simulation-Based Security Proofs
Jonathan Katz, Yehuda Lindell
2005/378
A New Protocol for Conditional Disclosure of Secrets And Its Applications
Sven Laur, Helger Lipmaa
2005/377
Exclusion-Intersection Encryption
Sherman S. M. Chow, Siu-Ming Yiu
2005/376
Representing small identically self-dual matroids by self-dual codes
Carles Padro, Ignacio Gracia
2005/375
Truncated differential cryptanalysis of five rounds of Salsa20
Paul Crowley
2005/374
Computation of Tate Pairing for Supersingular Curves over characteristic 5 and 7
Kunpeng Wang, Bao Li
2005/373
Efficient Broadcast Encryption Scheme with Log-Key Storage
Yong Ho Hwang, Pil Joong Lee
2005/372
Secret color images sharing schemes based on XOR operation
Dao-Shun Wang, Lei Zhang, Ning Ma, Lian-Sheng Huang
2005/371
On a Traitor Tracing Scheme from ACISP 2003
Dongvu Tonien
2005/370
Resource Fairness and Composability of Cryptographic Protocols
Juan A. Garay, Philip MacKenzie, Manoj Prabhakaran, Ke Yang
2005/369
Secure and {\sl Practical} Identity-Based Encryption
David Naccache
2005/368
The Program Counter Security Model: Automatic Detection and Removal of Control-Flow Side Channel Attacks
David Molnar, Matt Piotrowski, David Schultz, David Wagner
2005/367
Searchable Keyword-Based Encryption
Dong Jin Park, Juyoung Cha, Pil Joong Lee
2005/366
Efficient Compilers for Authenticated Group Key Exchange
Qiang Tang, Chris J. Mitchell
2005/365
Derandomization in Cryptography
Boaz Barak, Shien Jin Ong, Salil Vadhan
2005/364
Additive Proofs of Knowledge - A New Notion For Non-Interactive Proofs
Amitabh Saxena
2005/363
Elliptic Curves with Low Embedding Degree
Florian Luca, Igor E. Shparlinski
2005/362
On a (Flawed) Proposal to Build More Pairing-Friendly Curves
Michael Scott, Paulo S. L. M. Barreto
2005/361
Strict Avalanche Criterion Over Finite Fields
Yuan Li, T. W. Cusick
2005/360
Burmester-Desmedt Tree-Based Key Transport Revisited: Provable Security
Jens Matthias-Bohli, Maria Isabel Gonzalez Vasco, Rainer Steinwandt
2005/359
An infinite class of quadratic APN functions which are not equivalent to power mappings
L. Budaghyan, C. Carlet, P. Felke, G. Leander
2005/358
Normal Basis Multiplication Algorithms for GF(2n) (Full Version)
Haining Fan, Duo Liu, Yiqi Dai
2005/357
Cryptanalysis of Two ID-based Authenticated Key Agreement Protocols from Pairings
Kyung-Ah Shim
2005/356
Exponential Memory-Bound Functions for Proof of Work Protocols
Fabien Coelho
2005/355
ID-based Encryption Scheme Secure against Chosen Ciphertext Attacks
Rongxing Lu, Zhenfu Cao
2005/354
Pairing-Based Two-Party Authenticated Key Agreement Protocol
Rongxing Lu, Zhenfu Cao, Renwang Su, Jun Shao
2005/353
On the Security of A Group Signature Scheme
Jianhong Zhang, Wei Zou
2005/352
Candidate One-Way Functions and One-Way Permutations Based on Quasigroup String Transformations
Danilo Gligoroski
2005/351
Errors in Computational Complexity Proofs for Protocols
Kim-Kwang Raymond Choo, Colin Boyd, Yvonne Hitchcock
2005/350
Is SHA-1 conceptually sound?
Charanjit S. Jutla, Anindya C. Patthak
2005/349
Oblivious Transfer and Linear Functions
Ivan B. Damgaard, Serge Fehr, Louis Salvail, Christian Schaffner
2005/348
On Proofs of Security for Certificateless Cryptosystems
Alexander W. Dent, Caroline Kudla
2005/347
Knapsack Diffie-Hellman: A New Family of Diffie-Hellman
Song Han, Elizabeth Chang, Tharam Dillon
2005/346
Batch Verification of Validity of Bids in Homomorphic E-auction
Kun Peng, Colin Boyd, Ed Dawson
2005/345
Group Signatures with Efficient Concurrent Join
Aggelos Kiayias, Moti Yung
2005/344
Countering chosen-ciphertext attacks against noncommutative polly cracker-type cryptosystems.
Tapan Rai
2005/343
Zero-Knowledge Blind Identification For Smart Cards Using Bilinear Pairings
Amitabh Saxena, Serguey Priymak, Ben Soh
2005/342
Special Polynomial Families for Generating More Suitable Elliptic Curves for Pairing-Based Cryptosystems
Pu Duan, Shi Cui, Choong Wah Chan
2005/341
A Universally Composable Scheme for Electronic Cash
Marten Trolin
2005/340
A New Approach to Counteract DPA Attacks on Block Ciphers
Christophe Giraud, Emmanuel Prouff
2005/339
Identity-Based Key Agreement with Unilateral Identity Privacy Using Pairings
Zhaohui Cheng, Liqun Chen, Richard Comley, Qiang Tang
2005/338
An Improved Power Analysis Attack Against Camellia's Key Schedule
Lu Xiao, Howard M. Heys
2005/337
Statistical Multiparty Computation Based on Random Walks on Graphs
Liangliang Xiao, Mulan Liu, Zhifang Zhang
2005/336
Pairing-based identification schemes
David Freeman
2005/335
One-Way Signature Chaining - A New Paradigm For Group Cryptosystems
Amitabh Saxena, Ben Soh
2005/334
Secure Key-Updating for Lazy Revocation
Michael Backes, Christian Cachin, Alina Oprea
2005/333
Universally Composable Disk Encryption Schemes
Ivan Damgård, Kasper Dupont
2005/332
Classification of Cubic $(n-4)$-resilient Boolean Functions
An Braeken, Yuri Borissov, Svetla Nikova, Bart Preneel
2005/331
A Fuzzy Sketch with Trapdoor
Julien Bringer, Hervé Chabanne, Quoc Dung Do
2005/330
A Dedicated Processor for the eta Pairing
Robert Ronan, Colm O hEigeartaigh, Colin Murphy, Michael Scott, Tim Kerins, W. P. Marnane
2005/329
Cryptographic Protocols to Prevent Spam
Amir Herzberg
2005/328
On Constructing Universal One-Way Hash Functions from Arbitrary One-Way Functions
Jonathan Katz, Chiu-Yuen Koo
2005/327
On the Security of Encryption Modes of MD4, MD5 and HAVAL
Jongsung Kim, Alex Biryukov, Bart Preneel, Sangjin Lee
2005/326
A Suite of Non-Pairing ID-Based Threshold Ring Signature Schemes with Different Levels of Anonymity
Patrick P. Tsang, Man Ho Au, Joseph K. Liu, Willy Susilo, Duncan S. Wong
2005/325
An Effective Method to Implement Group Signature with Revocation
HE GE
2005/324
Extracting bits from coordinates of a point of an elliptic curve
Nicolas Gürel
2005/323
The Weil pairing on elliptic curves over C
Steven D. Galbraith
2005/322
Evolutionary Design of Trace Form Bent Functions
Min yang, Qingshu Meng, Huanguo Zhang
2005/321
Exact Maximum Expected Differential and Linear Probability for 2-Round Advanced Encryption Standard (AES)
Liam Keliher, Jiayuan Sui
2005/320
Efficient Identity-Based Encryption with Tight Security Reduction
Nuttapong Attrapadung, Benoit Chevallier-Mames, Jun Furukawa, Takeshi Gomi, Goichiro Hanaoka, Hideki Imai, Rui Zhang
2005/319
ID-based Restrictive Partially Blind Signatures and Applications
Xiaofeng Chen, Fangguo Zhang, Shengli Liu
2005/318
Bounds on Birthday Attack Times
Michael J. Wiener
2005/317
Ring Signatures without Random Oracles
Sherman S. M. Chow, Joseph K. Liu, Victor K. Wei, Tsz Hon Yuen
2005/316
Collision Attack on XTR and a Countermeasure with a Fixed Pattern
Dong-Guk Han, Tsuyoshi Takagi, Tae Hyun Kim, Ho Won Kim, Kyo Il Chung
2005/315
A Scalable, Delegatable Pseudonym Protocol Enabling Ownership Transfer of RFID Tags
David Molnar, Andrea Soppera, David Wagner
2005/314
Fast genus 2 arithmetic based on Theta functions
P. Gaudry
2005/313
Deterministic Identity-Based Signatures for Partial Aggregation
Javier Herranz
2005/312
A New Efficient Algorithm for Solving Systems of Multivariate Polynomial Equations
Xijin Tang, Yong Feng
2005/311
What do S-boxes Say in Differential Side Channel Attacks?
Cecile Canovas, Jessy Clediere
2005/310
Meta Ring Signature
Hiroyuki OKAZAKI, Ryuichi SAKAI, Masao KASAHARA
2005/309
A New Efficient ID-Based Authenticated Key Agreement Protocol
Quan Yuan, Songping Li
2005/308
Adaptable Group-Oriented Signature
Chunbo Ma, Jun Ao, Dake He
2005/307
The Equivalence Between the DHP and DLP for Elliptic Curves Used in Practical Applications, Revisited
K. Bentahar
2005/306
Murakami-Kasahara ID-based Key Sharing Scheme Revisited ---In Comparison with Maurer-Yacobi Schemes---
Yasuyuki MURAKAMI, Masao KASAHARA
2005/305
Steganography with Imperfect Samplers
Anna Lysyanskaya, Maria Meyerovich
2005/304
Ring Signatures: Stronger Definitions, and Constructions without Random Oracles
Adam Bender, Jonathan Katz, Ruggero Morselli
2005/303
Key Regression: Enabling Efficient Key Distribution for Secure Distributed Storage
Kevin Fu, Seny Kamara, Tadayoshi Kohno
2005/302
Elliptic Curves for Pairing Applications
Angela Murphy, Noel Fitzpatrick
2005/301
On the Hardware Implementation of the MICKEY-128 Stream Cipher
Paris Kitsos
2005/300
Towards Security Two-part Authenticated Key Agreement Protocols
Songping Li, Quan Yuan, Jin Li
2005/299
Nonlinearity of the Round Function
Marcin Kontak, Janusz Szmidt
2005/298
Keeping Denial-of-Service Attackers in the Dark
Gal Badishi, Amir Herzberg, Idit Keidar
2005/297
DSAC: An Approach to Ensure Integrity of Outsourced Databases using Signature Aggregation and Chaining
Maithili Narasimha, Gene Tsudik
2005/296
A Key Establishment IP-Core for Ubiquitous Computing
Markus Volkmer, Sebastian Wallner
2005/295
Hidden Exponent RSA and Efficient Key Distribution
HE GE
2005/294
On Fairness in Simulatability-based Cryptographic Systems
Michael Backes, Dennis Hofheinz, Jörn Müller-Quade, Dominique Unruh
2005/293
Speeding Up Pairing Computation
Colm O hEigeartaigh
2005/292
Improved Integral Cryptanalysis of FOX Block Cipher
Wu Wenling, Zhang Wentao, Feng Dengguo
2005/291
Cryptography In the Bounded Quantum-Storage Model
Ivan Damgård, Serge Fehr, Louis Salvail, Christian Schaffner
2005/290
Perfect Non-Interactive Zero Knowledge for NP
Jens Groth, Rafail Ostrovsky, Amit Sahai
2005/289
Overview of Key Agreement Protocols
Ratna Dutta, Rana Barua
2005/288
Direct Chosen Ciphertext Security from Identity-Based Techniques
Xavier Boyen, Qixiang Mei, Brent Waters
2005/287
Provable Efficient Certificateless Public Key Encryption
Yijuan Shi, Jianhua Li
2005/286
Concurrent Zero Knowledge without Complexity Assumptions
Daniele Micciancio, Shien Jin Ong, Amit Sahai, Salil Vadhan
2005/285
Generalizations of RSA public key cryptosystems
Li Banghe
2005/284
Foundations and Applications for Secure Triggers
Ariel Futoransky, Emiliano Kargieman, Carlos Sarraute, Ariel Waissbein
2005/283
Revisiting Oblivious Signature-Based Envelopes
Samad Nasserian, Gene Tsudik
2005/282
Spreading Alerts Quietly and the Subgroup Escape Problem
James Aspnes, Zoë Diamadi, Kristian Gjøsteen, René Peralta, Aleksandr Yampolskiy
2005/281
Herding Hash Functions and the Nostradamus Attack
John Kelsey, Tadayoshi Kohno
2005/280
Partitioned Cache Architecture as a Side-Channel Defence Mechanism
D. Page
2005/279
Efficient reduction of 1 out of $n$ oblivious transfers in random oracle model
Bao Li, Hongda Li, Guangwu Xu, Haixia Xu
2005/278
A New Rabin-type Trapdoor Permutation Equivalent to Factoring and Its Applications
Katja Schmidt-Samoa
2005/277
Scholten Forms and Elliptic/Hyperelliptic Curves with Weak Weil Restrictions
Fumiyuki Momose, Jinhui Chao
2005/276
Use of Sparse and/or Complex Exponents in Batch Verification of Exponentiations
Jung Hee Cheon, Dong Hoon Lee
2005/275
Explicit Construction of Secure Frameproof Codes
Dongvu Tonien, Reihaneh Safavi-Naini
2005/274
Performance Improvements and a Baseline Parameter Generation Algorithm for NTRUSign
Jeff Hoffstein, Nick Howgrave-Graham, Jill Pipher, Joseph H. Silverman, William Whyte
2005/273
CRYPTOGRAPHY BASED ON CHAOTIC SYNCHRONIZATION: ROUND III
P G Vaidya, Sajini Anand
2005/272
An Authentication Protocol For Mobile Agents Using Bilinear Pairings
Amitabh Saxena, Ben Soh
2005/271
Cache attacks and Countermeasures: the Case of AES
Dag Arne Osvik, Adi Shamir, Eran Tromer
2005/270
Examining Indistinguishability-Based Proof Models for Key Establishment Protocols
Kim-Kwang Raymond Choo, Colin Boyd, Yvonne Hitchcock
2005/269
Security Weakness in a Three-Party Password-Based Key Exchange Protocol Using Weil Pairing
Junghyun Nam, Seungjoo Kim, Dongho Won
2005/268
Secure Human-Computer Identification (Interface) Systems against Peeping Attacks: SecHCI
Shujun Li, Heung-Yeung Shum
2005/267
Stream Cipher Design based on Jumping Finite State Machines
Cees J. A. Jansen
2005/266
A Matching Lower Bound on the Minimum Weight of SHA-1 Expansion Code
Charanjit S. Jutla, Anindya C. Patthak
2005/265
Security Analysis of KEA Authenticated Key Exchange Protocol
Kristin Lauter, Anton Mityagin
2005/264
On an authentication scheme based on the Root Problem in the braid group
Boaz Tsaban
2005/263
Wang's sufficient conditions of MD5 are not sufficient
Jun Yajima, Takeshi Shimoyama
2005/262
Constant-Round Multiparty Computation Using a Black-Box Pseudorandom Generator
Ivan Damgård, Yuval Ishai
2005/261
The Cramer-Shoup Encryption Scheme is Plaintext Aware in the Standard Model
Alexander W. Dent
2005/260
Powered Tate Pairing Computation
Bo Gyeong Kang, Je Hong Park
2005/259
Efficient Delegation of Pairing Computation
Bo Gyeong Kang, Moon Sung Lee, Je Hong Park
2005/258
Relations Among Notions of Security for Identity Based Encryption Schemes
Nuttapong Attrapadung, Yang Cui, Goichiro Hanaoka, Hideki Imai, Kanta Matsuura, Peng Yang, Rui Zhang
2005/257
TMD-Tradeoff and State Entropy Loss Considerations of Streamcipher MICKEY
Jin Hong, Woo-Hwan Kim
2005/256
Fuzzy Universal Hashing and Approximate Authentication
Reihaneh Safavi-Naini, Dongvu Tonien
2005/255
Inoculating Multivariate Schemes Against Differential Attacks
Jintai Ding, Jason E. Gower
2005/254
Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions
Michel Abdalla, Mihir Bellare, Dario Catalano, Eike Kiltz, Tadayoshi Kohno, Tanja Lange, John Malone-Lee, Gregory Neven, Pascal Paillier, Haixia Shi
2005/253
Security Notions for Identity Based Encryption
David Galindo, Ichiro Hasuo
2005/252
Faster Pairings using an Elliptic Curve with an Efficient Endomorphism
Michael Scott
2005/251
Feistel Schemes and Bi-Linear Cryptanalysis
Nicolas Courtois
2005/250
The topology of covert conflict
Shishir Nagaraja, Ross Anderson
2005/249
Efficient Certificateless Public Key Encryption
Yijuan Shi, Jianhua Li
2005/248
Collision-Resistant usage of MD5 and SHA-1 via Message Preprocessing
Michael Szydlo, Yiqun Lisa Yin
2005/247
A Simple and Provably Good Code for SHA Message Expansion
Charanjit S. Jutla, Anindya C. Patthak
2005/246
A Verifiable Secret Shuffle of Homomorphic Encryptions
Jens Groth
2005/245
On the Algebraic Immunity of Symmetric Boolean Functions
An Braeken, Bart Preneel
2005/244
Theoretical cryptanalysis of the Klimov-Shamir number generator TF-1
Boaz Tsaban
2005/243
Cryptanalysis of Sfinks
Nicolas T. Courtois
2005/242
Private Searching On Streaming Data
Rafail Ostrovsky, William E. Skeith III
2005/241
On the binary sequences with high $GF(2)$ linear complexities and low $GF(p)$ linear complexities
Hao Chen, Liqing Xu
2005/240
Attack on Okamoto et al.'s New Short Signature Schemes
Fangguo Zhang, Xiaofeng Chen
2005/239
A Share-Correctable Protocol for the Shamir Threshold Scheme and Its Application to Participant Enrollment
Raylin Tso, Ying Miao, Takeshi Okamoto, Eiji Okamoto
2005/238
Simple and Provable Secure Strong Designated Verifier Signature Schemes
Raylin Tso, Takeshi Okamoto, Eiji Okamoto
2005/237
An Active Attack Against HB+ - A Provably Secure Lightweight Authentication Protocol
Henri Gilbert, Matt Robshaw, Herve Sibert
2005/236
Effective Polynomial Families for Generating More Pairing-Friendly Elliptic Curves
Pu Duan, Shi Cui, Choong Wah Chan
2005/235
Tree Parity Machine Rekeying Architectures for Embedded Security
Markus Volkmer, Sebastian Wallner
2005/234
LILI-II is not Broken
William Millan, Ed Dawson
2005/233
On the Entropy of Arcfour Keys
Luke O'Connor
2005/232
Lightweight Key Exchange and Stream Cipher based solely on Tree Parity Machines
Markus Volkmer, Sebastian Wallner
2005/231
Fast generators for the Diffie-Hellman key agreement protocol and malicious standards
Boaz Tsaban
2005/230
Yet Another Short Signatures Without Random Oracles from Bilinear Pairings
Fangguo Zhang, Xiaofeng Chen
2005/229
Basic Theory in Construction of Boolean Functions with Maximum Possible Annihilator Immunity
Deepak Kumar Dalai, Subhamoy Maitra, Sumanta Sarkar
2005/228
Efficient Doubling on Genus 3 Curves over Binary Fields
Xinxin Fan, Thomas Wollinger, Yumin Wang
2005/227
Threshold Ring Signatures Efficient for Large Sets of Signers
K. Maneva-Jakimoska, G. Jakimoski, M. Burmester
2005/226
Security Proof of Sakai-Kasahara's Identity-Based Encryption Scheme
Liqun Chen, Zhaohui Cheng
2005/225
Minimality of the Hamming Weight of the \tau-NAF for Koblitz Curves and Improved Combination with Point Halving
Roberto M. Avanzi, Clemens Heuberger, Helmut Prodinger
2005/224
An Efficient ID-KEM Based On The Sakai-Kasahara Key Construction
L. Chen, Z. Cheng, J. Malone-Lee, N. P. Smart
2005/223
Diffie-Hellman Key Exchange Protocol, Its Generalization and Nilpotent Groups
Ayan Mahalanobis
2005/222
Efficient Comb Elliptic Curve Multiplication Methods Resistant to Power Analysis
Min Feng, Bin B. Zhu, Maozhi Xu, Shipeng Li
2005/221
Constant Round Dynamic Group Key Agreement
Ratna Dutta, Rana Barua
2005/220
Limits of the Cryptographic Realization of Dolev-Yao-style XOR
Michael Backes, Birgit Pfitzmann
2005/219
Cryptanalysis of a 32-bit RC4-like Stream Cipher
Hongjun Wu
2005/218
The conjugacy problem and related problems in lattice-ordered groups
W. Charles Holland, Boaz Tsaban
2005/217
Efficient Identity-Based Key Encapsulation to Multiple Parties
M. Barbosa, P. Farshim
2005/216
A Secret Sharing Scheme for Preventing the Cheaters from Acquiring the Secret
Hassan Jameel, Sungyoung Lee
2005/215
Reconciling CA-Oblivious Encryption, Hidden Credentials, OSBE and Secret Handshakes
Jason E. Holt
2005/214
TMTO With Multiple Data: Analysis and New Single Table Trade-offs
Sourav Mukhopadhyay, Palash Sarkar
2005/213
A Counter-based MAC Revisited: Towards Better Security
Eonkyung Lee
2005/212
Probability distributions of Correlation and Differentials in Block Ciphers
Joan Daemen, Vincent Rijmen
2005/211
Games and the Impossibility of Realizable Ideal Functionality
Anupam Datta, Ante Derek, John C. Mitchell, Ajith Ramanathan, Andre Scedrov
2005/210
The Ideal-Cipher Model, Revisited: An Uninstantiable Blockcipher-Based Hash Function
John Black
2005/209
Comments on Weaknesses in Two Group Diffie-Hellman Key Exchange Protocols
Jin Wook Byun, Dong Hoon Lee
2005/208
On Finding Roots Without Factoring and A Special Purpose Factoring Algorithm
Daniel R. L. Brown
2005/207
Some Thoughts on Time-Memory-Data Tradeoffs
Alex Biryukov
2005/206
On Session Key Construction in Provably-Secure Key Establishment Protocols: Revisiting Chen & Kudla (2003) and McCullagh & Barreto (2005) ID-Based Protocols
Kim-Kwang Raymond Choo, Colin Boyd, Yvonne Hitchcock
2005/205
Another look at HMQV
Alfred Menezes
2005/204
An Algebraic Masking Method to Protect AES Against Power Attacks
Nicolas Courtois, Louis Goubin
2005/203
On Exact Algebraic [Non-]Immunity of S-boxes Based on Power Functions
Nicolas Courtois, Blandine Debraize, Eric Garrido
2005/202
The Best Differential Characteristics and Subtleties of the Biham-Shamir Attacks on DES
Nicolas Courtois
2005/201
On Security Proof of McCullagh-Barreto's Key Agreement Protocol and its Variants
Zhaohui Cheng, Liqun Chen
2005/200
Block ciphers sensitive to Groebner Basis Attacks
Johannes Buchmann, Andrei Pychkine, Ralf-Philipp Weinmann
2005/199
Verifiable Shuffles: A Formal Model and a Paillier-based 3-Round Construction with Provable Security
Lan Nguyen, Rei Safavi-Naini, Kaoru Kurosawa
2005/198
Universally Composable Time-Stamping Schemes with Audit
Ahto Buldas, Peeter Laud, Märt Saarepera, Jan Willemson
2005/197
Weaknesses in two group Diffie-Hellman key exchange protocols
Qiang Tang, Liqun Chen
2005/196
Universally Composable Password-Based Key Exchange
Ran Canetti, Shai Halevi, Jonathan Katz, Yehuda Lindell, Philip MacKenzie
2005/195
Twin RSA
Arjen K. Lenstra, Benjamin M. M. de Weger
2005/194
Primal-Dual Distance Bounds of Linear Codes with Application to Cryptography
Ryutaroh Matsumoto, Kaoru Kurosawa, Toshiya Itoh, Toshimitsu Konno, Tomohiko Uyematsu
2005/193
VSH, an Efficient and Provable Collision Resistant Hash Function
Scott Contini, Arjen K. Lenstra, Ron Steinfeld
2005/192
On the security and the efficiency of the Merkle signature scheme
Carlos Coronado
2005/191
Public Key Encryption with Keyword Search Revisited
Joonsang Baek, Reihaneh Safavi-Naini, Willy Susilo
2005/190
Security Proof of "Efficient and Leakage-Resilient Authenticated Key Transport Protocol Based on RSA"
SeongHan Shin, Kazukuni Kobara, Hideki Imai
2005/189
A Weak-Randomizer Attack on RSA-OAEP with e = 3
Daniel R. L. Brown
2005/188
Group Signature where Group Manager, Members and Open Authority are Identity-Based
Victor K. Wei, Tsz Hon Yuen, Fangguo Zhang
2005/187
How To Exchange Secrets with Oblivious Transfer
Michael O. Rabin
2005/186
Linkability of Several Blind Signature Schemes
Xuesheng Zhong
2005/185
Security properties of two provably secure conference key agreement protocols
Qiang Tang, Chris J. Mitchell
2005/184
Recursive Constructions of Secure Codes and Hash Families Using Difference Function Families
Dongvu Tonien, Reihaneh Safavi-Naini
2005/183
PEKE, Probabilistic Encryption Key Exchange, 10 Years Later, Including the PEKEv1.25 Specifications
Thierry Moreau
2005/182
Cryptanalysis on Chang-Yang-Hwang Protected Password Change Protocol
Chih-I Wang, Chun-I Fan, D. J. Guan
2005/181
A plausible approach to computer-aided cryptographic proofs
Shai Halevi
2005/180
A Note on Secure Key Issuing in ID-based Cryptography
XU Chunxiang, ZHOU Junhui, QIN Zhiguang
2005/179
Intrusion-Resilience via the Bounded-Storage Model
Stefan Dziembowski
2005/178
Analyzing Unlinkability of Some Group Signatures
Zhou Sujing, Lin Dongdai
2005/177
Secret sharing on the $d$-dimensional cube
Laszlo Csirmaz
2005/176
HMQV: A High-Performance Secure Diffie-Hellman Protocol
Hugo Krawczyk
2005/175
A 32-bit RC4-like Keystream Generator
Yassir Nawaz, Kishan Chand Gupta, Guang Gong
2005/174
On the Automatic Construction of Indistinguishable Operations
Manuel Barbosa, Dan Page
2005/173
Weaknesses in a leakage-resilient authenticated key transport protocol
Qiang Tang, Chris J. Mitchell
2005/172
Conjunctive Keyword Search on Encrypted Data with Completeness and Computational Privacy
Radu Sion, Bogdan Carbunar
2005/171
Towards computationally sound symbolic analysis of key exchange protocols
Prateek Gupta, Vitaly Shmatikov
2005/170
Unclonable Group Identification
Ivan Damgård, Kasper Dupont, Michael Østergaard Pedersen
2005/169
Enforcing Confinement in Distributed Storage and a Cryptographic Model for Access Control
Shai Halevi, Paul A. Karger, Dalit Naor
2005/168
Dynamic k-Times Anonymous Authentication
Lan Nguyen, Rei Safavi-Naini
2005/167
Efficient Computation of the Tate Pairing on Hyperelliptic Curves for Cryptosystems
YoungJu Choie, Jaemyung Kim, Eunjeong Lee
2005/166
Tate pairing computation on the divisors of hyperelliptic curves for cryptosystems
Eunjeong Lee, Yoonjin Lee
2005/165
CRYPTOGRAPHIC MERSENNE TWISTER AND FUBUKI STREAM/BLOCK CIPHER
Makoto Matsumoto, Takuji Nishimura, Mariko Hagita, Mutsuo Saito
2005/164
A Distinguish attack on COSvd Ciphers
Mohammad Ali Orumiehchi ha, Dr. R. Mirghadri
2005/163
Modeling Insider Attacks on Group Key-Exchange Protocols
Jonathan Katz, Ji Sun Shin
2005/162
A Provably Secure and Efficient Verifiable Shuffle based on a Variant of the Paillier Cryptosystem
Lan Nguyen, Rei Safavi-Naini, Kaoru Kurosawa
2005/161
Multiple forgery attacks against Message Authentication Codes
David A. McGrew, Scott R. Fluhrer
2005/160
First Steps Toward a Cryptography-Aware Language and Compiler
M. Barbosa, R. Noad, D. Page, N. P. Smart
2005/159
On Constructing Parallel Pseudorandom Generators from One-Way Functions
Emanuele Viola
2005/158
Geometric Cryptosystem
Arkady Berenstein, Leon Chernyak
2005/157
FOX Algorithm Implementation: a hardware design approach
Colm O'Keeffe, Emanuel Popovici
2005/156
On the security of some password-based key agreement schemes
Qiang Tang, Chris J. Mitchell
2005/155
Py (Roo): A Fast and Secure Stream Cipher using Rolling Arrays
Eli Biham, Jennifer Seberry
2005/154
Secure Stochastic Multi-party Computation for Combinatorial Problems and a Privacy Concept that Explicitely Factors out Knowledge about the Protocol
Marius C. Silaghi, Gerhard Friedrich
2005/153
On Security of Koyama Schemes
Sahadeo Padhye
2005/152
On High-Rate Cryptographic Compression Functions
Richard Ostertag, Martin Stanek
2005/151
Improved Collision Attack on MD4
Yusuke Naito, Yu Sasaki, Noboru Kunihiro, Kazuo Ohta
2005/150
Secure Delegation of Elliptic-Curve Pairing
Benoit Chevallier-Mames, Jean-Sebastien Coron, Noel McCullagh, David Naccache, Michael Scott
2005/149
Conditionally Verifiable Signatures
Aldar C-F. Chan, Ian F. Blake
2005/148
On Universal Composable Security of Time-Stamping Protocols
Toshihiko Matsuo, Shin'ichiro Matsuo
2005/147
Tamper-Evident Digital Signatures: Protecting Certification Authorities Against Malware
Jong Youl Choi, Philippe Golle, Markus Jakobsson
2005/146
A High Speed Architecture for Galois/Counter Mode of Operation (GCM)
Bo Yang, Sambit Mishra, Ramesh Karri
2005/145
Small Secure Sketch for Point-Set Difference
Ee-Chien Chang, Qiming Li
2005/144
Kaweichel, an Extension of Blowfish for 64-Bit Architectures
Dieter Schmidt
2005/143
Multiparty Computation Based on Connectivity of Graphs
Liangliang Xiao, Mulan Liu, Zhifang Zhang
2005/142
Broadcast Encryption with Random Key Pre-distribution Schemes
Mahalingam Ramkumar
2005/141
Enhanced password-based key establishment protocol
Qiang Tang, Chris J. Mitchell
2005/140
How to Split a Shared Secret into Shared Bits in Constant-Round
Ivan Damgård, Matthias Fitzi, Jesper Buus Nielsen, Tomas Toft
2005/139
Scaling security in pairing-based protocols
Michael Scott
2005/138
I-HARPS: An Efficient Key Pre-distribution Scheme
Mahalingam Ramkumar
2005/137
A Sender Verifiable Mix-Net and a New Proof of a Shuffle
Douglas Wikström
2005/136
Skipping, Cascade, and Combined Chain Schemes for Broadcast Encryption
Jung Hee Cheon, Nam-su Jho, Myung-Hwan Kim, Eun Sun Yoo
2005/135
Design of near-optimal pseudorandom functions and pseudorandom permutations in the information-theoretic model
Jacques Patarin, Paul Camion
2005/134
Broadcast Authentication With Hashed Random Preloaded Subsets
Mahalingam Ramkumar
2005/133
Pairing-Friendly Elliptic Curves of Prime Order
Paulo S. L. M. Barreto, Michael Naehrig
2005/132
Formal Notions of Anonymity for Peer-to-peer Networks
Jiejun Kong
2005/131
Dynamic Group Key Agreement in Tree-Based Setting
Ratna Dutta, Rana Barua
2005/130
Results on Rotation Symmetric Boolean Functions on Even Number Variable
pinhui ke, changzhu ling, wenqiao yan
2005/129
On The Indistinguishability-Based Security Model of Key Agreement Protocols-Simple Cases
Zhaohui Cheng, Manos Nistazakis, Richard Comley, Luminita Vasiu
2005/128
Improve the Behavior of XL Family by Reducing the Excrescent Multiply Monomials
Xijin Tang, Yong Feng
2005/127
Browser Model for Security Analysis of Browser-Based Protocols
Thomas Groß, Birgit Pfitzmann, Ahmad-Reza Sadeghi
2005/126
On the Statistically Optimal Divide and Conquer Correlation Attack on the Shrinking Generator
Shahram Khazaei, Mahmood Salmasizadeh, Javad Mohajeri
2005/125
SPA Resistant Left-to-Right Integer Recodings
Nicolas Thériault
2005/124
Append-Only Signatures
Eike Kiltz, Anton Mityagin, Saurabh Panjwani, Barath Raghavan
2005/123
Accumulators from Bilinear Pairings and Applications to ID-based Ring Signatures and Group Membership Revocation
Lan Nguyen
2005/122
Breaking and Repairing Trapdoor-free Group Signature Schemes from Asiacrypt 2004
Xinyi Huang, Willy Susilo, Yi Mu
2005/121
Pass-thoughts: Authenticating With Our Minds
Julie Thorpe, P. C. van Oorschot, Anil Somayaji
2005/120
On Designatedly Verified (Non-interactive) Watermarking Schemes
Malapati Raja Sekhar, Takeshi Okamoto, Eiji Okamato
2005/119
Index Calculus in Class Groups of Plane Curves of Small Degree
Claus Diem
2005/118
Results on Rotation Symmetric Bent Functions
Deepak Kumar Dalai, Subhamoy Maitra
2005/117
Boneh-Franklin Identity Based Encryption Revisited
David Galindo
2005/116
On Computable Isomorphisms in Efficient Asymmetric Pairing Based Systems
Nigel Smart, Frederik Vercauteren
2005/115
Characteristics of Key-Dependent S-Boxes: the Case of Twofish
Marco Macchetti
2005/114
Intrusion-Resilient Secure Channels
Gene Itkis, Robert McNerney Jr., Scott W. Russell
2005/113
Partially Fixed Point Multiplication
Majid Khabbazian, T. Aaron Gulliver, Vijay K. Bhargava
2005/112
On the relationship between squared pairings and plain pairings
Bo Gyeong Kang, Je Hong Park
2005/111
Weak Composite Diffie-Hellman is not Weaker than Factoring
Kooshiar Azimian, Javad Mohajeri, Mahmoud Salmasizadeh
2005/110
Diffie-Hellman key exchange protocol and non-abelian nilpotent groups.
Ayan Mahalanobis
2005/109
A Public Key Cryptosystem Based on Singular Cubic Curve
Sahadeo Padhye
2005/108
Efficient Identity-Based and Authenticated Key Agreement Protocol
Yongge Wang
2005/107
A Uniform Framework for Cryptanalysis of the Bluetooth $E_0$ Cipher
Ophir Levy, Avishai Wool
2005/106
How To Play Almost Any Mental Game Over The Net --- Concurrent Composition via Super-Polynomial Simulation
Boaz Barak, Amit Sahai
2005/105
On Error Correction in the Exponent
Chris Peikert
2005/104
On estimating the lattice security of NTRU
Nick Howgrave-Graham, Jeff Hoffstein, Jill Pipher, William Whyte
2005/103
Cryptanalysis and improvement of an ID-based ad-hoc anonymous identification scheme at CT-RSA 05
Fangguo Zhang, Xiaofeng Chen
2005/102
Finding MD5 Collisions on a Notebook PC Using Multi-message Modifications
Vlastimil Klima
2005/101
Soundness and Completeness of Formal Logics of Symmetric Encryption
Gergei Bana
2005/100
almost enumeration of 8-variable bent functions
Qingshu Meng, Huanguo Zhang, Jingsong Cui, Min Yang
2005/099
Time-Data-Memory Trade-Off Based Cryptanalysis of Certain Broadcast Encryption Schemes
Miodrag J. Mihaljevic, Marc P. C. Fossorier, Hideki Imai
2005/098
Probabilistic Opacity for a Passive Adversary and its Application to Chaum's Voting Scheme
Yassine Lakhnech, Laurent Mazare
2005/097
Computationally Sound Verification of Security Protocols Using Diffie-Hellman Exponentiation
Yassine Lakhnech, Laurent Mazare
2005/096
Almost Perfect Nonlinear Monomials over GF($2^n$) for Infinitely Many $n$
David Jedlicka
2005/095
Security and Privacy Issues in E-passports
Ari Juels, David Molnar, David Wagner
2005/094
A Survey on ID-Based Cryptographic Primitives
M. Choudary Gorantla, Raju Gangishetti, Ashutosh Saxena
2005/093
An ID-Based Key Agreement Scheme from pairing
Guohong Xie
2005/092
PRF Domain Extension Using DAGs
Charanjit Jutla
2005/091
Distributed Phishing Attacks
Markus Jakobsson, Adam Young
2005/090
Rediscovery of Time Memory Tradeoffs
Jin Hong, Palash Sarkar
2005/089
Cryptographer's Toolkit for Construction of $8$-Bit Bent Functions
Hans Dobbertin, Gregor Leander
2005/088
The MAC function Pelican 2.0
Joan Daemen, Vincent Rijmen
2005/087
AES side channel attack protection using random isomorphisms
A. G. Rostovtsev, O. V. Shemyakina
2005/086
Simple Pseudorandom Number Generator with Strengthened Double Encryption (Cilia)
Henry Ng
2005/085
A new structural attack for GPT and variants
R. Overbeck
2005/084
On Resistance of DES to Related-Key Differential Cryptanalysis
Goce Jakimoski, Yvo Desmedt
2005/083
Security notions for disk encryption
Kristian Gjøsteen
2005/082
Some properties of an FSE 2005 Hash Proposal
Lars R. Knudsen
2005/081
Smashing SMASH
Norbert Pramstaller, Christian Rechberger, Vincent Rijmen
2005/080
A QKD Protocol Extendable to Support Entanglement and Reduce Unauthorized Information Gain by Randomizing the Bases Lists with Key Values and Invalidate Explicit Privacy Amplification
R. Venkatesh, C. Sanjeevakumar, M. Kasi Rajan, L. Sudarsan, N. Srinivasan
2005/079
Zero-Knowledge Proofs for Mix-nets of Secret Shares and a Version of ElGamal with Modular Homomorphism
Marius C Silaghi
2005/078
Duality between Multiplication and Modular Reduction
Wieland Fischer, Jean-Pierre Seifert
2005/077
Taxonomy of Public Key Schemes based on the problem of Multivariate Quadratic equations
Christopher Wolf, Bart Preneel
2005/076
Pairing-Based Cryptography at High Security Levels
Neal Koblitz, Alfred Menezes
2005/075
Finding MD5 Collisions – a Toy For a Notebook
Vlastimil Klima
2005/074
Computationally sound implementations of equational theories against passive adversaries
Mathieu Baudet, Vëronique Cortier, Steve Kremer
2005/073
BROADCAST ENCRYPTION $\pi$
Nam-Su Jho, Jung Hee Cheon, Myung-Hwan Kim, Eun Sun Yoo
2005/072
Practical Lattice Basis Sampling Reduction
Johannes Buchmann, Christoph Ludwig
2005/071
A fast parallel scalar multiplication against side-channel analysis for elliptic curve cryptosystem over prime fields
Dabi Zou, Dongdai Lin
2005/070
On public-key cryptosystems based on combinatorial group theory
Jean-Camille Birget, Spyros S. Magliveras, Michal Sramka
2005/069
Fast Elliptic Curve Point Multiplication using Double-Base Chains
V. S. Dimitrov, L. Imbert, P. K. Mishra
2005/068
N-adic Summation-Shrinking Generator. Basic properties and empirical evidences.
Zhaneta Tasheva, Borislav Bedzhev, Borislav Stoyanov
2005/067
Colliding X.509 Certificates
Arjen Lenstra, Xiaoyun Wang, Benne de Weger
2005/066
Unconditionally Secure Constant Round Multi-Party Computation for Equality, Comparison, Bits and Exponentiation
Eike Kiltz
2005/065
Efficient hardware for the Tate pairing calculation in characteristic three
T. Kerins, W. P. Marnane, E. M. Popovici, P. S. L. M. Barreto
2005/064
On Efficient Key Agreement Protocols
Anish Mathuria, Vipul Jain
2005/063
On the Key Schedule of Blowfish
Dieter Schmidt
2005/062
Cryptanalysis of One Fair E-cash System
LiHua Liu, Zhengjun Cao
2005/061
Key Derivation and Randomness Extraction
Olivier Chevassut, Pierre-Alain Fouque, Pierrick Gaudry, David Pointcheval
2005/060
Compact E-Cash
Jan Camenisch, Susan Hohenberger, Anna Lysyanskaya
2005/059
Secret sharing schemes on graphs
Laszlo Csirmaz
2005/058
Generic Constructions of Identity-Based and Certificateless KEMs
K. Bentahar, P. Farshim, J. Malone-Lee, N. P. Smart
2005/057
Tight Reductions among Strong Diffie-Hellman Assumptions
Victor K. Wei
2005/056
Deniable Authentication with RSA and Multicasting
Daniel R. L. Brown
2005/055
Untraceability of Two Group Signature Schemes
Zhengjun Cao
2005/054
Comment on cryptanalysis of Tseng et al.¡¦s authenticated encryption schemes
Yi-Hwa Chen, Jinn-Ke Jan
2005/053
An Approach Towards Rebalanced RSA-CRT with Short Public Exponent
Hung-Min Sun, Mu-En Wu
2005/052
Picking Virtual Pockets using Relay Attacks on Contactless Smartcard Systems
Ziv Kfir, Avishai Wool
2005/051
A Note on Shor's Quantum Algorithm for Prime Factorization
Zhengjun Cao
2005/050
David Chaum's Voter Verification using Encrypted Paper Receipts
Poorvi L. Vora
2005/049
Adversarial Model for Radio Frequency Identification
Gildas Avoine
2005/048
Cryptanalysis of two identification schemes based on an ID-based cryptosystem
Qiang Tang, Chris J. Mitchell
2005/047
Cryptanalysis of an anonymous wireless authentication and conference key distribution scheme
Qiang Tang, Chris J. Mitchell
2005/046
New Approaches for Deniable Authentication
Mario Di Raimondo, Rosario Gennaro
2005/045
Choosing Parameter Sets for NTRUEncrypt with NAEP and SVES-3
Nick Howgrave-Graham, Joseph H. Silverman, William Whyte
2005/044
On the affine classification of cubic bent functions
Sergey Agievich
2005/043
An Efficient Solution to The Millionaires' Problem Based on Homomorphic Encryption
Hsiao-Ying Lin, Wen-Guey Tzeng
2005/042
Polyhedrons over Finite Abelian Groups and Their Cryptographic Applications
O. A. Logachev, A. A. Salnikov, V. V. Yaschenko
2005/041
On the Security of a Group Signature Scheme with Strong Separability
Lihua Liu, Zhengjun Cao
2005/040
Unfairness of a protocol for certified delivery
Juan M. Estevez-Tapiador, Almudena Alcaide
2005/039
Distinguishing Stream Ciphers with Convolutional Filters
Joan Daemen, Gilles Van Assche
2005/038
Cryptanalysis of improvement of digital signature with message recovery using self-certified public keys and its variants
Yi-Hwa Chen, Jinn-Ke Jan
2005/037
Improving Secure Server Performance by Re-balancing SSL/TLS Handshakes
Claude Castelluccia, Einar Mykletun, Gene Tsudik
2005/036
Concurrent Composition of Secure Protocols in the Timing Model
Yael Kalai, Yehuda Lindell, Manoj Prabhakaran
2005/035
An Efficient CDH-based Signature Scheme With a Tight Security Reduction
Benoit Chevallier-Mames
2005/034
Flexible Framework for Secret Handshakes (Multi-Party Anonymous and Un-observable Authentication)
Gene Tsudik, Shouhuai Xu
2005/033
An Attack on CFB Mode Encryption As Used By OpenPGP
Serge Mister, Robert Zuccherato
2005/032
On the Notion of Statistical Security in Simulatability Definitions
Dennis Hofheinz, Dominique Unruh
2005/031
The Vector Decomposition Problem for Elliptic and Hyperelliptic Curves
Iwan Duursma, Negar Kiyavash
2005/030
Weak keys of the Diffie Hellman key exchange II : Pairing based schemes on elliptic curves.
A. A. Kalele, V. R. Sule
2005/029
A model and architecture for pseudo-random generation with applications to /dev/random
Boaz Barak, Shai Halevi
2005/028
Improved Proxy Re-Encryption Schemes with Applications to Secure Distributed Storage
Giuseppe Ateniese, Kevin Fu, Matthew Green, Susan Hohenberger
2005/027
Tag-KEM/DEM: A New Framework for Hybrid Encryption
Masayuki ABE, Rosario Gennaro, Kaoru Kurosawa
2005/026
Techniques for random maskin in hardware
Jovan Dj. Golic
2005/025
Analysis of Affinely Equivalent Boolean Functions
Meng Qing-shu, Yang min, Zhang Huan-guo, Liu Yu-zhen
2005/024
Weak keys of the Diffe Hellman key exchange I
A. A. Kalele, V. R. Sule
2005/023
A Construction of Public-Key Cryptosystem Using Algebraic Coding on the Basis of Superimposition and Randomness
Masao Kasahara
2005/022
An Improved and Efficient Countermeasure against Power Analysis Attacks
ChangKyun Kim, JaeCheol Ha, SangJae Moon, Sung-Ming Yen, Wei-Chih Lien, Sung-Hyun Kim
2005/021
Partial Hiding in Public-Key Cryptography
Eabhnat N\'ı Fhloinn, Michael Purser
2005/020
(De)Compositions of Cryptographic Schemes and their Applications to Protocols
R. Janvier, Y. Lakhnech, L. Mazare
2005/019
The Full Abstraction of the UC Framework
Jesüs F. Almansa
2005/018
Collusion Resistant Broadcast Encryption With Short Ciphertexts and Private Keys
Dan Boneh, Craig Gentry, Brent Waters
2005/017
Side Channel Attacks on Implementations of Curve-Based Cryptographic Primitives
Roberto M. Avanzi
2005/016
Narrow T-functions
Magnus Daum
2005/015
Hierarchical Identity Based Encryption with Constant Size Ciphertext
Dan Boneh, Xavier Boyen, Eu-Jin Goh
2005/014
A Chosen Ciphertext Attack on a Public Key Cryptosystem Based on Lyndon Words
Ludovic Perret
2005/013
Comments: Insider attack on Cheng et al.'s pairing-based tripartite key agreement protocols
Hung-Yu Chien
2005/012
Efficient Certificateless Public Key Encryption
Zhaohui Cheng, Richard Comley
2005/011
An Improved Elegant Method to Re-initialize Hash Chains
Yuanchao Zhao, Daoben Li
2005/010
Update on SHA-1
Vincent Rijmen, Elisabeth Oswald
2005/009
Mixing properties of triangular feedback shift registers
Bernd Schomburg
2005/008
Comments on ``Distributed Symmetric Key Management for Mobile Ad hoc Networks" from INFOCOM 2004
J. Wu, R. Wei
2005/007
The Misuse of RC4 in Microsoft Word and Excel
Hongjun Wu
2005/006
A Metric on the Set of Elliptic Curves over ${\mathbf F}_p$.
Pradeep Kumar Mishra, Kishan Chand Gupta
2005/005
A sufficient condition for key-privacy
Shai Halevi
2005/004
Benes and Butterfly schemes revisited
Jacques Patarin, Audrey Montreuil
2005/003
Cryptanalysis of Hiji-bij-bij (HBB)
Vlastimil Klima
2005/002
Logcrypt: Forward Security and Public Verification for Secure Audit Logs
Jason E. Holt, Kent E. Seamons
2005/001
On Obfuscating Point Functions
Hoeteck Wee
2004/377
New Distributed Ring Signatures for General Families of Signing Subsets
Javier Herranz, Germán Sáez
2004/376
Cryptanalysis of RCES/RSES Image Encryption Scheme
Shujun Li, Chengqing Li, Guanrong Chen, Kwok-Tung Lo
2004/375
Efficient Pairing Computation on Supersingular Abelian Varieties
Paulo S. L. M. Barreto, Steven Galbraith, Colm O hEigeartaigh, Michael Scott
2004/374
A general quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks
Shujun Li, Chengqing Li, Guanrong Chen, Nikolaos G. Bourbakis, Kwok-Tung Lo
2004/373
Delegateable Signature Using Witness Indistinguishable and Witness Hiding Proofs
Chunming Tang, Dingyi Pei, Zhuojun Liu
2004/372
On The Security of Two Key-Updating Signature Schemes
Xingyang Guo
2004/371
Construction and Traversal of Hash Chain with Public Links
Vipul Goyal
2004/370
Tracing-by-Linking Group Signautres
Victor K. Wei
2004/369
SCA1 Model: Towards a concrete security approach to the design of cryptosystems secure against side-channel attacks
Filipe Rosado da-Fonseca
2004/368
Cryptographic Asynchronous Multi-Party Computation with Optimal Resilience
Martin Hirt, Jesper Buus Nielsen, Bartosz Przydatek
2004/367
On the Affine Transformations of HFE-Cryptosystems and Systems with Branches
Patrick Felke
2004/366
Piece In Hand Concept for Enhancing the Security of Multivariate Type Public Key Cryptosystems: Public Key Without Containing All the Information of Secret Key
Shigeo Tsujii, Kohtaro Tadaki, Ryou Fujita
2004/365
Ordinary abelian varieties having small embedding degree
Steven D. Galbraith, J. McKee, P. Valenca
2004/364
Finding good differential patterns for attacks on SHA-1
Krystian Matusiewicz, Josef Pieprzyk
2004/363
Rethinking the security of some authenticated group key agreement schemes
Qiang Tang, Chris J. Mitchell
2004/362
A new security proof for Damgård's ElGamal
Kristian Gjøsteen
2004/361
Superfluous Keys in Multivariate Quadratic Asymmetric Systems
Christopher Wolf, Bart Preneel
2004/360
Equivalent Keys in HFE, C$^*$, and variations
Christopher Wolf, Bart Preneel
2004/359
Secure Computation of the Mean and Related Statistics
Eike Kiltz, Gregor Leander, John Malone-Lee
2004/358
Reusable Cryptographic Fuzzy Extractors
Xavier Boyen
2004/357
MD5 To Be Considered Harmful Someday
Dan Kaminsky
2004/356
Practical Attacks on Digital Signatures Using MD5 Message Digest
Ondrej Mikle
2004/355
A Small-Scale Voting Protocol Hiding Vote-Counts of All Candidates
Pei-yih Ting, Po-Yueh Hung
2004/354
Classes of Plateaued Rotation Symmetric Boolean Functions under Transformation of Walsh Spectra
Alexander Maximov
2004/353
Direct Division in Factor Rings
Patrick Fitzpatrick, Christopher Wolf
2004/352
Practical Cryptography in High Dimensional Tori
Marten van Dijk, Robert Granger, Dan Page, Karl Rubin, Alice Silverberg, Martijn Stam, David Woodruff
2004/351
Efficient and Optimistic Fair Exchanges Based on Standard RSA with Provable Security
ZhenFeng ZHANG, YongBin ZHOU, DengGuo FENG
2004/350
Multivariable public--key cryptosystems
Jintai Ding, Dieter Schmidt
2004/349
A DPA Attack on the Improved Ha-Moon Algorithm
Dong Jin PARK, Pil Joong LEE
2004/348
A weakness in Sun-Chen-Hwang's three-party key agreement protocols using passwords
Junghyun Nam, Seungjoo Kim, Dongho Won
2004/347
Addendum to ``On the Generalized Linear Equivalence of Functions over Finite Fields''
Marco Macchetti
2004/346
Random Switching Logic: A Countermeasure against DPA based on Transition Probability
Daisuke Suzuki, Minoru Saeki, Tetsuya Ichikawa
2004/345
On Session Identifiers in Provably Secure Protocols: The Bellare-Rogaway Three-Party Key Distribution Protocol Revisited
Kim-Kwang Raymond Choo, Colin Boyd, Yvonne Hitchcock, Greg Maitland
2004/344
Modified Parameter Attacks: Practical Attacks against CCA2 Secure Cryptosystems and Countermeasures
Nick Howgrave-Graham, Joseph H. Silverman, Ari Singer, William Whyte
2004/343
Revisit Of McCullagh--Barreto Two-Party ID-Based Authenticated Key Agreement Protocols
Kim-Kwang Raymond Choo
2004/342
A comb method to render ECC resistant against Side Channel Attacks
Mustapha Hedabou, Pierre Pinel, Lucien Bénéteau
2004/341
Reducing Complexity Assumptions for Statistically-Hiding Commitment
Omer Horvitz, Jonathan Katz, Chiu-Yuen Koo, Ruggero Morselli
2004/340
Request for Review of Key Wrap Algorithms
Morris Dworkin
2004/339
Divisors in Residue Classes, Constructively
Don Coppersmith, Nick Howgrave-Graham, S. V. Nagaraj
2004/338
Identity-Based Hierarchical Strongly Key-Insulated Encryption and Its Application
Yumiko Hanaoka, Goichiro Hanaoka, Junji Shikata, Hideki Imai
2004/337
Security on Generalized Feistel Scheme with SP Round Function
Wu Wenling, Zhang Wentao, Lin Dongdai
2004/336
Oblivious Transfer Is Symmetric
Stefan Wolf, Jürg Wullschleger
2004/335
Statistical Zero-Knowledge Arguments for NP Using Approximable-Preimage-Size One-Way Functions
Haitner Iftach, Shaltiel Ronen
2004/334
Universally Composable Symbolic Analysis of Cryptographic Protocols (The case of encryption-based mutual authentication and key exchange)
Ran Canetti, Jonathan Herzog
2004/333
Secure Multi-party Computation for selecting a solution according to a uniform distribution over all solutions of a general combinatorial problem
Marius-Calin Silaghi
2004/332
Sequences of games: a tool for taming complexity in security proofs
Victor Shoup
2004/331
Code-Based Game-Playing Proofs and the Security of Triple Encryption
Mihir Bellare, Phillip Rogaway
2004/330
Multicollision Attacks on Generalized Hash Functions
M. Nandi, D. R. Stinson
2004/329
Hardness amplification of weakly verifiable puzzles
Ran Canetti, Shai Halevi, Michael Steiner
2004/328
Security Analysis of a 2/3-rate Double Length Compression Function in Black-Box Model
Mridul Nandi, Wonil Lee, Kouichi Sakurai, Sangjin Lee
2004/327
Efficient Identity Based Ring Signature
Sherman S. M. Chow, S. M. Yiu, Lucas C. K. Hui
2004/326
Cryptanalysis of Qiu-Gu-Chen Variant Group Signature Scheme
Zhengjun Cao
2004/325
Complexity of the Collision and Near-Collision Attack on SHA-0 with Different Message Schedules
Mitsuhiro HATTORI, Shoichi HIROSE, Susumu YOSHIDA
2004/324
On a Probabilistic Approach to the Security Analysis of Cryptographic Hash Functions
G. Laccetti, G. Schmid
2004/323
A note on López-Dahab coordinates
Tanja Lange
2004/322
Separable and Anonymous Identity-Based Key Issuing
Ai-fen Sui, Sherman S. M. Chow, Lucas C. K. Hui, S. M. Yiu, K. P. Chow, W. W. Tsang, C. F. Chong, K. H. Pun, H. W. Chan
2004/321
The conjugacy search problem in public key cryptography: unnecessary and insufficient
Vladimir Shpilrain, Alexander Ushakov
2004/320
Upper Bounds for the Selection of the Cryptographic Key Lifetimes: Bounding the Risk of Key Exposure in the Presence of Faults
Alfonso De Gregorio
2004/319
Badger - A Fast and Provably Secure MAC
Martin Boesgaard, Ove Scavenius, Thomas Pedersen, Thomas Christensen, Erik Zenner
2004/318
Upper Bounds on the Communication Complexity of Optimally Resilient Cryptographic Multiparty Computation
Martin Hirt, Jesper Buus Nielsen
2004/317
Adaptively-Secure, Non-Interactive Public-Key Encryption
Ran Canetti, Shai Halevi, Jonathan Katz
2004/316
On a Threshold Group Signature Scheme and a Fair Blind Signature Scheme
Zhengjun Cao
2004/315
Security Arguments for Partial Delegation with Warrant Proxy Signature Schemes
Qin Wang, Zhenfu Cao
2004/314
A Technical Comparison of IPSec and SSL
AbdelNasir Alshamsi, Takamichi Saito
2004/313
Cryptanalysis of a threshold proxy signature with known signers
Fuw-Yi Yang, Jinn-Ke Jan, Woei-Jiunn Jeng
2004/312
Ramanujan Graphs and the Random Reducibility of Discrete Log on Isogenous Elliptic Curves
David Jao, Stephen D. Miller, Ramarathnam Venkatesan
2004/311
Hierarchical Group Signatures
Marten Trolin, Douglas Wikstrom
2004/310
A Verifiable Random Function With Short Proofs and Keys
Yevgeniy Dodis, Aleksandr Yampolskiy
2004/309
The Power of Verification Queries in Message Authentication and Authenticated Encryption
Mihir Bellare, Oded Goldreich, Anton Mityagin
2004/308
Cryptanalysis of Noel McCullagh and Paulo S. L. M. Barreto¡¯s two-party identity-based key agreement
Guohong Xie
2004/307
Universal Forgeability of Wang-Wu-Wang Key-Insulated Signature Scheme
Zhengjun Cao
2004/306
The Static Diffie-Hellman Problem
Daniel R. L. Brown, Robert P. Gallant
2004/305
A note on efficient computation of cube roots in characteristic 3
Paulo S. L. M. Barreto
2004/304
Second Preimages on n-bit Hash Functions for Much Less than 2^n Work
John Kelsey, Bruce Schneier
2004/303
Efficient Tate Pairing Computation for Supersingular Elliptic Curves over Binary Fields
Soonhak Kwon
2004/302
Security of Wang-Li Threshold Signature Scheme
Lifeng Guo
2004/301
VMPC-MAC: A Stream Cipher Based Authenticated Encryption Scheme
Bartosz Zoltak
2004/300
Relating Symbolic and Cryptographic Secrecy
Michael Backes, Birgit Pfitzmann
2004/299
Security Flaws in a Pairing-based Group Signature Scheme
Zhengjun Cao, Sherman S. M. Chow
2004/298
Nominative Proxy Signature Schemes
Zuo-Wen Tan, Zhuo-Jun Liu
2004/297
Post-Quantum Signatures
Johannes Buchmann, Carlos Coronado, Martin Döring, Daniela Engelbert, Christoph Ludwig, Raphael Overbeck, Arthur Schmidt, Ulrich Vollmer, Ralf-Philipp Weinmann
2004/296
Designs of Efficient Secure Large Hash Values
Mridul Nandi
2004/295
An Access Control Scheme for Partially Ordered Set Hierarchy with Provable Security
Jiang Wu, Ruizhong Wei
2004/294
Solving Systems of Differential Equations of Addition and Cryptanalysis of the Helix Cipher
Souradyuti Paul, Bart Preneel
2004/293
Provably Secure Authentication of Digital Media Through Invertible Watermarks
Jana Dittmann, Stefan Katzenbeisser, Christian Schallhart, Helmut Veith
2004/292
Asynchronous Proactive RSA
Ruishan Zhang, Kefei Chen
2004/291
The Rabbit Stream Cipher - Design and Security Analysis
Martin Boesgaard, Thomas Pedersen, Mette Vesterager, Erik Zenner
2004/290
The Security of the FDH Variant of Chaum's Undeniable Signature Scheme
Wakaha Ogata, Kaoru Kurosawa, Swee-Huay Heng
2004/289
Fault attack on the DVB Common Scrambling Algorithm
Kai Wirt
2004/288
A New Designated Confirmer Signature Variant with Intended Recipient
Yong Li, Dingyi Pei
2004/287
Almost Ideal Contrast Visual Cryptography with Reversing
Duong Quang Viet, Kaoru Kurosawa
2004/286
Generalized compact knapsacks, cyclic lattices, and efficient one-way functions from worst-case complexity assumptions
Daniele Micciancio
2004/285
Generation of random Picard curves for cryptography
Annegret Weng
2004/284
ON THE DEGREE OF HOMOGENEOUS BENT FUNCTIONS
Qingshu Meng, Huanguo Zhang, Min Yang, Jingsong Cui
2004/283
Fault and Side-Channel Attacks on Pairing Based Cryptography
D. Page, F. Vercauteren
2004/282
New Monotone Span Programs from Old
Ventzislav Nikov, Svetla Nikova
2004/281
Short Linkable Ring Signatures for E-Voting, E-Cash and Attestation
Patrick P. Tsang, Victor K. Wei
2004/280
Cryptanalysis of Park-Lee Nominative Proxy Signature Scheme
Zhengjun Cao
2004/279
Parallel Montgomery Multiplication in $GF(2^k)$ using Trinomial Residue Arithmetic
Jean-Claude Bajard, Laurent Imbert, Graham A. Jullien
2004/278
The Extended Codebook (XCB) Mode of Operation
David A. McGrew, Scott R. Fluhrer
2004/277
Experimenting with Faults, Lattices and the DSA
David Naccache, Phong Q. Nguyen, Michael Tunstall, Claire Whelan
2004/276
Improving the algebraic immunity of resilient and nonlinear functions and constructing bent functions
C. Carlet
2004/275
An e-Voting Scheme with Improved Resistance to Bribe and Coercion
Wei-Chi Ku, Chun-Ming Ho
2004/274
A NOVEL ALGORITHM ENUMERATING BENT FUNCTIONS
Meng Qing-shu, Yang min, Zhang huan-guo, Cui jing-song
2004/273
Cryptanalysis of Threshold-Multisignature schemes
Lifeng Guo
2004/272
A Characterization of Authenticated-Encryption as a Form of Chosen-Ciphertext Security
Tom Shrimpton
2004/271
The Mundja Streaming MAC
Philip Hawkes, Michael Paddon, Gregory G. Rose
2004/270
An Enhanced and Secure Protocol for Authenticated Key Exchange
Fuw-Yi Yang, Jinn-Ke Jan
2004/269
Cryptanalysis of Threshold-Multisignature Schemes
Lifeng Guo
2004/268
Untraceability of Wang-Fu Group Signature Scheme
Zhengjun Cao, Lihua Liu
2004/267
Separable Linkable Threshold Ring Signatures
Patrick P. Tsang, Victor K. Wei, Tony K. Chan, Man Ho Au, Joseph K. Liu, Duncan S. Wong
2004/266
A New Minimal Average Weight Representation for Left-to-Right Point Multiplication Methods
M. Khabbazian, T. A. Gulliver
2004/265
sSCADA: Securing SCADA Infrastructure Communications
Yongge Wang, Bei-Tseng Chu
2004/264
Musings on the Wang et al. MD5 Collision
Philip Hawkes, Michael Paddon, Gregory G. Rose
2004/263
Applications of $\mathcal{M}$ultivariate $\mathcal{Q}$uadratic Public Key Systems
Christopher Wolf, Bart Preneel
2004/262
Universal Forgeability of a Forward-Secure Blind Signature Scheme Proposed by Duc et al.
Lihua Liu, Zhengjun Cao
2004/261
Improved Efficiency for CCA-Secure Cryptosystems Built Using Identity-Based Encryption
Dan Boneh, Jonathan Katz
2004/260
Secure Group Communications over Combined Wired/Wireless Networks
Junghyun Nam, Seungjoo Kim, Hyungkyu Yang, Dongho Won
2004/259
On Boolean Functions with Generalized Cryptographic Properties
An Braeken, Ventzislav Nikov, Svetla Nikova, Bart Preneel
2004/258
Escrow-Free Encryption Supporting Cryptographic Workflow
S. S. Al-Riyami, J. Malone-Lee, N. P. Smart
2004/257
A Weakness in Jung-Paeng-Kim's ID-based Conference Key Distribution Scheme
Junghyun Nam, Seungjoo Kim, Dongho Won
2004/256
On the supports of the Walsh transforms of Boolean functions
Claude Carlet, Sihem Mesnager
2004/255
A Complete Divisor Class Halving Algorithm for Hyperelliptic Curve Cryptosystems of Genus Two
Izuru Kitamura, Masanobu Katagi, Tsuyoshi Takagi
2004/254
New paradigms for digital generation and post-processing of random data
Jovan Dj. Golic
2004/253
Design Principles for Iterated Hash Functions
Stefan Lucks
2004/252
Security Proofs for Identity-Based Identification and Signature Schemes
Mihir Bellare, Chanathip Namprempre, Gregory Neven
2004/251
Attacks on Bresson-Chevassut-Essiari-Pointcheval's Group Key Agreement Scheme for Low-Power Mobile Devices
Junghyun Nam, Seungjoo Kim, Dongho Won
2004/250
Identity Based Threshold Proxy Signature
Jing Xu, Zhenfeng Zhang, Dengguo Feng
2004/249
Attacks On An ISO/IEC 11770-2 Key Establishment Protocol
Zhaohui Cheng, Richard Comley
2004/248
Classification of Boolean Functions of 6 Variables or Less with Respect to Cryptographic Properties
An Braeken, Yuri Borissov, Svetla Nikova, Bart Preneel
2004/247
Vectorial fast correlation attacks
Jovan Dj. Golic, Guglielmo Morgari
2004/246
Upper and Lower Bounds on Black-Box Steganography
Nenad Dedic, Gene Itkis, Leonid Reyzin, Scott Russell
2004/245
On codes, matroids and secure multi-party computation from linear secret sharing schemes
Ronald Cramer, Vanesa Daza, Ignacio Gracia, Jorge Jimenez Urroz, Gregor Leander, Jaume Marti-Farre, Carles Padro
2004/244
Signcryption in Hierarchical Identity Based Cryptosystem
Sherman S. M. Chow, Tsz Hon Yuen, Lucas C. K. Hui, S. M. Yiu
2004/243
On the Key Exposure Problem in Chameleon Hashes
Giuseppe Ateniese, Breno de Medeiros
2004/242
Combinatorial group theory and public key cryptography
Vladimir Shpilrain, Gabriel Zapata
2004/241
A Comparison of Point Counting methods for Hyperelliptic Curves over Prime Fields and Fields of Characteristic 2
Colm O hEigeartaigh
2004/240
A Weil Descent Attack against Elliptic Curve Cryptosystems over Quartic Extension Fields
Seigo Arita, Kazuto Matsuo, Koh-ichi Nagao, Mahoro Shimura
2004/239
Geometric Key Establishment
Arkady Berenstein, Leon Chernyak
2004/238
Security Analysis of A Dynamic ID-based Remote User Authentication Scheme
Amit K Awasthi, Sunder Lal
2004/237
Efficient Cryptanalysis of RSE(2)PKC and RSSE(2)PKC
Christopher Wolf, An Braeken, Bart Preneel
2004/236
Forgery Attacks on Chang et al.'s signature scheme with message recovery
FU Xiaotong, XU Chunxiang, XIAO Guozhen
2004/235
Cryptographic Implications of Hess' Generalized GHS Attack
Alfred Menezes, Edlyn Teske
2004/234
On the security of some nonrepudiable threshold proxy signature schemes with known signers
Zuo-Wen Tan, Zhuo-Jun Liu
2004/233
Password-Based Authenticated Key Exchange in the Three-Party Setting
Michel Abdalla, Pierre-Alain Fouque, David Pointcheval
2004/232
Extending the Resynchronization Attack
Frederik Armknecht, Joseph Lano, Bart Preneel
2004/231
Timed-Release and Key-Insulated Public Key Encryption
Jung Hee Cheon, Nicholas Hopper, Yongdae Kim, Ivan Osipkov
2004/230
A Provable Secure Scheme for Partially Blind Signatures
Fuw-Yi Yang, Jinn-Ke Jan
2004/229
Secure Direct Communication Using Quantum Calderbank-Shor-Steane Codes
Xin Lu, Zhi Ma, Dengguo Feng
2004/228
DISTRIBUTION OF R-PATTERNS IN THE KERDOCK-CODE BINARY SEQUENCES AND THE HIGHEST LEVEL SEQUENCES OF PRIMITIVE SEQUENCES OVER $Z_{2^l}$
Honggang Hu, Dengguo Feng
2004/227
Sign Change Fault Attacks On Elliptic Curve Cryptosystems
Johannes Blömer, Martin Otto, Jean-Pierre Seifert
2004/226
Lower Bounds for Non-Black-Box Zero Knowledge
Boaz Barak, Yehuda Lindell, Salil Vadhan
2004/225
Vectorial Boolean functions and induced algebraic equations
Jovan Dj. Golic
2004/224
The Polynomial Composition Problem in (Z/nZ)[X]
Marc Joye, David Naccache, Stephanie Porte
2004/223
Inversion-Free Arithmetic on Genus 3 Hyperelliptic Curves
Xinxin Fan, Yumin Wang
2004/222
A Study of the Security of Unbalanced Oil and Vinegar Signature Schemes
An Braeken, Christopher Wolf, Bart Preneel
2004/221
Towards Plaintext-Aware Public-Key Encryption without Random Oracles
Mihir Bellare, Adriana Palacio
2004/220
On Oleshchuk's Public Key Cryptosystem
Heiko Stamer, Friedrich Otto
2004/219
Entropic Security and the Encryption of High Entropy Messages
Yevgeniy Dodis, Adam Smith
2004/218
Plaintext-Simulatability
Eiichiro Fujisaki
2004/217
Cryptanalyzing the Polynomial-Reconstruction based Public-Key System Under Optimal Parameter Choice
Aggelos Kiayias, Moti Yung
2004/216
Tree Parity Machine Rekeying Architectures
Markus Volkmer, Sebastian Wallner
2004/215
Transitive Signatures: New Schemes and Proofs
Mihir Bellare, Gregory Neven
2004/214
Classification of Highly Nonlinear Boolean Power Functions with a Randomised Algorithm for Checking Normality
An Braeken, Christopher Wolf, Bart Preneel
2004/213
Cryptanalysis of Chang et al.'s Signature Scheme with Message Recovery
Fangguo Zhang
2004/212
ID-Based Encryption for Complex Hierarchies with Applications to Forward Security and Broadcast Encryption
Danfeng Yao, Nelly Fazio, Yevgeniy Dodis, Anna Lysyanskaya
2004/211
Scalable, Server-Passive, User-Anonymous Timed Release Public Key Encryption from Bilinear Pairing
Ian F. Blake, Aldar C-F. Chan
2004/210
Hybrid Cryptography
Alexander W. Dent
2004/209
The Security and Efficiency of Micciancio's Cryptosystem
Christoph Ludwig
2004/208
Deterministic Polynomial Time Equivalence of Computing the RSA Secret Key and Factoring
Jean-Sebastien Coron, Alexander May
2004/207
On Corrective Patterns for the SHA-2 Family
Philip Hawkes, Michael Paddon, Gregory G. Rose
2004/206
ID-Based Proxy Signature Using Bilinear Pairings
Jing Xu, Zhenfeng Zhang, Dengguo Feng
2004/205
Direct Anonymous Attestation
Ernie Brickell, Jan Camenisch, Liqun Chen
2004/204
Authenticated tree parity machine key exchange
Markus Volkmer, Andre Schaumburg
2004/203
How to Cheat at Chess: A Security Analysis of the Internet Chess Club
John Black, Martin Cochran, Ryan Gardner
2004/202
Covering Radius of the $(n-3)$-rd Order Reed-Muller Code in the Set of Resilient Functions
Yuri Borissov, An Braeken, Svetla Nikova
2004/201
Non-Interactive and Information-Theoretic Secure Publicly Verifiable Secret Sharing
Chunming Tang, Dingyi Pei, Zhuojun Liu, Yong He
2004/200
On Cheating Immune Secret Sharing
An Braeken, Svetla Nikova, Ventzislav Nikov
2004/199
Collisions for Hash Functions MD4, MD5, HAVAL-128 and RIPEMD
Xiaoyun Wang, Dengguo Feng, Xuejia Lai, Hongbo Yu
2004/198
Long Modular Multiplication for Cryptographic Applications
Laszlo Hars
2004/197
SPA-based attack against the modular reduction within a partially secured RSA-CRT implementation
Helmut Kahl
2004/196
Password Based Key Exchange with Mutual Authentication
Shaoquan Jiang, Guang Gong
2004/195
Signed Binary Representations Revisited
Katsuyuki Okeya, Katja Schmidt-Samoa, Christian Spahn, Tsuyoshi Takagi
2004/194
A Note on An Encryption Scheme of Kurosawa and Desmedt
Rosario Gennaro, Victor Shoup
2004/193
The Security and Performance of the Galois/Counter Mode of Operation (Full Version)
David A. McGrew, John Viega
2004/192
Security Pitfalls of an efficient remote user authentication scheme using smart cards
Manoj Kumar
2004/191
Scalar Multiplication in Elliptic Curve Cryptosystems: Pipelining with Pre-computations
Pradeep Kumar Mishra
2004/190
Distributed Ring Signatures for Identity-Based Scenarios
Javier Herranz, Germán Sáez
2004/189
Computing Modular Polynomials
Denis Charles, Kristin Lauter
2004/188
Grey Box Implementation of Block Ciphers Preserving the Confidentiality of their Design
Vincent Carlier, Hervé Chabanne, Emmanuelle Dottax
2004/187
Parallel FPGA Implementation of RSA with Residue Number Systems - Can side-channel threats be avoided? - Extended version
Mathieu Ciet, Michael Neve, Eric Peeters, Jean-Jacques Quisquater
2004/186
A New Remote User Authentication Scheme Using Smart Cards with Forward Secrecy
Manoj Kumar
2004/185
On the Existence of low-degree Equations for Algebraic Attacks
Frederik Armknecht
2004/184
ID-based Ring Signature and Proxy Ring Signature Schemes from Bilinear Pairings
Amit K Awasthi, Sunder Lal
2004/183
A New Forward Secure Signature Scheme
Bo Gyeong Kang, Je Hong Park, Sang Geun Hahn
2004/182
Simpler Session-Key Generation from Short Random Passwords
Minh-Huyen Nguyen, Salil Vadhan
2004/181
On the Composition of Authenticated Byzantine Agreement
Yehuda Lindell, Anna Lysyanskaya, Tal Rabin
2004/180
Efficient Identity-Based Encryption Without Random Oracles
Brent R. Waters
2004/179
Identity Based Threshold Ring Signature
Sherman S. M. Chow, Lucas C. K. Hui, S. M. Yiu
2004/178
Optimal Updating of Ideal Threshold Schemes
S. G. Barwick, W. -A. Jackson, K. M. Martin, C. M. O'Keefe
2004/177
Updating the Parameters of a Threshold Scheme by Minimal Broadcast
S. G. Barwick, W. -A. Jackson, K. M. Martin
2004/176
A Biometric Identity Based Signature Scheme
Andrew Burnett, Adam Duffy, Tom Dowling
2004/175
A Proof of Yao's Protocol for Secure Two-Party Computation
Yehuda Lindell, Benny Pinkas
2004/174
Short Group Signatures
Dan Boneh, Xavier Boyen, Hovav Shacham
2004/173
Secure Identity Based Encryption Without Random Oracles
Dan Boneh, Xavier Boyen
2004/172
Efficient Selective-ID Secure Identity Based Encryption Without Random Oracles
Dan Boneh, Xavier Boyen
2004/171
Short Signatures Without Random Oracles
Dan Boneh, Xavier Boyen
2004/170
Efficient Consistency Proofs for Generalized Queries on a Committed Database
Rafail Ostrovsky, Charles Rackoff, Adam Smith
2004/169
Regional Blackouts: Protection of Broadcast Content on 3G Networks.
Alexander W. Dent, Allan Tomlinson
2004/168
Building Instances of TTM Immune to the Goubin-Courtois Attack and the Ding-Schmidt Attack
T. Moh, J. M. Chen, Boyin Yang
2004/167
A Secure and Efficient Key Exchange Protocol for Mobile Communications
Fuw-Yi Yang, Jinn-Ke Jan
2004/166
FRMAC, a Fast Randomized Message Authentication Code
Eliane Jaulmes, Reynald Lercier
2004/165
A comparison of MNT curves and supersingular curves
D. Page, N. P. Smart, F. Vercauteren
2004/164
ID-based Cryptography from Composite Degree Residuosity
Man Ho Au, Victor K. Wei
2004/163
On the Weaknesses and Improvements of an Efficient Password Based Remote User Authentication Scheme Using Smart Cards
Manoj Kumar
2004/162
On the Key-Uncertainty of Quantum Ciphers and the Computational Security of One-way Quantum Transmission
Ivan Damgaard, Thomas Pedersen, Louis Salvail
2004/161
Improvement of Thériault Algorithm of Index Calculus for Jacobian of Hyperelliptic Curves of Small Genus
Ko-ichi Nagao
2004/160
Scalable Public-Key Tracing and Revoking
Yevgeniy Dodis, Nelly Fazio, Aggelos Kiayias, Moti Yung
2004/159
Provably Secure On-demand Source Routing in Mobile Ad Hoc Networks
Gergely Acs, Levente Buttyan, Istvan Vajda
2004/158
Mobile Terminal Security
Olivier Benoit, Nora Dabbous, Laurent Gauteron, Pierre Girard, Helena Handschuh, David Naccache, Stéphane Socié, Claire Whelan
2004/157
Hardware and Software Normal Basis Arithmetic for Pairing Based Cryptography in Characteristic Three
R. Granger, D. Page, M. Stam
2004/156
Quantum cryptography: a practical information security perspective
Kenneth G. Paterson, Fred Piper, Ruediger Schack
2004/155
Security and Identification Indicators for Browsers against Spoofing and Phishing Attacks
Amir Herzberg, Ahmad Gbara
2004/154
Controlling Spam by Secure Internet Content Selection
Amir Herzberg
2004/153
A double large prime variation for small genus hyperelliptic index calculus
P. Gaudry, E. Thomë, N. Thëriault, C. Diem
2004/152
Another Look at ``Provable Security''
Neal Koblitz, Alfred Menezes
2004/151
Suitable Curves for Genus-4 HCC over Prime Fields: Point Counting Formulae for Hyperelliptic Curves of type $y^2=x^{2k+1}+ax$
Mitsuhiro Haneda, Mitsuru Kawazoe, Tetsuya Takahashi
2004/150
An Authenticated Certificateless Public Key Encryption Scheme
Young-Ran Lee, Hyang-Sook Lee
2004/149
Secure and Efficient AES Software Implementation for Smart Caards
E. Trichina, L. Korkishko
2004/148
Provably Secure Delegation-by-Certification Proxy Signature Schemes
Zuowen Tan, Zhuojun Liu
2004/147
Key Recovery Method for CRT Implementation of RSA
Matthew J. Campagna, Amit Sethi
2004/146
Near-Collisions of SHA-0
Eli Biham, Rafi Chen
2004/145
Electromagnetic Side Channels of an FPGA Implementation of AES
Vincent Carlier, Hervé Chabanne, Emmanuelle Dottax, Hervé Pelletier
2004/144
Plateaued Rotation Symmetric Boolean Functions on Odd Number of Variables
Alexander Maximov, Martin Hell, Subhamoy Maitra
2004/143
Short Signatures, Provable Security, Generic Attacks and Computational Security of Multivariate Polynomial Schemes such as HFE, Quartz and Sflash
Nicolas T. Courtois
2004/142
Elliptic Curve based Signcryption and its Multi-party Schemes
Yiliang HAN, Xiaoyuan YANG
2004/141
Elastic AES
Debra L. Cook, Moti Yung, Angelos D. Keromytis
2004/140
Architectures and Hardware Implementations of the 64-bit MISTY1 Block Cipher
P. Kitsos, M. D. Galanis, O. Koufopavlou
2004/139
New Notions of Security: Achieving Universal Composability without Trusted Setup
Manoj Prabhakaran, Amit Sahai
2004/138
How to Disembed a Program?
Benoit Chevallier-Mames, David Naccache, Pascal Paillier, David Pointcheval
2004/137
New GF(2n) Parallel Multiplier Using Redundant Representation
Haining Fan, Yiqi Dai
2004/136
CompChall: Addressing Password Guessing Attacks
Vipul Goyal, Virendra Kumar, Mayank Singh, Ajith Abraham, Sugata Sanyal
2004/135
More Efficient Server Assisted One Time Signatures
Vipul Goyal
2004/134
Secure and Efficient Masking of AES - A Mission Impossible?
Elisabeth Oswald, Stefan Mangard, Norbert Pramstaller
2004/133
Secret Handshakes from CA-Oblivious Encryption
Claude Castelluccia, Stanislaw Jarecki, Gene Tsudik
2004/132
On Small Characteristic Algebraic Tori in Pairing-Based Cryptography
R. Granger, D. Page, M. Stam
2004/131
A New ID-based Signature with Batch Verification
Jung Hee Cheon, Yongdae Kim, Hyo Jin Yoon
2004/130
Private Inference Control
David Woodruff, Jessica Staddon
2004/129
Generalizing Kedlaya's order counting based on Miura Theory
Joe Suzuki
2004/128
Elastic Block Ciphers
Debra L. Cook, Moti Yung, Angelos D. Keromytis
2004/127
DDH-based Group Key Agreement in a Mobile Environment
Junghyun Nam, Jinwoo Lee, Seungjoo Kim, Dongho Won
2004/126
Two Software Normal Basis Multiplication Algorithms for GF(2n)
Haining Fan, Yiqi Dai
2004/125
EME*: extending EME to handle arbitrary-length messages with associated data
Shai Halevi
2004/124
Universally Composable DKG with Linear Number of Exponentiations
Douglas Wikström
2004/123
On security of XTR public key cryptosystems against Side Channel Attacks
Dong-Guk Han, Jongin Lim, Kouichi Sakurai
2004/122
A New Two-Party Identity-Based Authenticated Key Agreement
Noel McCullagh, Paulo S. L. M. Barreto
2004/121
Fast and Proven Secure Blind Identity-Based Signcryption from Pairings
Tsz Hon Yuen, Victor K. Wei
2004/120
Security of Symmetric Encryption Schemes with One-Way IND-CNA Key Setup
Bartosz Zoltak
2004/119
Adaptively Secure Feldman VSS and Applications to Universally-Composable Threshold Cryptography
Masayuki Abe, Serge Fehr
2004/118
Fast addition on non-hyperelliptic genus $3$ curves
Stéphane Flon, Roger Oyono, Christophe Ritzenthaler
2004/117
Efficient and Forward-Secure Identity-Based Signcryption
Noel McCullagh, Paulo S. L. M. Barreto
2004/116
On the Limitations of Universally Composable Two-Party Computation Without Set-up Assumptions
Ran Canetti, Eyal Kushilevitz, Yehuda Lindell
2004/115
Provably-Secure and Communication-Efficient Scheme for Dynamic Group Key Exchange
Junghyun Nam, Sungduk Kim, Seungjoo Kim, Dongho Won
2004/114
Improved Identity-Based Signcryption
Liqun Chen, John Malone-Lee
2004/113
On the Security and Composability of the One Time Pad
Dominik Raub, Rainer Steinwandt, Joern Mueller-Quade
2004/112
Relation between XL algorithm and Groebner Bases Algorithms
M. Sugita, M. Kawazoe, H. Imai
2004/111
The Vulnerability of SSL to Chosen Plaintext Attack
Gregory V. Bard
2004/110
Designing Against the `Overdefined System of Equations' Attack
Carlisle Adams
2004/109
Concealing Complex Policies with Hidden Credentials
Robert Bradshaw, Jason Holt, Kent Seamons
2004/108
Two Improved Partially Blind Signature Schemes from Bilinear Pairings
Sherman S. M. Chow, Lucas C. K. Hui, S. M. Yiu, K. P. Chow
2004/107
Classification of genus 2 curves over $\mathbb{F}_{2^n}$ and optimization of their arithmetic
Bertrand BYRAMJEE, Sylvain DUQUESNE
2004/106
Capacity and Examples of Template Protecting Biometric Authentication Systems
P. Tuyls, J. Goseling
2004/105
Receipt-Free Homomorphic Elections and Write-in Ballots
Alessandro Acquisti
2004/104
Efficient and Provably Secure Trapdoor-free Group Signature Schemes from Bilinear Pairings
Lan Nguyen, Rei Safavi-Naini
2004/103
Cryptanalysis of SFlash v3
Jintai Ding, Dieter Schmidt
2004/102
The Exact Security of an Identity Based Signature and its Applications
Benoît Libert, Jean-Jacques Quisquater
2004/101
Provably Secure Masking of AES
Johannes Blömer, Jorge Guajardo Merchan, Volker Krummel
2004/100
The Sorcerer’s Apprentice Guide to Fault Attacks
Hagai Bar-El, Hamid Choukri, David Naccache, Michael Tunstall, Claire Whelan
2004/099
Secure Hashed Diffie-Hellman over Non-DDH Groups
Rosario Gennaro, Hugo Krawczyk, Tal Rabin
2004/098
Attacking a Public Key Cryptosystem Based on Tree Replacement
María Isabel González Vasco, David Pérez García
2004/097
How To Re-initialize a Hash Chain
Vipul Goyal
2004/096
On the Ambiguity of Concurrent Signatures
Yi Mu, Fangguo Zhang, Willy Susilo
2004/095
GNFS Factoring Statistics of RSA-100, 110, ..., 150
Kazumaro Aoki, Yuji Kida, Takeshi Shimoyama, Hiroki Ueda
2004/094
Block Ciphers and Stream Ciphers: The State of the Art
Alex Biryukov
2004/093
A Provably Secure Nyberg-Rueppel Signature Variant with Applications
Giuseppe Ateniese, Breno de Medeiros
2004/092
A New Stream Cipher HC-256
Hongjun Wu
2004/091
Signature Bouquets: Immutability for Aggregated/Condensed Signatures
Einar Mykletun, Maithili Narasimha, Gene Tsudik
2004/090
Provably Secure Authenticated Tree Based Group Key Agreement Protocol
Ratna Dutta, Rana Barua, Palash Sarkar
2004/089
Security of Random Key Pre-distribution Schemes With Limited Tamper Resistance
Mahalingam Ramkumar, Nasir Memon
2004/088
Efficient Batch Verification of Signature Schemes based on Bilinear Maps
Noel McCullagh
2004/087
Using primitive subgroups to do more with fewer bits
K. Rubin, A. Silverberg
2004/086
Fuzzy Identity Based Encryption
Amit Sahai, Brent Waters
2004/085
The CS2 Block Cipher
Tom St Denis
2004/084
Evaluating elliptic curve based KEMs in the light of pairings
David Galindo, Sebastia Martin, Jorge L. Villar
2004/083
Scan Based Side Channel Attack on Data Encryption Standard
Bo Yang, Kaijie Wu, Ramesh Karri
2004/082
The Reactive Simulatability (RSIM) Framework for Asynchronous Systems
Michael Backes, Birgit Pfitzmann, Michael Waidner
2004/081
Rewriting Variables: the Complexity of Fast Algebraic Attacks on Stream Ciphers
Philip Hawkes, Gregory G. Rose
2004/080
HENKOS Stream Cipher
Marius Oliver Gheorghita
2004/079
Pairing-Based One-Round Tripartite Key Agreement Protocols
Zhaohui Cheng, Luminita Vasiu, Richard Comley
2004/078
Analysis of the WinZip encryption method
Tadayoshi Kohno
2004/077
Foundations of Group Signatures: The Case of Dynamic Groups
Mihir Bellare, Haixia Shi, Chong Zhang
2004/076
Group Signatures: Provable Security, Efficient Constructions and Anonymity from Trapdoor-Holders
Aggelos Kiayias, Moti Yung
2004/075
An Hybrid Mode of Operation
Alexis W. Machado
2004/074
Completion of Computation of Improved Upper Bound on the Maximum Average Linear Hull Probabilty for Rijndael
Liam Keliher, Henk Meijer, Stafford Tavares
2004/073
Index calculus for abelian varieties and the elliptic curve discrete logarithm problem
Pierrick Gaudry
2004/072
Asymmetric Cryptography: Hidden Field Equations
Christopher Wolf, Bart Preneel
2004/071
An IBE Scheme to Exchange Authenticated Secret Keys
Waldyr Benits Jr, Routo Terada
2004/070
Easy decision-Diffie-Hellman groups
Steven D Galbraith, Victor Rotger
2004/069
A Generalization of PGV-Hash Functions and Security Analysis in Black-Box Model
Wonil Lee, Mridul Nandi, Palash Sarkar, Donghoon Chang, Sangjin Lee, Kouichi Sakurai
2004/068
Synthesis of Secure FPGA Implementations
Kris Tiri, Ingrid Verbauwhede
2004/067
Charge Recycling Sense Amplifier Based Logic: Securing Low Power Security IC’s against Differential Power Analysis
Kris Tiri, Ingrid Verbauwhede
2004/066
A Dynamic and Differential CMOS Logic Style to Resist Power and Timing Attacks on Security IC’s.
Kris Tiri, Ingrid Verbauwhede
2004/065
Refinements of Miller's Algorithm for Computing Weil/Tate Pairing
Ian Blake, Kumar Murty, Guangwu Xu
2004/064
Pairing-Based Cryptographic Protocols : A Survey
Ratna Dutta, Rana Barua, Palash Sarkar
2004/063
An Oblivious Transfer Protocol with Log-Squared Communication
Helger Lipmaa
2004/062
On the Impossibility of Highly-Efficient Blockcipher-Based Hash Functions
John Black, Martin Cochran, Thomas Shrimpton
2004/061
TTS: Rank Attacks in Tame-Like Multivariate PKCs
Bo-Yin Yang, Jiun-Ming Chen
2004/060
Positive Results and Techniques for Obfuscation
Benjamin Lynn, Manoj Prabhakaran, Amit Sahai
2004/059
Symmetric Encryption in a Simulatable Dolev-Yao Style Cryptographic Library
Michael Backes, Birgit Pfitzmann
2004/058
Generating more MNT elliptic curves
Michael Scott, Paulo S. L. M Barreto
2004/057
On Multiple Linear Approximations
Alex Biryukov, Christophe De Cannière, Michael Quisquater
2004/055
Redundant Trinomials for Finite Fields of Characteristic $2$
Christophe Doche
2004/054
Comments on a Threshold Proxy Signature Scheme Based on the RSA Cryptosystem
Guilin Wang, Feng Bao, Jianying Zhou, Robert H. Deng
2004/053
Efficient and Universally Composable Committed Oblivious Transfer and Applications
Juan Garay, Philip MacKenzie, Ke Yang
2004/052
The Hierarchy of Key Evolving Signatures and a Characterization of Proxy Signatures
Tal Malkin, Satoshi Obana, Moti Yung
2004/051
Privacy Preserving Keyword Searches on Remote Encrypted Data
Yan-Cheng Chang, Michael Mitzenmacher
2004/050
Yet another attack on a password authentication scheme based on quadratic residues with parameters unknown 1
Lizhen Yang, Xiaoyun Wang, Dong Zheng, Kefei Chen
2004/049
Side Channel Analysis for Reverse Engineering (SCARE) - An Improved Attack Against a Secret A3/A8 GSM Algorithm
Christophe Clavier
2004/048
Tail-MAC: A Message Authentication Scheme for Stream Ciphers
Bartosz Zoltak
2004/047
On a zero-knowledge property of arguments of knowledge based on secure public key encryption schemes
Yodai Watanabe
2004/046
Revision of Tractable Rational Map Cryptosystem
Lih-Chung Wang, Fei-Hwang Chang
2004/045
Lower Bounds and Impossibility Results for Concurrent Self Composition
Yehuda Lindell
2004/044
Transitive Signatures Based on Non-adaptive Standard Signatures
Zhou Sujing
2004/043
Multi-sequences with d-perfect property
Xiutao Feng, Quanlong Wang, Zongduo Dai
2004/042
Cryptanalyzing Bresson, et al.'s Spontaneous Anonymous Threshold Signature for Ad Hoc Groups and Patching via Updating Cramer, et al.'s Threshold Proof-of-Knowledge
Joseph K. Liu, Victor K. Wei, Duncan S. Wong
2004/041
Efficient k-out-of-n Oblivious Transfer Schemes with Adaptive and Non-Adaptive Queries
Cheng-Kang Chu, Wen-Guey Tzeng
2004/040
Cryptanalysis of a timestamp-based password authentication scheme
Lizhen Yang, Kefei Chen
2004/039
A Bilinear Spontaneous Anonymous Threshold Signature for Ad Hoc Groups
Victor K. Wei
2004/038
Chameleon Hashing without Key Exposure
Xiaofeng Chen, Fangguo Zhang, Kwangjo Kim
2004/037
A Provably Secure Scheme for Restrictive Partially Blind Signatures
Fuw-Yi Yang, Jinn-Ke Jan
2004/036
Single Database Private Information Retrieval with Logarithmic Communication
Yan-Cheng Chang
2004/035
Cryptographic Hash-Function Basics: Definitions, Implications and Separations for Preimage Resistance, Second-Preimage Resistance, and Collision Resistance
Phillip Rogaway, Thomas Shrimpton
2004/034
s(n) An Arithmetic Function of Some Interest, and Related Arithmetic
Gideon Samid
2004/033
New Approaches to Password Authenticated Key Exchange based on RSA
Muxiang Zhang
2004/032
Compressed Pairings
Michael Scott, Paulo S. L. M. Barreto
2004/031
Summation polynomials and the discrete logarithm problem on elliptic curves
Igor Semaev
2004/030
Point Compression on Jacobians of Hyperelliptic Curves over $\F_q$.
Colin Stahlke
2004/029
Finding Optimum Parallel Coprocessor Design for Genus 2 Hyperelliptic Curve Cryptosystems
Guido Bertoni, Luca Breveglieri, Thomas Wollinger, Christof Paar
2004/028
Custodian-Hiding Verifiable Encryption
Joseph K. Liu, Victor K. Wei, Duncan S. Wong
2004/027
Linkable Spontaneous Anonymous Group Signature for Ad Hoc Groups
Joseph K. Liu, Victor K. Wei, Duncan S. Wong
2004/026
The CSQUARE Transform
Tom St Denis
2004/025
Clarifying Obfuscation: Improving the Security of White-Box Encoding
Hamilton E. Link, William D. Neumann
2004/024
Exponential S-boxes
Sergey Agievich, Andrey Afonenko
2004/023
RDS: Remote Distributed Scheme for Protecting Mobile Agents
Asnat Dadon-Elichai
2004/022
Privacy-Enhanced Searches Using Encrypted Bloom Filters
Steven M. Bellovin, William R. Cheswick
2004/021
Externalized Fingerprint Matching
Claude Barral, Jean-Sébastien Coron, David Naccache
2004/020
Optimal Signcryption from Any Trapdoor Permutation
Yevgeniy Dodis, Michael J. Freedman, Stanislaw Jarecki, Shabsi Walfish
2004/019
New Security Proofs for the 3GPP Confidentiality and Integrity Algorithms
Tetsu Iwata, Tadayoshi Kohno
2004/018
Corrections of the NIST Statistical Test Suite for Randomness
Song-Ju Kim, Ken Umeno, Akio Hasegawa
2004/017
Cryptanalysis of an ID-based Password Authentication Scheme using Smart Cards and Fingerprints
M. Scott
2004/016
A Synchronous Model for Multi-Party Computation and the Incompleteness of Oblivious Transfer
Dennis Hofheinz, Joern Mueller-Quade
2004/015
An AGM-type elliptic curve point counting algorithm in characteristic three
Trond Stølen Gustavsen, Kristian Ranestad
2004/014
Crosscorrelation Spectra of Dillon and Patterson-Wiedemann type Boolean Functions
Sugata Gangopadhyay, Subhamoy Maitra
2004/013
Cryptanalysis of a Provably Secure Cryptographic Hash Function
Jean-Sebastien Coron, Antoine Joux
2004/012
Pitfalls in public key cryptosystems based on free partially commutative monoids and groups
Maria Isabel Gonzalez Vasco, Rainer Steinwandt
2004/011
Known-Plaintext Attack Against a Permutation Based Video
Adam J. Slagell
2004/010
Fast Pseudo-Hadamard Transforms
Tom St Denis
2004/009
Efficient and Secure Multi-Party Computation with Faulty Majority and Complete Fairness
Juan A. Garay, Philip MacKenzie, Ke Yang
2004/008
The Knowledge-of-Exponent Assumptions and 3-Round Zero-Knowledge Protocols
Mihir Bellare, Adriana Palacio
2004/007
Traceable Signatures
Aggelos Kiayias, Yiannis Tsiounis, Moti Yung
2004/006
Protocol Initialization for the Framework of Universal Composability
Boaz Barak, Yehuda Lindell, Tal Rabin
2004/005
Universal Undeniable Signatures
Huafei Zhu
2004/004
None
--withdrawn--
2004/003
On the Role of the Inner State Size in Stream Ciphers
Erik Zenner
2004/002
Efficient Universal Padding Schemes for Multiplicative Trapdoor One-way Permutation
Yuichi Komano, Kazuo Ohta
2003/265
Concurrent/Resettable Zero-Knowledge With Concurrent Soundness in the Bare Public-Key Model and Its Applications
Yunlei ZHAO
2003/264
Inversion of Several Field Elements: A New Parallel Algorithm
Pradeep Kumar Mishra, Palash Sarkar
2003/263
Security Analysis of Lal and Awasthi's Proxy Signature Schemes
Manik Lal Das, Ashutosh Saxena, V P Gulati
2003/262
A Secure Modified ID-Based Undeniable Signature Scheme
Sherman S. M. Chow, Lucas C. K. Hui, S. M. Yiu, K. P. Chow
2003/261
A provably secure ID-based ring signature scheme
Javier Herranz, Germán Sáez
2003/260
An Improved ID-based Authenticated Group Key Agreement Scheme
Xinjun Du, Ying Wang, Jianhua Ge, Yumin Wang
2003/259
Attack on Two ID-based Authenticated Group Key Agreement Schemes
Fangguo Zhang, Xiaofeng Chen
2003/258
Analysis of Implementation Hierocrypt-3 algorithm (and its comparison to Camellia algorithm) using ALTERA devices.
Marcin Rogawski
2003/257
Trading Inversions for Multiplications in Elliptic Curve Cryptography
Mathieu Ciet, Marc Joye, Kristin Lauter, Peter L. Montgomery
2003/256
On the Security of a Multi-Party Certified Email Protocol
Jianying Zhou
2003/255
Improved Constructions for Universal Re-encryption.
Peter Fairbrother
2003/254
Committing Encryption and Publicly-Verifiable SignCryption
Yitchak Gertner, Amir Herzberg
2003/253
Aspects of Hyperelliptic Curves over Large Prime Fields in Software Implementations
Roberto Maria Avanzi
2003/252
On Simulation-Sound Trapdoor Commitments
Philip MacKenzie, Ke Yang
2003/251
Isomorphism Classes of Hyperelliptic Curves of genus 3 over finite fields
EunKyung Jeong
2003/250
Breaking the Stream Cipher Whitenoise
Hongjun Wu
2003/249
Software Specifications For Tinnitus Utilizing Whitenoise(Revised Feb 2004)
Stephen Boren, Andre Brisson
2003/248
Efficient Implementation of Genus Three Hyperelliptic Curve Cryptography over GF(2^n)
Izuru Kitamura, Masanobu Katagi
2003/247
ID-based Authenticated Two Round Multi-Party Key Agreement
Xinjun Du, Ying Wang, Jianhua Ge, Yumin Wang
2003/246
Quantum Digital Signature Based on Quantum One-way Functions
Xin L¨¹, Deng-Guo Feng
2003/245
A Key Substitution Attack on SFLASH^{v3}
Willi Geiselmann, Rainer Steinwandt
2003/244
Efficient Public Key Steganography Secure Against Adaptively Chosen Stegotext Attacks
Tri Van Le, Kaoru Kurosawa
2003/243
An Attack on Not-interactive Designated Verifier Proofs for Undeniable Signatures
Guilin Wang
2003/242
Improved Weil and Tate pairings for elliptic and hyperelliptic curves
Kirsten Eisentraeger, Kristin Lauter, Peter L. Montgomery
2003/241
Hybrid Broadcast Encryption and Security Analysis
Shaoquan Jiang, Guang Gong
2003/240
How to Break and Repair a Universally Composable Signature Functionality
Michael Backes, Dennis Hofheinz
2003/239
Universally Composable Signatures, Certification and Authentication
Ran Canetti
2003/238
Chameleon Signature from Bilinear Pairing
Xinjun Du, Ying Wang, Jianhua Ge, Yumin Wang
2003/237
Low-Cost Solutions for Preventing Simple Side-Channel Analysis: Side-Channel Atomicity
Benoit Chevallier-Mames, Mathieu Ciet, Marc Joye
2003/236
Combinational Logic Design for AES SubByte Transformation on Masked Data
Elena Trichina
2003/235
Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data
Yevgeniy Dodis, Rafail Ostrovsky, Leonid Reyzin, Adam Smith
2003/234
Generalized Key-Evolving Signature Schemes or How to Foil an Armed Adversary
Gene Itkis, Peng Xie
2003/233
Public Key Steganography
Luis von Ahn, Nicholas J. Hopper
2003/232
The Statistical Zero-knowledge Proof for Blum Integer Based on Discrete Logarithm
Chunming Tang, Zhuojun Liu, Jinwang Liu
2003/231
Public-Key Steganography with Active Attacks
Michael Backes, Christian Cachin
2003/230
A Fast Provably Secure Cryptographic Hash Function
Daniel Augot, Matthieu Finiasz, Nicolas Sendrier
2003/229
Algebraic Attacks on Summation Generators
Dong Hoon Lee, Jaeheon Kim, Jin Hong, Jae Woo Han, Dukjae Moon
2003/228
Verifiably Committed Signatures Provably Secure in The Standard Complexity Model
Huafei Zhu
2003/227
Attacks on a Secure Group Communication Scheme With Hierarchical Access Control
Willi Geiselmann, Rainer Steinwandt
2003/226
On the Security of a Group Signature Scheme with Forward Security
Guilin Wang
2003/225
Masking Based Domain Extenders for UOWHFs: Bounds and Constructions
Palash Sarkar
2003/224
--Withdrawn--
Noel McCullagh, Michael Scott
2003/223
Cryptanalysis of a Cryptosystem based on Drinfeld modules
Simon R. Blackburn, Carlos Cid, Steven D. Galbraith
2003/222
A Verifiable Secret Sharing Scheme with Statistical zero-knowledge
Chunming Tang, Zhuojun Liu, Mingsheng Wang
2003/221
A Cryptanalysis of the Original Domingo-Ferrer's Algebraic Privacy Homomophism
Jung Hee Cheon, Hyun Soo Nam
2003/220
A short comment on the affine parts of SFLASH^{v3}
Willi Geiselmann, Rainer Steinwandt
2003/219
Cryptanalysis of the Repaired Public-key Encryption Scheme Based on the Polynomial Reconstruction Problem
Jean-Sebastien Coron
2003/218
A Security Evaluation of Whitenoise
David Wagner
2003/217
Chemical Combinatorial Attacks on Keyboards
Eric Brier, David Naccache, Pascal Paillier
2003/216
Secure Indexes
Eu-Jin Goh
2003/215
Divide and Concatenate: A Scalable Hardware Architecture for Universal MAC
Bo Yang, Ramesh Karri, David Mcgrew
2003/214
Multi-Trapdoor Commitments and their Applications to Non-Malleable Protocols
Rosario Gennaro
2003/213
Isomorphism Classes of Hyperelliptic Curves of Genus 2 over $\mathbb{F}_{2^n}$
Y. Choie, E. Jeong
2003/212
High Performance Arithmetic for Hyperelliptic Curve Cryptosystems of Genus Two
Jan Pelzl, Thomas Wollinger, Christof Paar
2003/211
SFLASHv3, a fast asymmetric signature scheme
Nicolas T. Courtois, Louis Goubin, Jacques Patarin
2003/210
On a Relation Between Verifiable Secret Sharing Schemes and a Class of Error-Correcting Codes
Ventzislav Nikov, Svetla Nikova
2003/209
Using the Trace Operator to repair the Polynomial Reconstruction based Cryptosystem presented at Eurocrypt 2003
Daniel Augot, Matthieu Finiasz, Pierre Loidreau
2003/208
ID-Based Chameleon Hashes from Bilinear Pairings
Fangguo Zhang, Reihaneh Safavi-Naini, Willy Susilo
2003/207
Security Flaws in Several Group Signatures Proposed by Popescu
Guilin Wang, Sihan Qing
2003/206
Identity Based Undeniable Signatures
Benoît Libert, Jean-Jacques Quisquater
2003/205
Improved Cryptanalysis of SecurID
Scott Contini, Yiqun Lisa Yin
2003/204
A Composition Construction of Bent-Like Boolean Functions from Quadratic Polynomials
ZENG Xiangyong, HU Lei
2003/203
Novel Efficient Implementations of Hyperelliptic Curve Cryptosystems using Degenerate Divisors
Masanobu Katagi, Izuru Kitamura, Toru Akishita, Tsuyoshi Takagi
2003/202
Yet Another Sieving Device
Willi Geiselmann, Rainer Steinwandt
2003/201
an attack on a multisignature scheme
Zheng Dong, Kefei Chen
2003/200
Cryptanalysis of B.Lee-S.Kim-K.Kim Proxy Signature
Zheng Dong, Shengli Liu, kefei Chen
2003/199
Cryptanalysis of a Message Authentication Code due to Cary and Venkatesan
Simon R. Blackburn, Kenneth G. Paterson
2003/198
Construction of Perfect Nonlinear and Maximally Nonlinear Multi-Output Boolean Functions Satisfying Higher Order Strict Avalanche Criteria
Kishan Chand Gupta, Palash Sarkar
2003/197
Revisiting fully distributed proxy signature schemes
Javier Herranz, German Saez
2003/196
Security Analysis of Some Proxy Signatures
Guilin Wang, Feng Bao, Jianying Zhou, Robert H. Deng
2003/195
Public Key Encryption with keyword Search
Dan Boneh, Giovanni Di Crescenzo, Rafail Ostrovsky, Giuseppe Persiano
2003/194
Security Analysis of Several Group Signature Schemes
Guilin Wang
2003/193
Efficient Extension of Standard Schnorr/RSA signatures into Universal Designated-Verifier Signatures
Ron Steinfeld, Huaxiong Wang, Josef Pieprzyk
2003/192
Universal Designated-Verifier Signatures
Ron Steinfeld, Laurence Bull, Huaxiong Wang, Josef Pieprzyk
2003/191
Projective Coordinates Leak
David Naccache, Nigel Smart, Jacques Stern
2003/190
Extending Joux's Protocol to Multi Party Key Agreement
Rana Barua, Ratna Dutta, Palash Sarkar
2003/189
Cryptanalysis of publicly verifiable authenticated encryption
Zuhua Shao
2003/188
A New Forward Secure Signature Scheme using Bilinear Maps
Fei Hu, Chwan-Hwa Wu, J. D. Irwin
2003/187
Resource Bounded Unprovability of Computational Lower Bounds
Tatsuaki Okamoto, Ryo Kashima
2003/186
Safe Prime Generation with a Combined Sieve
Michael J. Wiener
2003/185
VMPC Stream Cipher
Bartosz Zoltak
2003/184
What do DES S-boxes Say to Each Other ?
Nicolas T. Courtois, Guilhem Castagnos, Louis Goubin
2003/183
Certificate-Based Encryption and the Certificate Revocation Problem
Craig Gentry
2003/182
Chosen-Ciphertext Security from Identity-Based Encryption
Ran Canetti, Shai Halevi, Jonathan Katz
2003/181
On the Security of Multiple Encryption or CCA-security+CCA-security=CCA-security?
Rui Zhang, Goichiro Hanaoka, Junji Shikata, Hideki Imai
2003/180
Parallelizing Explicit Formula for Arithmetic in the Jacobian of Hyperelliptic Curves
Pradeep Kumar Mishra, Palash Sarkar
2003/179
VMPC One-Way Function
Bartosz Zoltak
2003/178
Constructing Optimistic Fair Exchange Protocols from Committed Signatures
Huafei Zhu
2003/177
Building Secure Cryptographic Transforms, or How to Encrypt and MAC
Tadayoshi Kohno, Adriana Palacio, John Black
2003/176
Patterson-Wiedemann Construction Revisited
S. Gangopadhyay, P. H. Keskar, S. Maitra
2003/175
Double-Speed Safe Prime Generation
David Naccache
2003/174
Relaxing Chosen-Ciphertext Security
Ran Canetti, Hugo Krawczyk, Jesper Nielsen
2003/173
Domain Extender for Collision Resistant Hash Functions: Improving Upon Merkle-Damgaard Iteration
Palash Sarkar
2003/172
NAEP: Provable Security in the Presence of Decryption Failures
Nick Howgrave-Graham, Joseph H. Silverman, Ari Singer, William Whyte
2003/171
Scalable Protocols for Authenticated Group Key Exchange
Jonathan Katz, Moti Yung
2003/170
HARPS: HAshed Random Preloaded Subset Key Distribution
Mahalingam Ramkumar, Nasir Memon
2003/169
Properties of the Transformation Semigroup of the Solitaire Stream Cipher
Boris Pogorelov, Marina Pudovkina
2003/168
Robust discretization, with an application to graphical passwords
Jean-Camille Birget, Dawei Hong, Nasir Memon
2003/167
Identity-based Chameleon Hash and Applications
Giuseppe Ateniese, Breno de Medeiros
2003/166
A reduction of the space for the parallelized Pollard lambda search on elliptic curves over prime finite fields and on anomalous binary elliptic curves
Igor Semaev
2003/165
Commitment Capacity of Discrete Memoryless Channels
Andreas Winter, Anderson C. A. Nascimento, Hideki Imai
2003/164
Identity-Based Threshold Decryption
Joonsang Baek, Yuliang Zheng
2003/163
Multipurpose Identity-Based Signcryption : A Swiss Army Knife for Identity-Based Cryptography
Xavier Boyen
2003/162
Cryptanalysis of the Alleged SecurID Hash Function
Alex Biryukov, Joseph Lano, Bart Preneel
2003/161
Indifferentiability, Impossibility Results on Reductions, and Applications to the Random Oracle Methodology
Ueli Maurer, Renato Renner, Clemens Holenstein
2003/160
A More Secure and Efficacious TTS Signature Scheme
Jiun-Ming Chen, Bo-Yin Yang
2003/159
An efficient variant of the RSA cryptosystem
Cesar Alison Monteiro Paixão
2003/158
A Sufficient Condition and Optimal Domain Extension of UOWHF
Mridul Nandi
2003/157
Some RSA-based Encryption Schemes with Tight Security Reduction
Kaoru Kurosawa, Tsuyoshi Takagi
2003/156
Efficient Provably Secure Public Key Steganography
Tri Van Le
2003/155
A Formal Proof of Zhu's Signature Scheme
huafei zhu
2003/154
ManTiCore: Encryption with Joint Cipher-State Authentication
Cheryl Beaver, Timothy Draelos, Richard Schroeppel, Mark Torgerson
2003/153
Attack on an Identification Scheme Based on Gap Diffie-Hellman Problem
Zhen-Feng ZHANG, Jing XU, Deng-Guo FENG
2003/152
Optimal Statistical Power Analysis
Eric Brier, Christophe Clavier, Francis Olivier
2003/151
Secret sharing schemes on sparse homogeneous access structures with rank three
Jaume Martí-Farré, Carles Padró
2003/150
On the random-oracle methodology as applied to length-restricted signature schemes
Ran Canetti, Oded Goldreich, Shai Halevi
2003/149
Forward-Secure Hierarchical ID-Based Cryptography
Danfeng Yao, Anna Lysyanskaya
2003/148
A Tweakable Enciphering Mode
Shai Halevi, Phillip Rogaway
2003/147
A Parallelizable Enciphering Mode
Shai Halevi, Phillip Rogaway
2003/146
Breaking and Repairing Optimistic Fair Exchange from PODC 2003
Yevgeniy Dodis, Leonid Reyzin
2003/145
Symmetric Authentication Within a Simulatable Cryptographic Library
Michael Backes, Birgit Pfitzmann, Michael Waidner
2003/144
ID-based tripartite key agreement with signatures
Divya Nalla
2003/143
Elliptic curves suitable for pairing based cryptography
Friederike Brezing, Annegret Weng
2003/142
A New Tree based Domain Extension of UOWHF
Mridul Nandi
2003/141
General Composition and Universal Composability in Secure Multiparty Computation
Yehuda Lindell
2003/140
Trading-Off Type-Inference Memory Complexity Against Communication
Konstantin Hyppönen, David Naccache, Elena Trichina, Alexei Tchoulkine
2003/139
On the Randomness of the Editing Generator
Enjian Bai, Guozhen Xiao
2003/138
Permutation graphs, fast forward permutations, and
Boaz Tsaban
2003/137
Bernoulli numbers and the probability of a birthday surprise
Boaz Tsaban
2003/136
Efficient linear feedback shift registers with maximal period
Boaz Tsaban, Uzi Vishne
2003/135
Collision Attack on Reduced-Round Camellia
Wen-Ling Wu, Deng-Guo Feng
2003/134
Direct Sum of Non Normal and Normal Bent Functions Always Produces Non Normal Bent Functions
Sugata Gangopadhyay, Subhamoy Maitra
2003/133
Minimum Distance between Bent and 1-resilient Boolean Functions
Soumen Maity, Subhamoy Maitra
2003/132
Guaranteeing the diversity of number generators
Adi Shamir, Boaz Tsaban
2003/131
Homomorphic public-key systems based on subgroup membership problems
Kristian Gjøsteen
2003/130
On the Pseudorandomness of KASUMI Type Permutations
Tetsu Iwata, Tohru Yagi, Kaoru Kurosawa
2003/129
Attack on Han et al.'s ID-based Confirmer (Undeniable) Signature at ACM-EC'03
Fangguo Zhang, Reihaneh Safavi-Naini, Willy Susilo
2003/128
Weak Fields for ECC
Alfred Menezes, Edlyn Teske, Annegret Weng
2003/127
Using Information Theory Approach to Randomness Testing
B. Ya. Ryabko, V. A. Monarev
2003/126
Certificateless Public Key Cryptography
Sattam S. Al-Riyami, Kenneth G. Paterson
2003/125
Algebraic Attacks on Combiners with Memory and Several Outputs
Nicolas T. Courtois
2003/124
A General Correlation Theorem
Kishan Chand Gupta, Palash Sarkar
2003/123
Assessing security of some group based cryptosystems
Vladimir Shpilrain
2003/122
Cryptanalysis of Al-Riyami-Paterson's Authenticated Three Party Key Agreement Protocols
Kyungah Shim
2003/121
A Cryptographically Sound Security Proof of the Needham-Schroeder-Lowe Public-Key Protocol
Michael Backes, Birgit Pfitzmann
2003/120
Physically Observable Cryptography
Silvio Micali, Leonid Reyzin
2003/119
How Secure Are FPGAs in Cryptographic Applications?
Thomas Wollinger, Christof Paar
2003/118
Visual Crypto Displays Enabling Secure Communications
Pim Tuyls, Tom Kevenaar, Geert-Jan Schrijen, Toine Staring, Marten van Dijk
2003/117
An identity-based ring signature scheme from bilinear pairings
Chih-Yin Lin, Tzong-Chen Wu
2003/116
A New ID-based Group Signature Scheme from Bilinear Pairings
Xiaofeng Chen, Fangguo Zhang, Kwangjo Kim
2003/115
Cryptanalysis of ID-based Tripartite Authenticated Key Agreement Protocols
Kyungah Shim
2003/114
Unifying Simulatability Definitions in Cryptographic Systems under Different Timing Assumptions
Michael Backes
2003/113
Security Analysis of Shim's Authenticated Key Agreement Protocols from Pairings
Hung-Min Sun, Bin-Tsan Hsieh
2003/112
Accumulating Composites and Improved Group Signing
Gene Tsudik, Shouhuai Xu
2003/111
Further Cryptanalysis of some Proxy Signature Schemes
Jiqiang Lv, Jingwei Liu, Xinmei Wang
2003/110
Proposal on Personal Authentication System in which Biological Information is embedded in Cryptosystem Key
Yukio Itakura, Shigeo Tsujii
2003/109
Crytanalysis of SAFER++
Alex Biryukov, Christophe De Cannière, Gustaf Dellkrantz
2003/108
Novel Cyclic and Algebraic Properties of AES
Tri Van Le
2003/107
Fujisaki-Okamoto IND-CCA hybrid encryption revisited
David Galindo, Sebastià Mart\'ın, Paz Morillo, Jorge L. Villar
2003/106
CWC: A high-performance conventional authenticated encryption mode
Tadayoshi Kohno, John Viega, Doug Whiting
2003/105
On Diophantine Complexity and Statistical Zero-Knowledge Arguments
Helger Lipmaa
2003/104
New Proxy Signature, Proxy Blind Signature and Proxy Ring Signature Schemes from Bilinear Pairing
Fangguo Zhang, Reihaneh Safavi-Naini, Chih-Yin Lin
2003/103
Security analysis on Nalla-Reddy's ID-based tripartite authenticated key agreement protocols
Zhongliang Chen
2003/102
Length-Based Attacks for Certain Group Based Encryption Rewriting Systems
J. Hughes, A. Tannenbaum
2003/101
Cryptanalysis of HFE
Ilia Toli
2003/100
Protocols for Bounded-Concurrent Secure Two-Party Computation in the Plain Model
Yehuda Lindell
2003/099
Algorithms in Braid Groups
Matthew J. Campagna
2003/098
Side Channel Attacks on CBC Encrypted Messages in the PKCS#7 Format
Vlastimil Klima, Tomas Rosa
2003/097
Low Cost Security: Explicit Formulae for Genus 4 Hyperelliptic Curves
Jan Pelzl, Thomas Wollinger, Christof Paar
2003/096
Secure Proxy Signature Schemes for Delegation of Signing Rights
Alexandra Boldyreva, Adriana Palacio, Bogdan Warinschi
2003/095
Public Key Trace and Revoke Scheme Secure against Adaptive Chosen Ciphertext Attack
Yevgeniy Dodis, Nelly Fazio
2003/094
Trace Zero Subvariety for Cryptosystems
Tanja Lange
2003/093
Simple Stateless Steganography
Leonid Reyzin, Scott Russell
2003/092
Provably-Secure Enhancement on 3GPP Authentication and Key Agreement Protocol
Muxiang Zhang
2003/091
Sequential Aggregate Signatures from Trapdoor Permutations
Anna Lysyanskaya, Silvio Micali, Leonid Reyzin, Hovav Shacham
2003/090
A Structured Multisignature Scheme from the Gap Diffie-Hellman Group
Chih-Yin Lin, Tzong-Chen Wu, Fangguo Zhang
2003/089
Efficient Public Key Generation for Multivariate Cryptosystems
Christopher Wolf
2003/088
Elliptic Curve Point Multiplication
A. G. Rostovtsev, E. B. Makhovenko
2003/087
A Practical Elliptic Curve Public Key Encryption Scheme Provably Secure Against Adaptive Chosen-message Attack
huafei zhu
2003/086
On the Selection of Pairing-Friendly Groups
Paulo S. L. M. Barreto, Ben Lynn, Michael Scott
2003/085
A defect of the implementation schemes of the TTM cryptosystem
Jintai Ding, Dieter Schmidt
2003/084
Cryptanalysis of an implementation scheme of the Tamed Transformation Method cryptosystem
Jintai Ding, Timonthy Hodges
2003/083
A Forward-Secure Public-Key Encryption Scheme
Ran Canetti, Shai Halevi, Jonathan Katz
2003/082
Stronger Security Bounds for OMAC, TMAC and XCBC
Tetsu Iwata, Kaoru Kurosawa
2003/081
Primitive Specification for SOBER-128
Philip Hawkes, Greg Rose
2003/080
Non-interactive and Reusable Non-malleable Commitment Schemes
Ivan Damgård, Jens Groth
2003/079
Fast arithmetic on Jacobians of Picard curves
Stéphane Flon, Roger Oyono
2003/078
Relation among simulator-based and comparison-based definitions of semantic security
Yodai Watanabe, Junji Shikata
2003/077
An Uninstantiable Random-Oracle-Model Scheme for a Hybrid Encryption Problem
Mihir Bellare, Alexandra Boldyreva, Adriana Palacio
2003/076
Goldbach’s Conjecture on ECDSA Protocols
N. Vijayarangan, Nitin Agarwal, S. Kasilingam
2003/075
Almost Security of Cryptographic Boolean Functions
Kaoru Kurosawa
2003/074
Divisible Voting Scheme
Natsuki Ishida, Shin'ichiro Matsuo, Wakaha Ogata
2003/073
A Scheme for obtaining a Warrant Message from the Digital Proxy Signatures
Sunder Lal, Amit K Awasthi
2003/072
Proxy Blind Signature Scheme
Amit K Awasthi, Sunder Lal
2003/071
How to Protect Against a Militant Spammer
Markus Jakobsson, John Linn, Joy Algesheimer
2003/070
A Critique of CCM
P. Rogaway, D. Wagner
2003/069
EAX: A Conventional Authenticated-Encryption Mode
M. Bellare, P. Rogaway, D. Wagner
2003/068
On the Security of Some Proxy Signature Schemes
Hung-Min Sun, Bin-Tsan Hsieh
2003/067
Forking Lemmas in the Ring Signatures' Scenario
Javier Herranz, Germán Sáez
2003/066
Signcryption scheme for Identity-based Cryptosystems
Divya Nalla, K. C. Reddy
2003/065
Hash Function Balance and its Impact on Birthday Attacks
Mihir Bellare, Tadayoshi Kohno
2003/064
On the Optimality of Linear, Differential and Sequential Distinguishers
Pascal Junod
2003/063
Initiator-Resilient Universally Composable Key Exchange
Dennis Hofheinz, Joern Mueller-Quade, Rainer Steinwandt
2003/062
Extending Joux's Protocol to Multi Party Key Agreement
Rana Barua, Ratna Dutta, Palash Sarkar
2003/061
Hidden Polynomial Cryptosystems
Ilia Toli
2003/060
Isomorphism Classes of Picard Curves over Finite Fields
Jong Won Lee
2003/059
A Transitive Signature Scheme Provably Secure Against Adaptive Chosen-message Attack
Huafei Zhu, Bao Feng, Robert H. Deng
2003/058
An Elliptic Curve Trapdoor System
Edlyn Teske
2003/057
Secure Multiplication of Shared Secrets in the Exponent
Mario Di Raimondo, Rosario Gennaro
2003/056
Computing of Trust in Distributed Networks
Huafei Zhu, Bao Feng, Robert H. Deng
2003/055
A New Approach to Prevent Blackmailing in E-Cash
Xiaofeng Chen, Fangguo Zhang, Yumin Wang
2003/054
ID based Cryptosystems with Pairing on Elliptic Curve
Ryuichi SAKAI, Masao KASAHARA
2003/053
Tate-pairing implementations for tripartite key agreement
Iwan Duursma, Hyang-Sook Lee
2003/052
Attacking RSA-based Sessions in SSL/TLS
Vlastimil Klima, Ondrej Pokorny, Tomas Rosa
2003/051
How to Predict the Output of a Hardware Random Number Generator
Markus Dichtl
2003/050
Concealment and its Applications to Authenticated Encryption
Yevgeniy Dodis, Jee Hea An
2003/049
Hidden Number Problem in Small Subgroups
Igor Shparlinski, Arne Winterhof
2003/048
Compounding Secret Sharing Schemes
E. Martinez-Moro, J. Mozo-Fernandez, C. Munuera
2003/047
A Construction of 100 bit Public-Key Cryptosystem and Digital Signature Scheme
Masao KASAHARA, Ryuichi SAKAI
2003/046
Remarks on Saeednia's Identity-based Society Oriented Signature Scheme with Anonymous Signers
Guilin Wang, Bo Zhu
2003/045
An algorithm to obtain an RSA modulus with a large private key
L. Hernández Encinas, J. Muñoz Masqué, A. Queiruga Dios
2003/044
Signcryption scheme for Identity-based Cryptosystems
Divya Nalla, K. C. Reddy
2003/043
Parallel Signcryption with OAEP, PSS-R, and other Feistel Paddings
Yevgeniy Dodis, Michael J. Freedman, Shabsi Walfish
2003/042
Timed Fair Exchange of Standard Signatures
Juan A. Garay, Carl Pomerance
2003/041
A new statistical distinguisher for the shrinking generator
Jovan Dj. Golic, Renato Menicocci
2003/040
Computing Partial Walsh Transform from the Algebraic Normal Form of a Boolean Function
Kishan Chand Gupta, Palash Sarkar
2003/039
Torus-based cryptography
Karl Rubin, Alice Silverberg
2003/038
Pretty-Simple Password-Authenticated Key-Exchange Under Standard Assumptions
Kazukuni Kobara, Hideki Imai
2003/037
Strengthening Zero-Knowledge Protocols using Signatures
Juan A. Garay, Philip MacKenzie, Ke Yang
2003/036
Cryptanalysis of a public-key encryption scheme based on the polynomial reconstruction problem
Jean-Sebastien Coron
2003/035
On alternative approach for verifiable secret sharing
Kamil Kulesza, Zbigniew Kotulski, Josef Pieprzyk
2003/034
On the (In)security of the Fiat-Shamir Paradigm
Shafi Goldwasser, Yael Tauman
2003/033
Integral Cryptanalysis on reduced-round Safer++
Gilles Piret, Jean-Jacques Quisquater
2003/032
A Framework for Password-Based Authenticated Key Exchange
Rosario Gennaro, Yehuda Lindell
2003/031
Cryptographic Tamper Evidence
Gene Itkis
2003/030
Efficient Multi-Party Computation over Rings
Ronald Cramer, Serge Fehr, Yuval Ishai, Eyal Kushilevitz
2003/029
Universal Padding Schemes for RSA with Optimal Bandwidth of Message Recovery
Wenbo Mao, John Malone-Lee
2003/028
Elliptic Curve Cryptosystems in the Presence of Permanent and Transient Faults
Mathieu Ciet, Marc Joye
2003/027
Cryptographic Randomized Response Techniques
Andris Ambainis, Markus Jakobsson, Helger Lipmaa
2003/026
Hyperelliptic Curve Cryptosystems: Closing the Performance Gap to Elliptic Curves (Update)
Jan Pelzl, Thomas Wollinger, Jorge Guajardo, Christof Paar
2003/025
Homomorphic public-key cryptosystems and encrypting boolean circuits
D. Grigoriev., I. Ponomarenko
2003/024
On Modeling IND-CCA Security in Cryptographic Protocols
Dennis Hofheinz, Joern Mueller-Quade, Rainer Steinwandt
2003/023
New identity based signcryption schemes from pairings
Benoît Libert, Jean-Jacques Quisquater
2003/022
Did Filiol Break AES ?
Nicolas T. Courtois, Robert T. Johnson, Pascal Junod, Thomas Pornin, Michael Scott
2003/021
Interleaving Cryptography and Mechanism Design: The Case of Online Auctions
Edith Elkind, Helger Lipmaa
2003/020
Attacks based on Conditional Correlations against the Nonlinear Filter Generator
Bernhard Löhlein
2003/019
A Polynomial Time Algorithm for the Braid Diffie-Hellman Conjugacy Problem
Jung Hee Cheon, Byungheup Jun
2003/018
An Authenticated Group Key Agreement Protocol on Braid groups
HO-KYU LEE, HYANG-SOOK LEE, YOUNG-RAN LEE
2003/017
Perfect Hash Families with Few Functions
Simon R. Blackburn
2003/016
A Threshold GQ Signature Scheme
Cheng-Kang Chu, Li-Shan Liu, Wen-Guey Tzeng
2003/015
A Universally Composable Cryptographic Library
Michael Backes, Birgit Pfitzmann, Michael Waidner
2003/014
Hiji-bij-bij: A New Stream Cipher with a Self-Synchronizing Mode of Operation
Palash Sarkar
2003/013
Security Constraints on the Oswald-Aigner Exponentiation Algorithm
Colin D. Walter
2003/012
The number of initial states of the RC4 cipher with the same cycle structure
Marina Pudovkina
2003/011
Cryptanalysis of Lee-Hwang-Li's Key Authentication Scheme
Fangguo Zhang, Kwangjo Kim
2003/010
Differential Fault Analysis on A.E.S.
P. Dusart, G. Letourneux, O. Vivolo
2003/009
Domain Extenders for UOWHF: A Finite Binary Tree Algorithm
Palash Sarkar
2003/008
DFA on AES
Christophe Giraud
2003/007
A Price Negotiable Transaction System
Huafei Zhu
2003/006
Multi-Party Computation from any Linear Secret Sharing Scheme Secure against Adaptive Adversary: The Zero-Error Case
Ventzislav Nikov, Svetla Nikova, Bart Preneel
2003/005
Distributing the Encryption and Decryption of a Block Cipher
Keith M. Martin, Rei Safavi-Naini, Huaxiong Wang, Peter R. Wild
2003/004
ID-based tripartite Authenticated Key Agreement Protocols from pairings
Divya Nalla, K. C. Reddy
2003/003
Plaintext-dependant Repetition Codes Cryptanalysis of Block Ciphers - The AES Case
Eric FILIOL
2003/002
Imperfect Decryption and an Attack on the NTRU Encryption Scheme
John Proos
2003/001
A Mode of Operation with Partial Encryption and Message Integrity
Philip Hawkes, Gregory G. Rose
2002/195
An addition to the paper: A polarisation based visual crypto system and its secret sharing schemes
H. D. L. Hollmann, J. H. v. Lint, L. Tolhuizen, P. Tuyls
2002/194
A polarisation based Visual Crypto System and its Secret Sharing Schemes
P. Tuyls, H. D. L. Hollmann, J. H. v. Lint, L. Tolhuizen
2002/193
A Note on Ideal Tripartite Access Structures
Michael J. Collins
2002/192
Security Proofs for an Efficient Password-Based Key Exchange
Emmanuel Bresson, Olivier Chevassut, David Pointcheval
2002/191
A Linearization Attack on the Bluetooth Key Stream Generator
Frederik Armknecht
2002/190
Parallelizable Authentication Trees
Eric Hall, Charanjit S. Jutla
2002/189
Bit-Slice Auction Circuit
Kaoru Kurosawa, Wakaha Ogata
2002/188
Key recovery attacks on NTRU without ciphertext validation routine
Daewan Han, Jin Hong, Jae Woo Han, Daesung Kwon
2002/187
Entity Authentication Schemes Using Braid Word Reduction
Hervé SIBERT, Patrick DEHORNOY, Marc GIRAULT
2002/186
Zero-Knowledge twenty years after its invention
Oded Goldreich
2002/185
Turing, a fast stream cipher
Greg Rose, Philip Hawkes
2002/184
Identity Based Authenticated Key Agreement Protocols from Pairings
Liqun Chen, Caroline Kudla
2002/183
Simple backdoors to RSA key generation
Claude Crépeau, Alain Slakmon
2002/182
Oblivious Keyword Search
Wakaha Ogata, Kaoru Kurosawa
2002/181
Counting Points for Hyperelliptic Curves of type $y^2=x^5+ax$ over Finite Prime Fields
Eisaku Furukawa, Mitsuru Kawazoe, Tetsuya Takahashi
2002/180
OMAC: One-Key CBC MAC
Tetsu Iwata, Kaoru Kurosawa
2002/179
Parallel Algorithm for Multiplication on Elliptic Curves
Juan Manuel Garcia Garcia, Rolando Menchaca Garcia
2002/178
Attack on A New Public Key Cryptosystem from ISC'02 (LNCS 2433)
Fangguo Zhang, Shengli Liu, Kwangjo Kim
2002/177
two attacks on xia-you Group Signature
Jianhong Zhang, Jilin Wang, Yumin Wang
2002/176
Theoretical Analysis of ``Correlations in RC6''
Masahiko Takenaka, Takeshi Shimoyama, Takeshi Koshiba
2002/175
Aggregate and Verifiably Encrypted Signatures from Bilinear Maps
Dan Boneh, Craig Gentry, Ben Lynn, Hovav Shacham
2002/174
A Designer's Guide to KEMs
Alexander W. Dent
2002/173
Efficient Group Signatures without Trapdoors
Giuseppe Ateniese, Breno de Medeiros
2002/172
PECDSA. How to build a DL-based digital signature scheme with the best proven security
Louis Granboulan
2002/171
Statistical weaknesses in the alleged RC4 keystream generator
Marina Pudovkina
2002/170
An Analysis of RMAC
Jack Lloyd
2002/169
Theoretical Use of Cache Memory as a Cryptanalytic Side-Channel
D. Page
2002/168
New Signature Scheme Using Conjugacy Problem
Ki Hyoung Ko, Doo Ho Choi, Mi Sung Cho, Jang Won Lee
2002/167
Cryptanalysis of Two New Signature Schemes
Fangguo Zhang, Kwangjo Kim
2002/166
Multi-Party Authenticated Key Agreement Protocols from Multilinear Forms
Ho-Kyu Lee, Hyang-Sook Lee, Young-Ran Lee
2002/165
Coercion-Resistant Electronic Elections
Ari Juels, Dario Catalano, Markus Jakobsson
2002/164
Authenticated ID-based Key Exchange and remote log-in with simple token and PIN number
Mike Scott
2002/163
Man-in-the-Middle in Tunnelled Authentication Protocols
N. Asokan, Valtteri Niemi, Kaisa Nyberg
2002/162
On Constructing Locally Computable Extractors and Cryptosystems in the Bounded Storage Model
Salil P. Vadhan
2002/161
Practical Verifiable Encryption and Decryption of Discrete Logarithms
Jan Camenisch, Victor Shoup
2002/160
Cryptology and Physical Security: Rights Amplification in Master-Keyed Mechanical Locks
Matt Blaze
2002/159
Related-Key and Key-Collision Attacks Against RMAC
Tadayoshi Kohno
2002/158
The Book of Rijndaels
Elad Barkan, Eli Biham
2002/157
In How Many Ways Can You Write Rijndael?
Elad Barkan, Eli Biham
2002/156
Validating Digital Signatures without Time-Stamping and Certificate Revocation
Jianying Zhou, Feng Bao, Robert Deng
2002/155
Secure Bilinear Diffie-Hellman Bits
Steven D. Galbraith, Herbie J. Hopkins, Igor E. Shparlinski
2002/154
On multi-exponentiation in cryptography
Roberto M. Avanzi
2002/153
Weighted Coordinates on Genus 2 Hyperelliptic Curves
Tanja Lange
2002/152
A note on Weak Keys of PES, IDEA and some Extended Variants
Jorge Nakahara Jr, Bart Preneel, Joos Vandewalle
2002/151
Selective disclosure credential sets
Jason E. Holt, Kent E. Seamons
2002/150
Cryptanalysis of the Lee-Hwang Group-Oriented Undeniable Signature Schemes
Guilin Wang, Jianying Zhou, Robert H. Deng
2002/149
About Filliol's Observations on DES, AES and Hash Functions (draft)
Nicolas T. Courtois
2002/148
The EMD Mode of Operation (A Tweaked, Wide-Blocksize, Strong PRP)
Phillip Rogaway
2002/147
Inversion-Free Arithmetic on Genus 2 Hyperelliptic Curves
Tanja Lange
2002/146
Bauer-Berson-Feiertag attack revisited
Jun-Bum Shin, Kwang H. Lee
2002/145
Cryptanalysis of MQV with partially known nonces
P. J. Leadbitter, N. P. Smart
2002/144
On Some Algebraic Structures in the AES Round Function
A. M. Youssef, S. E. Tavares
2002/143
An Attack on the Isomorphisms of Polynomials Problem with One Secret
Willi Geiselmann, Willi Meier, Rainer Steinwandt
2002/142
On the Applicability of Distinguishing Attacks Against Stream Ciphers
Greg Rose, Philip Hawkes
2002/141
Applying General Access Structure to Proactive Secret Sharing Schemes
Ventzislav Nikov, Svetla Nikova, Bart Preneel, Joos Vandewalle
2002/140
Universally Composable Two-Party and Multi-Party Secure Computation
Ran Canetti, Yehuda Lindell, Rafail Ostrovsky, Amit Sahai
2002/139
Reaction Attacks on Public Key Cryptosystems Based on the Word Problem
Maria Isabel Gonzalez Vasco, Rainer Steinwandt
2002/138
On the Security of HFE, HFEv- and Quartz
Nicolas T. Courtois, Magnus Daum, Patrick Felke
2002/137
Provably Secure Steganography
Nicholas J. Hopper, John Langford, Luis von Ahn
2002/136
Practical Non-Interactive Key Distribution Based on Pairings
Régis Dupont, Andreas Enge
2002/135
Folklore, Practice and Theory of Robust Combiners
Amir Herzberg
2002/134
Asynchronous Verifiable Secret Sharing and Proactive Cryptosystems
Christian Cachin, Klaus Kursawe, Anna Lysyanskaya, Reto Strobl
2002/133
Efficient Construction of (Distributed) Verifiable Random Functions
Yevgeniy Dodis
2002/132
Tight Lower Bound on Linear Authenticated Encryption
Charanjit S. Jutla
2002/131
An Improved Pseudorandom Generator Based on Hardness of Factoring
Nenad Dedic, Leonid Reyzin, Salil Vadhan
2002/130
OAEP++ : A Very Simple Way to Apply OAEP to Deterministic OW-CPA Primitives
Kazukuni Kobara, Hideki Imai
2002/129
Key-collisions in (EC)DSA: Attacking Non-repudiation
Tomas Rosa
2002/128
Perfectly Secure Message Transmission Revisited
Yvo Desmedt, Yongge Wang
2002/127
Power of a Public Random Permutation and its Application to Authenticated-Encryption
Kaoru Kurosawa
2002/126
Assumptions Related to Discrete Logarithms: Why Subtleties Make a Real Difference
Ahmad-Reza Sadeghi, Michael Steiner
2002/125
The Jacobi Model of an Elliptic Curve and Side-Channel Analysis
Olivier Billet, Marc Joye
2002/124
On Optimal Hash Tree Traversal for Interval Time-Stamping
Helger Lipmaa
2002/123
New covering radius of Reed-Muller codes for $t$-resilient functions
Kaoru Kurosawa, Tetsu Iwata, Takayuki Yoshiwara
2002/122
ID-Based One Round Authenticated Tripartite Key Agreement Protocol with Pairings
Fangguo Zhang, Shengli Liu, Kwangjo Kim
2002/121
Efficient Arithmetic on Genus 2 Hyperelliptic Curves over Finite Fields via Explicit Formulae
Tanja Lange
2002/120
Security Analysis of IKE's Signature-based Key-Exchange Protocol
Ran Canetti, Hugo Krawczyk
2002/119
Provably Secure Public-Key Encryption for Length-Preserving Chaumian Mixes
Bodo Möller
2002/118
Efficient threshold signature, multisignature and blind signature schemes based on the Gap-Diffie-Hellman-group signature scheme
Alexandra Boldyreva
2002/117
Diffie-Hellman Problems and Bilinear Maps
Jung Hee Cheon, Dong Hoon Lee
2002/116
How to convert any ID-based Signature Schemes
Claude Castelluccia
2002/115
Universal Padding Schemes for RSA
Jean-Sébastien Coron, Marc Joye, David Naccache, Pascal Paillier
2002/114
Point Multiplication on Ordinary Elliptic Curves over Fields of Characteristic Three
N. P. Smart, J. Westwood
2002/113
A Note on the Bilinear Diffie-Hellman Assumption
Yacov Yacobi
2002/112
An Efficient Procedure to Double and Add Points on an Elliptic Curve
Kirsten Eisentraeger, Kristin Lauter, Peter L. Montgomery
2002/111
On Linear Redundancy in the AES S-Box
Joanne Fuller, William Millan
2002/110
The GGM Construction does NOT yield Correlation Intractable Function Ensembles
Oded Goldreich
2002/109
A New Class of Unsafe Primes
Qi Cheng
2002/108
Clock-Controlled Alternating Step Generator
Ali Adel Kanso
2002/107
Efficient Arithmetic on Hyperelliptic Curves
Tanja Lange
2002/106
Secret sharing schemes on access structures with intersection number equal to one
Jaume Marti-Farre, Carles Padro
2002/105
An Extension of Kedlaya's Algorithm to Hyperelliptic Curves in Characteristic 2
Jan Denef, Frederik Vercauteren
2002/104
Forward-Secure Signatures with Fast Key Update
Anton Kozlov, Leonid Reyzin
2002/103
On the Power of Claw-Free Permutations
Yevgeniy Dodis, Leonid Reyzin
2002/102
Applying General Access Structure to Metering Schemes
Ventzislav Nikov, Svetla Nikova, Bart Preneel, Joos Vandewalle
2002/101
An Upper Bound on the Size of a Code with the $k$-Identifiable Parent Property
Simon R. Blackburn
2002/100
Encryption-Scheme Security in the Presence of Key-Dependent Messages
J. Black, P. Rogaway, T. Shrimpton
2002/099
A New Statistical Testing for Symmetric Ciphers and Hash Functions
Eric Filiol
2002/098
Identity-Based Signcryption
John Malone-Lee
2002/097
A new public key encryption scheme provably secure against adaptive chosen cipher-text attack
Huafei Zhu
2002/096
Generating Large Non-Singular Matrices over an Arbitrary Field with Blocks of Full Rank
James Xiao, Yongxin Zhou
2002/095
The (a, b)-Shrinking Generator
Ali Adel Kanso
2002/094
Building curves with arbitrary small MOV degree over finite prime fields
R. Dupont, A. Enge, F. Morain
2002/093
A Fuzzy Vault Scheme
Ari Juels, Madhu Sudan
2002/092
TMAC: Two-Key CBC MAC
Kaoru Kurosawa, Tetsu Iwata
2002/091
Multiplicative Masking and Power Analysis of AES
Jovan Dj. Golić
2002/090
Efficient and Concurrent Zero-Knowledge from any public coin HVZK protocol
Daniele Micciancio, Erez Petrank
2002/089
On Chosen Ciphertext Security of Multiple Encryptions
Oded Goldreich, Yoad Lustig, Moni Naor
2002/088
Constructing Elliptic Curves with Prescribed Embedding Degrees
Paulo S. L. M. Barreto, Ben Lynn, Michael Scott
2002/087
Higher Order Correlation Attacks, XL algorithm and Cryptanalysis of Toyocrypt
Nicolas T. Courtois
2002/086
Adapting the weaknesses of the Random Oracle model to the Generic Group model.
Alexander W. Dent
2002/085
Efficient and Player-Optimal Strong Consensus
Matthias Fitzi, Juan A. Garay
2002/084
Towards Provably-Secure Timed E-Commerce: The Trusted Delivery Layer
Amir Herzberg
2002/083
A semantically secure elliptic curve RSA scheme with small expansion factor
David Galindo, Sebastià Mart\'ın, Paz Morillo, Jorge L. Villar
2002/082
Authentication of Quantum Messages
Howard Barnum, Claude Crepeau, Daniel Gottesman, Adam Smith, Alain Tapp
2002/081
Some Applications of Threshold Signature Schemes to Distributed Protocols
Vanesa Daza, Javier Herranz, Germán Sáez
2002/080
Applications of Multilinear Forms to Cryptography
Dan Boneh, Alice Silverberg
2002/079
On the efficiency of the Clock Control Guessing Attack
Erik Zenner
2002/078
Breaking and Provably Repairing the SSH Authenticated Encryption Scheme: A Case Study of the Encode-then-Encrypt-and-MAC Paradigm
Mihir Bellare, Tadayoshi Kohno, Chanathip Namprempre
2002/077
Key-Insulated Public-Key Cryptosystems
Yevgeniy Dodis, Jonathan Katz, Shouhuai Xu, Moti Yung
2002/076
Attack on Private Signature Keys of the OpenPGP Format, PGP(TM) Programs and Other Applications Compatible with OpenPGP
Vlastimil Klima, Tomas Rosa
2002/075
Fault based cryptanalysis of the Advanced Encryption Standard
J. Blöemer, J. -P. Seifert
2002/074
How to repair ESIGN
Louis Granboulan
2002/073
Fault attacks on RSA with CRT: Concrete Results and Practical Countermeasures
C. Aumüller, P. Bier, P. Hofreiter, W. Fischer, J. -P. Seifert
2002/072
Authenticated Identity-Based Encryption
Ben Lynn
2002/071
Further Results and Considerations on Side Channel Attacks on RSA
Vlastimil Klima, Tomas Rosa
2002/070
Weak Keys in MST1
Jens-Matthias Bohli, Maria Isabel Gonzalez Vasco, Consuelo Martinez, Rainer Steinwandt
2002/069
A Distributed and Computationally Secure Key Distribution Scheme
Vanesa Daza, Javier Herranz, Carles Padró, Germán Sáez
2002/068
Improved key recovery of level 1 of the Bluetooth Encryption System
Scott Fluhrer
2002/067
(Not So) Random Shuffles of RC4
Ilya Mironov
2002/066
Black-Box Analysis of the Block-Cipher-Based Hash-Function Constructions from PGV
John Black, Phillip Rogaway, Thomas Shrimpton
2002/065
Secure Channels based on Authenticated Encryption Schemes: A Simple Characterization
Chanathip Namprempre
2002/064
Protecting against Key Exposure: Strongly Key-Insulated Encryption with Optimal Threshold
Mihir Bellare, Adriana Palacio
2002/063
On some Attacks on Multi-prime RSA
M Jason Hinek, Mo King Low, Edlyn Teske
2002/062
ABC - A Block Cipher
Dieter Schmidt
2002/061
Strengthened Encryption in the CBC Mode
Vlastimil Klima, Tomas Rosa
2002/060
A Forward-Secure Public-Key Encryption Scheme
Jonathan Katz
2002/059
Universally Composable Notions of Key Exchange and Secure Channels
Ran Canetti, Hugo Krawczyk
2002/058
Construction of UOWHF: Tree Hashing Revisited
Palash Sarkar
2002/057
A Simpler Construction of CCA2-Secure Public-Key Encryption Under General Assumptions
Yehuda Lindell
2002/056
Hierarchical ID-Based Cryptography
Craig Gentry, Alice Silverberg
2002/055
Concurrent Zero Knowledge Proofs with Logarithmic Round-Complexity
Manoj Prabhakaran, Amit Sahai
2002/054
SiBIR: Signer-Base Intrusion-Resilient Signatures
Gene Itkis, Leonid Reyzin
2002/053
Extended Validity and Consistency in Byzantine Agreement
Matthias Fitzi, Martin Hirt, Thomas Holenstein, Jürg Wullschleger
2002/052
A Variant of the Cramer-Shoup Cryptosystem for Groups with Unknwon Order
Stefan Lucks
2002/051
Fully Distributed Proxy Signature Schemes
Javier Herranz, Germán Sáez
2002/050
Secret sharing schemes with three or four minimal qualified subsets
Jaume Martí-Farré, Carles Padró
2002/049
Tensor Transform of Boolean Functions and Related Algebraic and Probabilistic Properties
Alexander Kholosha, Henk C. A. van Tilborg
2002/048
Towards a Uniform Description of Several Group Based Cryptographic Primitives
Maria Isabel Gonzalez Vasco, Consuelo Martinez, Rainer Steinwandt
2002/047
Universal Composition with Joint State
Ran Canetti, Tal Rabin
2002/046
On the Security of Joint Signature and Encryption
Jee Hea An, Yevgeniy Dodis, Tal Rabin
2002/045
Cryptanalysis of S-DES
Dr. K. S. Ooi, Brain Chin Vito
2002/044
Cryptanalysis of Block Ciphers with Overdefined Systems of Equations
Nicolas Courtois, Josef Pieprzyk
2002/043
Strict Polynomial-time in Simulation and Extraction
Boaz Barak, Yehuda Lindell
2002/042
A Unified Methodology For Constructing Public-Key Encryption Schemes Secure Against Adaptive Chosen-Ciphertext Attack
Edith Elkind, Amit Sahai
2002/041
New Results on Boomerang and Rectangle Attack
Eli Biham, Orr Dunkelman, Nathan Keller
2002/040
Secure Computation Without Agreement
Shafi Goldwasser, Yehuda Lindell
2002/039
Partial Key Escrow Monitoring Scheme
Jiang Shaoquan, Zhang Yufeng
2002/038
A Distributed RSA Signature Scheme for General Access Structures
Javier Herranz, Carles Padró, Germán Sáez
2002/037
An efficient semantically secure elliptic curve cryptosystem based on KMOV
David Galindo, Sebastià Mart\'ın, Paz Morillo, Jorge L. Villar
2002/036
Optimal Black-Box Secret Sharing over Arbitrary Abelian Groups
Ronald Cramer, Serge Fehr
2002/035
Tripartite Authenticated Key Agreement Protocols from Pairings
Sattam S. Al-Riyami, Kenneth G. Paterson
2002/034
An OAEP Variant With a Tight Security Proof
Jakob Jonsson
2002/033
Equivalence between semantic security and indistinguishability against chosen ciphertext attacks
Yodai Watanabe, Junji Shikata, Hideki Imai
2002/032
Supersingular Hyperelliptic Curve of Genus 2 over Finite Fields
Y. Choie, E. Jeong, E. Lee
2002/031
A Parallelizable Design Principle for Cryptographic Hash Functions
Palash Sarkar, Paul J. Schellenberg
2002/030
Adaptive chi-square test and its application to some cryptographic problems.
Boris Ryabko
2002/029
Efficient Computation Modulo a Shared Secret with Application to the Generation of Shared Safe-Prime Products
Joy Algesheimer, Jan Camenisch, Victor Shoup
2002/028
A Universal Forgery of Hess's Second ID-based Signature against the Known-message Attack
Jung Hee Cheon
2002/027
Efficient and Non-Malleable Proofs of Plaintext Knowledge and Applications
Jonathan Katz
2002/026
Generic Groups, Collision Resistance, and ECDSA
Daniel R. L. Brown
2002/025
Making Mix Nets Robust For Electronic Voting By Randomized Partial Checking
Markus Jakobsson, Ari Juels, Ron Rivest
2002/024
Timed Release of Standard Digital Signatures
Juan Garay, Markus Jakobsson
2002/023
Almost Optimal Hash Sequence Traversal
Don Coppersmith, Markus Jakobsson
2002/022
From Identification to Signatures via the Fiat-Shamir Transform: Minimizing Assumptions for Security and Forward-Security
Michel Abdalla, Jee Hea An, Mihir Bellare, Chanathip Namprempre
2002/021
Spectral Analysis of Boolean Functions under Non-uniformity of Arguments
Kanstantsin Miranovich
2002/020
Cryptanalysis of stream ciphers with linear masking
Don Coppersmith, Shai Halevi, Charanjit Jutla
2002/019
Scream: a software-efficient stream cipher
Shai Halevi, Don Coppersmith, Charanjit Jutla
2002/018
An Identity-Based Signature from Gap Diffie-Hellman Groups
Jae Choon Cha, Jung Hee Cheon
2002/017
The Cramer-Shoup Strong-RSA Signature Scheme Revisited
Marc Fischlin
2002/016
Content Extraction Signatures
Ron Steinfeld, Laurence Bull, Yuliang Zheng
2002/015
Security proofs of cryptographic protocols
Eva Jencusova
2002/014
Better than BiBa: Short One-time Signatures with Fast Signing and Verifying
Leonid Reyzin, Natan Reyzin
2002/013
Generic Lower Bounds for Root Extraction and Signature Schemes in General Groups
Ivan Damgard, Maciej Koprowski
2002/012
Exponent Group Signature Schemes and Efficient Identity Based Signature Schemes Based on Pairings
F. Hess
2002/011
Optimal Chosen-Ciphertext Secure Encryption of Arbitrary-Length Messages
Jean-Sebastien Coron, Helena Handschuh, Marc Joye, Pascal Paillier, David Pointcheval, Christophe Tymen
2002/010
Cut and Paste Attacks with Java
Serge Lefranc, David Naccache
2002/009
Tree-based Group Key Agreement
Yongdae Kim, Adrian Perrig, Gene Tsudik
2002/008
Efficient Algorithms for Pairing-Based Cryptosystems
Paulo S. L. M. Barreto, Hae Y. Kim, Ben Lynn, Michael Scott
2002/007
Parallel scalar multiplication on general elliptic curves over $\mathbb{F}_p$ hedged against Non-Differential Side-Channel Attacks
Wieland Fischer, Christophe Giraud, Erik Woodward Knudsen, Jean-Pierre Seifert
2002/006
The best and worst of supersingular abelian varieties in cryptology
Karl Rubin, Alice Silverberg
2002/005
Cryptanalysis of Stream Cipher COS (2,128) Mode I
Hongjun Wu, Feng Bao
2002/004
ID-based Signatures from Pairings on Elliptic Curves
Kenneth G. Paterson
2002/003
Square Attacks on Reduced-Round Variants of the Skipjack Block Cipher
Jorge Nakahara Jr, Bart Preneel, Joos Vandewalle
2002/002
Evaluating Security of Voting Schemes in the Universal Composability Framework
Jens Groth
2002/001
Fractal Hash Sequence Representation and Traversal
Markus Jakobsson
2001/113
Efficient Revocation of Anonymous Group Membership
Jan Camenisch, Anna Lysyanskaya
2001/112
A Proposal for an ISO Standard for Public Key Encryption
Victor Shoup
2001/111
An Identity Based Authenticated Key Agreement Protocol Based on the Weil Pairing
N. P. Smart
2001/110
RSA hybrid encryption schemes
Louis Granboulan
2001/109
New Notions of Soundness and Simultaneous Resettability in the Public-Key Model
Yunlei ZHAO
2001/108
Design and Analysis of Practical Public-Key Encryption Schemes Secure against Adaptive Chosen Ciphertext Attack
Ronald Cramer, Victor Shoup
2001/107
Parallel Coin-Tossing and Constant-Round Secure Two-Party Computation
Yehuda Lindell
2001/106
Cryptanalysis of the COS (2,128) Stream Ciphers
Steve Babbage
2001/105
Universal Arguments and their Applications
Boaz Barak, Oded Goldreich
2001/104
Concurrent Zero-Knowledge With Timing, Revisited
Oded Goldreich
2001/103
Countermeasures against Side-Channel Attacks for Elliptic Curve Cryptosystems
Antonio Bellezza
2001/102
An Extended Quadratic Frobenius Primality Test with Average Case Error Estimates
Ivan Damgård, Gudmund Frandsen
2001/101
Quasi-Efficient Revocation of Group Signatures
Giuseppe Ateniese, Dawn Song, Gene Tsudik
2001/100
A Note on Girault's Self-Certified Model
Shahrokh Saeednia
2001/099
Linear Code Implies Public-Key Traitor Tracing
Kaoru Kurosawa, Takuya Yoshida
2001/098
Fast hashing onto elliptic curves over fields of characteristic 3
Paulo S. L. M. Barreto, Hae Yong Kim
2001/097
An Efficient MAC for Short Messages
Sarvar Patel
2001/096
Constructing elliptic curves with a given number of points over a finite field
Amod Agashe, Kristin Lauter, Ramarathnam Venkatesan
2001/095
Secure Vickrey Auctions without Threshold Trust
Helger Lipmaa, N. Asokan, Valtteri Niemi
2001/094
Slope packings and coverings, and generic algorithms for the discrete logarithm problem
M. Chateauneuf, A. C. H. Ling, D. R. Stinson
2001/093
Threshold Cryptosystems Based on Factoring
Jonathan Katz, Moti Yung
2001/092
BDD-based Cryptanalysis of Keystream Generators
Matthias Krause
2001/091
Perfect Hiding and Perfect Binding Universally Composable Commitment Schemes with Constant Expansion Factor
Ivan Damgård, Jesper B. Nielsen
2001/090
Identity Based Encryption From the Weil Pairing
Dan Boneh, Matthew Franklin
2001/089
Linear broadcast encryption schemes
Carles Padró, Ignacio Gracia, Sebastià Martín, Paz Morillo
2001/088
Improving the trade-off between storage and communication in broadcast encryption schemes
Ignacio Gracia, Sebastià Martín, Carles Padró
2001/087
A Linear Algebraic Approach to Metering Schemes
C. Blundo, S. Martìn, B. Masucci, C. Padrò
2001/086
Statistical Zero-Knowledge Proofs from Diophantine Equations
Helger Lipmaa
2001/085
Universal Hash Proofs and a Paradigm for Adaptive Chosen Ciphertext Secure Public-Key Encryption
Ronald Cramer, Victor Shoup
2001/084
Analysis of the GHS Weil Descent Attack on the ECDLP over Characteristic Two Finite Fields of Composite Degree
Markus Maurer, Alfred Menezes, Edlyn Teske
2001/083
On the Constructing of Highly Nonlinear Resilient Boolean Functions by Means of Special Matrices
Maria Fedorova, Yuriy Tarannikov
2001/082
A Description of Protocols for Private Credentials
Ariel Glenn, Ian Goldberg, Frédéric Légaré, Anton Stiglic
2001/081
A Sufficient Condition for Secure Ping--Pong Protocols
Masao Mori
2001/080
COS Ciphers are not "extremely weak"! - The Design Rationale of COS Ciphers
Eric Filiol, Caroline Fontaine
2001/079
Authenticated Encryption in the Public-Key Setting: Security Notions and Analyses
Jee Hea An
2001/078
The COS Stream Ciphers are Extremely Weak
Steve Babbage
2001/077
A Time-Memory Tradeoff Attack Against LILI-128
Markku-Juhani Olavi Saarinen
2001/076
Communication Complexity and Secure Function Evaluation
Moni Naor, Kobbi Nissim
2001/075
Pseudo-Random Functions and Factoring
Moni Naor, Omer Reingold, Alon Rosen
2001/074
On the Security of Randomized CBC-MAC Beyond the Birthday Paradox Limit - A New Construction
Eliane Jaulmes, Antoine Joux, Frederic Valette
2001/073
Efficient oblivious transfer schemes
Wen-Guey Tzeng
2001/072
On the Goubin-Courtois Attack on TTM
T. Moh, Jiun-Ming Chen
2001/071
Multi-Recipient Public-Key Encryption with Shortened Ciphertext
Kaoru Kurosawa
2001/070
Security Assessment of Hierocrypt and Rijndael against the Differential and Linear Cryptanalysis (Extended Abstract)
Kenji Ohkuma, Hideo Shimizu, Fumihiko Sano, Shinichi Kawamura
2001/069
On the (Im)possibility of Obfuscating Programs
Boaz Barak, Oded Goldreich, Russell Impagliazzo, Steven Rudich, Amit Sahai, Salil Vadhan, Ke Yang
2001/068
SQUARE Attacks on Reduced-Round PES and IDEA Block Ciphers
J. Nakahara Jr, P. S. L. M. Barreto, B. Preneel, J. Vandewalle, H. Y. Kim
2001/067
An Attack on A Traitor Tracing Scheme
Jeff Jianxin Yan, Yongdong Wu
2001/066
IMPROVED PUBLIC KEY CRYPTOSYSTEM USING FINITE NON ABELIAN GROUPS
SEONG-HUN PAENG, DAESUNG KWON, KIL-CHAN HA, JAE HEON KIM
2001/065
Analysis of chosen plaintext attacks on the WAKE Stream Cipher
Marina Pudovkina
2001/064
An Integer Commitment Scheme based on Groups with Hidden Order
Ivan Damgard, Eiichiro Fujisaki
2001/063
Resettably-Sound Zero-Knowledge and its Applications
Boaz Barak, Oded Goldreich, Shafi Goldwasser, Yehuda Lindell
2001/062
Optimal security proofs for PSS and other signature schemes
Jean-Sébastien Coron
2001/061
Clock-Controlled Shift Registers for Key-Stream Generation
Alexander Kholosha
2001/060
The Security of Practical Two-Party RSA Signature Schemes
Mihir Bellare, Ravi Sandhu
2001/059
Revocation and Tracing Schemes for Stateless Receivers
Dalit Naor, Moni Naor, Jeff Lotspiech
2001/058
Efficient Zero-knowledge Authentication Based on a Linear Algebra Problem MinRank
Nicolas T. Courtois
2001/057
On the Security of the SPEKE Password-Authenticated Key Exchange Protocol
Philip MacKenzie
2001/056
On the Complexity of Matsui's Attack
P. Junod
2001/055
Universally Composable Commitments
Ran Canetti, Marc Fischlin
2001/054
Extending the GHS Weil Descent Attack
S. D. Galbraith, F. Hess, N. P. Smart
2001/053
Security Proofs for the RSA-PSS Signature Scheme and Its Variants
Jakob Jonsson
2001/052
Differential Probability of Modular Addition with a Constant Operand
Alexis Warner Machado
2001/051
Black-Box Concurrent Zero-Knowledge Requires $\tilde\Omega(\log n)$ Rounds
Ran Canetti, Joe Kilian, Erez Petrank, Alon Rosen
2001/050
Elliptic curve Paillier schemes
Steven D Galbraith
2001/049
A known plaintext attack on the ISAAC keystream generator
Marina Pudovkina
2001/048
Forward-Secure Signatures with Optimal Signing and Verifying
Gene Itkis, Leonid Reyzin
2001/047
ON THE METHOD OF "XL" AND ITS INEFFICIENCY TO TTM
T. MOH
2001/046
The simple ideal cipher system
Boris Ryabko
2001/045
The order of encryption and authentication for protecting communications (Or: how secure is SSL?)
Hugo Krawczyk
2001/044
Optimistic Asynchronous Multi-Party Contract Signing with Reduced Number of Rounds
Birgit Baum-Waidner
2001/043
Cryptanalysis of the Vesta-2M Stream Cipher
Marina Pudovkina
2001/042
Simple Forward-Secure Signatures From Any Signature Scheme
Hugo Krawczyk
2001/041
Solving Elliptic Curve Discrete Logarithm Problems Using Weil Descent
Michael Jacobson, Alfred Menezes, Andreas Stein
2001/040
Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels
Ran Canetti, Hugo Krawczyk
2001/039
Robust Software Tokens: Towards Securing a Digital Identity
Taekyoung Kwon
2001/038
Flaws in differential cryptanalysis of Skipjack
Louis Granboulan
2001/037
EMpowering Side-Channel Attacks
Josyula R. Rao, Pankaj Rohatgi
2001/036
Anti-persistence: History Independent Data Structures
Moni Naor, Vanessa Teague
2001/035
Forward-Security in Private-Key Cryptography
Mihir Bellare, Bennet Yee
2001/034
Composition and Efficiency Tradeoffs for Forward-Secure Digital Signatures
Tal Malkin, Daniele Micciancio, Sara Miner
2001/033
Dual of New Method for Upper Bounding the Maximum Average Linear Hull Probability for SPNs
Liam Keliher, Henk Meijer, Stafford Tavares
2001/032
Efficient and Non-Interactive Non-Malleable Commitment
Giovanni Di Crescenzo, Jonathan Katz, Rafail Ostrovsky, Adam Smith
2001/031
Efficient Password-Authenticated Key Exchange Using Human-Memorable Passwords
Jonathan Katz, Rafail Ostrovsky, Moti Yung
2001/030
On the Power of Nonlinear Secret-Sharing
Amos Beimel, Yuval Ishai
2001/029
On multivariate signature-only public key cryptosystems
Nicolas T. Courtois
2001/028
Efficient Encryption for Rich Message Spaces Under General Assumptions
Alexander Russell, Hong Wang
2001/027
A Block-Cipher Mode of Operation for Parallelizable Message Authentication
John Black, Phillip Rogaway
2001/026
OCB Mode
Phillip Rogaway, Mihir Bellare, John Black, Ted Krovetz
2001/025
Cryptanalysis of some elliptic curve based cryptosystems of Paillier
Steven D. Galbraith
2001/024
Secure Multiparty Computation of Approximations
Joan Feigenbaum, Yuval Ishai, Tal Malkin, Kobbi Nissim, Martin Strauss, Rebecca N. Wright
2001/023
Robustness for Free in Unconditional Multi-Party Computation
Martin Hirt, Ueli Maurer
2001/022
Optimistic Asynchronous Atomic Broadcast
Klaus Kursawe, Victor Shoup
2001/021
The Rectangle Attack - Rectangling the Serpent
Biham Eli, Orr Dunkelman, Nathan Keller
2001/020
Some observations on the theory of cryptographic hash functions
D. R. Stinson
2001/019
An Efficient System for Non-transferable Anonymous Credentials with Optional Anonymity Revocation
Jan Camenisch, Anna Lysyanskaya
2001/018
Analysis of a Subset Sum Randomizer
Peter Gemmell, Anna Johnston
2001/017
On adaptive vs. non-adaptive security of multiparty protocols
Ran Canetti, Ivan Damgard, Stefan Dziembowski, Yuval Ishai, Tal Malkin
2001/016
Efficient Traitor Tracing Algorithms using List Decoding
Alice Silverberg, Jessica Staddon, Judy Walker
2001/015
An observation regarding Jutla's modes of operation
Shai Halevi
2001/014
Timed-Release Cryptography
Wenbo Mao
2001/013
Digitally Watermarking RSA Moduli
Anna M. Johnston
2001/012
Ciphers with Arbitrary Finite Domains
John Black, Phillip Rogaway
2001/011
New Zero-knowledge Undeniable Signatures - Forgery of Signature Equivalent to Factorisation
Wenbo Mao
2001/010
How to achieve a McEliece-based Digital Signature Scheme
Nicolas Courtois, Matthieu Finiasz, Nicolas Sendrier
2001/009
Robust key-evolving public key encryption schemes
Wen-Guey Tzeng, Zhi-Jia Tzeng
2001/008
Fully Distributed Threshold RSA under Standard Assumptions
Pierre-Alain Fouque, Jacques Stern
2001/007
Are 'Strong' Primes Needed for RSA
Ron Rivest, Robert Silverman
2001/006
Secure and Efficient Asynchronous Broadcast Protocols
Christian Cachin, Klaus Kursawe, Frank Petzold, Victor Shoup
2001/005
A Note on Cryptanalysis of the Preliminary Version of the NTRU Signature Scheme
Ilya Mironov
2001/004
MinRank problem and Zero-knowledge authentication
Nicolas T. Courtois
2001/003
Separating Decision Diffie-Hellman from Diffie-Hellman in cryptographic groups
Antoine Joux, Kim Nguyen
2001/002
The One-More-RSA-Inversion Problems and the Security of Chaum's Blind Signature Scheme
M. Bellare, C. Namprempre, D. Pointcheval, M. Semanko
2001/001
Efficient Algorithms for Computing Differential Properties of Addition
Helger Lipmaa, Shiho Moriai
2000/069
New constructions of resilient Boolean functions with maximal nonlinearity
Yuriy Tarannikov
2000/068
A Content Certified E-mail Protocol with a Public Mailbox
Tak-Ming Law
2000/067
Universally Composable Security: A New Paradigm for Cryptographic Protocols
Ran Canetti
2000/066
A Model for Asynchronous Reactive Systems and its Application to Secure Message Transmission
Birgit Pfitzmann, Michael Waidner
2000/065
How to Encrypt Long Messages without Large Size Symmetric/Asymmetric Encryption Schemes
Masashi Mitomo, Kaoru Kurosawa
2000/064
On the Security of Modular Exponentiation with Application to the Construction of Pseudorandom Generators
Oded Goldreich, Vered Rosen
2000/063
Candidate One-Way Functions Based on Expander Graphs
Oded Goldreich
2000/062
Non-Deforming Digital Watermarks
Gideon Samid
2000/061
RSA-OAEP is Secure under the RSA Assumption
Eiichiro Fujisaki, Tatsuaki Okamoto, David Pointcheval, Jacques Stern
2000/060
OAEP Reconsidered
Victor Shoup
2000/059
Essential Shannon Security with Keys Smaller Than the Encrypted Message
Gideon Samid
2000/058
Graph-Based Authentication of Digital Streams
Sara Miner, Jessica Staddon
2000/057
Session-Key Generation using Human Passwords Only
Oded Goldreich, Yehuda Lindell
2000/056
A Complete Problem for Statistical Zero Knowledge
Amit Sahai, Salil Vadhan
2000/055
Multiparty Computation from Threshold Homomorphic Encryption
Ronald Cramer, Ivan Damgård, Jesper Buus Nielsen
2000/054
Correlation Immune Boolean Functions with Very High Nonlinearity
Subhamoy Maitra
2000/053
A Construction of Resilient Functions with High Nonlinearity
Thomas Johansson, Enes Pasalic
2000/052
CRYPTANALYSIS OF THE A5/2 ALGORITHM
Slobodan Petrovic, Amparo Fúster-Sabater
2000/051
Reducing the Gate Count of Bitslice DES
Matthew Kwan
2000/050
Spectral Analysis of High Order Correlation Immune Functions
Yuriy Tarannikov, Denis Kirienko
2000/049
Spectral Domain Analysis of Correlation Immune and Resilient Boolean Functions
Palash Sarkar
2000/048
New Constructions of Resilent and Correlation Immune Boolean Functions achieving Upper Bounds on Nonlinearity
Enes Pasalic, Thomas Johansson, Subhamoy Maitra, Palash Sarkar
2000/047
Highly Nonlinear Balanced Boolean Functions with very good Autocorrelation Property
Subhamoy Maitra
2000/046
The Saturation Attack - a Bait for Twofish
Stefan Lucks
2000/045
Efficient Zero-Knowledge Proofs of Knowledge Without Intractability Assumptions
Ronald Cramer, Ivan Damgård, Philip MacKenzie
2000/044
Provably Secure Password-Authenticated Key Exchange Using Diffie-Hellman
Victor Boyko, Philip MacKenzie, Sarvar Patel
2000/043
Constructions and Bounds for Unconditionally Secure Commitment Schemes
C. Blundo, B. Masucci, D. R. Stinson, R. Wei
2000/042
Constructing Pseudo-Random Permutations with a Prescribed Structure
Moni Naor, Omer Reingold
2000/041
On Symmetrically Private Information Retrieval
Sanjeev Kumar Mishra
2000/040
Decimation Attack of Stream Ciphers
Eric FILIOL
2000/039
Encryption Modes with Almost Free Message Integrity
Charanjit S. Jutla
2000/038
On the Complexity of Verifiable Secret Sharing and Multi-Party Computation
Ronald Cramer, Ivan Damgård, Stefan Dziembowski
2000/037
General Secure Multi-Party Computation from any Linear Secret Sharing Scheme
Ronald Cramer, Ivan Damgård, Ueli Maurer
2000/036
Using fewer Qubits in Shor's Factorization Algorithm via Simultaneous Diophantine Approximation
Jean-Pierre Seifert
2000/035
Electronic Jury Voting Protocols
Alejandro Hevia, Marcos Kiwi
2000/034
Random Oracles in Constantinople: Practical Asynchronous Byzantine Agreement using Cryptography
Christian Cachin, Klaus Kursawe, Victor Shoup
2000/033
The Complete Distribution of Linear Probabilities of MARS' s-box
Kazumaro Aoki
2000/032
Anonymous Fingerprinting with Direct Non-Repudiation
Birgit Pfitzmann, Ahmad-Reza Sadeghi
2000/031
Forward Security in Threshold Signature Schemes
Michel Abdalla, Sara Miner, Chanathip Namprempre
2000/030
Secure Multiparty Computation of Approximations
Joan Feigenbaum, Jessica Fong, Martin Strauss, Rebecca N. Wright
2000/029
Concrete Security Characterizations of PRFs and PRPs: Reductions and Applications
Anand Desai, Sara Miner
2000/028
An Information-Theoretic Model for Steganography
Christian Cachin
2000/027
Accountable Certificate Management using Undeniable Attestations
Ahto Buldas, Peeter Laud, Helger Lipmaa
2000/026
Authentication and Key Agreement via Memorable Password
Taekyoung Kwon
2000/025
Authenticated Encryption: Relations among notions and analysis of the generic composition paradigm
Mihir Bellare, Chanathip Namprempre
2000/024
Security of the Most Significant Bits of the Shamir Message Passing Scheme
Maria Isabel Gonzalez Vasco, Igor E. Shparlinski
2000/023
Security of Polynomial Transformations of the Diffie--Hellman Key
Igor Shparlinski
2000/022
ACE: The Advanced Cryptographic Engine
Thomas Schweinberger, Victor Shoup
2000/021
An Efficient Identification Scheme Based on Permuted Patterns
Shahrokh Saeednia
2000/020
On the Security of Diffie--Hellman Bits
Maria Isabel Gonzalez Vasco, Igor E. Shparlinski
2000/019
Threshold Cryptography Secure Against the Adaptive Adversary, Concurrently
Anna Lysyanskaya
2000/018
Fast Verification of Any Remote Procedure Call: Short Witness-Indistinguishable One-Round Proofs for NP
A. Aiello, S. Bhatt, R. Ostrovsky, S. Rajagopalan.
2000/017
Lower Bounds on the Efficiency of Generic Cryptographic Constructions
Rosario Gennaro, Luca Trevisan
2000/016
Cryptanalysis of RSA with small prime difference
Benne de Weger
2000/015
Identification Protocols Secure Against Reset Attacks
Mihir Bellare, Marc Fischlin, Shafi Goldwasser, Silvio Micali
2000/014
Authenticated Key Exchange Secure Against Dictionary Attacks
Mihir Bellare, David Pointcheval, Phillip Rogaway
2000/013
Concurrent Zero-Knowledge in Poly-logarithmic Rounds
Joe Kilian, Erez Petrank
2000/012
Chosen Message Attack Against Goldreich-Goldwasser-Halevi's Signature Scheme from Crypto'97
DaeHun Nyang, JooSeok Song
2000/011
Tailored Key Encryption (TaKE) Tailoring a key for a given pair of plaintext/ciphertext
Gideon Samid
2000/010
The Security of Chaffing and Winnowing
Mihir Bellare, Alexandra Boldyreva
2000/009
New Directions in Design of Resilient Boolean Functions
Palash Sarkar, Subhamoy Maitra
2000/008
Efficient Protocols based on Probabilistic Encryption using Composite Degree Residue Classes
Ivan Damgård, Mads Jurik
2000/007
Public Electronic Contract Protocol
Tak-Ming Law
2000/006
An Encryption Algorithm and Key-stream Generator for Chinese Text Messages by Character Internal Code Structure
Tak-Ming Law
2000/005
On Resilient Boolean Functions with Maximal Possible Nonlinearity
Yuriy Tarannikov
2000/004
Combinatorial Properties of Frameproof and Traceability Codes
J. N. Staddon, D. R. Stinson, R. Wei
2000/003
Implications of the Nontriviality of Entropy Approximation
Marc Fischlin
2000/002
A New Forward-Secure Digital Signature Scheme
Michel Abdalla, Leonid Reyzin
2000/001
On Security Preserving Reductions -- Revised Terminology
Oded Goldreich
1999/024
A tool for obtaining tighter security analyses of pseudorandom function based constructions, with applications to PRP to PRF conversion
M. Bellare, R. Impagliazzo
1999/023
Concurrent Zero-Knowledge
Cynthia Dwork, Moni Naor, Amit Sahai
1999/022
Resettable Zero-Knowledge
Ran Canetti, Oded Goldreich, Shafi Goldwasser, Silvio Micali
1999/021
Public-Key Cryptography and Password Protocols: The Multi-User Case
Maurizio Kliban Boyarsky
1999/020
Improving the Exact Security of Digital Signature Schemes
Silvio Micali, Leonid Reyzin
1999/019
Security of all RSA and Discrete Log Bits
Johan Hastad, Mats Naslund
1999/018
Non-Malleable Encryption: Equivalence between Two Notions, and an Indistinguishability-Based Characterization
Mihir Bellare, Amit Sahai
1999/017
A Composition Theorem for Universal One-Way Hash Functions
Victor Shoup
1999/016
A forward-secure digital signature scheme
Mihir Bellare, Sara Miner
1999/015
Interleaved Zero-Knowledge in the Public-Key Model
Oded Goldreich, Shafi Goldwasser, Silvio Micali
1999/014
Concurrent Zero-Knowledge is Easy in Practice
Ivan Damgard
1999/013
Secure Hash-and-Sign Signatures without the Random Oracle
Rosario Gennaro, Shai Halevi, Tal Rabin
1999/012
On Formal Models for Secure Key Exchange
Victor Shoup
1999/011
Practical Threshold Signatures
Victor Shoup
1999/010
A Relationship between One-Wayness and Correlation Intractability
Satoshi Hada, Toshiaki Tanaka
1999/009
On the Existence of3-Round Zero-Knowledge Protocols
Satoshi Hada, Toshiaki Tanaka
1999/008
Verifiable Encryption and Applications to Group Signatures and Signature Sharing
Jan Camenisch, Ivan Damgaard
1999/007
DHAES: An Encryption Scheme Based on the Diffie-Hellman Problem
Michel Abdalla, Mihir Bellare, Phillip Rogaway
1999/006
Fast Proof of Plaintext-Knowledge and Deniable Authentication Based on Chinese Remainder Theorem
Roger Fischlin
1999/005
Lattice Based Cryptography: A Global Improvement
Daniele Micciancio
1999/004
Public-key cryptography and password protocols
Shai Halevi, Hugo Krawczyk
1999/003
An error in the mixed adversary protocol by Fitzi, Hirt and Maurer
Ivan Damgard
1999/002
Chinese Remaindering with Errors
Oded Goldreich, Dana Ron, Madhu Sudan
1999/001
Signature Schemes Based on the Strong RSA Assumption
Ronald Cramer, Victor Shoup
1998/026
Comparing Entropies in Statistical Zero-Knowledge with Applications to the Structure of SZK
Oded Goldreich, Salil Vadhan
1998/025
Secure Distributed Storage and Retrieval
Juan A. Garay, Rosario Gennaro, Charanjit Jutla, Tal Rabin
1998/024
The Disparity between Work and Entropy in Cryptology
John Pliam
1998/023
Security amplification by composition: The case of doubly-iterated, ideal ciphers
William Aiello, Mihir Bellare, Giovanni Di Crescenzo, Ramarathnam Venkatesan
1998/022
Insecurity of Quantum Computations
Hoi-Kwong Lo
1998/021
Relations among Notions of Security for Public-Key Encryption Schemes
Mihir Bellare, Anand Desai, David Pointcheval, Phillip Rogaway
1998/020
Almost All Discrete Log Bits Are Simultaneously Secure
Claus P. Schnorr
1998/019
Many-to-one Trapdoor Functions and their Relation to Public-key Cryptosystems
Mihir Bellare, Shai Halevi, Amit Sahai, Salil Vadhan
1998/018
Security and Composition of Multi-party Cryptographic Protocols
Ran Canetti
1998/017
Making An Empty Promise With A Quantum Computer (Or, A Brief Review on the Impossibility of Quantum Bit Commitment)
H. F. Chau, H. -K. Lo
1998/016
Quantum Computers Render Quantum Key Distribution Unconditionally Secure Over Arbitrarily Long Distances
Hoi-Kwong Lo, H. F. Chau
1998/015
More on Proofs of Knowledge
Shai Halevi, Silvio Micali
1998/014
Randomness versus Fault-Tolerance
Ran Canetti, Eyal Kushilevitz, Rafail Ostrovsky, Adi Rosen
1998/013
A Random Server Model for Private Information Retrieval (or How to Achieve Information Theoretic PIR Avoiding Data Replication)
Yael Gertner, Shafi Goldwasser, Tal Malkin
1998/012
Maintaining Authenticated Communication in the Presence of Break-ins
Ran Canetti, Shai Halevi, Amir Herzberg
1998/011
The Random Oracle Methodology, Revisited
Ran Canetti, Oded Goldreich, Shai Halevi
1998/010
Chameleon Hashing and Signatures
Hugo Krawczyk, Tal Rabin
1998/009
A Modular Approach to the Design and Analysis of Authentication and Key Exchange Protocols
Mihir Bellare, Ran Canetti, Hugo Krawczyk
1998/008
An Efficient Non-Interactive Statistical Zero-Knowledge Proof System for Quasi-Safe Prime Products
Rosario Gennaro, Daniele Micciancio, Tal Rabin
1998/007
Fast Batch Verification for Modular Exponentiation and Digital Signatures
Mihir Bellare, Juan A. Garay, Tal Rabin
1998/006
A Practical Public Key Cryptosystem Provably Secure against Adaptive Chosen Ciphertext Attack
Ronald Cramer, Victor Shoup
1998/005
On the possibility of basing Cryptography on the assumption that $P \neq NP$
Oded Goldreich, Shafi Goldwasser
1998/004
Universal Service Providers for Database Private Information Retrieval
Giovanni Di-Crescenzo, Yuval Ishai, Rafail Ostrovsky
1998/003
Private Information Retrieval by Keywords
Benny Chor, Niv Gilboa, Moni Naor
1998/002
The Graph Clustering Problem has a Perfect Zero-Knowledge Proof
A. De Santis, G. Di Crescenzo, O. Goldreich, G. Persiano.
1998/001
On Protocol Divertibility
Gerrit Bleumer
1997/015
Optimistic fair Exchange of Digital Signatures
N. Asokan, V. Shoup, M. Waidner
1997/014
Generalized Diffie-Hellman Modulo a Composite is not Weaker than Factoring
Eli Biham, Dan Boneh, Omer Reingold
1997/013
Visual Authentication and Identification
Moni Naor, Benny Pinkas.
1997/012
Self-Delegation with Controlled Propagation - or - What If You Lose Your Laptop.
Oded Goldreich, Birgit Pfitzmann, Ronald L. Rivest
1997/011
Identity Escrow
Joe Kilian, Erez Petrank
1997/010
CBC MAC for Real-Time Data Sources
Erez Petrank, Charles Rackoff
1997/009
Collision-Resistant Hashing: Towards Making UOWHFs Practical
Mihir Bellare, Phillip Rogaway
1997/008
Factoring via Strong Lattice Reduction Algorithms
Harald Ritter, Carsten Roessner
1997/007
Towards realizing random oracles: Hash functions that hide all partial information
Ran Canetti
1997/006
Protecting Data Privacy in Private Information Retrieval Schemes
Yuval Ishai, Eyal Kushilevitz
1997/005
A Probabilistic Error-Correcting Scheme
S. Decatur, O. Goldreich, D. Ron
1997/004
A note on negligible functions
Mihir Bellare
1997/003
Efficient Cryptographic Protocols Based on Noisy Channels.
Claude Crepeau
1997/002
Round-Optimal Zero-Knowledge Arguments Based on any One-Way Function
Mihir Bellare, Markus Jakobsson, Moti Yung
1997/001
A New Paradigm for Collision-free Hashing: Incrementality at Reduced Cost
Mihir Bellare, Daniele Micciancio
1996/016
Public-Key Cryptosystems from Lattice Reduction Problems
Oded Goldreich, Shafi Goldwasser, Shai Halevi
1996/015
Verifiable Partial Key Escrow
Mihir Bellare, Shafi Goldwasser
1996/014
The Graph Clustering Problem has a Perfect Zero-Knowledge Proof
Oded Goldreich
1996/013
On the Contrast in Visual Cryptography Schemes
Carlo Blundo, Alfredo De Santis, Douglas R. Stinson
1996/012
Proactive RSA
Yair Frankel, Peter Gemmell, Philip D. MacKenzie, Moti Yung
1996/011
On the Construction of Pseudo-Random Permutations: Luby-Rackoff Revisited
Moni Naor, Omer Reingold
1996/010
Oblivious Transfers and Intersecting Codes
Gilles Brassard, Claude Crepeau, Miklos Santha
1996/009
Collision-Free Hashing from Lattice Problems
Oded Goldreich, Shafi Goldwasser, Shai Halevi
1996/008
Access Control and Signatures via Quorum Secret Sharing
Moni Naor, Avishai Wool
1996/007
Visual Cryptography II: Improving the Contrast Via the Cover Base
Moni Naor, Adi Shamir
1996/006
Upper bound on the communication complexity of private information retrieval
Andris Ambainis
1996/005
Private Information Storage
Rafail Ostrovsky, Victor Shoup
1996/004
Linear Zero-Knowledge - A note on Efficient Zero-Knowledge Proofs and Arguments
Ronald Cramer, Ivan Damgaard
1996/003
On Monotone Function Closure of Statistical Zero-Knowledge
Ronald Cramer, Ivan Damgaard
1996/002
Deniable Encryption
Ran Canetti, Cynthia Dwork, Moni Naor, Rafi Ostrovsky
1996/001
Incoercible Multiparty Computation
Ran Canetti, Rosario Gennaro
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.