default search action
IACR Cryptology ePrint Archive, Volume 2015
Volume 2015, 2015
- Oscar Reparaz:
A note on the security of Higher-Order Threshold Implementations. 1 - Baodong Qin, Shengli Liu, Tsz Hon Yuen, Robert H. Deng, Kefei Chen:
Continuous Non-Malleable Key Derivation and Its Application to Related-Key Security. 3 - Carmit Hazay:
Oblivious Polynomial Evaluation and Secure Set-Intersection from Algebraic PRFs. 4 - Srinivas Devadas, Marten van Dijk, Christopher W. Fletcher, Ling Ren:
Onion ORAM: A Constant Bandwidth and Constant Client Storage ORAM (without FHE or SWHE). 5 - Jan Camenisch, Robert R. Enderlein, Gregory Neven:
Two-Server Password-Authenticated Secret Sharing UC-Secure Against Transient Corruptions. 6 - Tobias Pulls, Roel Peeters:
Balloon: A Forward-Secure Append-Only Persistent Authenticated Data Structure. 7 - Satrajit Ghosh, Aniket Kate:
Post-Quantum Secure Onion Routing (Future Anonymity in Today's Budget). 8 - Donghoon Chang, Arpan Jati, Sweta Mishra, Somitra Kumar Sanadhya:
Rig: A simple, secure and flexible design for Password Hashing. 9 - Shengli Liu, Kenneth G. Paterson:
Simulation-based Selective Opening CCA Security for PKE from Key Encapsulation Mechanisms. 10 - Benjamin Buhrow, Paul Riemer, Mike Shea, Barry K. Gilbert, Erik S. Daniel:
Block Cipher Speed and Energy Efficiency Records on the MSP430: System Design Trade-Offs for 16-bit Embedded Applications. 11 - Tancrède Lepoint, Mehdi Tibouchi:
Cryptanalysis of a (Somewhat) Additively Homomorphic Encryption Scheme Used in PIR. 12 - Nico Döttling:
Low Noise LPN: KDM Secure Public Key Encryption and Sample Amplification. 13 - San Ling, Khoa Nguyen, Huaxiong Wang:
Group Signatures from Lattices: Simpler, Tighter, Shorter, Ring-based. 14 - Florian Bergsma, Tibor Jager, Jörg Schwenk:
One-Round Key Exchange with Strong Security: An Efficient and Generic Construction in the Standard Model. 15 - Yannis Rouselakis, Brent Waters:
Efficient Statically-Secure Large-Universe Multi-Authority Attribute-Based Encryption. 16 - Michel Abdalla, Florian Bourse, Angelo De Caro, David Pointcheval:
Simple Functional Encryption Schemes for Inner Products. 17 - Jintai Ding, Alexei Miasnikov, Alexander Ushakov:
A Linear Attack on a Key Exchange Protocol Using Extensions of Matrix Semigroups. 18 - Gilles Barthe, Edvard Fagerholm, Dario Fiore, Andre Scedrov, Benedikt Schmidt, Mehdi Tibouchi:
Strongly-Optimal Structure Preserving Signatures from Type II Pairings: Synthesis and Lower Bounds. 19 - Phong Q. Nguyen, Jiang Zhang, Zhenfeng Zhang:
Simpler Efficient Group Signatures from Lattices. 20 - Xin Li:
Non-Malleable Condensers for Arbitrary Min-Entropy, and Almost Optimal Protocols for Privacy Amplification. 21 - Bo Yang, Dengguo Feng, Yu Qin, Yingjun Zhang, Weijin Wang:
TMSUI: A Trust Management Scheme of USB Storage Devices for Industrial Control Systems. 22 - Chunsheng Gu:
Multilinear Maps Using Ideal Lattices without Encodings of Zero. 23 - Evgeni Begelfor, Stephen D. Miller, Ramarathnam Venkatesan:
Non-Abelian Analogs of Lattice Rounding. 24 - Benny Applebaum, Zvika Brakerski:
Obfuscating Circuits via Composite-Order Graded Encoding. 25 - Adam D. Smith, Ye Zhang:
On the Regularity of Lossy RSA: Improved Bounds and Applications to Padding-Based Encryption. 27 - Jeremy Maitin-Shepard:
Optimal software-implemented Itoh-Tsujii inversion for GF(2m). 28 - Sergey Gorbunov, Vinod Vaikuntanathan, Hoeteck Wee:
Predicate Encryption for Circuits from LWE. 29 - Christoph Dobraunig, Maria Eichlseder, Florian Mendel, Martin Schläffer:
Cryptanalysis of Ascon. 30 - Kai-Min Chung, Rafael Pass:
Tight Parallel Repetition Theorems for Public-Coin Arguments using KL-divergence. 31 - Zvika Brakerski, Vinod Vaikuntanathan:
Constrained Key-Homomorphic PRFs from Standard Lattice Assumptions Or: How to Secretly Embed a Circuit in Your PRF. 32 - Christoph Dobraunig, Maria Eichlseder, Stefan Mangard, Florian Mendel:
On the Security of Fresh Re-keying to Counteract Side-Channel and Fault Attacks. 33 - Hannes Groß, Erich Wenger, Christoph Dobraunig, Christoph Ehrenhöfer:
Suit up! Made-to-Measure Hardware Implementations of Ascon. 34 - Elena Dubrova, Mats Näslund, Göran Selander, Fredrik Lindqvist:
Cryptographically Secure CRC for Lightweight Message Authentication. 35 - Billy Bob Brumley:
Faster software for fast endomorphisms. 36 - Da-Zhi Sun, Zahra Ahmadian, Yue-Jiao Wang, Mahmoud Salmasizadeh, Mohammad Reza Aref:
Analysis and Enhancement of Desynchronization Attack on an Ultralightweight RFID Authentication Protocol. 37 - Aloni Cohen, Shafi Goldwasser, Vinod Vaikuntanathan:
Aggregatable Pseudorandom Functions and Connections to Learning. 38 - Véronique Cortier, Fabienne Eigner, Steve Kremer, Matteo Maffei, Cyrille Wiedling:
Type-Based Verification of Electronic Voting Protocols. 39 - Zahra Ahmadian, Shahram Rasoolzadeh, Mahmoud Salmasizadeh, Mohammad Reza Aref:
Automated Dynamic Cube Attack on Block Ciphers: Cryptanalysis of SIMON and KATAN. 40 - Artur Mariano, Thijs Laarhoven, Christian H. Bischof:
Parallel (probable) lock-free HashSieve: a practical sieving algorithm for the SVP. 41 - Rachid El Bansarkhani, Johannes Buchmann:
High Performance Lattice-based CCA-secure Encryption. 42 - Ai Ishida, Keita Emura, Goichiro Hanaoka, Yusuke Sakai, Keisuke Tanaka:
Group Signature with Deniability: How to Disavow a Signature. 43 - Binanda Sengupta, Abhijit Das:
Use of SIMD-Based Data Parallelism to Speed up Sieving in Integer-Factoring Algorithms. 44 - Valentina Banciu, Elisabeth Oswald, Carolyn Whitnall:
Reliable Information Extraction for Single Trace Attacks. 45 - Martin R. Albrecht, Rachel Player, Sam Scott:
On the concrete hardness of Learning with Errors. 46 - Guilhem Castagnos, Fabien Laguillaumie:
Linearly Homomorphic Encryption from DDH. 47 - Ran Canetti, Yael Tauman Kalai, Omer Paneth:
On Obfuscation with Random Oracles. 48 - Sonia Bogos, Florian Tramèr, Serge Vaudenay:
On Solving Lpn using BKW and Variants. 49 - Carla Ràfols:
Stretching Groth-Sahai: NIZK Proofs of Partial Satisfiability. 50 - Li Lin, Wenling Wu:
Improved Meet-in-the-Middle Distinguisher on Feistel Schemes. 51 - Mihir Bellare, Sriram Keelveedhi:
Interactive Message-Locked Encryption and Secure Deduplication. 52 - Peter Gazi, Krzysztof Pietrzak, Stefano Tessaro:
Tight Bounds for Keyed Sponges and Truncated CBC. 53 - Brett Hemenway, Rafail Ostrovsky, Alon Rosen:
Non-committing encryption from Φ-hiding. 54 - Vladimir Kolesnikov, Payman Mohassel, Ben Riva, Mike Rosulek:
Richer Efficiency/Security Trade-offs in 2PC. 55 - Alexandre Duc, Florian Tramèr, Serge Vaudenay:
Better Algorithms for LWE and LWR. 56 - Bertram Poettering, Dale L. Sibborn:
Cold Boot Attacks in the Discrete Logarithm Setting. 57 - Berry Schoenmakers, Meilof Veeningen:
Universally Verifiable Multiparty Computation from Threshold Homomorphic Cryptosystems. 58 - Alexandra Boldyreva, Jean Paul Degabriele, Kenneth G. Paterson, Martijn Stam:
Security of Symmetric Encryption in the Presence of Ciphertext Fragmentation. 59 - Gilles Barthe, Sonia Belaïd, François Dupressoir, Pierre-Alain Fouque, Benjamin Grégoire, Pierre-Yves Strub:
Verified Proofs of Higher-Order Masking. 60 - Gilad Asharov, Yehuda Lindell, Thomas Schneider, Michael Zohner:
More Efficient Oblivious Transfer Extensions with Security for Malicious Adversaries. 61 - Yuval Yarom, Gefei Li, Damith Chinthana Ranasinghe:
Evaluation and Cryptanalysis of the Pandaka Lightweight Cipher. 62 - Ryad Benadjila, Thomas Calderon, Marion Daubignard:
CamlCrush: A PKCS\#11 Filtering Proxy. 63 - Handan Kilinç, Alptekin Küpçü:
Optimally Efficient Multi-Party Fair Exchange and Fair Secure Multi-Party Computation. 64 - Andrey Dmukh, Denis Dygin, Grigory B. Marshalko:
A lightweight-friendly modifcation of GOST block cipher. 65 - Tobias Schneider, Amir Moradi, Tim Güneysu:
Arithmetic Addition over Boolean Masking - Towards First- and Second-Order Resistance in Hardware. 66 - Susumu Kiyoshima:
An Alternative Approach to Non-black-box Simulation in Fully Concurrent Setting. 67 - Gregor Leander, Brice Minaud, Sondre Rønjom:
A Generic Approach to Invariant Subspace Attacks: Cryptanalysis of Robin, iSCREAM and Zorro. 68 - Benoit Cogliati, Yannick Seurin:
On the Provable Security of the Iterated Even-Mansour Cipher against Related-Key and Chosen-Key Attacks. 69 - Gaëtan Leurent, Lei Wang:
The Sum Can Be Weaker Than Each Part. 70 - Jean-Sébastien Coron, Jean-Charles Faugère, Guénaël Renault, Rina Zeitoun:
Factoring N=pr qs for Large r and s. 71 - Olivier Blazy, Céline Chevalier, Damien Vergnaud:
Non-Interactive Zero-Knowledge Proofs of Non-Membership. 72 - Dana Dachman-Soled, Chang Liu, Charalampos Papamanthou, Elaine Shi, Uzi Vishkin:
Oblivious Network RAM. 73 - Gilles Barthe, Juan Manuel Crespo, Yassine Lakhnech, Benedikt Schmidt:
Mind the Gap: Modular Machine-checked Proofs of One-Round Key Exchange Protocols. 74 - Jian Guo, Yu Sasaki, Lei Wang, Meiqin Wang, Long Wen:
Equivalent Key Recovery Attacks against HMAC and NMAC with Whirlpool Reduced to 7 Rounds. 75 - Masayuki Abe, Markulf Kohlweiss, Miyako Ohkubo, Mehdi Tibouchi:
Fully Structure-Preserving Signatures and Shrinking Commitments. 76 - Yuwei Xu, Chuankun Wu:
On the Existence and Constructions of Vectorial Boolean Bent Functions. 77 - Chun-Xiang Gu, Dan Xin, Yonghui Zheng, Yuanji Kang:
Fully Homomorphic Encryption from Ring-LWE:Identity-Based,Arbitrary Cyclotomic,Tighter Parameters. 78 - Jiqiang Lu:
On the Security of the COPA and Marble Authenticated Encryption Algorithms against (Almost) Universal Forgery Attack. 79 - Feng Hao, Xun Yi, Liqun Chen, Siamak Fayyaz Shahandashti:
The Fairy-Ring Dance: Password Authenticated Key Exchange in a Group. 80 - Yan Huang, Jonathan Katz, Vladimir Kolesnikov, Ranjit Kumaresan, Alex J. Malozemoff:
Amortizing Garbled Circuits. 81 - Ihsan Haluk Akin, Berk Sunar:
On the Difficulty of Securing Web Applications using CryptDB. 82 - Massimo Chenal, Qiang Tang:
Key Recovery Attack against an NTRU-type Somewhat Homomorphic Encryption Scheme. 83 - Zhengjun Cao, Lihua Liu:
On the Disadvantages of Pairing-based Cryptography. 84 - Anne Canteaut, Joëlle Roué:
On the behaviors of affine equivalent Sboxes regarding differential and linear attacks. 85 - Patrick Märtens:
Practical Compact E-Cash with Arbitrary Wallet Size. 86 - David Derler, Christian Hanser, Daniel Slamanig:
Revisiting Cryptographic Accumulators, Additional Properties and Relations to other Primitives. 87 - Klaus Kursawe, Christiane Peters:
Structural Weaknesses in the Open Smart Grid Protocol. 88 - Thomas Eisenbarth, Aaron Meyerowitz, Rainer Steinwandt:
On the security margin of MAC striping. 89 - Yosuke Todo:
Structural Evaluation by Generalized Integral Property. 90 - Christoph Dobraunig, Maria Eichlseder, Florian Mendel:
Related-Key Forgeries for Prøst-OTR. 91 - Grasha Jacob, A. Murugan, Irine Viola:
Towards the Generation of a Dynamic Key-Dependent S-Box to Enhance Security. 92 - Murat Cenk, M. Anwar Hasan:
Some New Results on Binary Polynomial Multiplication. 94 - Dmitry Khovratovich, Ivica Nikolic, Josef Pieprzyk, Przemyslaw Sokolowski, Ron Steinfeld:
Rotational Cryptanalysis of ARX Revisited. 95 - Riham AlTawy, Amr M. Youssef:
Meet in the Middle Attacks on Reduced Round Kuznyechik. 96 - Bruce Schneier, Matthew Fredrikson, Tadayoshi Kohno, Thomas Ristenpart:
Surreptitiously Weakening Cryptographic Systems. 97 - Shantian Cheng, Juanyang Zhang:
Adaptive-ID Secure Revocable Identity-Based Encryption from Lattices via Subset Difference Method. 98 - Dirk Achenbach, Jörn Müller-Quade, Jochen Rill:
Universally Composable Firewall Architectures using Trusted Hardware. 99 - Christian Wittke, Zoya Dyka, Peter Langendörfer:
Influence of Electrical Circuits of ECC Designs on Shape of Electromagnetic Traces measured on FPGA. 100 - Nicky Mouha, Atul Luykx:
Multi-Key Security: The Even-Mansour Construction Revisited. 101 - Shay Gueron, Yehuda Lindell:
GCM-SIV: Full Nonce Misuse-Resistant Authenticated Encryption at Under One Cycle per Byte. 102 - Vincenzo Iovino, Karol Zebrowski:
Mergeable Functional Encryption. 103 - Rafael Dowsley, Jörn Müller-Quade, Tobias Nilges:
Weakening the Isolation Assumption of Tamper-proof Hardware Tokens. 104 - Josep Balasch, Sebastian Faust, Benedikt Gierlichs:
Inner Product Masking Revisited. 105 - Yara Elias, Kristin E. Lauter, Ekin Ozman, Katherine E. Stange:
Provably weak instances of Ring-LWE. 106 - Attila Altay Yavuz, Jorge Guajardo:
Dynamic Searchable Symmetric Encryption with Minimal Leakage and Efficient Updates on Commodity Hardware. 107 - Lucjan Hanzlik, Przemyslaw Kubiak, Miroslaw Kutylowski:
Tracing Attacks on U-Prove with Revocation Mechanism. 108 - Shijun Zhao, Qianying Zhang:
sHMQV: An Efficient Key Exchange Protocol for Power-limited Devices. 110 - Steven D. Galbraith, Barak Shani:
The Multivariate Hidden Number Problem. 111 - Satsuya Ohata, Yutaka Kawai, Takahiro Matsuda, Goichiro Hanaoka, Kanta Matsuura:
Re-encryption Verifiability: How to Detect Malicious Activities of a Proxy in Proxy Re-encryption. 112 - Anne Canteaut, Sergiu Carpov, Caroline Fontaine, Tancrède Lepoint, María Naya-Plasencia, Pascal Paillier, Renaud Sirdey:
How to Compress Homomorphic Ciphertexts. 113 - Shai Halevi, William Eric Hall, Charanjit S. Jutla, Arnab Roy:
Weak Ideal Functionalities for Designing Random Oracles with Applications to Fugue. 114 - Muhammad Yasir Malik:
Comprehensive Efficient Implementations of ECC on C54xx Family of Low-cost Digital Signal Processors. 115 - Riadh Brinci, Walid Khmiri, Mefteh Mbarek, Abdellatif Ben Rabaa, Ammar Bouallègue:
Efficient Hardware Design for Computing Pairings Using Few FPGA In-built DSPs. 116 - Maciej Skorski:
Nonuniform Indistinguishability and Unpredictability Hardcore Lemmas: New Proofs and Applications to Pseudoentropy. 117 - Takahiro Matsuda, Goichiro Hanaoka:
Constructing and Understanding Chosen Ciphertext Security via Puncturable Key Encapsulation Mechanisms. 118 - Alexandre Duc, Sebastian Faust, François-Xavier Standaert:
Making Masking Security Proofs Concrete Or How to Evaluate the Security of any Leaking Device. 119 - Debapriya Basu Roy, Shivam Bhasin, Sylvain Guilley, Jean-Luc Danger, Debdeep Mukhopadhyay:
Reconfigurable LUT: Boon or Bane for Secure Applications. 120 - Travis Mayberry, Erik-Oliver Blass, Guevara Noubir:
Multi-User Oblivious RAM Secure Against Malicious Servers. 121 - Siwei Sun, Lei Hu, Meiqin Wang, Peng Wang, Kexin Qiao, Xiaoshuang Ma, Danping Shi, Ling Song, Kai Fu:
Constructing Mixed-integer Programming Models whose Feasible Region is Exactly the Set of All Valid Differential Characteristics of SIMON. 122 - Dennis Hofheinz, Jessica Koch, Christoph Striecks:
Identity-based encryption with (almost) tight security in the multi-instance, multi-ciphertext setting. 123 - Alexander Wild, Amir Moradi, Tim Güneysu:
GliFreD: Glitch-Free Duplication - Towards Power-Equalized Circuits on FPGAs. 124 - Aloni Cohen, Justin Holmgren:
Multilinear Pseudorandom Functions. 125 - Nir Bitansky, Omer Paneth, Daniel Wichs:
Perfect Structure on the Edge of Chaos. 126 - Ricardo Dahab, Steven D. Galbraith, Eduardo Morais:
Adaptive key recovery attacks on NTRU-based somewhat homomorphic encryption schemes. 127 - Takashi Yamakawa, Shota Yamada, Goichiro Hanaoka, Noboru Kunihiro:
Self-bilinear Map on Unknown Order Groups from Indistinguishability Obfuscation and Its Applications. 128 - Nishanth Chandran, Vipul Goyal, Pratyay Mukherjee, Omkant Pandey, Jalaj Upadhyay:
Block-wise Non-Malleable Codes. 129 - Sune K. Jakobsen, Claudio Orlandi:
How to Bootstrap Anonymous Communication. 130 - Frederik Armknecht, Vasily Mikhalev:
On Lightweight Stream Ciphers with Shorter Internal States. 131 - Jung Hee Cheon, Miran Kim, Kristin E. Lauter:
Homomorphic Computation of Edit Distance. 132 - Kristin E. Lauter, Adriana López-Alt, Michael Naehrig:
Private Computation on Encrypted Genomic Data. 133 - Pierre Karpman:
From Related-Key Distinguishers to Related-Key-Recovery on Even-Mansour Constructions. 134 - Bernardo David, Ryo Nishimaki, Samuel Ranellucci, Alain Tapp:
Generalizing Efficient Multiparty Computation. 135 - Marcos A. Simplício Jr., Leonardo C. Almeida, Ewerton R. Andrade, Paulo C. F. dos Santos, Paulo S. L. M. Barreto:
Lyra2: Password Hashing Scheme with improved security against time-memory trade-offs. 136 - Mikhail Strizhov, Indrajit Ray:
Multi-keyword Similarity Search Over Encrypted Cloud Data. 137 - Vikram Singh:
A Practical Key Exchange for the Internet using Lattice Cryptography. 138 - Donghoon Chang, Arpan Jati, Sweta Mishra, Somitra Kumar Sanadhya:
Performance Analysis of Some Password Hashing Schemes. 139 - Neal Koblitz, Alfred Menezes:
The Random Oracle Model: A Twenty-Year Retrospective. 140 - Céline Blondeau, Marine Minier:
Analysis of Impossible, Integral and Zero-Correlation Attacks on Type-II Generalized Feistel Networks using the Matrix Method. 141 - S. Dov Gordon, Jonathan Katz, Feng-Hao Liu, Elaine Shi, Hong-Sheng Zhou:
Multi-Client Verifiable Computation with Stronger Security Guarantees. 142 - Erich Wenger, Paul Wolfger:
Harder, Better, Faster, Stronger - Elliptic Curve Discrete Logarithm Computations on FPGAs. 143 - Tyge Tiessen, Lars R. Knudsen, Stefan Kölbl, Martin M. Lauridsen:
Security of the AES with a Secret S-box. 144 - Stefan Kölbl, Gregor Leander, Tyge Tiessen:
Observations on the SIMON block cipher family. 145 - Itai Dinur, Orr Dunkelman, Nathan Keller, Adi Shamir:
New Attacks on Feistel Structures with Improved Memory Complexities. 146 - Lionel Rivière, Zakaria Najm, Pablo Rauzy, Jean-Luc Danger, Julien Bringer, Laurent Sauvage:
High Precision Fault Injections on the Instruction Cache of ARMv7-M Architectures. 147 - Yossef Oren, Ahmad-Reza Sadeghi, Christian Wachsmann:
On the Effectiveness of the Remanence Decay Side-Channel to Clone Memory-based PUFs. 148 - Jian Guo, Yu Sasaki, Lei Wang, Shuang Wu:
Cryptanalysis of HMAC/NMAC-Whirlpool. 149 - Tobias Pulls, Roel Peeters:
Insynd: Privacy-Preserving Secure One-Way Messaging Using Balloons. 150 - Daniel J. Bernstein, Andreas Hülsing, Tanja Lange, Ruben Niederhagen:
Bad directions in cryptographic hash functions. 151 - Ronan Lashermes, Jacques J. A. Fournier, Louis Goubin:
Inverting the Final exponentiation of Tate pairings on ordinary elliptic curves using faults. 152 - Kai-Min Chung, Jonathan Katz, Hong-Sheng Zhou:
Functional Encryption from (Small) Hardwae Tokens. 153 - Daniel Genkin, Yuval Ishai, Manoj Prabhakaran, Amit Sahai, Eran Tromer:
Circuits Resilient to Additive Attacks with Applications to Secure Computation. 154 - Loi Luu, Ratul Saha, Inian Parameshwaran, Prateek Saxena, Aquinas Hobor:
On Power Splitting Games in Distributed Computation: The Case of Bitcoin Pooled Mining. 155 - Brett Hemenway, Rafail Ostrovsky:
Building Lossy Trapdoor Functions from Lossy Encryption. 156 - Nuttapong Attrapadung, Shota Yamada:
Duality in ABE: Converting Attribute Based Encryption for Dual Predicate and Dual Policy via Computational Encodings. 157 - Zvika Brakerski, Ilan Komargodski, Gil Segev:
From Single-Input to Multi-Input Functional Encryption in the Private-Key Setting. 158 - Shengbao Wu, Hongjun Wu, Tao Huang, Mingsheng Wang, Wenling Wu:
Leaked-State-Forgery Attack Against The Authenticated Encryption Algorithm ALE. 159 - Tao Huang, Ivan Tjuawinata, Hongjun Wu:
Differential-Linear Cryptanalysis of ICEPOLE. 160 - Valentina Banciu, Elisabeth Oswald, Carolyn Whitnall:
Exploring the Resilience of Some Lightweight Ciphers Against Pro led Single Trace Attacks. 161 - Jean-Sébastien Coron, Tancrède Lepoint, Mehdi Tibouchi:
New Multilinear Maps over the Integers. 162 - Nir Bitansky, Vinod Vaikuntanathan:
Indistinguishability Obfuscation from Functional Encryption. 163 - Priyanka Bose, Dipanjan Das, C. Pandu Rangan:
Constant Size Ring Signature Without Random Oracle. 164 - Benny Applebaum:
The Cryptographic Hardness of Random Local Functions - Survey. 165 - Jeremiah Blocki, Manuel Blum, Anupam Datta:
Naturally Rehearsing Passwords. 166 - Saikrishna Badrinarayanan, Eric Miles, Amit Sahai, Mark Zhandry:
Post-Zeroizing Obfuscation: The case of Evasive Circuits. 167 - Claude Carlet:
More PS and H-like bent functions. 168 - Daniel R. L. Brown:
Short Schnorr signatures require a hash function with more than just random-prefix resistance. 169 - Daniel Genkin, Lev Pachmanov, Itamar Pipman, Eran Tromer:
Stealing Keys from PCs using a Radio: Cheap Electromagnetic Attacks on Windowed Exponentiation. 170 - Benjamin Dowling, Douglas Stebila, Greg Zaverucha:
Authenticated Network Time Synchronization. 171 - Aria Shahverdi, Mostafa Taha, Thomas Eisenbarth:
Silent Simon: A Threshold Implementation under 100 Slices. 172 - Prabhanjan Ananth, Abhishek Jain:
Indistinguishability Obfuscation from Compact Functional Encryption. 173 - Chenyang Tu, Neng Gao, Zeyi Liu, Lei Wang, Zongbin Liu, Bingke Ma:
A Practical Chosen Message Power Analysis Method on the Feistel-SP ciphers with Applications to CLEFIA and Camellia. 174 - Tomer Ashur, Bart Mennink:
Trivial Nonce-Misusing Attack on Pure OMD. 175 - Kim Laine, Kristin E. Lauter:
Key Recovery for LWE in Polynomial Time. 176 - B. R. Purushothama, Nishat Koti:
On the Security of an Efficient Group Key Agreement Scheme for MANETs. 177 - Pablo Azar, Shafi Goldwasser, Sunoo Park:
How to Incentivize Data-Driven Collaboration Among Competing Parties. 178 - Palash Sarkar, Shashank Singh:
A Simple Method for Obtaining Relations Among Factor Basis Elements for Special Hyperelliptic Curves. 179 - Abhishek Banerjee, Georg Fuchsbauer, Chris Peikert, Krzysztof Pietrzak, Sophie Stevens:
Key-Homomorphic Constrained Pseudorandom Functions. 180 - Bing Sun, Zhiqiang Liu, Vincent Rijmen, Ruilin Li, Lei Cheng, Qingju Wang, Hoda Alkhzaimi, Chao Li:
Links among Impossible Differential, Integral and Zero Correlation Linear Cryptanalysis. 181 - Rodolphe Lampe, Yannick Seurin:
Tweakable Blockciphers with Asymptotically Optimal Security. 182 - Céline Blondeau, Kaisa Nyberg:
New Links Between Differential and Linear Cryptanalysis. 183 - Céline Blondeau, Kaisa Nyberg:
Links Between Truncated Differential and Multidimensional Linear Properties of Block Ciphers and Underlying Attack Complexities. 184 - Elena Dubrova, Mats Näslund, Gunnar Carlsson, John Fornehed, Ben J. M. Smeets:
Remotely Managed Logic Built-In Self-Test for Secure M2M Communications. 185 - Sourav Das, Subhamoy Maitra, Willi Meier:
Higher Order Differential Analysis of NORX. 186 - Juan A. Garay, Jonathan Katz, Björn Tackmann, Vassilis Zikas:
How Fair is Your Protocol? A Utility-based Approach to Protocol Optimality. 187 - Fabrice Benhamouda, Olivier Blazy, Céline Chevalier, David Pointcheval, Damien Vergnaud:
New Techniques for SPHFs and Efficient One-Round PAKE Protocols. 188 - Viet Tung Hoang, Reza Reyhanitabar, Phillip Rogaway, Damian Vizár:
Online Authenticated-Encryption and its Nonce-Reuse Misuse-Resistance. 189 - Seung Geol Choi, Jonathan Katz, Ranjit Kumaresan, Carlos Cid:
Multi-Client Non-Interactive Verifiable Computation. 190 - Xiao Shaun Wang, Chang Liu, Kartik Nayak, Yan Huang, Elaine Shi:
iDASH Secure Genome Analysis Competition Using ObliVM. 191 - Sylvain Duquesne, Loubna Ghammam:
Memory-saving computation of the pairing fi nal exponentiation on BN curves. 192 - Karim Bigou, Arnaud Tisserand:
Improving Modular Inversion in RNS using the Plus-Minus Method. 193 - Dario Catalano, Dario Fiore:
Practical Homomorphic MACs for Arithmetic Circuits. 194 - Stephanie Bayer, Jens Groth:
Zero-knowledge Argument for Polynomial Evaluation with Application to Blacklists. 195 - Michel Abdalla, Fabrice Benhamouda, David Pointcheval:
Tighter Reductions for Forward-Secure Signature Schemes. 196 - N. Nalla Anandakumar:
SCA Resistance Analysis of MAC-PHOTON. 197 - Pascal Sasdrich, Oliver Mischke, Amir Moradi, Tim Güneysu:
Side-Channel Protection by Randomizing Look-Up Tables on Reconfigurable Hardware - Pitfalls of Memory Primitives. 198 - Amir Moradi, Gesine Hinterwälder:
Side-Channel Security Analysis of Ultra-Low-Power FRAM-based MCUs. 199 - Alexander Wild, Amir Moradi, Tim Güneysu:
Evaluating the Duplication of Dual-Rail Precharge Logics on FPGAs. 200 - Akbar Mahmoodi Rishakani, Seyed Mojtaba Dehnavi, M. R. Mirzaee Shamsabad, Hamidreza Maimani, Einollah Pasha:
Statistical Properties of Multiplication mod 2n. 201 - Shafi Goldwasser, Yael Tauman Kalai, Sunoo Park:
Adaptively Secure Coin-Flipping, Revisited. 202 - Pascal Sasdrich, Amir Moradi, Oliver Mischke, Tim Güneysu:
Achieving Side-Channel Protection with Dynamic Logic Reconfiguration on Modern FPGAs. 203 - Michel Abdalla, Sonia Belaïd, Pierre-Alain Fouque:
Leakage-Resilient Symmetric Encryption via Re-keying. 204 - Jooyoung Lee:
Towards Key-Length Extension with Optimal Security: Cascade Encryption and Xor-cascade Encryption. 205 - Bren Cavallo, Giovanni Di Crescenzo, Delaram Kahrobaei, Vladimir Shpilrain:
Efficient and Secure Delegation of Group Exponentiation to a Single Server. 206 - Tobias Schneider, Amir Moradi:
Leakage Assessment Methodology - a clear roadmap for side-channel evaluations. 207 - Ioana Boureanu, Aikaterini Mitrokotsa, Serge Vaudenay:
Towards Secure Distance Bounding. 208 - Daniel Dinu, Yann Le Corre, Dmitry Khovratovich, Léo Perrin, Johann Großschädl, Alex Biryukov:
Triathlon of Lightweight Block Ciphers for the Internet of Things. 209 - Chenglu Jin, Marten van Dijk:
Secure and Efficient Initialization and Authentication Protocols for SHIELD. 210 - Thijs Laarhoven, Benne de Weger:
Faster sieving for shortest lattice vectors using spherical locality-sensitive hashing. 211 - Christof Beierle, Philipp Jovanovic, Martin M. Lauridsen, Gregor Leander, Christian Rechberger:
Analyzing Permutations for AES-like Ciphers: Understanding ShiftRows. 212 - Javier Herranz:
Attribute-Based Versions of Schnorr and ElGamal. 213 - Yuichi Niwa, Keisuke Ohashi, Kazuhiko Minematsu, Tetsu Iwata:
GCM Security Bounds Reconsidered. 214 - Amadou Moctar Kane:
A revocable anonymity in Tor. 215 - Eike Kiltz, Hoeteck Wee:
Quasi-Adaptive NIZK for Linear Subspaces Revisited. 216 - Subhamoy Maitra, Goutam Paul, Willi Meier:
Salsa20 Cryptanalysis: New Moves and Revisiting Old Styles. 217 - Qinglong Wang:
Efficient k-out-of-n oblivious transfer protocol. 218 - Prakruti C, Sashank Dara, V. N. Muralidhara:
Efficient Format Preserving Encrypted Databases. 219 - Dan Boneh, Kevin Lewi, Hart William Montgomery, Ananth Raghunathan:
Key Homomorphic PRFs and Their Applications. 220 - Daniel J. Bernstein, Tanja Lange, Christine van Vredendaal:
Tighter, faster, simpler side-channel security evaluations beyond computing power. 221 - Elena Andreeva, Andrey Bogdanov, Bart Mennink:
Towards Understanding the Known-Key Security of Block Ciphers. 222 - Anubhab Baksi, Subhamoy Maitra, Santanu Sarkar:
New Distinguishers for Reduced Round Trivium and Trivia-SC using Cube Testers. 223 - Matteo Maffei, Giulio Malavolta, Manuel Reinert, Dominique Schröder:
Privacy and Access Control for Outsourced Personal Records. 224 - Ben Fisch, Daniel Freund, Moni Naor:
Secure Physical Computation using Disposable Circuits. 226 - Alex Biryukov, Dmitry Khovratovich:
Tradeoff Cryptanalysis of Memory-Hard Functions. 227 - Konrad Durnoga, Tomasz Kazana, Michal Zajac, Maciej Zdanowicz:
Leakage-Resilient Cryptography with Key Derived from Sensitive Data. 228 - Reza Hooshmand, Taraneh Eghlidos, Mohammad Reza Aref:
Improving GGH Public Key Scheme Using Low Density Lattice Codes. 229 - Der-Yeuan Yu, Aanjhan Ranganathan, Ramya Jayaram Masti, Claudio Soriente, Srdjan Capkun:
W-SPS: Designing a Wide-Area Secure Positioning System. 230 - Yonglin Hao:
A Related-Key Chosen-IV Distinguishing Attack on Full Sprout Stream Cipher. 231 - Virginie Lallemand, María Naya-Plasencia:
Cryptanalysis of Full Sprout. 232 - Ben Smyth, Steven Frink, Michael R. Clarkson:
Computational Election Verifiability: Definitions and an Analysis of Helios and JCJ. 233 - Megha Agrawal, Donghoon Chang, Mohona Ghosh, Somitra Kumar Sanadhya:
Collision Attack on 4-branch, Type-2 GFN based Hash Functions using Sliced Biclique Cryptanalysis Technique. 234 - Mashael AlSabah, Ian Goldberg:
Performance and Security Improvements for Tor: A Survey. 235 - Subhamoy Maitra, Santanu Sarkar, Anubhab Baksi, Pramit Dey:
Key Recovery from State Information of Sprout: Application to Cryptanalysis and Fault Attack. 236 - Wouter Lueks, Gergely Alpár, Jaap-Henk Hoepman, Pim Vullers:
Fast Revocation of Attribute-Based Credentials for Both Users and Verifiers. 237 - Konrad Durnoga, Stefan Dziembowski, Tomasz Kazana, Michal Zajac:
One Time Programs with Limited Memory. 238 - Patrick Derbez, Léo Perrin:
Meet-in-the-Middle Attacks and Structural Analysis of Round-Reduced PRINCE. 239 - Alex Biryukov, Patrick Derbez, Léo Perrin:
Differential Analysis and Meet-in-the-Middle Attack against Round-Reduced TWINE. 240 - Elena Dubrova, Martin Hell:
Espresso: A Stream Cipher for 5G Wireless Communication Systems. 241 - Benoît Libert, Thomas Peters, Marc Joye, Moti Yung:
Compactly Hiding Linear Spans: Tightly Secure Constant-Size Simulation-Sound QA-NIZK Proofs and Applications. 242 - Aris Pagourtzis, Giorgos Panagiotakos, Dimitris Sakavalas:
Reliable Message Transmission under Partial Knowledge. 243 - Jérémy Jean, Ivica Nikolic:
Internal Differential Boomerangs: Practical Analysis of the Round-Reduced Keccak-f Permutation. 244 - Pawel Morawiecki:
Practical Attacks on the Round-reduced PRINCE. 245 - Fabrice Benhamouda, Geoffroy Couteau, David Pointcheval, Hoeteck Wee:
Implicit Zero-Knowledge Arguments and Applications to the Malicious Setting. 246 - Paulo S. L. M. Barreto, Craig Costello, Rafael Misoczki, Michael Naehrig, C. C. F. Pereira Geovandro, Gustavo H. M. Zanon:
Subgroup security in pairing-based cryptography. 247 - Ryo Nishimaki, Keita Xagawa:
Verifiably Encrypted Signatures with Short Keys based on the Decisional Linear Problem and Obfuscation for Encrypted VES. 248 - Keita Xagawa:
Improved (Hierarchical) Inner-Product Encryption from Lattices. 249 - Junji Shikata:
Design and Analysis of Information-Theoretically Secure Authentication Codes with Non-Uniformly Random Keys. 250 - Kaoru Kurosawa, Yasuhiro Ohtaki:
How to Construct UC-Secure Searchable Symmetric Encryption Scheme. 251 - Haiyan Wang, Jianghua Zhong, Dongdai Lin:
Linearization of Multi-valued Nonlinear Feedback Shift Registers. 252 - Haiyan Wang, Dongdai Lin:
Stability and Linearization of Multi-valued Nonlinear Feedback Shift Registers. 253 - Pouyan Sepehrdad, Petr Susil, Serge Vaudenay, Martin Vuagnoux:
Tornado Attack on RC4 with Applications to WEP & WPA. 254 - David Bernhard, Véronique Cortier, David Galindo, Olivier Pereira, Bogdan Warinschi:
A comprehensive analysis of game-based ballot privacy definitions. 255 - Yang Lu, Quanling Zhang, Jiguo Li:
Cryptanalysis of Three Certificate-Based Authenticated Key Agreement Protocols and a Secure Construction. 256 - Vadim Lyubashevsky, Thomas Prest:
Quadratic Time, Linear Space Algorithms for Gram-Schmidt Orthogonalization and Gaussian Sampling in Structured Lattices. 257 - Siang Meng Sim, Khoongming Khoo, Frédérique E. Oggier, Thomas Peyrin:
Lightweight MDS Involution Matrices. 258 - Patrick Derbez, Pierre-Alain Fouque:
Exhausting Demirci-Selçuk Meet-in-the-Middle Attacks against Reduced-Round AES. 259 - Paul Bottinelli, Joppe W. Bos:
Computational Aspects of Correlation Power Analysis. 260 - Joseph Bonneau, Andrew Miller, Jeremy Clark, Arvind Narayanan, Joshua A. Kroll, Edward W. Felten:
Research Perspectives and Challenges for Bitcoin and Cryptocurrencies. 261 - Hanno Böck:
A look at the PGP ecosystem through the key server data. 262 - Ethan Heilman, Alison Kendler, Aviv Zohar, Sharon Goldberg:
Eclipse Attacks on Bitcoin's Peer-to-Peer Network. 263 - Justine Sherry, Chang Lan, Raluca Ada Popa, Sylvia Ratnasamy:
BlindBox: Deep Packet Inspection over Encrypted Traffic. 264 - George Hatzivasilis, Ioannis Papaefstathiou, Charalampos Manifavas:
Password Hashing Competition - Survey and Benchmark. 265 - Xianrui Meng, Seny Kamara, Kobbi Nissim, George Kollios:
GRECS: Graph Encryption for Approximate Shortest Distance Queries. 266 - Tung Chou, Claudio Orlandi:
The Simplest Protocol for Oblivious Transfer. 267 - Itai Dinur, Orr Dunkelman, Masha Gutman, Adi Shamir:
Improved Top-Down Techniques in Differential Cryptanalysis. 268 - Chunsheng Gu:
Ideal Multilinear Maps Based on Ideal Lattices. 269 - Markus Dichtl:
Fibonacci Ring Oscillators as True Random Number Generators - A Security Risk. 270 - Mariya Georgieva, Frédéric de Portzamparc:
Toward Secure Implementation of McEliece Decryption. 271 - Baodong Qin, Shengli Liu:
Leakage-Flexible CCA-secure Public-Key Encryption: Simple Construction and Free of Pairing. 272 - Hoeteck Wee:
Dual System Encryption via Predicate Encodings. 273 - Gizem S. Çetin, Yarkin Doröz, Berk Sunar, Erkay Savas:
Low Depth Circuits for Efficient Homomorphic Sorting. 274 - Takanori Yasuda, Xavier Dahan, Yun-Ju Huang, Tsuyoshi Takagi, Kouichi Sakurai:
MQ Challenge: Hardness Evaluation of Solving Multivariate Quadratic Problems. 275 - Binglong Chen, Chang-An Zhao:
An Improvment of the Elliptic Net Algorithm. 276 - Marco Tomamichel, Serge Fehr, Jedrzej Kaniewski, Stephanie Wehner:
One-Sided Device-Independent QKD and Position-based Cryptography from Monogamy Games. 277 - Sébastien Canard, David Pointcheval, Olivier Sanders:
Efficient Delegation of Zero-Knowledge Proofs of Knowledge in a Pairing-Friendly Setting. 278 - Jérémy Jean, María Naya-Plasencia, Thomas Peyrin:
Improved Cryptanalysis of AES-like Permutations. 279 - Jonathan Katz, Aishwarya Thiruvengadam, Hong-Sheng Zhou:
Feasibility and Infeasibility of Adaptively Secure Fully Homomorphic Encryption. 280 - Vinod Vaikuntanathan, Prashant Nalini Vasudevan:
From Statistical Zero Knowledge to Secret Sharing. 281 - Arash Afshar, Payman Mohassel, Benny Pinkas, Ben Riva:
Non-Interactive Secure Computation Based on Cut-and-Choose. 282 - Esha Ghosh, Michael T. Goodrich, Olga Ohrimenko, Roberto Tamassia:
Fully-Dynamic Verifiable Zero-Knowledge Order Queries for Network Data. 283 - Binglong Chen, Chuangqiang Hu, Chang-An Zhao:
A Note on Scalar Multiplication Using Division Polynomials. 284 - Tomer Ashur:
Improved Linear Trails for the Block Cipher Simon. 285 - Zhan Chen, Ning Wang, Xiaoyun Wang:
Impossible Differential Cryptanalysis of Reduced Round SIMON. 286 - John M. Schanck, William Whyte, Zhenfei Zhang:
A quantum-safe circuit-extension handshake for Tor. 287 - Aydin Aysu, Patrick Schaumont:
Precomputation Methods for Faster and Greener Post-Quantum Cryptography on Emerging Embedded Platforms. 288 - Muhammed F. Esgin, Orhun Kara:
Practical Cryptanalysis of Full Sprout with TMD Tradeoff Attacks. 289 - Joseph A. Akinyele, Christina Garman, Susan Hohenberger:
Automating Fast and Secure Translations from Type-I to Type-III Pairing Schemes. 290 - Takeshi Sugawara, Daisuke Suzuki, Minoru Saeki:
Two Operands of Multipliers in Side-Channel Attack. 291 - Shlomi Dolev, Yin Li:
Secret Shared Random Access Machine. 292 - Pratish Datta, Ratna Dutta, Sourav Mukhopadhyay:
Fully Secure Unbounded Revocable Attribute-Based Encryption in Prime Order Bilinear Groups via Subset Difference Method. 293 - Erdinç Öztürk, Yarkin Doröz, Berk Sunar, Erkay Savas:
Accelerating Somewhat Homomorphic Evaluation using FPGAs. 294 - Ralf Küsters, Tomasz Truderung:
Security Analysis of Re-Encryption RPC Mix Nets. 295 - Emil Lerner:
The Uniform Distribution of Sequences Generated by Iteration of Polynomials. 296 - Junzuo Lai, Robert H. Deng, Shengli Liu, Jian Weng, Yunlei Zhao:
Identity-Based Encryption Secure Against Selective Opening Chosen-Ciphertext Attack. 297 - Yongge Wang:
Secure Random Linear Code Based Public Key Encryption Scheme RLCE. 298 - Zhengjun Cao, Lihua Liu:
A Note on the Lindell-Waisbard Private Web Search Scheme. 299 - Sébastien Canard, David Pointcheval, Olivier Sanders, Jacques Traoré:
Scalable Divisible E-cash. 300 - Yupu Hu, Huiwen Jia:
Cryptanalysis of GGH Map. 301 - Reza Reyhanitabar, Serge Vaudenay, Damian Vizár:
Boosting OMD for Almost Free Authentication of Associated Data. 302 - Nicky Mouha:
The Design Space of Lightweight Cryptography. 303 - Joshua Baron, Karim El Defrawy, Joshua Lampkins, Rafail Ostrovsky:
Communication-Optimal Proactive Secret Sharing for Dynamic Groups. 304 - Jonas Schneider, Dominique Schröder:
Foundations of Reconfigurable PUFs (Full Version). 305 - Morris Dworkin, Ray A. Perlner:
Analysis of VAES3 (FF2). 306 - Sanjam Garg, Steve Lu, Rafail Ostrovsky:
Black-Box Garbled RAM. 307 - Patrick McCorry, Siamak Fayyaz Shahandashti, Dylan Clarke, Feng Hao:
Authenticated Key Exchange over Bitcoin. 308 - Tore Kasper Frederiksen, Thomas P. Jakobsen, Jesper Buus Nielsen, Roberto Trifiletti:
TinyLEGO: An Interactive Garbling Scheme for Maliciously Secure Two-party Computation. 309 - Igor A. Semaev:
New algorithm for the discrete logarithm problem on elliptic curves. 310 - Masayuki Abe, Bernardo David, Markulf Kohlweiss, Ryo Nishimaki, Miyako Ohkubo:
Tagged One-Time Signatures: Tight Security and Optimal Tag Size. 311 - Pierre-Alain Fouque, Thomas Vannet:
Improving Key Recovery to 784 and 799 rounds of Trivium using Optimized Cube Attacks. 312 - Ronald Cramer, Léo Ducas, Chris Peikert, Oded Regev:
Recovering Short Generators of Principal Ideals in Cyclotomic Rings. 313 - Qihong Yu, Jiguo Li, Yichen Zhang, Wei Wu, Xinyi Huang, Yang Xiang:
Certificate-Based Encryption Resilient to Key Leakage. 314 - Grégory Demay, Peter Gazi, Ueli Maurer, Björn Tackmann:
Query-Complexity Amplification for Random Oracles. 315 - Zhengan Huang, Shengli Liu, Xianping Mao, Kefei Chen:
Non-malleability under Selective Opening Attacks: Implication and Separation. 316 - Marcin Andrychowicz, Daniel Masny, Edoardo Persichetti:
Leakage-Resilient Cryptography over Large Finite Fields: Theory and Practice. 317 - Patrick Märtens:
Practical Divisible E-Cash. 318 - Koray Karabina:
Point Decomposition Problem in Binary Elliptic Curves. 319 - James Alderman, Christian Janson, Carlos Cid, Jason Crampton:
Hybrid Publicly Verifiable Computation. 320 - (Withdrawn) Size-Hiding in Private Set Intersection: what can be done and how to do it without random oracles. 321
- Peeter Laud, Alisa Pankova:
Transformation-Based Outsourcing of Linear Equation Systems over Real Numbers. 322 - (Withdrawn) Efficient, Pairing-Free, One Round Attribute-Based Authenticated Key Exchange. 323
- Divesh Aggarwal, Alexander Golovnev:
A Note on Lower Bounds for Non-interactive Message Authentication Using Weak Keys. 324 - Yuval Ishai, Rafail Ostrovsky, Vassilis Zikas:
Secure Multi-Party Computation with Identifiable Abort. 325 - Saeideh Kabirirad, Hamideh Hajiabadi:
Cryptanalysis Of An Authenticated Image Encryption Scheme Based On Chaotic Maps And Memory Cellular Automata. 326 - Subhadeep Banik:
Some results on Sprout. 327 - Xiaopeng Yang, Wenping Ma:
Strongly Secure Authenticated Key Exchange from Ideal Lattices. 328 - Dieter Schmidt:
PAGES - A Family of Block Ciiphers. 329 - Tarun Kumar Bansal, Donghoon Chang, Somitra Kumar Sanadhya:
Sponge based CCA2 secure asymmetric encryption for arbitrary length message. 330 - Megha Agrawal, Donghoon Chang, Somitra Kumar Sanadhya:
A New Authenticated Encryption Technique for Handling Long Ciphertexts in Memory Constrained Devices. 331 - Sumit Chakraborty:
Security Intelligence for Broadcast : Threat Analytics. 332 - Johannes Krupp, Dominique Schröder, Mark Simkin, Dario Fiore, Giuseppe Ateniese, Stefan Nürnberger:
Nearly Optimal Verifiable Data Streaming (Full Version). 333 - Ran Canetti, Yilei Chen, Leonid Reyzin:
On the Correlation Intractability of Obfuscated Pseudorandom Functions. 334 - Janaka Alawatugoda, Colin Boyd, Douglas Stebila:
Continuous After-the-fact Leakage-Resilient eCK-secure Key Exchange. 335 - Benny Applebaum, Jonathan Avron, Christina Brzuska:
Arithmetic Cryptography. 336 - Sujoy Sinha Roy, Kimmo Järvinen, Frederik Vercauteren, Vassil S. Dimitrov, Ingrid Verbauwhede:
Modular Hardware Architecture for Somewhat Homomorphic Function Evaluation. 337 - Amadou Moctar Kane:
Cryptanalysis of a fair anonymity for the tor network. 338 - Berry Schoenmakers, Meilof Veeningen:
Guaranteeing Correctness in Privacy-Friendly Outsourcing by Certificate Validation. 339 - Santanu Sarkar:
A New Distinguisher on Grain v1 for 106 rounds. 340 - Gilad Asharov, Gil Segev:
Limits on the Power of Indistinguishability Obfuscation and Functional Encryption. 341 - Yan Zhu, Xin Wang, Di Ma, Ruiqi Guo:
Identity-Set-based Broadcast Encryption supporting "Cut-or-Select" with Short Ciphertext. 342 - Michael Düll, Björn Haase, Gesine Hinterwälder, Michael Hutter, Christof Paar, Ana Helena Sánchez, Peter Schwabe:
High-speed Curve25519 on 8-bit, 16-bit, and 32-bit microcontrollers. 343 - Ryo Nishimaki, Daniel Wichs:
Watermarking Cryptographic Programs Against Arbitrary Removal Strategies. 344 - Pratyay Mukherjee, Daniel Wichs:
Two Round MPC from LWE via Multi-Key FHE. 345 - Aggelos Kiayias, Thomas Zacharias, Bingsheng Zhang:
End-to-End Verifiable Elections in the Standard Model∗. 346 - Riham AlTawy, Onur Duman, Amr M. Youssef:
Fault Analysis of Kuznyechik. 347 - Andreas Gornik, Amir Moradi, Jürgen Oehm, Christof Paar:
A Hardware-based Countermeasure to Reduce Side-Channel Leakage - Design, Implementation, and Evaluation. 348 - Chang Liu, Liehuang Zhu, Jinjun Chen:
Efficient Searchable Symmetric Encryption for Storing Multiple Source Data on Cloud. 349 - Florian Mendel, Tomislav Nad, Martin Schläffer:
Improving Local Collisions: New Attacks on Reduced SHA-256. 350 - Mohammad Etemad, Alptekin Küpçü:
Database Outsourcing with Hierarchical Authenticated Data Structures. 351 - Pavel Raykov:
Broadcast from Minicast Secure Against General Adversaries. 352 - Paz Morillo, Carla Ràfols, Jorge L. Villar:
Matrix Computational Assumptions in Multilinear Groups. 353 - Jacek Samotyja, Kerstin Lemke-Rust, Markus Ullmann:
SEMA and MESD Leakage of TinyECC 2.0 on a LOTUS Sensor Node. 354 - Tommaso Gagliardoni, Andreas Hülsing, Christian Schaffner:
Semantic Security and Indistinguishability in the Quantum World. 355 - Nir Bitansky, Sanjam Garg, Huijia Lin, Rafael Pass, Sidharth Telang:
Succinct Randomized Encodings and their Applications. 356 - Ming Li, Yupeng Jiang, Dongdai Lin:
A Group-theory Method to The Cycle Structures of Feedback Shift Registers. 357 - Yun-Ju Huang, Christophe Petit, Naoyuki Shinohara, Tsuyoshi Takagi:
On Generalized First Fall Degree Assumptions. 358 - Jean-Sébastien Coron, Emmanuel Prouff, Matthieu Rivain, Thomas Roche:
Higher-Order Side Channel Security and Mask Refreshing. 359 - Yanqing Yao, Zhoujun Li:
Achieving Differential Privacy with Bias-Control Limited Source. 360 - Dominique Unruh:
Computationally binding quantum commitments. 361 - Claude Crépeau, Raza Ali Kazmi:
Oblivious Transfer from weakly Random Self-Reducible Public-Key Cryptosystem. 362 - Bart Mennink:
Optimally Secure Tweakable Blockciphers. 363 - Qiang Tang, Jun Wang:
Privacy-preserving Context-aware Recommender Systems: Analysis and New Solutions. 364 - Masoumeh Safkhani, Nasour Bagheri, Mehdi Hosseinzadeh, Mojtaba Eslamnezhad Namin, Samad Rostampour:
On the (im)possibility of receiving security beyond 2l using an l-bit PRNG: the case of Wang et. al. protocol. 365 - Arjen K. Lenstra, Benjamin Wesolowski:
A random zoo: sloth, unicorn, and trx. 366 - Achiya Bar-On:
Improved Higher-Order Differential Attacks on MISTY1. 367 - Evgeny Sidorov:
Breaking the Rabin-Williams digital signature system implementation in the Crypto++ library. 368 - Nir Bitansky, Omer Paneth:
On Non-Black-Box Simulation and the Impossibility of Approximate Obfuscation. 369 - Sumit Chakraborty:
Financial Cryptography: Discriminatory Pricing Mechanism. 370 - S. Dov Gordon, Feng-Hao Liu, Elaine Shi:
Constant-Round MPC with Fairness and Guarantee of Output Delivery. 371 - Jérémy Jean, Ivica Nikolic, Thomas Peyrin, Lei Wang, Shuang Wu:
Security Analysis of PRINCE. 372 - Aloni Cohen, Justin Holmgren, Vinod Vaikuntanathan:
Publicly Verifiable Software Watermarking. 373 - Christoph Bader, Tibor Jager, Yong Li, Sven Schäge:
On the Impossibility of Tight Cryptographic Reductions. 374 - Daniel R. L. Brown:
Bounds on surmising remixed keys. 375 - Raza Ali Kazmi:
Cryptography from Post-Quantum Assumptions. 376 - Alessandro Chiesa, Eran Tromer, Madars Virza:
Cluster Computing in Zero Knowledge. 377 - Fatemeh Ganji, Shahin Tajik, Jean-Pierre Seifert:
PAC Learning of Arbiter PUFs. 378 - Jingwei Li, Anna Cinzia Squicciarini, Dan Lin, Smitha Sundareswaran, Chunfu Jia:
MMBcloud-tree: Authenticated Index for Verifiable Cloud Service Selection. 379 - Céline Blondeau, Aslí Bay, Serge Vaudenay:
Protecting against Multidimensional Linear and Truncated Differential Cryptanalysis by Decorrelation. 380 - Sumit Chakraborty:
Financial Cryptography: Algorithmic Mechanisms for a Hedonic Game. 381 - Thomas Pöppelmann, Tobias Oder, Tim Güneysu:
Speed Records for Ideal Lattice-Based Cryptography on AVR. 382 - Rafael Pass, Abhi Shelat:
Impossibility of VBB Obfuscation with Ideal Constant-Degree Graded Encodings. 383 - Maciej Skorski, Alexander Golovnev, Krzysztof Pietrzak:
Condensed Unpredictability. 384 - Serge Fehr, Jonathan Katz, Fang Song, Hong-Sheng Zhou, Vassilis Zikas:
Feasibility and Completeness of Cryptographic Tasks in the Quantum World. 385 - David J. Wu, Tony Feng, Michael Naehrig, Kristin E. Lauter:
Privately Evaluating Decision Trees and Random Forests. 386 - Scott Contini:
Method to Protect Passwords in Databases for Web Applications. 387 - Ran Canetti, Justin Holmgren:
Fully Succinct Garbled RAM. 388 - Guido Bertoni, Joan Daemen, Michaël Peeters, Gilles Van Assche:
Keccak. 389 - Nuttapong Attrapadung:
Dual System Encryption Framework in Prime-Order Groups. 390 - Deepesh Data, Manoj Prabhakaran, Vinod M. Prabhakaran:
On the Communication Complexity of Secure Computation. 391 - Christoph Dobraunig, Maria Eichlseder, Florian Mendel:
Forgery Attacks on round-reduced ICEPOLE-128. 392 - Mohammad Hossein Faghihi Sereshgi, Mohammad Dakhilalian, Mohsen Shakiba:
Biclique cryptanalysis of MIBS-80 and PRESENT-80. 393 - Christian Badertscher, Christian Matt, Ueli Maurer, Phillip Rogaway, Björn Tackmann:
Augmented Secure Channels and the Goal of the TLS 1.3 Record Layer. 394 - Nils Fleischhacker, Johannes Krupp, Giulio Malavolta, Jonas Schneider, Dominique Schröder, Mark Simkin:
Efficient Unlinkable Sanitizable Signatures from Signatures with Rerandomizable Keys. 395 - Dario Catalano, Dario Fiore, Rosario Gennaro, Luca Nizzardo:
Generalizing Homomorphic MACs for Arithmetic Circuits. 396 - Peter Gazi, Jooyoung Lee, Yannick Seurin, John P. Steinberger, Stefano Tessaro:
Relaxing Full-Codebook Security: A Refined Analysis of Key-Length Extension Schemes. 397 - Abderrahmane Nitaj, Tajjeeddine Rachidi:
Factoring RSA moduli with weak prime factors. 398 - Abderrahmane Nitaj, Tajjeeddine Rachidi:
New attacks on RSA with Moduli N=prq. 399 - Stephen R. Tate, Roopa Vishwanathan:
Expiration and Revocation of Keys for Attribute-based Signatures. 400 - Eike Kiltz, Daniel Masny, Krzysztof Pietrzak:
Simple Chosen-Ciphertext Security from Low-Noise LPN. 401 - Adrian Thillard, Emmanuel Prouff, Thomas Roche:
Success through confidence: Evaluating the effectiveness of a side-channel attack. 402 - Mehrdad Nojoumian, Douglas R. Stinson:
Sequential Secret Sharing as a New Hierarchical Access Structure. 403 - Esha Ghosh, Olga Ohrimenko, Dimitrios Papadopoulos, Roberto Tamassia, Nikos Triandopoulos:
Zero-Knowledge Accumulators and Set Operations. 404 - Dana Dachman-Soled, Nils Fleischhacker, Jonathan Katz, Anna Lysyanskaya, Dominique Schröder:
Feasibility and Infeasibility of Secure Computation with Malicious PUFs. 405 - Yu-Chi Chen, Sherman S. M. Chow, Kai-Min Chung, Russell W. F. Lai, Wei-Kai Lin, Hong-Sheng Zhou:
Computation-Trace Indistinguishability Obfuscation and its Applications. 406 - Christoph Dobraunig, Maria Eichlseder, Florian Mendel:
Higher-order cryptanalysis of LowMC. 407 - Franck Rondepierre:
Revisiting Atomic Patterns for Scalar Multiplications on Elliptic Curves. 408 - Jie Chen, Romain Gay, Hoeteck Wee:
Improved Dual System ABE in Prime-Order Groups via Predicate Encodings. 409 - Zhe Liu, Hwajeong Seo, Sujoy Sinha Roy, Johann Großschädl, Howon Kim, Ingrid Verbauwhede:
Efficient Ring-LWE Encryption on 8-bit AVR Processors. 410 - Pei Luo, Yunsi Fei, Xin Fang, A. Adam Ding, David R. Kaeli, Miriam Leeser:
Side-Channel Analysis of MAC-Keccak Hardware Implementations. 411 - Máté Horváth:
Survey on Cryptographic Obfuscation. 412 - Shashank Agrawal, Melissa Chase:
A study of Pair Encodings: Predicate Encryption in prime order groups. 413 - Mridul Nandi:
On the Optimality of Non-Linear Computations of Length-Preserving Encryption Schemes. 414 - Markku-Juhani O. Saarinen:
STRIBOB / WHIRLBOB Security Analysis Addendum. 415 - Mayank Varia, Sophia Yakoubov, Yang Yang:
HETest: A Homomorphic Encryption Testing Framework. 416 - Mark Bun, Mark Zhandry:
Order-Revealing Encryption and the Hardness of Private Learning. 417 - Itai Dinur, Yunwen Liu, Willi Meier, Qingju Wang:
Optimized Interpolation Attacks on LowMC. 418 - Yasser Shoukry, Paul D. Martin, Paulo Tabuada, Mani B. Srivastava:
Non-invasive Spoofing Attacks for Anti-lock Braking Systems. 419 - Vipul Goyal, Divya Gupta, Abhishek Jain:
What Information is Leaked under Concurrent Composition? 420 - Zhe Liu, Husen Wang, Johann Großschädl, Zhi Hu, Ingrid Verbauwhede:
VLSI Implementation of Double-Base Scalar Multiplication on a Twisted Edwards Curve with an Efficiently Computable Endomorphism. 421 - Marina Blanton, Fattaneh Bayatbabolghani:
Efficient Server-Aided Secure Two-Party Function Evaluation with Applications to Genomic Computation. 422 - Santosh Ghosh, Amit Kumar, Amitabh Das, Ingrid Verbauwhede:
On the Implementation of Unified Arithmetic on Binary Huff Curves. 423 - Begül Bilgin, Andrey Bogdanov, Miroslav Knezevic, Florian Mendel, Qingju Wang:
FIDES: Lightweight Authenticated Cipher with Side-Channel Resistance for Constrained Hardware. 424 - Stefan Heyse, Ingo von Maurich, Tim Güneysu:
Smaller Keys for Code-Based Cryptography: QC-MDPC McEliece Implementations on Embedded Devices. 425 - Alex Biryukov, Ivica Nikolic:
Complementing Feistel Ciphers. 426 - Mudit Bhargava, Ken Mai:
A High Reliability PUF Using Hot Carrier Injection Based Response Reinforcement. 427 - Philipp Jovanovic, Samuel Neves:
Dumb Crypto in Smart Grids: Practical Cryptanalysis of the Open Smart Grid Protocol. 428 - Ivica Nikolic, Lei Wang, Shuang Wu:
Cryptanalysis of Round-Reduced LED. 429 - Alex Biryukov, Daniel Dinu, Dmitry Khovratovich:
Fast and Tradeoff-Resilient Memory-Hard Functions for Cryptocurrencies and Password Hashing. 430 - Shota Yamada, Nuttapong Attrapadung, Goichiro Hanaoka:
Conversions among Several Classes of Predicate Encryption and Their Applications. 431 - (Withdrawn) Non-Repudiable Provable Data Possession in Cloud Storage. 432
- Wentao Zhang, Zhenzhen Bao, Vincent Rijmen, Meicheng Liu:
A New Classification of 4-bit Optimal S-boxes and its Application to PRESENT, RECTANGLE and SPONGENT. 433 - Pascale Charpin, Sihem Mesnager, Sumanta Sarkar:
Dickson Polynomials that are Involutions. 434 - Yusong Du, Baodian Wei, Fangguo Zhang, Huang Zhang:
On the (Fast) Algebraic Immunity of Boolean Power Functions. 435 - Yusong Du, Baodian Wei, Fangguo Zhang, Huang Zhang:
On the Resistance of Prime-variable Rotation Symmetric Boolean Functions against Fast Algebraic Attacks. 436 - Bryan Parno:
A Note on the Unsoundness of vnTinyRAM's SNARK. 437 - Ralf Küsters, Tomasz Truderung, Bernhard Beckert, Daniel Bruns, Michael Kirsten, Martin Mohr:
A Hybrid Approach for Proving Noninterference of Java Programs. 438 - Vipul Goyal, Abhishek Jain:
On Concurrently Secure Computation in the Multiple Ideal Query Model. 439 - Martín Abadi, Dan Boneh, Ilya Mironov, Ananth Raghunathan, Gil Segev:
Message-Locked Encryption for Lock-Dependent Messages. 440 - Devu Manikantan Shila, Vivek Venugopalan, Cameron D. Patterson:
Enhancing Trust in Reconfigurable Based Hardware Systems with Tags and Monitors. 441 - Zoya Dyka, Thomas Basmer, Christian Wittke, Peter Langendörfer:
Individualizing Electrical Circuits of Cryptographic Devices as a Means to Hinder Tampering Attacks. 442 - Xiaolin Xu, Ulrich Rührmair, Daniel E. Holcomb, Wayne P. Burleson:
Security Evaluation and Enhancement of Bistable Ring PUFs. 443 - Mridul Nandi:
Revisiting Security Claims of XLS and COPA. 444 - Mridul Nandi:
XLS is not a Strong Pseudorandom Permutation. 445 - Ronald Cramer, Ivan Damgård, Marcel Keller:
On the Amortized Complexity of Zero-knowledge Protocols. 446 - Zhenqi Li, Bin Zhang, Junfeng Fan, Ingrid Verbauwhede:
A New Model for Error-Tolerant Side-Channel Cube Attacks. 447 - Yupu Hu, Huiwen Jia:
A Comment on Gu Map-1. 448 - Ruoxin Zhao, Rui Zhang, Yongqiang Li, Baofeng Wu:
On Constructions of a Sort of MDS Block Diffusion Matrices for Block Ciphers and Hash Functions. 449 - Carmit Hazay, Yehuda Lindell, Arpita Patra:
Adaptively Secure Computation with Partial Erasures. 450 - Sihong Su, Xiaohu Tang:
On the Systematic Constructions of Rotation Symmetric Bent Functions with Any Possible Algebraic Degrees. 451 - Nicolas Bruneau, Sylvain Guilley, Annelie Heuser, Olivier Rioul:
Masks will Fall Off - Higher-Order Optimal Distinguishers. 452 - Yupu Hu, Huiwen Jia:
An Optimization of Gu Map-1. 453 - Oscar García Morchon, Ronald Rietman, Sahil Sharma, Ludo Tolhuizen, Jose Luis Torre-Arce:
A comprehensive and lightweight security architecture to secure the IoT throughout the lifecycle of a device based on HIMMO. 454 - Jian Liu, N. Asokan, Benny Pinkas:
Secure Deduplication of Encrypted Data without Additional Independent Servers. 455 - Iraklis Symeonidis, Filipe Beato, Pagona Tsormpatzoudi, Bart Preneel:
Collateral damage of Facebook Apps: an enhanced privacy scoring model. 456 - Mridul Nandi, Tapas Pandit:
Generic Conversions from CPA to CCA secure Functional Encryption. 457 - Sheena Sathyan, Ramaswamy Swarnammal Shaji:
A Hybrid Approach for the Secure Transmission of H.264/AVC Video Streams. 458 - Bing Sun, Xin Hai, Wenyu Zhang, Lei Cheng, Zhichao Yang:
New Observation on Division Property. 459 - Kevin Delmolino, Mitchell Arnett, Ahmed E. Kosba, Andrew Miller, Elaine Shi:
Step by Step Towards Creating a Safe Smart Contract: Lessons and Insights from a Cryptocurrency Lab. 460 - Jung Hee Cheon, Changmin Lee:
Cryptanalysis of the multilinear map on the ideal lattices. 461 - Wei Dai, Yarkin Doröz, Berk Sunar:
Accelerating SWHE based PIRs using GPUs. 462 - (Withdrawn) Multilinear Maps Using Random Matrix. 463
- Florian Tschorsch, Björn Scheuermann:
Bitcoin and Beyond: A Technical Survey on Decentralized Digital Currencies. 464 - Hwajeong Seo, Zhe Liu, Johann Großschädl, Howon Kim:
Efficient Arithmetic on ARM-NEON and Its Application for High-Speed RSA Implementation. 465 - Tanping Zhou, Xiaoyuan Yang, Wei Zhang, Liqiang Wu:
Efficient Fully Homomorphic Encryption with Circularly Secure Key Switching Process. 466 - Marcel Keller:
The Oblivious Machine - or: How to Put the C into MPC. 467 - Dongxi Liu:
Practical Fully Homomorphic Encryption without Noise Reduction. 468 - Andrew Miller, Rob Jansen:
Shadow-Bitcoin: Scalable Simulation via Direct Execution of Multi-threaded Applications. 469 - Vincenzo Iovino, Qiang Tang, Karol Zebrowski:
On the Power of Public-key Functional Encryption with Function Privacy. 470 - Yansong Gao, Damith Chinthana Ranasinghe, Gefei Li, Said F. Al-Sarawi, Omid Kavehei, Derek Abbott:
A Challenge Obfuscation Method for Thwarting Model Building Attacks on PUFs. 471 - Sai Sheshank Burra, Enrique Larraia, Jesper Buus Nielsen, Peter Sebastian Nordholt, Claudio Orlandi, Emmanuela Orsini, Peter Scholl, Nigel P. Smart:
High Performance Multi-Party Computation for Binary Circuits Based on Oblivious Transfer. 472 - Mehak Khurana, Meena Kumari:
VARIANTS OF DIFFERENTIAL AND LINEAR CRYPTANALYSIS. 473 - Masahiro Yagisawa:
Fully Homomorphic Encryption without bootstrapping. 474 - Eleonora Guerrini, Laurent Imbert, Théo Winterhalter:
Randomizing Scalar Multiplication Using Exact Covering Systems of Congruences. 475 - Bart Mennink:
XPX: Generalized Tweakable Even-Mansour with Improved Security Guarantees. 476 - John Preuß Mattsson:
Authentication Key Recovery in Galois/Counter Mode (GCM). 477 - (Withdrawn) How to Build Time-Lock Encryption. 478
- Martianus Frederic Ezerman, Hyung Tae Lee, San Ling, Khoa Nguyen, Huaxiong Wang:
A Provably Secure Group Signature Scheme from Code-Based Assumptions. 479 - Berry Schoenmakers, Meilof Veeningen, Niels de Vreede:
Trinocchio: Privacy-Friendly Outsourcing by Distributed Verifiable Computation. 480 - Theodosis Mourouzis, Guangyan Song, Nicolas T. Courtois, Michalis Christofi:
Advanced Differential Cryptanalysis of Reduced-Round SIMON64/128 Using Large-Round Statistical Distinguishers. 481 - Jia Liu, Saqib A. Kakvi, Bogdan Warinschi:
Extractable Witness Encryption and Timed-Release Encryption from Bitcoin. 482 - Shi Bai, Adeline Langlois, Tancrède Lepoint, Damien Stehlé, Ron Steinfeld:
Improved security proofs in lattice-based cryptography: using the Rényi divergence rather than the statistical distance. 483 - Jian Guo, Jérémy Jean, Nicky Mouha, Ivica Nikolic:
More Rounds, Less Security? 484 - Elena Andreeva, Guy Barwell, Dan Page, Martijn Stam:
Turning Online Ciphers Off. 485 - Jiangshan Yu, Mark Ryan, Cas Cremers:
How to detect unauthorised usage of a key. 486 - Mihir Bellare, Igors Stepanovs, Stefano Tessaro:
Contention in Cryptoland: Obfuscation, Leakage and UCE. 487 - Carmit Hazay, Muthuramakrishnan Venkitasubramaniam:
On Black-Box Complexity of Universally Composable Security in the CRS model. 488 - Trinabh Gupta, Natacha Crooks, Srinath T. V. Setty, Lorenzo Alvisi, Michael Walfish:
Scalable and private media consumption with Popcorn. 489 - Sonam Devgan Kaul, Amit K. Awasthi:
Cryptanalysis Of Dynamic ID Based Remote User Authentication Scheme With Key Agreement. 490 - Nishanth Chandran, Melissa Chase, Feng-Hao Liu, Ryo Nishimaki, Keita Xagawa:
Re-encryption, functional re-encryption, and multi-hop re-encryption: A framework for achieving obfuscation-based security and instantiations from lattices. 491 - Vincent Grosso, François-Xavier Standaert, Sebastian Faust:
Masking vs. Multiparty Computation: How Large is the Gap for AES? 492 - Sikhar Patranabis, Abhishek Chakraborty, Debdeep Mukhopadhyay:
Fault Tolerant Infective Countermeasure for AES. 493 - (Withdrawn) Cryptanalysis of the LSH and SHA-V Hash Functions. 494
- Sondre Rønjom:
Powers of Subfield Polynomials and Algebraic Attacks on Word-Based Stream Ciphers. 495 - Arthur Gervais, Hubert Ritzdorf, Mario Lucic, Srdjan Capkun:
Quantifying Location Privacy Leakage from Transaction Prices. 496 - Zhangxiang Hu, Payman Mohassel, Mike Rosulek:
Efficient Zero-Knowledge Proofs of Non-Algebraic Statements with Sublinear Amortized Cost. 497 - Jiajun Zhang, Haining Fan:
Low Space Complexity CRT-based Bit-Parallel GF(2n) Polynomial Basis Multipliers for Irreducible Trinomials. 498 - Dennis Hofheinz:
Algebraic partitioning: Fully compact and (almost) tightly secure cryptography. 499 - Alberto Battistello, Christophe Giraud:
Fault Cryptanalysis of CHES 2014 Symmetric Infective Countermeasure. 500 - Serge Fehr, Max Fillinger:
Multi-Prover Commitments Against Non-Signaling Attacks. 501 - George Danezis, Sarah Meiklejohn:
Centrally Banked Cryptocurrencies. 502 - Kristian Gjøsteen, Anders Smedstuen Lund:
The Norwegian Internet Voting Protocol: A new Instantiation. 503 - Brice Minaud, Yannick Seurin:
The Iterated Random Permutation Problem with Applications to Cascade Encryption. 504 - Razvan Barbulescu, Pierrick Gaudry, Thorsten Kleinjung:
The Tower Number Field Sieve. 505 - Gilles Barthe, Sonia Belaïd, François Dupressoir, Pierre-Alain Fouque, Benjamin Grégoire:
Compositional Verification of Higher-Order Masking: Application to a Verifying Masking Compiler. 506 - Itai Dinur, Orr Dunkelman, Thorsten Kranz, Gregor Leander:
Decomposing the ASASA Block Cipher Construction. 507 - Santanu Sarkar, Prakash Dey, Avishek Adhikari, Subhamoy Maitra:
Probabilistic Signature Based Framework for Differential Fault Analysis of Stream Ciphers. 508 - Daniel R. L. Brown:
A flaw in a theorem about Schnorr signatures. 509 - Gideon Samid:
Equivoe-T: Transposition Equivocation Cryptography. 510 - Baris Ege, Thomas Eisenbarth, Lejla Batina:
Near Collision Side Channel Attacks. 511 - Sami Saab, Andrew Leiserson, Michael Tunstall:
Efficient Key Extraction from the Primary Side of a Switched-Mode Power Supply. 512 - Aurore Guillevic:
Computing Individual Discrete Logarithms Faster in GF(pn). 513 - Nir Bitansky, Shafi Goldwasser, Abhishek Jain, Omer Paneth, Vinod Vaikuntanathan, Brent Waters:
Time-Lock Puzzles from Randomized Encodings. 514 - Thomas Espitau, Pierre-Alain Fouque, Pierre Karpman:
Higher-Order Differential Meet-in-The-Middle Preimage Attacks on SHA-1 and BLAKE. 515 - Brice Minaud, Patrick Derbez, Pierre-Alain Fouque, Pierre Karpman:
Key-Recovery Attacks on ASASA. 516 - Giuseppe Ateniese, Bernardo Magri, Daniele Venturi:
Subversion-Resilient Signature Schemes. 517 - Ren Zhang:
Broadcasting Intermediate Blocks as a Defense Mechanism Against Selfish-Mine in Bitcoin. 518 - Yongge Wang:
Notes on Two Fully Homomorphic Encryption Schemes Without Bootstrapping. 519 - Suvradip Chakraborty, Srinivasan Raghuraman, C. Pandu Rangan:
Efficient, Pairing-Free, One Round Attribute-Based Authenticated Key Exchange. 520 - Sergey Gorbunov, Silvio Micali:
Democoin: A Publicly Verifiable and Jointly Serviced Cryptocurrency. 521 - Anja Becker, Nicolas Gama, Antoine Joux:
Speeding-up lattice sieving without increasing the memory, using sub-quadratic nearest neighbor search. 522 - Yehuda Lindell, Benny Pinkas, Nigel P. Smart, Avishay Yanai:
Efficient Constant Round Multi-Party Computation Combining BMR and SPDZ. 523 - Yansong Gao:
Secure Key Exchange Protocol based on Virtual Proof of Reality. 524 - David Pointcheval, Olivier Sanders:
Short Randomizable Signatures. 525 - Takanori Isobe, Kyoji Shibutani:
Generic Key Recovery Attack on Feistel Scheme. 526 - Carolyn Whitnall, Elisabeth Oswald:
Robust Profiling for DPA-Style Attacks. 527 - Sunoo Park, Krzysztof Pietrzak, Albert Kwon, Joël Alwen, Georg Fuchsbauer, Peter Gazi:
Spacemint: A Cryptocurrency Based on Proofs of Space. 528 - Colin O'Flynn, Zhizhang Chen:
Power Analysis Attacks against IEEE 802.15.4 Nodes. 529 - Pierre Karpman, Thomas Peyrin, Marc Stevens:
Practical Free-Start Collision Attacks on 76-step SHA-1. 530 - Mohammad Hajiabadi, Bruce M. Kapron:
Reproducible Circularly-Secure Bit Encryption: Applications and Realizations. 531 - Xiaoshuang Ma, Kexin Qiao:
Related-Key Rectangle Attack on Round-reduced Khudra Block Cipher. 533 - Sergey Agievich, Anastasiya Gorodilova, Nikolay Kolomeec, Svetla Nikova, Bart Preneel, Vincent Rijmen, George Shushuev, Natalia N. Tokareva, Valeriya Vitkup:
Problems, solutions and experience of the first international student's Olympiad in cryptography. 534 - Vincent Grosso, François-Xavier Standaert:
ASCA, SASCA and DPA with Enumeration: Which One Beats the Other and When? 535 - François Durvaux, François-Xavier Standaert:
From Improved Leakage Detection to the Detection of Points of Interests in Leakage Traces. 536 - François Durvaux, François-Xavier Standaert:
Towards Easy Leakage Certification. 537 - Sarita Agrawal, Jay Patel, Manik Lal Das:
Pairing Based Mutual Healing in Wireless Sensor Networks. 538 - Benoit Cogliati, Rodolphe Lampe, Yannick Seurin:
Tweaking Even-Mansour Ciphers. 539 - (Withdrawn) PICO: An Ultra lightweight and Low power encryption design for pervasive computing. 540
- Bart Mennink, Reza Reyhanitabar, Damian Vizár:
Security of Full-State Keyed and Duplex Sponge: Applications to Authenticated Encryption. 541 - Sonia Belaïd, Jean-Sébastien Coron, Pierre-Alain Fouque, Benoît Gérard, Jean-Gabriel Kammerer, Emmanuel Prouff:
Improved Side-Channel Analysis of Finite-Field Multiplication. 542 - Moni Naor, Eylon Yogev:
Bloom Filters in Adversarial Environments. 543 - Daniel R. L. Brown:
Alternative cubics' rules with an algebraic appeal. 544 - Qinglong Zhang, Zongbin Liu, Cunqing Ma, Changting Li, Jiwu Jing:
FROPUF: How to Extract More Entropy from Two Ring Oscillators in FPGA-Based PUFs. 545 - Marcel Keller, Emmanuela Orsini, Peter Scholl:
Actively Secure OT Extension with Optimal Overhead. 546 - Xiao Wang, S. Dov Gordon, Allen McIntosh, Jonathan Katz:
Secure Computation of MIPS Machine Code. 547 - Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz:
Message Transmission with Reverse Firewalls - Secure Communication on Corrupted Machines. 548 - Amir Hassani Karbasi, Reza Ebrahimi Atani:
ILTRU: An NTRU-Like Public Key Cryptosystem Over Ideal Lattices. 549 - Charanjit S. Jutla:
Upending Stock Market Structure Using Secure Multi-Party Computation. 550 - Anne Broadbent, Stacey Jeffery:
Quantum homomorphic encryption for circuits of low T-gate complexity. 551 - Paul Kirchner, Pierre-Alain Fouque:
An Improved BKW Algorithm for LWE with Applications to Cryptography and Lattices. 552 - Rafail Ostrovsky, Silas Richelson, Alessandra Scafuro:
Round-Optimal Black-Box Two-Party Computation. 553 - Michel Abdalla, Fabrice Benhamouda, Alain Passelègue:
An Algebraic Framework for Pseudorandom Functions and Applications to Related-Key Security. 554 - Tapas Pandit, Sumit Kumar Pandey, Rana Barua:
Attribute-Based Signcryption : Signer Privacy, Strong Unforgeability and IND-CCA2 Security in Adaptive-Predicates Attack. 555 - Sujoy Sinha Roy, Kimmo Järvinen, Ingrid Verbauwhede:
Lightweight Coprocessor for Koblitz Curves: 283-bit ECC Including Scalar Conversion with only 4300 Gates. 556 - Takanori Isobe, Kyoji Shibutani:
Improved All-Subkeys Recovery Attacks on FOX, KATAN and SHACAL-2 Block Ciphers. 557 - Oksana Kulyk, Stephan Neumann, Jurlind Budurushi, Melanie Volkamer, Rolf Haenni, Reto E. Koenig, Philémon von Bergen:
Efficiency Evaluation of Cryptographic Protocols for Boardroom Voting. 558 - Ran Canetti, Vipul Goyal, Abhishek Jain:
Concurrent Secure Computation with Optimal Query Complexity. 559 - Olivier Blazy, Céline Chevalier:
Generic Construction of UC-Secure Oblivious Transfer. 560 - Jake Longo, Elke De Mulder, Daniel Page, Michael Tunstall:
SoC it to EM: electromagnetic side-channel attacks on a complex system-on-chip. 561 - Iraklis Leontiadis, Kaoutar Elkhiyaoui, Melek Önen, Refik Molva:
PUDA - Privacy and Unforgeability for Data Aggregation. 562 - Muhammad Naveed, Erman Ayday, Ellen Wright Clayton, Jacques Fellay, Carl A. Gunter, Jean-Pierre Hubaux, Bradley A. Malin, XiaoFeng Wang:
Privacy in the Genomic Era. 563 - Victor Costan, Ilia A. Lebedev, Srinivas Devadas:
Sanctum: Minimal RISC Extensions for Isolated Execution. 564 - Craig Costello, Patrick Longa:
FourQ: four-dimensional decompositions on a Q-curve over the Mersenne prime. 565 - Nuttapong Attrapadung, Goichiro Hanaoka, Shota Yamada:
A Framework for Identity-Based Encryption with Almost Tight Security. 566 - Henri Gilbert, Jérôme Plût, Joana Treger:
Key-Recovery Attack on the ASASA Cryptosystem with Expanding S-boxes. 567 - Bingke Ma, Bao Li, Ronglin Hao, Xiaoqian Li:
Cryptanalysis of Reduced-Round Whirlwind (Full Version). 568 - Bingke Ma, Bao Li, Ronglin Hao, Xiaoqian Li:
Improved (Pseudo) Preimage Attacks on Reduced-Round GOST and Grøstl-256 and Studies on Several Truncation Patterns for AES-like Compression Functions (Full Version). 569 - Tarik Moataz, Travis Mayberry, Erik-Oliver Blass:
Constant Communication Oblivious RAM. 570 - Tobias Schneider, Amir Moradi, Tim Güneysu:
Robust and One-Pass Parallel Computation of Correlation-Based Attacks at Arbitrary Order. 571 - Eli Ben-Sasson, Iddo Bentov, Ivan Damgård, Yuval Ishai, Noga Ron-Zewi:
On Public Key Encryption from Noisy Codewords. 572 - Ming-Deh A. Huang, Michiel Kosters, Sze Ling Yeo:
Last fall degree, HFE, and Weil descent attacks on ECDLP. 573 - Aggelos Kiayias, Hong-Sheng Zhou, Vassilis Zikas:
Fair and Robust Multi-Party Computation using a Global Transaction Ledger. 574 - Céline Blondeau, Thomas Peyrin, Lei Wang:
Known-key Distinguisher on Full PRESENT. 575 - Michael Scott, Brian Spector:
The Carnac protocol - or how to read the contents of a sealed envelope. 576 - Manfred Lochter, Andreas Wiemers:
Twist Insecurity. 577 - Arthur Gervais, Hubert Ritzdorf, Ghassan O. Karame, Srdjan Capkun:
Tampering with the Delivery of Blocks and Transactions in Bitcoin. 578 - Mridul Nandi:
A Simple Proof of a Distinguishing Bound of Iterated Uniform Random Permutation. 579 - Jan Camenisch, Maria Dubovitskaya, Kristiyan Haralambiev, Markulf Kohlweiss:
Composable & Modular Anonymous Credentials: Definitions and Practical Constructions. 580 - Christina Brzuska, Arno Mittelbach:
Universal Computational Extractors and the Superfluous Padding Assumption for Indistinguishability Obfuscation. 581 - Robert Lychev, Samuel Jero, Alexandra Boldyreva, Cristina Nita-Rotaru:
How Secure and Quick is QUIC? Provable Security and Performance Analyses. 582 - Roel Maes, Vincent van der Leest, Erik van der Sluis, Frans M. J. Willems:
Secure Key Generation from Biased PUFs. 583 - Denise Demirel, Jean Lancrenon:
How to Securely Prolong the Computational Bindingness of Pedersen Commitments. 584 - Ray Beaulieu, Douglas Shors, Jason Smith, Stefan Treatman-Clark, Bryan Weeks, Louis Wingers:
SIMON and SPECK: Block Ciphers for the Internet of Things. 585 - (Withdrawn) SCLPV: Secure Certificateless Public Verification for Cloud Storage in Cyber-physical-social System. 586
- Trupil Limbasiya, Nishant Doshi:
AN ENHANCED BIOMETRIC BASED REMOTE USER AUTHENTICATION SCHEME USING SMART CARD. 587 - Bimal Mandal, Pantelimon Stanica, Sugata Gangopadhyay, Enes Pasalic:
An analysis of the C class of bent functions. 588 - Anastasia-Maria Leventi-Peetz, J.-V. Peetz:
Generating S-Box Multivariate Quadratic Equation Systems And Estimating Algebraic Attack Resistance Aided By SageMath. 589 - Avik Chakraborti, Anupam Chattopadhyay, Muhammad Hassan, Mridul Nandi:
TriviA: A Fast and Secure Authenticated Encryption Scheme. 590 - Maciej Skorski:
How much randomness can be extracted from memoryless Shannon entropy sources? 591 - Milivoj Simeonovski, Fabian Bendun, Muhammad Rizwan Asghar, Michael Backes, Ninja Marnau, Peter Druschel:
Oblivion: Mitigating Privacy Leaks by Controlling the Discoverability of Online Information. 592 - Patrick Haddad, Viktor Fischer, Florent Bernard, Jean Nicolai:
A Physical Approach for Stochastic Modeling of TERO-based TRNG. 593 - Debrup Chakraborty, Cuauhtemoc Mancillas-López, Palash Sarkar:
Disk Encryption: Do We Need to Preserve Length? 594 - (Withdrawn) Differential Fault Intensity Analysis. 595
- Jean-Sébastien Coron, Craig Gentry, Shai Halevi, Tancrède Lepoint, Hemanta K. Maji, Eric Miles, Mariana Raykova, Amit Sahai, Mehdi Tibouchi:
Zeroizing Without Low-Level Zeroes: New MMAP Attacks and Their Limitations. 596 - Amir Moradi, Alexander Wild:
Assessment of Hiding the Higher-Order Leakages in Hardware - what are the achievements versus overheads? 597 - Martin Pettai, Peeter Laud:
Combining Differential Privacy and Secure Multiparty Computation. 598 - Krzysztof Pietrzak, Maciej Skorski:
The Chain Rule for HILL Pseudoentropy, Revisited. 599 - John Kelsey, Kerry A. McKay, Meltem Sönmez Turan:
Predictive Models for Min-Entropy Estimation. 600 - Mei Wang, Zheng Yuan, Xiao Feng:
A Secure Oblivious Transfer Protocol from Indistinguishing Obfuscation. 601 - Abhishek Chakraborty, Bodhisatwa Mazumdar, Debdeep Mukhopadhyay:
Combined Side-Channel and Fault Analysis Attack on Protected Grain Family of Stream Ciphers. 602 - Claude Carlet, Sylvain Guilley:
Complementary Dual Codes for Counter-measures to Side-Channel Attacks. 603 - Eike Kiltz, Jiaxin Pan, Hoeteck Wee:
Structure-Preserving Signatures from Standard Assumptions, Revisited. 604 - Steven D. Galbraith, Ping Wang, Fangguo Zhang:
Computing Elliptic Curve Discrete Logarithms with Improved Baby-step Giant-step Algorithm. 605 - Kyu Young Choi, Jihoon Cho, Jung Yeon Hwang, Taekyoung Kwon:
Constructing Efficient PAKE Protocols from Identity-Based KEM/DEM. 606 - Hitesh Tewari, Eamonn O. Nuallain:
Netcoin - A Traceable P2P Electronic Cash System. 607 - Benoît Libert, Damien Stehlé:
Fully Secure Functional Encryption for Inner Products, from Standard Assumptions. 608 - Igor A. Semaev:
Experimental Study of DIGIPASS GO3 and the Security of Authentication. 609 - Daniel J. Bernstein, Tung Chou, Peter Schwabe:
McBits: fast constant-time code-based cryptography. 610 - (Withdrawn) A Unified Security Analysis of Two-phase Key Exchange Protocols in TPM 2.0. 611
- Gangqiang Yang, Bo Zhu, Valentin Suder, Mark D. Aagaard, Guang Gong:
The Simeck Family of Lightweight Block Ciphers. 612 - Jianting Ning, Xiaolei Dong, Zhenfu Cao, Lifei Wei:
Accountable Authority Ciphertext-Policy Attribute-Based Encryption with White-Box Traceability and Public Auditing in the Cloud. 613 - Fangguo Zhang:
Bit Security of the Hyperelliptic Curves Diffie-Hellman Problem. 614 - Nasour Bagheri, Masoumeh Safkhani, Hoda Jannati:
Security Analysis of Niu et al. Authentication and Ownership Management Protocol. 615 - Lukasz Olejnik, Gunes Acar, Claude Castelluccia, Claudia Díaz:
The leaking battery: A privacy analysis of the HTML5 Battery Status API. 616 - Boris Skoric, Wouter de Groot:
Generalised tally-based decoders for traitor tracing and group testing. 617 - Juan Carlos Ku-Cauich, Guillermo Morales-Luna, Horacio Tapia-Recillas:
An Authentication Code over Galois Rings with Optimal Impersonation and Substitution Probabilities. 618 - Seher Tutdere, Osmanbey Uzunkol:
Construction of Arithmetic Secret Sharing Schemes by Using Torsion Limits. 619 - Susumu Kiyoshima:
Statistical Concurrent Non-malleable Zero-knowledge from One-way Functions. 620 - Sarani Bhattacharya, Debdeep Mukhopadhyay:
Who watches the watchmen? : Utilizing Performance Monitors for Compromising keys of RSA on Intel Platforms. 621 - Nicolas Méloni, M. Anwar Hasan:
Random Digit Representation of Integers. 622 - (Withdrawn) Design, Evaluation and Optimization of Physical Unclonable Functions based on Transient Effect Ring Oscillators. 623
- Viet Tung Hoang, Jonathan Katz, Alex J. Malozemoff:
Automated Analysis and Synthesis of Authenticated Encryption Schemes. 624 - Mike Hamburg:
Ed448-Goldilocks, a new elliptic curve. 625 - Georg Fuchsbauer, Christian Hanser, Daniel Slamanig:
Practical Round-Optimal Blind Signatures in the Standard Model. 626 - Justin Holmgren:
On Necessary Padding with IO. 627 - Daniel Cabarcas, Denise Demirel, Florian Göpfert, Jean Lancrenon, Thomas Wunderer:
An Unconditionally Hiding and Long-Term Binding Post-Quantum Commitment Scheme. 628 - Véronique Cortier, Georg Fuchsbauer, David Galindo:
BeleniosRF: A Strongly Receipt-Free Electronic Voting Scheme. 629 - Ivan Damgård, Jesper Buus Nielsen:
Unconditionally Secure Computation with Reduced Interaction. 630 - Thomas Pöppelmann, Michael Naehrig, Andrew Putnam, Adrián Macías:
Accelerating Homomorphic Evaluation on Reconfigurable Hardware. 631 - Mohammad Mahmoody, Ameer Mohammed, Soheil Nematihaji:
More on Impossibility of Virtual Black-Box Obfuscation in Idealized Models. 632 - Mehmet Sabir Kiraz, Isa Sertkaya, Osmanbey Uzunkol:
An Efficient ID-Based Message Recoverable Privacy-Preserving Auditing Scheme. 633 - Benny Pinkas, Thomas Schneider, Gil Segev, Michael Zohner:
Phasing: Private Set Intersection using Permutation-based Hashing. 634 - Chris Pavlovski, Colin Boyd:
Microcash: Efficient Off-Line Small Payments. 635 - Matthias Krause:
Analyzing Constructions for key-alternating Pseudorandom Functions with Applications to Stream Cipher Operation Modes. 636 - Fenghua Li, Yanchao Wang, Rongna Xie, Jinbo Xiong, Fangfang Shan:
A Novel Cyberspace-Oriented Access Control Model. 637 - Marco Indaco, Fabio Lauri, Andrea Miele, Pascal Trotta:
An Efficient Many-Core Architecture for Elliptic Curve Cryptography Security Assessment. 638 - (Withdrawn) Polynomial time reduction from approximate shortest vector problem to the principle ideal porblem for lattices in cyclotomic rings. 639
- Luís T. A. N. Brandão:
Very-efficient simulatable flipping of many coins into a well. 640 - Jing Li, Licheng Wang:
Noise-free Symmetric Fully Homomorphic Encryption based on noncommutative rings. 641 - Muhammed F. Esgin, Mehmet S. Kiraz, Osmanbey Uzunkol:
A New Partial Key Exposure Attack on Multi-power RSA. 642 - Jonathan Bootle, Andrea Cerulli, Pyrros Chaidos, Essam Ghadafi, Jens Groth, Christophe Petit:
Short Accountable Ring Signatures Based on DDH. 643 - Adam Everspaugh, Rahul Chatterjee, Samuel Scott, Ari Juels, Thomas Ristenpart:
The Pythia PRF Service. 644 - (Withdrawn) Improvements on Efficient Dynamic Provable Data Possession scheme with Public Verifiability and Data Privacy. 645
- Alex Biryukov, Dmitry Khovratovich:
Decomposition attack on SASASASAS. 646 - Andrea Miele, Arjen K. Lenstra:
Efficient ephemeral elliptic curve cryptographic keys. 647 - David Bernhard, Marc Fischlin, Bogdan Warinschi:
Adaptive Proofs of Knowledge in the Random Oracle Model. 648 - David Bernhard, Marc Fischlin, Bogdan Warinschi:
On the Hardness of Proving CCA-security of Signed ElGamal. 649 - Roman Oliynykov, Ivan Gorbenko, Oleksandr Kazymyrov, Victor Ruzhentsev, Oleksandr Kuznetsov, Yurii Gorbenko, Oleksandr Dyrda, Viktor Dolgov, Andrii Pushkaryov, Ruslan Mordvinov, Dmytro Kaidalov:
A New Encryption Standard of Ukraine: The Kalyna Block Cipher. 650 - Stephan Kleber, Florian Unterstein, Matthias Matousek, Frank Kargl, Frank Slomka, Matthias Hiller:
Secure Execution Architecture based on PUF-driven Instruction Level Code Encryption. 651 - Benjamin Dowling, Douglas Stebila:
Modelling ciphersuite and version negotiation in the TLS protocol. 652 - (Withdrawn) Homomorphic Signature Schemes - A survey. 653
- Bo Yang, Kang Yang, Yu Qin, Zhenfeng Zhang, Dengguo Feng:
DAA-TZ: An Efficient DAA Scheme for Mobile Devices using ARM TrustZone. 654 - Nizamud Din, Arif Iqbal Umar, Abdul Waheed, Noor Ul Amin:
An Efficient Multi-Message Multi-Receiver Signcryption Scheme with Forward Secrecy on Elliptic Curves. 655 - Ruhul Amin, G. P. Biswas:
Cryptanalysis of a Markov Chain Based User Authentication Scheme. 656 - Duc-Phong Le, Chik How Tan, Michael Tunstall:
Randomizing the Montgomery Powering Ladder. 657 - Pieter Maene, Ingrid Verbauwhede:
Single-Cycle Implementations of Block Ciphers. 658 - Jean-Pierre Flori, Jérôme Plût, Jean-René Reinhard, Martin Ekerå:
Diversity and Transparency for ECC. 659 - (Withdrawn) A Hybrid Gaussian Sampler for Lattices over Rings. 660
- Shane Kepley, David Russo, Rainer Steinwandt:
Cryptanalysis of a modern rotor machine in a multicast setting. 661 - Ryutaroh Matsumoto:
Strong Security of the Strongly Multiplicative Ramp Secret Sharing based on Algebraic Curves. 662 - Nahid Farhady Ghalaty, Bilgiday Yuce, Patrick Schaumont:
Analyzing the Efficiency of Biased-Fault Based Attacks. 663 - Mahnush Movahedi, Jared Saia, Mahdi Zamani:
Secure Multi-Party Shuffling. 664 - Romain Gay, Iordanis Kerenidis, Hoeteck Wee:
Communication Complexity of Conditional Disclosure of Secrets and Attribute-Based Encryption. 665 - Huaifeng Chen, Xiaoyun Wang:
Improved Linear Hull Attack on Round-Reduced Simon with Dynamic Key-guessing Techniques. 666 - Ming Li, Dongdai Lin:
De Bruijn Sequences from Nonlinear Feedback Shift Registers. 667 - Ekawat Homsirikamol, William Diehl, Ahmed Ferozpuri, Farnoud Farahmand, Malik Umar Sharif, Kris Gaj:
GMU Hardware API for Authenticated Ciphers. 669 - Bruno Robisson, Michel Agoyan, Patrick Soquet, Sébastien Le Henaff, Franck Wajsbürt, Pirouz Bazargan-Sabet, Guillaume Phan:
Smart Security Management in Secure Devices. 670 - Peeter Laud, Alisa Pankova:
Privacy-preserving Frequent Itemset Mining for Sparse and Dense Data. 671 - Allison Bishop, Abhishek Jain, Lucas Kowalczyk:
Function-Hiding Inner Product Encryption. 672 - Mike Hamburg:
Decaf: Eliminating cofactors through point compression. 673 - Peeter Laud, Alisa Pankova:
Preprocessing-Based Verification of Multiparty Protocols with Honest Majority. 674 - Ahmed E. Kosba, Andrew Miller, Elaine Shi, Zikai Wen, Charalampos Papamanthou:
Hawk: The Blockchain Model of Cryptography and Privacy-Preserving Smart Contracts. 675 - Scott R. Fluhrer:
Quantum Cryptanalysis of NTRU. 676 - Daniel J. Bernstein, Simon Josefsson, Tanja Lange, Peter Schwabe, Bo-Yin Yang:
EdDSA for more curves. 677 - Thomas Pornin:
Optimizing MAKWA on GPU and CPU. 678 - Subhabrata Samajder, Palash Sarkar:
Another Look at Normal Approximations in Cryptanalysis. 679 - Yevgeniy Dodis, Tianren Liu, Martijn Stam, John P. Steinberger:
Indifferentiability of Confusion-Diffusion Networks. 680 - Susan Hohenberger, Steven A. Myers, Rafael Pass, Abhi Shelat:
ANONIZE: A Large-Scale Anonymous Survey System. 681 - Yosuke Todo:
Integral Cryptanalysis on Full MISTY1. 682 - Irene Giacomelli, Ruxandra F. Olimid, Samuel Ranellucci:
Security of Linear Secret-Sharing Schemes against Mass Surveillance. 683 - Aggelos Kiayias, Yona Raekow, Alexander Russell, Narasimha K. Shashidhar:
A One-time Stegosystem and Applications to Efficient Covert Communication. 684 - Robert Granger, Thorsten Kleinjung, Jens Zumbrägel:
On the discrete logarithm problem in finite fields of fixed characteristic. 685 - Azeem Irshad, Muhammad Sher, Shahzad Ashraf, Ch. Muhammad Shahzad Faisal, Mahmood Ul Hassan:
Cryptanalysis for Secure and Efficient Smart-Card-Based Remote User Authentication Scheme for Multi-server Environment. 686 - Sean Hallgren, Adam D. Smith, Fang Song:
Classical Cryptographic Protocols in a Quantum World. 687 - Hwajeong Seo, Zhe Liu, Yasuyuki Nogami, Jongseok Choi, Howon Kim:
Binary Field Multiplication on ARMv8. 688 - Daniel P. Martin, Jonathan F. O'Connell, Elisabeth Oswald, Martijn Stam:
How to Enumerate Your Keys Accurately and Efficiently After a Side Channel Attack. 689 - Gorka Irazoqui Apecechea, Thomas Eisenbarth, Berk Sunar:
Systematic Reverse Engineering of Cache Slice Selection in Intel Processors. 690 - Cong Chen, Mehmet Sinan Inci, Mostafa Taha, Thomas Eisenbarth:
SpecTre: A Tiny Side-Channel Resistant Speck Core for FPGAs. 691 - Yoshinori Aono, Takuya Hayashi, Le Trieu Phong, Lihua Wang:
Fast and Secure Linear Regression and Biometric Authentication with Security Update. 692 - Jesper Buus Nielsen, Samuel Ranellucci:
Foundations of Reactive Garbling Schemes. 693 - Tore Kasper Frederiksen, Thomas P. Jakobsen, Jesper Buus Nielsen, Roberto Trifiletti:
On the Complexity of Additively Homomorphic UC Commitments. 694 - Alexander Russell, Qiang Tang, Moti Yung, Hong-Sheng Zhou:
Cliptography: Clipping the Power of Kleptographic Attacks. 695 - Miguel Morales-Sandoval, Arturo Diaz-Perez:
Novel algorithms and hardware architectures for Montgomery Multiplication over GF(p). 696 - Yandong Zheng, Hua Guo:
On the Security of a Self-healing Group Key Distribution Scheme. 697 - Subhamoy Maitra:
Chosen IV Cryptanalysis on Reduced Round ChaCha and Salsa. 698 - Ayantika Chatterjee, Indranil Sengupta:
FURISC: FHE Encrypted URISC Design. 699 - Jimmy Jose, Dipanwita Roy Chowdhury:
Four Neighbourhood Cellular Automata as Better Cryptographic Primitives. 700 - Sébastien Canard, Baptiste Olivier:
Differential Privacy in distribution and instance-based noise mechanisms. 701 - Loi Luu, Jason Teutsch, Raghav Kulkarni, Prateek Saxena:
Demystifying incentives in the consensus computer. 702 - Mihir Bellare, Igors Stepanovs:
Point-Function Obfuscation: A Framework and Generic Constructions. 703 - Nir Bitansky, Vinod Vaikuntanathan:
Indistinguishability Obfuscation: from Approximate to Exact. 704 - Ashish Choudhury, Emmanuela Orsini, Arpita Patra, Nigel P. Smart:
Linear Overhead Robust MPC with Honest Majority Using Preprocessing. 705 - Stefan Kölbl, Arnab Roy:
A Brief Comparison of Simon and Simeck. 706 - Siamak Fayyaz Shahandashti, Reihaneh Safavi-Naini, Nashad Ahmed Safa:
Reconciling User Privacy and Implicit Authentication for Mobile Devices. 707 - Jeffrey Hoffstein, Jill Pipher, John M. Schanck, Joseph H. Silverman, William Whyte, Zhenfei Zhang:
Choosing Parameters for NTRUEncrypt. 708 - Luka Malisa, Kari Kostiainen, Srdjan Capkun:
Detecting Mobile Application Spoofing Attacks by Leveraging User Visual Similarity Perception. 709 - Bernardo Ferreira, João Rodrigues, João Leitão, Henrique João L. Domingos:
Privacy-Preserving Content-Based Image Retrieval in the Cloud (Extended Version). 710 - Anne Canteaut, Sébastien Duval, Gaëtan Leurent:
Construction of Lightweight S-Boxes using Feistel and MISTY structures (Full Version). 711 - David Bernhard, Bogdan Warinschi:
On Limitations of the Fiat - Shamir Transformation. 712 - (Withdrawn) Light-hHB: A New Version of hHB with Improved Session Key Exchange. 713
- Masao Kasahara:
New classes of public key cryptosystem K(XVI)SE(1)PKC constructed based on Reed-Solomon code over extension field of m=8 and K(XVI)SE(2)PKC, based on binary cyclic code. 714 - Allison Bishop, Susan Hohenberger, Brent Waters:
New Circular Security Counterexamples from Decision Linear and Learning with Errors. 715 - Nasour Bagheri:
Linear Cryptanalysis of Reduced-Round SIMECK Variants. 716 - Pei Luo, Liwei Zhang, Yunsi Fei, A. Adam Ding:
Towards Secure Cryptographic Software Implementation Against Side-Channel Power Analysis Attacks. 717 - Leonid Reyzin, Sophia Yakoubov:
Efficient Asynchronous Accumulators for Distributed PKI. 718 - Oscar Reparaz, Begül Bilgin, Svetla Nikova, Benedikt Gierlichs, Ingrid Verbauwhede:
Consolidating masking schemes. 719 - Huijia Lin, Rafael Pass, Karn Seth, Sidharth Telang:
Output-Compressing Randomized Encodings and Applications. 720 - Hoeteck Wee:
KDM-Security via Homomorphic Smooth Projective Hashing. 721 - Tarik Moataz, Erik-Oliver Blass:
Oblivious Substring Search with Updates. 722 - Alex Biryukov, Gaëtan Leurent, Léo Perrin:
Cryptanalysis of Feistel Networks with Secret Round Functions. 723 - Oscar Reparaz, Sujoy Sinha Roy, Frederik Vercauteren, Ingrid Verbauwhede:
A masked ring-LWE implementation. 724 - Eric R. Verheul, Sietse Ringers, Jaap-Henk Hoepman:
The self-blindable U-Prove scheme by Hanzlik and Kluczniak is forgeable. 725 - Vladimir Shpilrain, Bianca Sosnovski:
Compositions of linear functions and applications to hashing. 726 - Josep Balasch, Benedikt Gierlichs, Oscar Reparaz, Ingrid Verbauwhede:
DPA, Bitslicing and Masking at 1 GHz. 727 - Richard J. Lipton, Rafail Ostrovsky, Vassilis Zikas:
Provable Virus Detection: Using the Uncertainty Principle to Protect Against Malware. 728 - Alexandra Boldyreva, Taesoo Kim, Richard J. Lipton, Bogdan Warinschi:
Towards Provably-Secure Remote Memory Attestation. 729 - Prabhanjan Ananth, Abhishek Jain, Amit Sahai:
Achieving Compactness Generically: Indistinguishability Obfuscation from Non-Compact Functional Encryption. 730 - Rodrigo Abarzúa, Santi Martínez, Valeria Mendoza:
Same Value Analysis on Edwards Curves. 731 - Hwajeong Seo, Zhe Liu, Jongseok Choi, Taehwan Park, Howon Kim:
Compact Implementations of LEA Block Cipher for Low-End Microprocessors. 732 - Masahiro Yagisawa:
Fully Homomorphic Encryption on Octonion Ring. 733 - (Withdrawn) On the Security of Extended Generalized Feistel Networks. 734
- Ilan Komargodski, Mark Zhandry:
Modern Cryptography Through the Lens of Secret Sharing. 735 - (Withdrawn) Solving LWE via List Decoding. 736
- Chunsheng Gu:
New multilinear maps from ideal lattices. 737 - Kazuhiko Minematsu:
Authenticated Encryption without Tag Expansion (or, How to Accelerate AERO). 738 - (Withdrawn) Fine-grained sharing of encrypted sensor data over cloud storage with key aggregation. 739
- Antonio Faonio, Jesper Buus Nielsen, Daniele Venturi:
Predictable Arguments of Knowledge. 740 - Mohammad Hajiabadi, Bruce M. Kapron, S. Venkatesh:
On Generic Constructions of Circularly-Secure, Leakage-Resilient Public-Key Encryption Schemes. 741 - Can Kizilkale, Ömer Egecioglu, Çetin Kaya Koç:
A Matrix Decomposition Method for Optimal Normal Basis Multiplication. 742 - Benoît Libert, Thomas Peters, Moti Yung:
Short Group Signatures via Structure-Preserving Signatures: Standard Model Security from Simple Assumptions. 743 - Ege Gulcan, Aydin Aysu, Patrick Schaumont:
BitCryptor: Bit-Serialized Compact Crypto Engine on Reconfigurable Hardware. 744 - Hwajeong Seo, Zhe Liu, Yasuyuki Nogami, Jongseok Choi, Howon Kim:
Faster ECC over F2571 (feat. PMULL). 745 - Achiya Bar-On:
A 270 Attack on the Full MISTY1. 746 - Huang Zhang, Fangguo Zhang, Baodian Wei, Yusong Du:
Self-bilinear Map from One Way Encoding System and Indistinguishability Obfuscation. 747 - Jean Paul Degabriele, Pooya Farshim, Bertram Poettering:
A More Cautious Approach to Security Against Mass Surveillance. 748 - Pascal Sasdrich, Amir Moradi, Tim Güneysu:
Affine Equivalence and its Application to Tightening Threshold Implementations. 749 - Ryo Nishimaki, Daniel Wichs, Mark Zhandry:
Anonymous Traitor Tracing: How to Embed Arbitrary Information in a Key. 750 - Shay Gueron, Yehuda Lindell, Ariel Nof, Benny Pinkas:
Fast Garbling of Circuits Under Standard Assumptions. 751 - Gilad Asharov, Gil Segev:
On Constructing One-Way Permutations from Indistinguishability Obfuscation. 752 - Joppe W. Bos, Charles Hubain, Wil Michiels, Philippe Teuwen:
Differential Computation Analysis: Hiding your White-Box Designs is Not Enough. 753 - Anne Canteaut, Virginie Lallemand, María Naya-Plasencia:
Related-Key Attack on Full-Round PICARO. 754 - Erdem Alkim, Nina Bindel, Johannes Buchmann, Özgür Dagdelen:
TESLA: Tightly-Secure Efficient Signatures from Standard Lattices. 755 - Yandong Zheng, Hua Guo:
Cryptanalysis of an Improved One-Way Hash Chain Self-Healing Group Key Distribution Scheme. 756 - Matthias Hamann, Matthias Krause:
Stream Cipher Operation Modes with Improved Security against Generic Collision Attacks. 757 - Yara Elias, Kristin E. Lauter, Ekin Ozman, Katherine E. Stange:
Ring-LWE Cryptography for the Number Theorist. 758 - Alice Pellet-Mary, Damien Stehlé:
Cryptanalysis of Gu's ideal multilinear map. 759 - Pol Van Aubel, Daniel J. Bernstein, Ruben Niederhagen:
Investigating SRAM PUFs in large CPUs and GPUs. 760 - William Diehl:
Implementation of the SCREAM Tweakable Block Cipher in MSP430 Assembly Language. 761 - Riham AlTawy, Ahmed Abdelkhalek, Amr M. Youssef:
A Meet-in-the-Middle Attack on Reduced-Round Kalyna-b/2b. 762 - Rei Ueno, Naofumi Homma, Yukihiro Sugawara, Yasuyuki Nogami, Takafumi Aoki:
Highly Efficient GF(28) Inversion Circuit Based on Redundant GF Arithmetic and Its Application to AES Design. 763 - Jincheng Zhuang, Qi Cheng:
On Generating Coset Representatives of PGL2(Fq) in PGL2(Fq2). 764 - Victoria Fehr, Marc Fischlin:
Sanitizable Signcryption: Sanitization over Encrypted Data (Full Version). 765 - Peng Wang, Yuling Li, Liting Zhang, Kaiyan Zheng:
Relate-Key Almost Universal Hash Functions: Definitions, Constructions and Applications. 766 - Daniel J. Bernstein, Tanja Lange, Ruben Niederhagen:
Dual EC: A Standardized Back Door. 767 - Pawel Swierczynski, Marc Fyrbiak, Philipp Koppe, Amir Moradi, Christof Paar:
Interdiction in Practice - Hardware Trojan Against a High-Security USB Flash Drive. 768 - Andrej Bogdanov, Siyao Guo, Daniel Masny, Silas Richelson, Alon Rosen:
On the Hardness of Learning with Rounding over Small Modulus. 769 - Michele Ciampi, Giuseppe Persiano, Luisa Siniscalchi, Ivan Visconti:
A Transform for NIZK Almost as Efficient and General as the Fiat-Shamir Transform Without Programmable Random Oracles. 770 - Sebastian E. Schmittner:
A SAT-based Public Key Cryptography Scheme. 771 - Sandro Coretti, Yevgeniy Dodis, Björn Tackmann, Daniele Venturi:
Non-Malleable Encryption: Simpler, Shorter, Stronger. 772 - Shoni Gilboa, Shay Gueron:
Distinguishing a truncated random permutation from a random function. 773 - Santanu Sarkar:
Revisiting Prime Power RSA. 774 - Prabhanjan Ananth, Amit Sahai:
Functional Encryption for Turing Machines. 776 - (Withdrawn) Arithmetic Walsh Transform of Boolean Functions with Linear Structures. 777
- (Withdrawn) Modular Inversion Hidden Number Problem - Correction and Improvements. 778
- Masao Kasahara:
A Simple Scheme, for Strengthening Product-sum Type PKC. 779 - Martin R. Albrecht, Pooya Farshim, Dennis Hofheinz, Enrique Larraia, Kenneth G. Paterson:
Multilinear Maps from Obfuscation. 780 - Daniel J. Bernstein, Chitchanok Chuengsatiansup, David Kohel, Tanja Lange:
Twisted Hessian curves. 781 - Sergiu Bursuc:
Secure two-party computation in applied pi-calculus: models and verification. 782 - Ivan Tjuawinata, Tao Huang, Hongjun Wu:
Cryptanalysis of the Authenticated Encryption Algorithm COFFE. 783 - David S. Leslie, Chris Sherfield, Nigel P. Smart:
Threshold FlipThem: When the winner does not need to take all. 784 - Rémi Géraud, Diana Maimut, David Naccache:
Double-Speed Barrett Moduli. 785 - Jean-Michel Cioranesco, Roman Korkikian, David Naccache, Rodrigo Portella do Canto:
Buying AES Design Resistance with Speed and Energy. 786 - Houda Ferradi, Rémi Géraud, Diana Maimut, David Naccache, Hang Zhou:
Backtracking-Assisted Multiplication. 787 - Rahul Chatterjee, Joseph Bonneau, Ari Juels, Thomas Ristenpart:
Cracking-Resistant Password Vaults using Natural Language Encoders. 788 - Gangqiang Yang, Mark D. Aagaard, Guang Gong:
Efficient Hardware Implementations of the Warbler Pseudorandom Number Generator. 789 - Pantelimon Stanica:
On weak and strong 2k-bent Boolean functions. 790 - Omer Paneth, Amit Sahai:
On the Equivalence of Obfuscation and Multilinear Maps. 791 - Dennis Hofheinz, Vanishree Rao, Daniel Wichs:
Standard Security Does Not Imply Indistinguishability Under Selective Opening. 792 - Rabih Mohsen, Alexandre Miranda Pinto:
Algorithmic Information Theory for Obfuscation Security. 793 - Pierre-Alain Fouque, Sylvain Guilley, Cédric Murdica, David Naccache:
Safe-Errors on SPA Protected implementations with the Atomicity Technique. 794 - Andrey Bogdanov, Ilya Kizhvatov, Kamran Manzoor, Elmar Tischhauser, Marc Witteman:
Fast and Memory-Efficient Key Recovery in Side-Channel Attacks. 795 - Kartik Nayak, Srijan Kumar, Andrew Miller, Elaine Shi:
Stubborn Mining: Generalizing Selfish Mining and Combining with an Eclipse Attack. 796 - Carmit Hazay, Muthuramakrishnan Venkitasubramaniam:
What Security can we Achieve in 4-Rounds? 797 - (Withdrawn) A Stateless Cryptographically-Secure Physical Unclonable Function. 798
- Hwajeong Seo, Chien-Ning Chen, Zhe Liu, Yasuyuki Nogami, Taehwan Park, Jongseok Choi, Howon Kim:
Secure Binary Field Multiplication. 799 - (Withdrawn) Hybrid WBC: Secure and efficient encryption schemes using the White-Box Cryptography. 800
- Scott R. Fluhrer:
Scalar Blinding on Elliptic Curves based on Primes with Special Structure. 801 - Shahram Khazaei, Siavash Ahmadi:
Ciphertext-only attack on d*d Hill in O(d13d). 802 - Stian Fauskanger, Igor A. Semaev:
Statistical and Algebraic Properties of DES. 803 - Sumit Chakraborty:
Secure Multi-party Computation: How to Solve the Problem between Security Intelligence & Business Intelligence. 804 - Tsutomu Iijima, Fumiyuki Momose, Jinhui Chao:
A classification of elliptic curves with respect to the GHS attack in odd characteristic. 805 - Sikhar Patranabis, Abhishek Chakraborty, Debdeep Mukhopadhyay, P. P. Chakrabarti:
Using State Space Encoding To Counter Biased Fault Attacks on AES Countermeasures. 806 - Juan A. Garay, Björn Tackmann, Vassilis Zikas:
Fair Distributed Computation of Reactive Functions. 807 - Mihir Bellare, Joseph Jaeger, Daniel Kane:
Mass-surveillance without the State: Strongly Undetectable Algorithm-Substitution Attacks. 808 - Alan Szepieniec, Bart Preneel:
New Techniques for Electronic Voting. 809 - Michele Ciampi, Giuseppe Persiano, Alessandra Scafuro, Luisa Siniscalchi, Ivan Visconti:
Improved OR Composition of Sigma-Protocols. 810 - Chrysanthi Mavromati:
Key-recovery attacks against the MAC algorithm Chaskey. 811 - Alex Biryukov, Léo Perrin, Aleksei Udovenko:
The Secret Structure of the S-Box of Streebog, Kuznechik and Stribob. 812 - Ritam Bhaumik, Mridul Nandi:
Revisiting Turning Online Cipher Off. 813 - Qingji Zheng, Xiangxue Li, Aytac Azgin:
CLKS: Certificateless Keyword Search on Encrypted Data. 814 - Mohammad Mahmoody, Ameer Mohammed:
On the Power of Hierarchical Identity-Based Encryption. 815 - Valery I. Korzhik, Guillermo Morales-Luna, Sergei Tikhonov, Victor Yakovlev:
Analysis of Keyless Massive MIMO-based Cryptosystem Security. 816 - Varsha Bhat, Harsimran Singh, S. R. S. Iyengar:
Secure Multi-party Graph Computation. 817 - Wei Dai, Berk Sunar:
cuHE: A Homomorphic Encryption Accelerator Library. 818 - Jean-Luc Danger, Sylvain Guilley, Philippe Hoogvorst, Cédric Murdica, David Naccache:
Improving the Big Mac Attack on Elliptic Curve Cryptography. 819 - Junqing Gong, Jie Chen, Xiaolei Dong, Zhenfu Cao, Shaohua Tang:
Extended Nested Dual System Groups, Revisited. 820 - Gérald Gavin:
A general framework for building noise-free homomorphic cryptosystems. 821 - Akshayaram Srinivasan, C. Pandu Rangan:
Efficiently Obfuscating Re-Encryption Program under DDH Assumption. 822 - Anja Becker, Thijs Laarhoven:
Efficient (ideal) lattice sieving using cross-polytope LSH. 823 - Jens Groth:
Efficient Fully Structure-Preserving Signatures for Large Messages. 824 - Ding Wang, Ping Wang:
The Emperor's New Password Creation Policies. 825 - Dario Catalano, Dario Fiore, Luca Nizzardo:
Programmable Hash Functions go Private: Constructions and Applications to (Homomorphic) Signatures with Shorter Public Keys. 826 - Geumsook Ryu, Kwangsu Lee, Seunghwan Park, Dong Hoon Lee:
Unbounded Hierarchical Identity-Based Encryption with Efficient Revocation. 827 - Ralph Ankele, Stefan Kölbl, Christian Rechberger:
State-recovery analysis of Spritz. 828 - Nishanth Chandran, Srinivasan Raghuraman, Dhinakaran Vinayagamurthy:
Reducing Multilinear Map Levels in Constrained PRFs and ABE. 829 - Shiuan-Tzuo Shen, Amir Rezapour, Wen-Guey Tzeng:
Unique Signature with Short Output from CDH Assumption. 830 - Syed Kamran Haider, Masab Ahmad, Farrukh Hijaz, Astha Patni, Ethan Johnson, Matthew Seita, Omer Khan, Marten van Dijk:
M-MAP: Multi-Factor Memory Authentication for Secure Embedded Processors. 831 - David McCann, Kerstin Eder, Elisabeth Oswald:
Characterising and Comparing the Energy Consumption of Side Channel Attack Countermeasures and Lightweight Cryptography on Embedded Devices. 832 - Mohammad Etemad, Alptekin Küpçü:
Efficient Key Authentication Service for Secure End-to-end Communications. 833 - (Withdrawn) Authentication Using Side-Channel Information. 834
- Duc-Phong Le, Nadia El Mrabet, Chik How Tan:
On near prime-order elliptic curves with small embedding degrees. 835 - Benjamin Wesolowski, Pascal Junod:
Ciphertext-Policy Attribute-Based Broadcast Encryption with Small Keys. 836 - Nicolas Bruneau, Sylvain Guilley, Zakaria Najm, Yannick Teglia:
Multi-Variate High-Order Attacks of Shuffled Tables Recomputation. 837 - Hamza Abusalah, Georg Fuchsbauer, Krzysztof Pietrzak:
Offline Witness Encryption. 838 - David Wong:
Timing and Lattice Attacks on a Remote ECDSA OpenSSL Server: How Practical Are They Really? 839 - Qianqian Yang, Lei Hu, Siwei Sun, Ling Song:
Related-key Impossible Differential Analysis of Full Khudra. 840 - Vanga Odelu, Ashok Kumar Das, Adrijit Goswami:
An Efficient CP-ABE with Constant Size Secret Keys using ECC for Lightweight Devices. 841 - Jaap-Henk Hoepman, Wouter Lueks, Sietse Ringers:
On Linkability and Malleability in Self-blindable Credentials. 842 - David Derler, Daniel Slamanig:
Rethinking Privacy for Extended Sanitizable Signatures and a Black-Box Construction of Strongly Private Schemes. 843 - Jeffrey Hoffstein, Jill Pipher, John M. Schanck, Joseph H. Silverman, William Whyte, Zhenfei Zhang:
DA-Encrypt: Homomorphic Encryption via Non-Archimedean Diophantine Approximation - Preliminary Report. 844 - Zvika Brakerski, Craig Gentry, Shai Halevi, Tancrède Lepoint, Amit Sahai, Mehdi Tibouchi:
Cryptanalysis of the Quadratic Zero-Testing of GGH. 845 - Ran Cohen, Iftach Haitner, Eran Omri, Lior Rotem:
Characterization of Secure Multiparty Computation Without Broadcast. 846 - Subhadeep Banik, Andrey Bogdanov, Francesco Regazzoni:
Exploring Energy Efficiency of Lightweight Block Ciphers. 847 - Meltem Sönmez Turan, René Peralta:
The Multiplicative Complexity of Boolean Functions on Four and Five Variables. 848 - Houda Ferradi, Rémi Géraud, Diana Maimut, David Naccache, Amaury de Wargny:
Regulating the Pace of von Neumann Correctors. 849 - Zhen Liu, Duncan S. Wong:
Traceable CP-ABE on Prime Order Groups: Fully Secure and Fully Collusion-resistant Blackbox Traceable. 850 - Benoit Cogliati, Yannick Seurin:
Beyond-Birthday-Bound Security for Tweakable Even-Mansour Ciphers with Linear Tweak and Key Mixing. 851 - Matvei Kotov, Alexander Ushakov:
Analysis of a key exchange protocol based on tropical matrix algebra. 852 - Felix Heuer, Eike Kiltz, Krzysztof Pietrzak:
Standard Security Does Imply Security Against Selective Opening for Markov Distributions. 853 - Jeroen Delvaux, Dawu Gu, Ingrid Verbauwhede, Matthias Hiller, Meng-Day (Mandel) Yu:
Secure Sketch Metamorphosis: Tight Unified Bounds. 854 - (Withdrawn) A new framework for keystream generators against Correlation, Linear and Distinguishing Attacks. 855
- Khushboo Bussi, Dhananjoy Dey, Prasanna Raghaw Mishra, B. K. Dass:
MGR HASH FUNCTION. 856 - Benjamin Fuller, Ariel Hamlin:
Unifying Leakage Classes: Simulatable Leakage and Pseudoentropy. 857 - Olivier Blazy, Saqib A. Kakvi:
Group Signatures Without q-Assumptions. 858 - Dianyan Xiao, Jincheng Zhuang, Qi Cheng:
Factor Base Discrete Logarithms in Kummer Extensions. 859 - Carmit Hazay, Arpita Patra, Bogdan Warinschi:
Selective Opening Security for Receivers. 860 - Chun Guo, Dongdai Lin:
A Synthetic Indifferentiability Analysis of Interleaved Double-Key Even-Mansour Ciphers. 861 - Dennis Hofheinz, Christian Matt, Ueli Maurer:
Idealizing Identity-Based Encryption. 862 - Elette Boyle, Moni Naor:
Is There an Oblivious RAM Lower Bound? 863 - Christine Jost, Ha Lam, Alexander Maximov, Ben J. M. Smeets:
Encryption Performance Improvements of the Paillier Cryptosystem. 864 - Alexander Koch, Stefan Walzer, Kevin Härtel:
Card-based Cryptographic Protocols Using a Minimal Number of Cards. 865 - Shai Halevi:
Graded Encoding, Variations on a Scheme. 866 - Michel Abdalla, Fabrice Benhamouda, Alain Passelègue:
Multilinear and Aggregate Pseudorandom Functions: New Constructions and Improved Security. 867 - Stefano Tessaro:
Optimally Secure Block Ciphers from Ideal Primitives. 868 - Tatsuaki Okamoto, Krzysztof Pietrzak, Brent Waters, Daniel Wichs:
New Realizations of Somewhere Statistically Binding Hashing and Positional Accumulators. 869 - Mohammad Hajiabadi, Bruce M. Kapron:
Gambling, Computational Information and Encryption Security. 870 - Shahin Tajik, Enrico Dietz, Sven Frohmann, Helmar Dittrich, Dmitry Nedospasov, Clemens Helfmeier, Jean-Pierre Seifert, Christian Boit, Heinz-Wilhelm Hübers:
A Complete and Linear Physical Characterization Methodology for the Arbiter PUF Family. 871 - Seyed Salman Sajjadi GhaemMaghami, Afrooz Haghbin, Mahtab Mirmohseni:
Traceability Improvements of a New RFID Protocol Based On EPC C1G2. 872 - Jian Liu, Sihem Mesnager, Lusheng Chen:
On the Diffusion Property of Iterated Functions. 873 - Yuanxi Dai, John P. Steinberger:
Feistel Networks: Indifferentiability at 10 Rounds. 874 - Nese Koçak, Sihem Mesnager, Ferruh Özbudak:
Bent and Semi-bent Functions via Linear Translators. 875 - Dana Dachman-Soled, Jonathan Katz, Aishwarya Thiruvengadam:
10-Round Feistel is Indifferentiable from an Ideal Cipher. 876 - Christophe Clavier, Julien Francq, Antoine Wurcker:
Study of a Parity Check Based Fault-Detection Countermeasure for the AES Key Schedule. 877 - Edward Eaton, Fang Song:
Making Existential-Unforgeable Signatures Strongly Unforgeable in the Quantum Random-Oracle Model. 878 - Martin Ekerå:
Computing information on domain parameters from public keys selected uniformly at random. 879 - Mohammad Etemad, Alptekin Küpçü:
Generic Efficient Dynamic Proofs of Retrievability. 880 - Peter Gazi, Krzysztof Pietrzak, Stefano Tessaro:
Generic Security of NMAC and HMAC with Input Whitening. 881 - Pablo Rauzy, Martin Moreau, Sylvain Guilley, Zakaria Najm:
A Generic Countermeasure Against Fault Injection Attacks on Asymmetric Cryptography. 882 - (Withdrawn) Revisiting Sum of CBC-MACs and Extending NI2-MAC to Achieve Beyond-Birthday Security. 883
- Pratish Datta, Ratna Dutta, Sourav Mukhopadhyay:
General Circuit Realizing Compact Revocable Attribute-Based Encryption from Multilinear Maps. 884 - Roman Oliynykov, Ivan Gorbenko, Oleksandr Kazymyrov, Victor Ruzhentsev, Oleksandr Kuznetsov, Yurii Gorbenko, Artem Boiko, Oleksandr Dyrda, Viktor Dolgov, Andrii Pushkaryov:
A New Standard of Ukraine: The Kupyna Hash Function. 885 - Rémi Géraud, Diana-Stefania Maimut, David Naccache, Rodrigo Portella do Canto, Emil Simion:
Applying Cryptographic Acceleration Techniques to Error Correction. 886 - Carmit Hazay, Antigoni Polychroniadou, Muthuramakrishnan Venkitasubramaniam:
Round-Optimal Token-Based Secure Computation. 887 - Kazuhiko Minematsu, Tetsu Iwata:
Tweak-Length Extension for Tweakable Blockciphers. 888 - Anamaria Costache, Nigel P. Smart:
Which Ring Based Somewhat Homomorphic Encryption Scheme is Best? 889 - Wenbin Zhang, Chik How Tan:
MI-T-HFE, a New Multivariate Signature Scheme. 890 - Sébastien Canard, Viet Cuong Trinh:
Private Ciphertext-Policy Attribute-based Encryption Schemes With Constant-Size Ciphertext Supporting CNF Access Policy. 891 - Kenneth G. Paterson, Jacob C. N. Schuldt, Dale L. Sibborn, Hoeteck Wee:
Security Against Related Randomness Attacks via Reconstructive Extractors. 892 - Christian Badertscher, Christian Matt, Ueli Maurer, Phillip Rogaway, Björn Tackmann:
Robust Authenticated Encryption and the Limits of Symmetric Cryptography. 893 - Richard Winter, Ana Salagean, Raphael C.-W. Phan:
Comparison of cube attacks over different vector spaces. 894 - Guy Barwell, Dan Page, Martijn Stam:
Rogue Decryption Failures: Reconciling AE Robustness Notions. 895 - Xiaoyang Dong, Leibo Li, Keting Jia, Xiaoyun Wang:
Improved Attacks on Reduced-Round Camellia-128/192/256. 896 - Prosanta Gope:
Integrity-Aware Parallelizable Cipher Feedback Mode for Real-time Cryptography. 897 - Mehmet Sinan Inci, Berk Gülmezoglu, Gorka Irazoqui Apecechea, Thomas Eisenbarth, Berk Sunar:
Seriously, get off my cloud! Cross-VM RSA Key Recovery in a Public Cloud. 898 - Payal Chaudhari, Manik Lal Das:
Privacy-preserving Attribute Based Searchable Encryption. 899 - Ferucio Laurentiu Tiplea, Emil Simion:
New Results on Identity-based Encryption from Quadratic Residuosity. 900 - Tore Kasper Frederiksen, Marcel Keller, Emmanuela Orsini, Peter Scholl:
A Unified Approach to MPC with Preprocessing using OT. 901 - Kexin Qiao, Lei Hu, Siwei Sun:
Differential Security Evaluation of Simeck with Dynamic Key-guessing Techniques. 902 - Yannick Seurin:
A Note on the Indifferentiability of the 10-Round Feistel Construction. 903 - Junqing Gong, Xiaolei Dong, Zhenfu Cao, Jie Chen:
Almost-tight Identity Based Encryption against Selective Opening Attack. 904 - Yuval Yarom, Qian Ge, Fangfei Liu, Ruby B. Lee, Gernot Heiser:
Mapping the Intel Last-Level Cache. 905 - Adnan Baysal, Suhap Sahin:
RoadRunneR: A Small And Fast Bitslice Block Cipher For Low Cost 8-bit Processors. 906 - Shafi Goldwasser, Yael Tauman Kalai:
Cryptographic Assumptions: A Position Paper. 907 - Martin M. Lauridsen, Christian Rechberger:
Linear Distinguishers in the Key-less Setting: Application to PRESENT. 908 - Bart Mennink, Bart Preneel:
On the Impact of Known-Key Attacks on Hash Functions. 909 - Alonso González, Alejandro Hevia, Carla Ràfols:
QA-NIZK Arguments in Asymmetric Groups: New Tools and New Constructions. 910 - Kai Zhang, Jie Guan, Bin Hu, Dongdai Lin:
Security Evaluation on Simeck against Zero Correlation Linear Cryptanalysis. 911 - Maxime Lecomte, Jacques Fournier, Philippe Maurine:
Extraction of intrinsic structure for Hardware Trojan detection. 912 - Pratish Datta, Ratna Dutta, Sourav Mukhopadhyay:
Functional Signcryption: Notion, Construction, and Applications. 913 - Benjamin Dowling, Marc Fischlin, Felix Günther, Douglas Stebila:
A Cryptographic Analysis of the TLS 1.3 Handshake Protocol Candidates. 914 - Mohammad Hassan Ameri, Maryam Rajabzadeh Asaar, Javad Mohajeri, Mahmoud Salmasizadeh:
A Generic Construction for Verifiable Attribute-based Keyword Search Schemes. 915 - Subhabrata Samajder, Palash Sarkar:
Rigorous Upper Bounds on Data Complexities of Block Cipher Cryptanalysis. 916 - Constantinos Patsakis, Panayiotis Kotzanikolaou, Mélanie Bouroche:
Private Proximity Testing on Steroids: An NTRU-based Protocol. 917 - Md. Iftekhar Salam, Kenneth Koon-Ho Wong, Harry Bartlett, Leonie Simpson, Ed Dawson, Josef Pieprzyk:
Finding State Collisions in the Authenticated Encryption Stream Cipher ACORN. 918 - (Withdrawn) PRAMOD: A Privacy-Preserving Framework for Supporting Efficient and Secure Database-as-a-Service. 919
- Giuseppe Ateniese, Antonio Faonio, Seny Kamara:
Leakage-Resilient Identification Schemes from Zero-Knowledge Proofs of Storage. 920 - Kwangsu Lee, Jong Hwan Park:
Identity-Based Revocation from Subset Difference Methods under Simple Assumptions. 921 - Thalia M. Laing, Keith M. Martin, Maura B. Paterson, Douglas R. Stinson:
Localised Multisecret Sharing. 922 - Sikhar Patranabis, Yash Shrivastava, Debdeep Mukhopadhyay:
Dynamic Key-Aggregate Cryptosystem on Elliptic Curves for Online Data Sharing. 923 - Cong Chen, Thomas Eisenbarth, Ingo von Maurich, Rainer Steinwandt:
Masking Large Keys in Hardware: A Masked Implementation of McEliece. 924 - Poulami Das, Debapriya Basu Roy, Debdeep Mukhopadhyay:
Exploiting the Order of Multiplier Operands: A Low Cost Approach for HCCA Resistance. 925 - Vadim N. Tsypyschev, Julia S. Vinogradova:
Criterion of Maximal Period of a Trinomial over Nontrivial Galois Ring of odd Characteristic. 926 - Sky Faber, Stanislaw Jarecki, Hugo Krawczyk, Quan Nguyen, Marcel-Catalin Rosu, Michael Steiner:
Rich Queries on Encrypted Data: Beyond Exact Matches. 927 - Hassan Noura, Damien Couroussé:
HLDCA-WSN: Homomorphic Lightweight Data Confidentiality Algorithm for Wireless Sensor Network. 928 - Yongjun Zhao, Sherman S. M. Chow:
Are you The One to Share? Secret Transfer with Access Structure. 929 - Antoine Joux, Cécile Pierrot:
Nearly Sparse Linear Algebra. 930 - Payman Mohassel, Mike Rosulek, Ye Zhang:
Fast and Secure Three-party Computation: The Garbled Circuit Approach. 931 - Sikhar Patranabis, Debapriya Basu Roy, Debdeep Mukhopadhyay:
Using Tweaks To Design Fault Resistant Ciphers. 932 - Jayaprakash Kar:
Cryptanalysis of Provably Secure Certi cateless Short Signature Scheme. 933 - Jung Hee Cheon, Changmin Lee, Hansol Ryu:
Cryptanalysis of the New CLT Multilinear Maps. 934 - Céline Blondeau, Kaisa Nyberg:
Joint Data and Key Distribution of the Linear Cryptanalysis Test Statistic and Its Impact to Data Complexity Estimates of Multiple/Multidimensional Linear and Truncated Differential Attacks. 935 - (Withdrawn) A Privacy Preserving Improvement for SRTA in Telecare Medicine Information System. 936
- Aydin Aysu, Ege Gulcan, Daisuke Moriyama, Patrick Schaumont, Moti Yung:
End-to-end Design of a PUF-based Privacy Preserving Authentication Protocol. 937 - Dong Pyo Chi, Jeong Woon Choi, Jeong San Kim, Taewan Kim:
Lattice Based Cryptography for Beginners. 938 - Chris Peikert:
A Decade of Lattice Cryptography. 939 - Almog Benin, Sivan Toledo, Eran Tromer:
Secure Association for the Internet of Things. 940 - Brice Minaud, Pierre-Alain Fouque:
Cryptanalysis of the New Multilinear Map over the Integers. 941 - Ben Smyth:
Secrecy and independence for election schemes. 942 - Tung Chou:
Sandy2x: New Curve25519 Speed Records. 943 - Palash Sarkar, Shashank Singh:
New Complexity Trade-Offs for the (Multiple) Number Field Sieve Algorithm in Non-Prime Fields. 944 - Changyu Dong, Franziskus Kiefer:
Secure Set-based Policy Checking and Its Application to Password Registration. 945 - Alex Biryukov, Dmitry Khovratovich:
Asymmetric proof-of-work based on the Generalized Birthday problem. 946 - Yi-Ruei Chen, Shiuan-Tzuo Shen, Wen-Guey Tzeng:
Weave ElGamal Encryption for Secure Outsourcing Algebraic Computations over Zp. 947 - Maryam Rajabzadeh Asaar, Mahmoud Salmasizadeh, Mohammad Reza Aref:
A Provably Secure Short Signature Scheme from Coding Theory. 948 - Luca Melis, Hassan Jameel Asghar, Emiliano De Cristofaro, Mohamed Ali Kâafar:
Private Processing of Outsourced Network Functions: Feasibility and Constructions. 949 - Shota Goto, Junji Shikata:
A Compiler of Two-Party Protocols for Composable and Game-Theoretic Security, and Its Application to Oblivious Transfer. 950 - Mahdi Cheraghchi:
Nearly Optimal Robust Secret Sharing. 951 - Rafael Dowsley, Felipe Lacerda, Anderson C. A. Nascimento:
Commitment and Oblivious Transfer in the Bounded Storage Model with Errors. 952 - Markku-Juhani O. Saarinen:
Gaussian Sampling Precision and Information Leakage in Lattice Cryptography. 953 - Kaoutar Elkhiyaoui, Melek Önen, Refik Molva:
Online-Offline Homomorphic Signatures for Polynomial Functions. 954 - Mridul Nandi, Tapas Pandit:
On the Power of Pair Encodings: Frameworks for Predicate Cryptographic Primitives. 955 - Christoph Dobraunig, Maria Eichlseder, Florian Mendel:
Analysis of the Kupyna-256 Hash Function. 956 - Yael Tauman Kalai, Omer Paneth:
Delegating RAM Computations. 957 - (Withdrawn) One-key Double-Sum MAC with Beyond-Birthday Security. 958
- Jian Zou, Le Dong:
Cryptanalysis of the Round-Reduced Kupyna Hash Function. 959 - Öznur Arabaci, Mehmet Sabir Kiraz, Isa Sertkaya, Osmanbey Uzunkol:
More Efficient Secure Outsourcing Methods for Bilinear Maps. 960 - Essam Ghadafi:
Short Structure-Preserving Signatures. 961 - Thuong T. Dang, Tri T. Ton, Van H. Dang, Thuc Dinh Nguyen:
SOME REMARKS ON THE LOGARITHMIC SIGNATURES OF FINITE ABELIAN GROUPS. 962 - Houda Ferradi, Rémi Géraud, David Naccache, Assia Tria:
When Organized Crime Applies Academic Results - A Forensic Analysis of an In-Card Listening Device. 963 - Danping Shi, Lei Hu, Siwei Sun, Ling Song:
Linear (hull) Cryptanalysis of Round-reduced Versions of KATAN. 964 - Miran Kim, Kristin E. Lauter:
Private Genome Analysis through Homomorphic Encryption. 965 - Dustin Moody, Ray A. Perlner:
Vulnerabilities of "McEliece in the World of Escher". 966 - Marc Stevens, Pierre Karpman, Thomas Peyrin:
Freestart collision on full SHA-1. 967 - Gaëtan Leurent:
Differential and Linear Cryptanalysis of ARX with Partitioning - Application to FEAL and Chaskey. 968 - Claude Crépeau, Raza Ali Kazmi:
Zero-Knowledge Interactive Proof Systems for New Lattice Problems. 969 - (Withdrawn) Multilinear Maps over the Integers Using Modulus Switching. 970
- Hao Chen, Kristin E. Lauter, Katherine E. Stange:
Attacks on Search RLWE. 971 - David Pointcheval, Olivier Sanders, Jacques Traoré:
Cut Down the Tree to Achieve Constant Complexity in Divisible E-Cash. 972 - Ashwin Jha, Mridul Nandi:
Some Cryptanalytic Results on Zipper Hash and Concatenated Hash. 973 - Ehsan Aerabi, A. Elhadi Amirouche, Houda Ferradi, Rémi Géraud, David Naccache, Jean Vuillemin:
The Conjoined Microprocessor. 974 - James Alderman, Christian Janson, Keith M. Martin, Sarah Louise Renwick:
Extended Functionality in Verifiable Searchable Encryption. 975 - Alex Biryukov, Léo Perrin:
On Reverse-Engineering S-Boxes with Hidden Design Criteria or Structure. 976 - Michal Wronski:
Faster point scalar multiplication on NIST elliptic curves over GF(p) using (twisted) Edwards curves over GF(p³). 977 - Hugo Krawczyk, Hoeteck Wee:
The OPTLS Protocol and TLS 1.3. 978 - Raluca Ada Popa, Nickolai Zeldovich, Hari Balakrishnan:
Guidelines for Using the CryptDB System Securely. 979 - Behzad Abdolmaleki, Hamidreza Bakhshi, Karim Baghery, Mohammad Reza Aref:
Analysis of an RFID Authentication Protocol in Accordance with EPC Standards. 980 - Ayantika Chatterjee, Indranil Sengupta:
Searching and Sorting of Fully Homomorphic Encrypted Data on Cloud. 981 - Sihem Mesnager:
A note on constructions of bent functions from involutions. 982 - Ping Ngai Chung, Craig Costello, Benjamin Smith:
Fast, uniform, and compact scalar multiplication for elliptic curves and genus 2 Jacobians with applications to signature schemes. 983 - Koh-ichi Nagao:
Complexity of ECDLP under the First Fall Degree Assumption. 984 - Koh-ichi Nagao:
Polynomial time reduction from 3SAT to solving low first fall degree multivariable cubic equations system. 985 - Koh-ichi Nagao:
Bit Coincidence Mining Algorithm. 986 - Yehuda Lindell, Ben Riva:
Blazing Fast 2PC in the Offline/Online Setting with Security for Malicious Adversaries. 987 - Mohamed Ahmed Abdelraheem, Javad Alizadeh, Hoda Alkhzaimi, Mohammad Reza Aref, Nasour Bagheri, Praveen Gauravaram:
Improved Linear Cryptanalysis of reduced-round SIMON-32 and SIMON-48. 988 - Ivan Damgård, Rasmus Winther Zakarias:
Fast Oblivious AES\\A dedicated application of the MiniMac protocol. 989 - Geoffroy Couteau, Thomas Peters, David Pointcheval:
Encryption Switching Protocols. 990 - Mike Scott:
Ed3363 (HighFive) - An alternative Elliptic Curve. 991 - Jinsu Kim, Sungwook Kim, Jae Hong Seo:
Multilinear Map via Scale-Invariant FHE: Enhancing Security and Efficiency. 992 - Daniel Apon, Xiong Fan, Feng-Hao Liu:
Bi-Deniable Inner Product Encryption from LWE. 993 - (Withdrawn) An Efficient Scheme to Reduce Side-Channel Leakage of MAC-Keccak for Smart Card. 994
- Nitesh Emmadi, Praveen Gauravaram, Harika Narumanchi, Habeeb Syed:
Updates on Sorting of Fully Homomorphic Encrypted Data. 995 - Daniel J. Bernstein:
Multi-user Schnorr security, revisited. 996 - Sanjam Garg, Omkant Pandey:
Incremental Program Obfuscation. 997 - Paolo D'Arco, Navid Nasr Esfahani, Douglas R. Stinson:
All or Nothing at All. 998 - Robert Granger, Philipp Jovanovic, Bart Mennink, Samuel Neves:
Improved Masking for Tweakable Blockciphers with Applications to Authenticated Encryption. 999 - Luke Valenta, Shaanan Cohney, Alex Liao, Joshua Fried, Satya Bodduluri, Nadia Heninger:
Factoring as a Service. 1000 - Margaux Dugardin, Louiza Papachristodoulou, Zakaria Najm, Lejla Batina, Jean-Luc Danger, Sylvain Guilley, Jean-Christophe Courrège, Carine Therond:
Dismantling real-world ECC with Horizontal and Vertical Template Attacks. 1001 - Gunnar Alendal, Christian Kison, modg:
got HW crypto? On the (in)security of a Self-Encrypting Drive series. 1002 - Oscar García Morchon, Ronald Rietman, Igor E. Shparlinski, Ludo Tolhuizen:
Results on polynomial interpolation with mixed modular operations and unknown moduli. 1003 - Shinya Okumura, Shingo Sugiyama, Masaya Yasuda, Tsuyoshi Takagi:
Security Analysis of Cryptosystems Using Short Generators over Ideal Lattices. 1004 - Wenbin Zhang, Chik How Tan:
Cryptanalysis of Yasuda, Takagi and Sakurai's Signature Scheme Using Invariant Subspaces. 1005 - Ivan Damgård, Kasper Damgård, Kurt Nielsen, Peter Sebastian Nordholt, Tomas Toft:
Confidential Benchmarking based on Multiparty Computation. 1006 - Zhichao Zhao, T.-H. Hubert Chan:
How to Vote Privately Using Bitcoin. 1007 - Gaby G. Dagher, Benedikt Bünz, Joseph Bonneau, Jeremy Clark, Dan Boneh:
Provisions: Privacy-preserving proofs of solvency for Bitcoin exchanges. 1008 - Pawel Morawiecki, Josef Pieprzyk, Michal Straus, Marian Srebrny:
Applications of Key Recovery Cube-attack-like. 1009 - Sanjam Garg, Payman Mohassel, Charalampos Papamanthou:
TWORAM: Round-Optimal Oblivious RAM with Applications to Searchable Encryption. 1010 - Zvika Brakerski, Gil Segev:
Hierarchical Functional Encryption. 1011 - Harish Karthikeyan, Suvradip Chakraborty, Kunwar Singh, C. Pandu Rangan:
An Efficient Multiple PKG Compatible Identity Based Key Agreement for Vehicular Networks. 1012 - Divesh Aggarwal, Tomasz Kazana, Maciej Obremski:
Inception Makes Non-malleable Codes Stronger. 1013 - Léo Ducas, Thomas Prest:
Fast Fourier Orthogonalization. 1014 - Joseph Bonneau, Jeremy Clark, Steven Goldfeder:
On Bitcoin as a public randomness source. 1015 - Avijit Dutta, Goutam Paul:
Lifting the Security of NI-MAC Beyond Birthday Bound. 1016 - Nishanth Chandran, Vipul Goyal, Aayush Jain, Amit Sahai:
Functional Encryption: Decentralised and Delegatable. 1017 - Neal Koblitz, Alfred Menezes:
A Riddle Wrapped in an Enigma. 1018 - Aggelos Kiayias, Giorgos Panagiotakos:
Speed-Security Tradeoffs in Blockchain Protocols. 1019 - Aanchal Malhotra, Isaac E. Cohen, Erik Brakke, Sharon Goldberg:
Attacking the Network Time Protocol. 1020 - Katsuyuki Takashima:
New Proof Techniques for DLIN-Based Adaptively Secure Attribute-Based Encryption and Their Application. 1021 - Steven D. Galbraith, Pierrick Gaudry:
Recent progress on the elliptic curve discrete logarithm problem. 1022 - Prabhanjan Ananth, Abhishek Jain, Amit Sahai:
Indistinguishability Obfuscation with Constant Size Overhead. 1023 - (Withdrawn) Parallel Implementation of Number Theoretic Transform. 1024
- Dieter Schmidt:
PAGES+, PAGES-, and PAGES- - Three Families of Block Ciphers. 1025 - Yoshinori Aono, Le Trieu Phong, Lihua Wang:
Hardness Estimation of LWE via Band Pruning. 1026 - Taechan Kim:
Extended Tower Number Field Sieve: A New Complexity for Medium Prime Case. 1027 - Hristina Mihajloska, Danilo Gligoroski, Simona Samardjiska:
Reviving the Idea of Incremental Cryptography for the Zettabyte era Use case: Incremental Hash Functions Based on SHA-3. 1028 - Dave Singelée, Stefaan Seys, Lejla Batina, Ingrid Verbauwhede:
The Energy Budget for Wireless Security: Extended Version. 1029 - Vadim N. Tsypyschev:
SECOND COORDINATE SEQUENCE OF MP-LRS OVER NONTRIVIAL GALOIS RING OF ODD CHARACTERISTIC. 1030 - Antonio Marcedone, Zikai Wen, Elaine Shi:
Secure Dating with Four or Fewer Cards. 1031 - Allison Bishop, Valerio Pastro, Rajmohan Rajaraman, Daniel Wichs:
Essentially Optimal Robust Secret Sharing with Maximal Corruptions. 1032 - Gideon Samid:
The Ultimate Transposition Cipher (UTC). 1033 - Marco Chiappetta, Erkay Savas, Cemal Yilmaz:
Real time detection of cache-based side-channel attacks using Hardware Performance Counters. 1034 - Britta Hale, Christopher Carr, Danilo Gligoroski:
CARIBE: Adapting Traditional IBE for the Modern Key-Covetous Appetite. 1035 - Selçuk Kavut, Subhamoy Maitra:
Patterson-Wiedemann type functions on 21 variables with Nonlinearity greater than Bent Concatenation bound. 1036 - Jean-Sébastien Coron:
Cryptanalysis of GGH15 Multilinear Maps. 1037 - Yan Huang, Ruiyu Zhu:
Revisiting LEGOs: Optimizations, Analysis, and their Limit. 1038 - David W. Archer, Dan Bogdanov, Benny Pinkas, Pille Pullonen:
Maturity and Performance of Programmable Secure Computation. 1039 - Masahiro Yagisawa:
Fully Homomorphic Encryption with Composite Number Modulus. 1040 - Magnus Gausdal Find, Daniel Smith-Tone, Meltem Sönmez Turan:
The Number of Boolean Functions with Multiplicative Complexity 2. 1041 - Andreas Hülsing, Joost Rijneveld, Peter Schwabe:
ARMed SPHINCS - Computing a 41KB signature in 16KB of RAM. 1042 - Subhamoy Maitra:
The Index j in RC4 is not Pseudo-random due to Non-existence of Finney Cycle. 1043 - Andrej Bogdanov, Chin Ho Lee:
Homomorphic evaluation requires depth. 1044 - Gefei Li, Yuval Yarom, Damith Chinthana Ranasinghe:
Exploiting Transformations of the Galois Configuration to Improve Guess-and-Determine Attacks on NFSRs. 1045 - Benny Applebaum, Pavel Raykov:
From Private Simultaneous Messages to Zero-Information Arthur-Merlin Protocols and Back. 1046 - Julia Hesse, Dennis Hofheinz, Andy Rupp:
Reconfigurable Cryptography: A flexible approach to long-term security. 1047 - Dennis Hofheinz, Tibor Jager:
Verifiable Random Functions from Standard Assumptions. 1048 - Thomas Peyrin, Yannick Seurin:
Counter-in-Tweak: Authenticated Encryption Modes for Tweakable Block Ciphers. 1049 - Thuraya M. Qaradaghi, Newroz N. Abdulrazaq:
Comparison Between Irreducible and Separable Goppa Code in McEliece Cryptosystem. 1050 - Jayaprakash Kar:
Cryptanalysis and Improvement of Identity-based Proxy Multi-signature scheme. 1051 - Chenglu Jin, Xiaolin Xu, Wayne P. Burleson, Ulrich Rührmair, Marten van Dijk:
PLayPUF: Programmable Logically Erasable PUFs for Forward and Backward Secure Key Management. 1052 - Binyi Chen, Huijia Lin, Stefano Tessaro:
Oblivious Parallel RAM: Improved Efficiency and Generic Constructions. 1053 - Hui Zhao, Kouichi Sakurai:
Computational Soundness of Uniformity Properties for Multi-party Computation based on LSSS. 1054 - Yuval Ishai, Mor Weiss, Guang Yang:
Making the Best of a Leaky Situation: Zero-Knowledge PCPs from Leakage-Resilient Circuits. 1055 - Nishanth Chandran, Bhavana Kanukurthi, Srinivasan Raghuraman:
Information-theoretic Local Non-malleable Codes and their Applications. 1056 - Jack Murtagh, Salil P. Vadhan:
The Complexity of Computing the Optimal Composition of Differential Privacy. 1057 - Siyao Guo, Pavel Hubácek, Alon Rosen, Margarita Vald:
Rational Sumchecks. 1058 - David Derler, Henrich Christopher Pöhls, Kai Samelin, Daniel Slamanig:
A General Framework for Redactable Signatures and New Constructions. 1059 - Joost Renes, Craig Costello, Lejla Batina:
Complete addition formulas for prime order elliptic curves. 1060 - Tianren Liu, Vinod Vaikuntanathan:
On Basing Private Information Retrieval on NP-Hardness. 1061 - Mohammad Mahmoody, Ameer Mohammed, Soheil Nematihaji, Rafael Pass, Abhi Shelat:
Lower Bounds on Assumptions behind Indistinguishability Obfuscation. 1062 - Divesh Aggarwal, Shashank Agrawal, Divya Gupta, Hemanta K. Maji, Omkant Pandey, Manoj Prabhakaran:
Optimal Computational Split-state Non-malleable Codes. 1063 - Hoeteck Wee:
Déjà Q: Encore! Un Petit IBE. 1064 - Christopher W. Fletcher, Muhammad Naveed, Ling Ren, Elaine Shi, Emil Stefanov:
Bucket ORAM: Single Online Roundtrip, Constant Bandwidth Oblivious RAM. 1065 - Haipeng Qu, Peng Shang, Xi Jun Lin, Lin Sun:
Cryptanalysis of A Privacy-Preserving Smart Metering Scheme Using Linkable Anonymous Credential. 1066 - Vladimir Kolesnikov, Alex J. Malozemoff:
Public Verifiability in the Covert Model (Almost) for Free. 1067 - Steve Lu, Rafail Ostrovsky:
Black-Box Parallel Garbled RAM. 1068 - Yuanxi Dai, John P. Steinberger:
Feistel Networks: Indifferentiability at 8 Rounds. 1069 - Bo Tang, Jiapeng Zhang:
Barriers to Black-Box Constructions of Traitor Tracing Systems. 1070 - Arpita Maitra, Goutam Paul, Asim K. Pal:
Fairness in Secure Two-Party Computation with Rational Players. 1071 - (Withdrawn) Quantum One-Time Memories from Stateless Hardware. 1072
- David Derler, Daniel Slamanig:
Practical Witness Encryption for Algebraic Languages And How to Reply an Unknown Whistleblower. 1073 - Ran Canetti, Yilei Chen, Justin Holmgren, Mariana Raykova:
Succinct Adaptive Garbled RAM. 1074 - Michele Mosca:
Cybersecurity in an era with quantum computers: will we be ready? 1075 - Razvan Barbulescu:
An appendix for a recent paper of Kim. 1076 - Dibyendu Roy, Sourav Mukhopadhyay:
Fault Analysis on the Stream Ciphers LILI-128 and Achterbahn. 1077 - Sanjam Garg, Omkant Pandey, Akshayaram Srinivasan:
On the Exact Cryptographic Hardness of Finding a Nash Equilibrium. 1078 - Ming Li, Mingxing Wang, Dongdai Lin:
De Bruijn Sequences from Symmetric Shift Registers. 1079 - Pablo Freyre, Nelson Díaz, Oristela Cuellar:
Variations to the Cryptographics Algorithms AES and Twofish. 1080 - Reza Azarderakhsh, Zhe Liu, Hwajeong Seo, Howon Kim:
NEON PQCryto: Fast and Parallel Ring-LWE Encryption on ARM NEON Architecture. 1081 - Prabhanjan Ananth, Yu-Chi Chen, Kai-Min Chung, Huijia Lin, Wei-Kai Lin:
Delegating RAM Computations with Adaptive Soundness and Privacy. 1082 - Mostafa Taha, Thomas Eisenbarth:
Implementation Attacks on Post-Quantum Cryptographic Schemes. 1083 - Prabhanjan Ananth, Abhishek Jain, Amit Sahai:
Patchable Obfuscation. 1084 - Pawel Morawiecki:
Malicious Keccak. 1085 - Julien Allibert, Benoit Feix, Georges Gagnerot, Ismael Kane, Hugues Thiebeauld, Tiana Razafindralambo:
Chicken or the Egg - Computational Data Attacks or Physical Attacks. 1086 - (Withdrawn) Efficient Signature Schemes from R-LWE. 1087
- Eiichiro Fujisaki, Keita Xagawa:
Note on the RKA security of Continuously Non-Malleable Key-Derivation Function from PKC 2015. 1088 - Ronald Cramer, Ivan Bjerre Damgård, Nico Döttling, Serge Fehr, Gabriele Spini:
Linear Secret Sharing Schemes from Error Correcting Codes and Universal Hash Functions. 1089 - Vipul Goyal, Dakshita Khurana, Ilya Mironov, Omkant Pandey, Amit Sahai:
Do Distributed Differentially-Private Protocols Require Oblivious Transfer? 1090 - (Withdrawn) Construction for de Bruijn Sequences with Large Orders. 1091
- Erdem Alkim, Léo Ducas, Thomas Pöppelmann, Peter Schwabe:
Post-quantum key exchange - a new hope. 1092 - Ahmed E. Kosba, Zhichao Zhao, Andrew Miller, Yi Qian, T.-H. Hubert Chan, Charalampos Papamanthou, Rafael Pass, Abhi Shelat, Elaine Shi:
How to Use SNARKs in Universally Composable Protocols. 1093 - Divesh Aggarwal, Kaave Hosseini, Shachar Lovett:
Affine-malleable Extractors, Spectrum Doubling, and Application to Privacy Amplification. 1094 - Vipul Goyal, Aayush Jain, Dakshita Khurana:
Witness Signatures and Non-Malleable Multi-Prover Zero-Knowledge Proofs. 1095 - Aloni Cohen, Justin Holmgren, Ryo Nishimaki, Vinod Vaikuntanathan, Daniel Wichs:
Watermarking Cryptographic Capabilities. 1096 - Ivan Damgård, Jesper Buus Nielsen, Antigoni Polychroniadou:
On the Communication required for Unconditionally Secure Multiplication. 1097 - Shen Noether:
Ring SIgnature Confidential Transactions for Monero. 1098 - Stanislaw Jarecki, Hugo Krawczyk, Maliheh Shirvanian, Nitesh Saxena:
Device-Enhanced Password Protocols with Optimal Online-Offline Protection. 1099 - Anissa Sghaier, Loubna Ghammam, Zeghid Medien, Sylvain Duquesne, Mohsen Machhout:
Area-Efficient Hardware Implementation of the Optimal Ate Pairing over BN curves. 1100 - Jan Camenisch, Anja Lehmann, Gregory Neven, Kai Samelin:
Virtual Smart Cards: How to Sign with a Password and a Server. 1101 - Adi Ben-Zvi, Simon R. Blackburn, Boaz Tsaban:
A Practical Cryptanalysis of the Algebraic Eraser. 1102 - Sihem Mesnager:
Linear codes with few weights from weakly regular bent functions based on a generic construction. 1103 - Hugo Labrande:
Computing Jacobi's \theta in quasi-linear time. 1104 - Peter Y. A. Ryan, Peter B. Rønne, Vincenzo Iovino:
Selene: Voting with Transparent Verifiability and Coercion-Mitigation. 1105 - Daniel S. Roche, Daniel Apon, Seung Geol Choi, Arkady Yerukhimovich:
POPE: Partial Order-Preserving Encoding. 1106 - Vipul Goyal, Divya Gupta, Amit Sahai:
Concurrent Secure Computation via Non-Black Box Simulation. 1107 - Jun Wang, Qiang Tang:
Recommender Systems and their Security Concerns. 1108 - Bahram Rashidi, Sayed Masoud Sayedi, Reza Rezaeian Farashahi:
Efficient and Low-complexity Hardware Architecture of Gaussian Normal Basis Multiplication over GF(2m) for Elliptic Curve Cryptosystems. 1109 - Hannes Groß, Marko Hölbl, Daniel Slamanig, Raphael Spreitzer:
Privacy-Aware Authentication in the Internet of Things. 1110 - (Withdrawn) Comparison of TERO-cell implementations and characterisation on SRAM FPGAs. 1111
- Prastudy Fauzi, Helger Lipmaa:
Efficient Culpably Sound NIZK Shuffle Argument without Random Oracles. 1112 - Vipul Goyal, Aayush Jain, Adam O'Neill:
Multi-Input Functional Encryption with Unbounded-Message Security. 1113 - Michal Wronski:
Faster arithmetic on elliptic curves using Fp2. Application to GLV-GLS and NIST elliptic curves over Fp isomorphic to twisted Hessian curves over fields extension. 1114 - Avishek Adhikari, Kirill Morozov, Satoshi Obana, Partha Sarathi Roy, Kouichi Sakurai, Rui Xu:
Efficient Threshold Secret Sharing Schemes Secure against Rushing Cheaters. 1115 - Tarik Moataz, Erik-Oliver Blass, Travis Mayberry:
Constant Communication ORAM without Encryption. 1116 - Antonio de la Piedra:
Efficient implementation of AND, OR and NOT operators for ABCs. 1117 - Zhenzhen Bao, Peng Luo, Dongdai Lin:
Bitsliced Implementations of the PRINCE, LED and RECTANGLE Block Ciphers on AVR 8-bit Microcontrollers. 1118 - Rosario Giustolisi, Vincenzo Iovino, Peter B. Rønne:
On the Possibility of Non-Interactive E-Voting in the Public-key Setting. 1119 - Vikram Singh, Arjun Chopra:
Even More Practical Key Exchanges for the Internet using Lattice Cryptography. 1120 - Stavros Kousidis, Andreas Wiemers:
On the First Fall Degree of Summation Polynomials. 1121 - (Withdrawn) Schnorr Signatures in the Multi-User Setting. 1122
- Daniele Micciancio, Michael Walter:
Practical, Predictable Lattice Basis Reduction. 1123 - Juan Carlos Ku-Cauich, Guillermo Morales-Luna:
A Linear Code and its Application into Secret Sharing. 1124 - Nathan Chenette, Kevin Lewi, Stephen A. Weis, David J. Wu:
Practical Order-Revealing Encryption with Limited Leakage. 1125 - Daniel S. Roche, Adam J. Aviv, Seung Geol Choi:
A Practical Oblivious Map Data Structure with Secure Deletion and History Independence. 1126 - Mikhail Anokhin:
Pseudo-Free Families of Finite Computational Elementary Abelian p-Groups. 1127 - Anja Becker, Léo Ducas, Nicolas Gama, Thijs Laarhoven:
New directions in nearest neighbor searching with applications to lattice sieving. 1128 - Martin R. Albrecht, Kenneth G. Paterson:
Lucky Microseconds: A Timing Attack on Amazon's s2n Implementation of TLS. 1129 - Nir Bitansky, Vinod Vaikuntanathan:
A Note on Perfect Correctness by Derandomization. 1130 - Ding Wang, Ping Wang:
On the Usability of Two-Factor Authentication. 1131 - Katsuyuki Takashima, Atsushi Takayasu:
Tighter Security for Efficient Lattice Cryptography via the Rényi Divergence of Optimized Orders. 1132 - Zhengjun Cao, Lihua Liu:
Comment on "Realization of a scalable Shor algorithm". 1133 - Eric Crockett, Chris Peikert:
Λ ∘ λ: A Functional Library for Lattice Cryptography. 1134 - Hiraku Morita, Jacob C. N. Schuldt, Takahiro Matsuda, Goichiro Hanaoka, Tetsu Iwata:
On the Security of the Schnorr Signature Scheme and DSA against Related-Key Attacks. 1135 - Saikrishna Badrinarayanan, Divya Gupta, Abhishek Jain, Amit Sahai:
Multi-Input Functional Encryption for Unbounded Arity Functions. 1136 - Mengce Zheng, Honggang Hu:
A New Factoring Attack on Multi-Prime RSA with Small Prime Difference. 1137 - Elena Dubrova, Mats Näslund, Göran Selander, Fredrik Lindqvist:
Lightweight CRC-based Message Authentication. 1138 - Jian Liu, Sihem Mesnager, Lusheng Chen:
Secret Sharing Schemes with General Access Structures (Full version). 1139 - Pranjal Dutta:
Modular Inversion Hidden Number Problem- A Lattice Approach. 1140 - Thomas Allan, Billy Bob Brumley, Katrina Falkner, Joop van de Pol, Yuval Yarom:
Amplifying Side Channels Through Performance Degradation. 1141 - Subhadeep Banik, Andrey Bogdanov, Takanori Isobe, Kyoji Shibutani, Harunaga Hiwatari, Toru Akishita, Francesco Regazzoni:
Midori: A Block Cipher for Low Energy (Extended Version). 1142 - (Withdrawn) A Multi-Bit Fully Homomorphic Encryption with Shorter Public Key from LWE. 1143
- Olivier Blazy, Céline Chevalier, Damien Vergnaud:
Mitigating Server Breaches in Password-Based Authentication: Secure and Efficient Solutions. 1144 - Abderrahmane Nitaj, Tajjeeddine Rachidi:
Lattice Attacks on the DGHV Homomorphic Encryption Scheme. 1145 - Jesus Diaz, David Arroyo, Francisco de Borja Rodríguez:
libgroupsig: An extensible C library for group signatures. 1146 - (Withdrawn) Collusion Resistant Aggregation from Convertible Tags. 1147
- Ritam Bhaumik, Mridul Nandi:
An Inverse-free Single-Keyed Tweakable Enciphering Scheme. 1148 - Takahiro Matsuda, Goichiro Hanaoka:
An Asymptotically Optimal Method for Converting Bit Encryption to Multi-Bit Encryption. 1149 - Colin Boyd, Britta Hale, Stig Frode Mjølsnes, Douglas Stebila:
From Stateless to Stateful: Generic Authentication and Authenticated Encryption Constructions with Application to TLS. 1150 - Antonio Faonio, Jesper Buus Nielsen:
Fully Leakage-Resilient Codes. 1151 - Qiang Tang, Jun Wang:
Privacy-preserving Friendship-based Recommender Systems. 1152 - Samee Zahur, David Evans:
Obliv-C: A Language for Extensible Data-Oblivious Computation. 1153 - Jean-Philippe Aumasson, Philipp Jovanovic, Samuel Neves:
NORX8 and NORX16: Authenticated Encryption for Low-End Systems. 1154 - Gorka Irazoqui, Thomas Eisenbarth, Berk Sunar:
Cross Processor Cache Attacks. 1155 - (Withdrawn) An Identity Based Encryption Scheme Resilient to RAM Scraper Like Malware Attacks. 1156
- Mihir Bellare, Douglas Stebila:
Double-Authentication-Preventing Signatures from Trapdoor Identification. 1157 - Marie-Sarah Lacharité, Kenneth G. Paterson:
A note on the optimality of frequency analysis vs. ℓp-optimization. 1158 - Dan Bogdanov, Liina Kamm, Baldur Kubo, Reimo Rebane, Ville Sokk, Riivo Talviste:
Students and Taxes: a Privacy-Preserving Social Study Using Secure Computation. 1159 - Yasufumi Hashimoto:
Cryptanalysis of multi-HFE. 1160 - Jia Xu, Jianying Zhou, Liming Lu:
Cyber and Physical Access Control in Legacy System Using Passwords. 1161 - Phillip Rogaway:
The Moral Character of Cryptographic Work. 1162 - Mehmet Özen, Mustafa Çoban, Ferhat Karakoç:
A Guess-and-Determine Attack on Reduced-Round Khudra and Weak Keys of Full Cipher. 1163 - Pasquale Forte, Diego Romano, Giovanni Schmid:
Beyond Bitcoin - Part I: A critical look at blockchain-based systems. 1164 - Li Lin, Wenling Wu:
Meet-in-the-Middle Attacks on Reduced-Round Midori-64. 1165 - Aggelos Kiayias, Thomas Zacharias, Bingsheng Zhang:
Ceremonies for End-to-End Verifiable Elections. 1166 - Dan Boneh, Kevin Lewi, David J. Wu:
Constraining Pseudorandom Functions Privately. 1167 - (Withdrawn) SCP: A Computationally-Scalable Byzantine Consensus Protocol For Blockchains. 1168
- Marc Green, Thomas Eisenbarth:
Strength in Numbers: Threshold ECDSA to Protect Keys in the Cloud. 1169 - Takanori Yasuda, Xavier Dahan, Kouichi Sakurai:
Characterizing NTRU-Variants Using Group Ring and Evaluating their Lattice Security. 1170 - (Withdrawn) On the Security of a access polynomial based self-healing key management schemes in wireless sensor networks. 1171
- (Withdrawn) An Application Specific Instruction Set Processor (ASIP) for the Niederreiter Cryptosystem. 1172
- Shai Halevi, Yuval Ishai, Abhishek Jain, Eyal Kushilevitz, Tal Rabin:
Secure Multiparty Computation with General Interaction Patterns. 1173 - Goutam Paul, Souvik Ray:
On Data Complexity of Distinguishing Attacks vs. Message Recovery Attacks on Stream Ciphers. 1174 - Bhanu Prakash Gopularam, Nalini N:
Improved Data Confidentiality of Audit Trail Data in Multi-Tenant Cloud. 1175 - Myungsun Kim, Hyung Tae Lee, San Ling, Huaxiong Wang:
On the Efficiency of FHE-based Private Queries. 1176 - Jakob Jakobsen, Claudio Orlandi:
On the CCA (in)security of MTProto. 1177 - Vipul Goyal, Omkant Pandey, Silas Richelson:
Textbook Non-Malleable Commitments. 1178 - Kenichiro Hayasaka, Kazumaro Aoki, Tetsutaro Kobayashi, Tsuyoshi Takagi:
A construction of 3-dimensional lattice sieve for number field sieve over F_{p^n}. 1179 - Ignat Korchagin, Eugene Pilyankevich:
Secure Comparator: a ZKP-Based Authentication System. 1180 - Zhiqiang Lin, Dingyi Pei, Dongdai Lin:
Construction of Transition Matrices for Binary FCSRs. 1181 - Nicky Mouha:
Chaskey: a MAC Algorithm for Microcontrollers - Status Update and Proposal of Chaskey-12 -. 1182 - Esha Ghosh, Olga Ohrimenko, Roberto Tamassia:
Authenticated Range \& Closest Point Queries in Zero-Knowledge. 1183 - Alan Szepieniec, Jintai Ding, Bart Preneel:
Extension Field Cancellation: a New Central Trapdoor for Multivariate Quadratic Systems. 1184 - Nico Döttling, Dominique Schröder:
Efficient Pseudorandom Functions via On-the-Fly Adaptation. 1185 - Khodakhast Bibak, Bruce M. Kapron, S. Venkatesh, Roberto Tauraso, László Tóth:
Restricted linear congruences. 1186 - Khodakhast Bibak, Bruce M. Kapron, S. Venkatesh, László Tóth:
On an almost-universal hash function family with applications to authentication and secrecy codes. 1187 - Pratish Datta, Ratna Dutta, Sourav Mukhopadhyay:
Compact Attribute-Based Encryption and Signcryption for General Circuits from Multilinear Maps. 1188 - Jian Guo, Jérémy Jean, Ivica Nikolic, Kexin Qiao, Yu Sasaki, Siang Meng Sim:
Invariant Subspace Attack Against Full Midori64. 1189 - Yuval Ishai, Eyal Kushilevitz, Steve Lu, Rafail Ostrovsky:
Private Large-Scale Databases with Distributed Searchable Symmetric Encryption. 1190 - Chester Rebeiro, Debdeep Mukhopadhyay:
A Formal Analysis of Prefetching in Profiled Cache-Timing Attacks on Block Ciphers. 1191 - Frederik Armknecht, Colin Boyd, Christopher Carr, Kristian Gjøsteen, Angela Jäschke, Christian A. Reuter, Martin Strand:
A Guide to Fully Homomorphic Encryption. 1192 - Thomas Fuhr, Gaëtan Leurent, Valentin Suder:
Collision Attacks against CAESAR Candidates - Forgery and Key-Recovery against AEZ and Marble. 1193 - Gizem S. Çetin, Wei Dai, Yarkin Doröz, Berk Sunar:
Homomorphic Autocomplete. 1194 - Gizem S. Çetin, Yarkin Doröz, Berk Sunar, William J. Martin:
An Investigation of Complex Operations with Word-Size Homomorphic Encryption. 1195 - Geoffroy Couteau, Thomas Peters, David Pointcheval:
Secure Distributed Computation on Private Inputs. 1196 - Yarkin Doröz, Berk Sunar, Gizem S. Çetin:
On-the-fly Homomorphic Batching/Unbatching. 1197 - Mihir Bellare, Anna Lysyanskaya:
Symmetric and Dual PRFs from Standard Assumptions: A Generic Validation of an HMAC Assumption. 1198 - Sergiu Carpov, Renaud Sirdey:
A compression method for homomorphic ciphertexts. 1199 - Christoph Dobraunig, Maria Eichlseder, Florian Mendel:
Heuristic Tool for Linear Cryptanalysis with Applications to CAESAR Candidates. 1200 - Zheng Yuan, Zhen Peng, Ming Mao:
A Star-based Independent Biclique Attack on Full Rounds SQUARE. 1201 - Kwangsu Lee, Dong Hoon Lee, Jong Hwan Park, Moti Yung:
CCA Security for Self-Updatable Encryption: Protecting Cloud Data When Clients Read/Write Ciphertexts. 1202 - Nikolay Kolomeec:
The graph of minimal distances of bent functions and its properties. 1203 - Elizabeth A. Quaglia, Ben Smyth:
Constructing secret, verifiable auction schemes from election schemes. 1204 - Angelo De Caro, Vincenzo Iovino, Adam O'Neill:
Deniable Functional Encryption. 1205 - Elad Carmon, Jean-Pierre Seifert, Avishai Wool:
Simple Photonic Emission Attack with Reduced Data Complexity. 1206 - Zhengjun Cao, Zhenfu Cao, Lihua Liu:
Comment on Demonstrations of Shor's Algorithm in the Past Decades. 1207 - Zheng Yuan, Zhen Peng, Haiwen Ou:
Two Kinds of Biclique Attacks on Lightweight Block Cipher PRINCE. 1208 - Alptekin Küpçü, Payman Mohassel:
Fast Optimistically Fair Cut-and-Choose 2PC. 1209 - Ehsan Ebrahimi Targhi, Dominique Unruh:
Quantum Security of the Fujisaki-Okamoto and OAEP Transforms. 1210 - Sven Heiberg, Arnis Parsovs, Jan Willemson:
Log Analysis of Estonian Internet Voting 2013-2015. 1211 - Sylvain Duquesne, Nadia El Mrabet, Safia Haloui, Franck Rondepierre:
Choosing and generating parameters for low level pairing implementation on BN curves. 1212 - Anna Krasnova, Moritz Neikes, Peter Schwabe:
Footprint scheduling for Dining-Cryptographer networks. 1213 - Britta Hale, Tibor Jager, Sebastian Lauer, Jörg Schwenk:
Speeding: On Low-Latency Key Exchange. 1214 - A. Adam Ding, Cong Chen, Thomas Eisenbarth:
Simpler, Faster, and More Robust T-test Based Leakage Detection. 1215 - Hui Guo, Zhenfeng Zhang, Jing Xu:
Non-Transferable Proxy Re-Encryption. 1216 - Boris Ryabko:
Two-faced processes and existence of RNG with proven properties. 1217 - (Withdrawn) Area-Time Efficient Hardware Implementation of Elliptic Curve Cryptosystem. 1218
- Michel Abdalla, Sonia Belaïd, David Pointcheval, Sylvain Ruhault, Damien Vergnaud:
Robust Pseudo-Random Number Generators with Input Secure Against Side-Channel Attacks. 1219 - David Cash, Eike Kiltz, Stefano Tessaro:
Two-Round Man-in-the-Middle Security from LPN. 1220 - (Withdrawn) Unclonable encryption revisited (4 ˟ 2 = 8). 1221
- Gottfried Herold, Elena Kirshanova, Alexander May:
On the Asymptotic Complexity of Solving LWE. 1222 - Sebastian Faust, Daniel Masny, Daniele Venturi:
Chosen-Ciphertext Security from Subset Sum. 1223 - Mohamed Ahmed Abdelraheem, Peter Beelen, Andrey Bogdanov, Elmar Tischhauser:
Twisted Polynomials and Forgery Attacks on GCM. 1224 - Debapriya Basu Roy, Poulami Das, Debdeep Mukhopadhyay:
ECC on Your Fingertips: A Single Instruction Approach for Lightweight ECC Design in GF (p). 1225 - Oleg Mazonka, Nektarios Georgios Tsoutsos, Michail Maniatakos:
Cryptoleq: A Heterogeneous Abstract Machine for Encrypted and Unencrypted Computation. 1226 - Akshima, Donghoon Chang, Mohona Ghosh, Aarushi Goel, Somitra Kumar Sanadhya:
Single Key Recovery Attacks on 9-round Kalyna-128/256 and Kalyna-256/512. 1227 - Eric R. Verheul:
Privacy protection in electronic education based on polymorphic pseudonymization. 1228 - Jintai Ding, Momonari Kudo, Shinya Okumura, Tsuyoshi Takagi, Chengdong Tao:
Cryptanalysis of a public key cryptosystem based on Diophantine equations via weighted LLL reduction. 1229 - Foteini Baldimtsi, Aggelos Kiayias, Thomas Zacharias, Bingsheng Zhang:
Indistinguishable Proofs of Work or Knowledge. 1230 - Hassan Jameel Asghar, Mohamed Ali Kâafar:
When are Identification Protocols with Sparse Challenges Safe? The Case of the Coskun and Herley Attack. 1231 - Tanping Zhou, Longfei Liu, Xiaoyuan Yang, Yiliang Han:
Extend FHEW to General Case. 1232 - Samuel Neves, Mehdi Tibouchi:
Degenerate Curve Attacks. 1233 - Ruxandra F. Olimid, Anat Paskin-Cherniavsky:
On Cryptographic Anonimity and Unpredicatbility in Secret Sharing. 1234 - Susumu Kiyoshima:
Constant-round Leakage-resilient Zero-knowledge from Collision Resistance. 1235 - Liron David, Avishai Wool:
A Bounded-Space Near-Optimal Key Enumeration Algorithm for Multi-Dimensional Side-Channel Attacks. 1236 - Stanislav Smyshlyaev, Igor B. Oshkin, Evgeniy K. Alekseev, Liliya R. Ahmetzyanova:
On the Security of One Password Authenticated Key Exchange Protocol. 1237 - Ran Cohen:
Asynchronous Secure Multiparty Computation in Constant Time. 1238 - Yansong Gao, Damith Chinthana Ranasinghe, Said F. Al-Sarawi, Derek Abbott:
Secure Goods Supply Chain and Key Exchange with Virtual Proof of Reality. 1239 - (Withdrawn) Exploiting Unreliability of the PUF to Secure Remote Wireless Sensing. 1240
- José Bacelar Almeida, Manuel Barbosa, Gilles Barthe, François Dupressoir:
Verifiable side-channel security of cryptographic implementations: constant-time MEE-CBC. 1241 - Anne Broadbent, Christian Schaffner:
Quantum Cryptography Beyond Quantum Key Distribution. 1242 - Riad S. Wahby, Max Howald, Siddharth Garg, Abhi Shelat, Michael Walfish:
Verifiable ASICs. 1243 - George Shushuev:
On values of vectorial Boolean functions and related problems in APN functions. 1244 - Chunsheng Gu:
Variation of GGH15 Multilinear Maps. 1245 - Jan Camenisch, Manu Drijvers, Anja Lehmann:
Universally Composable Direct Anonymous Attestation. 1246 - Mike Scott:
Missing a trick: Karatsuba revisited. 1247 - Janaka Alawatugoda:
Generic Transformation of a CCA2-Secure Public-Key Encryption Scheme to an eCK-Secure Key Exchange Protocol in the Standard Model. 1248 - Thomas Baignères, Cécile Delerablée, Matthieu Finiasz, Louis Goubin, Tancrède Lepoint, Matthieu Rivain:
Trap Me If You Can - Million Dollar Curve. 1249 - Brett Hemenway, Zahra Jafargholi, Rafail Ostrovsky, Alessandra Scafuro, Daniel Wichs:
Adaptively Secure Garbled Circuits from One-Way Functions. 1250 - Zhengjun Cao, Zhenfu Cao:
Comment on Quantum Cryptography - Which is More Important, Signal Security, Information Security or Communication Reliability. 1251 - Sayandeep Saha, Rajat Subhra Chakraborty, Srinivasa Shashank Nuthakki, Anshul, Debdeep Mukhopadhyay:
Improved Test Pattern Generation for Hardware Trojan Detection using Genetic Algorithm and Boolean Satisfiability. 1252 - Yu Chen, Baodong Qin, Jiang Zhang, Yi Deng, Sherman S. M. Chow:
Non-Malleable Functions and Their Applications. 1253 - Yohei Watanabe, Junji Shikata:
Identity-based Hierarchical Key-insulated Encryption without Random Oracles. 1254 - Pratish Datta, Ratna Dutta, Sourav Mukhopadhyay:
Functional Encryption for Inner Product with Full Function Privacy. 1255 - Andreas Hülsing, Joost Rijneveld, Fang Song:
Mitigating Multi-Target Attacks in Hash-based Signatures. 1256 - (Withdrawn) Security Attack on CloudBI: Practical privacy-preserving outsourcing of biometric identification in the cloud. 1257
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.