default search action
IACR Cryptology ePrint Archive, Volume 2012
Volume 2012, 2012
- Andrew C. Yao, Yunlei Zhao:
Digital Signatures from Challenge-Divided Sigma-Protocols. 1 - Daniel J. Bernstein, Hsieh-Chung Chen, Chen-Mou Cheng, Tanja Lange, Ruben Niederhagen, Peter Schwabe, Bo-Yin Yang:
ECC2K-130 on NVIDIA GPUs. 2 - Qun-Xiong Zheng, Wen-Feng Qi, Tian Tian:
On the distinctness of binary sequences derived from primitive sequences modulo square-free odd integers. 3 - Daniel J. Bernstein, Tanja Lange:
The new SHA-3 software shootout. 4 - Benjamin Fuller, Adam O'Neill, Leonid Reyzin:
A Unified Approach to Deterministic Encryption: New Constructions and a Connection to Computational Entropy. 5 - Susan Hohenberger, Allison B. Lewko, Brent Waters:
Detecting Dangerous Queries: A New Approach for Chosen Ciphertext Security. 6 - Qiang Li, Xiangxue Li, Dong Zheng, Kefei Chen:
Optimal Multiple Assignments with (m, m)-Scheme for General Access Structures. 7 - Hubert Comon-Lundh, Véronique Cortier, Guillaume Scerri:
Security proof with dishonest keys. 8 - Saif Al-Kuwari:
On the Indifferentiability of the Integrated-Key Hash Functions. 9 - Charanjit S. Jutla, Moti Yung:
PayTree: "Amortized Signature" for Flexible Micro-Payments. 10 - Shao-zhen Chen, Tian-min Xu:
Biclique Attack of the Full ARIA-256. 11 - Melissa Chase, Markulf Kohlweiss, Anna Lysyanskaya, Sarah Meiklejohn:
Malleable Proof Systems and Applications. 12 - (Withdrawn) Higher Order Algebraic Attacks on Stream Ciphers. 13
- Yusuke Naito:
On the Indifferentiable Hash Functions in the Multi-Stage Security Games. 14 - Mihir Bellare, Stefano Tessaro, Alexander Vardy:
A Cryptographic Treatment of the Wiretap Channel. 15 - (Withdrawn) Efficient Mix-Net Veri cation by Proofs of Random Blocks. 16
- Brajesh Kumar Singh:
Secondary constructions on generalized bent functions. 17 - Kazuhiko Minematsu, Hiraku Morita, Tetsu Iwata:
Cryptanalysis of EAXprime. 18 - Gergei Bana, Hubert Comon-Lundh:
Towards Unconditional Soundness: Computationally Complete Symbolic Attacker. 19 - Jean-Pierre Flori, Sihem Mesnager:
Dickson polynomials, hyperelliptic curves and hyper-bent functions. 20 - (Withdrawn) Security Analysis of J-PAKE. 21
- Mihir Bellare, Stefano Tessaro:
Polynomial-Time, Semantically-Secure Encryption Achieving the Secrecy Capacity. 22 - Masoumeh Safkhani, Nasour Bagheri, Majid Naderi:
How a Cryptographer Can Get Rich? 23 - Somindu C. Ramanna, Sanjit Chatterjee, Palash Sarkar:
Variants of Waters' Dual-System Primitives Using Asymmetric Pairings. 24 - Xiangtao Yan, Yifa Li:
A new remote data integrity checking scheme for cloud storage. 25 - Anja Becker, Antoine Joux, Alexander May, Alexander Meurer:
Decoding Random Binary Linear Codes in 2n/20: How 1+1=0 Improves Information Set Decoding. 26 - (Withdrawn) Breaking the provably secure SAKE-C authenticated key exchange protocol with Extended Key Compromise Impersonation (E-KCI) Attack. 27
- Houssem Maghrebi, Emmanuel Prouff, Sylvain Guilley, Jean-Luc Danger:
A First-Order Leak-Free Masking Countermeasure. 28 - Yannick Seurin:
On the Exact Security of Schnorr-Type Signatures in the Random Oracle Model. 29 - Shekh Faisal Abdul-Latip, Reza Reyhanitabar, Willy Susilo, Jennifer Seberry:
Fault Analysis of the KATAN Family of Block Ciphers. 30 - Da-Zhi Sun:
An error in "On a new formal proof model for RFID location privacy". 31 - Yevgeniy Dodis, Abhishek Jain, Tal Moran, Daniel Wichs:
Counterexamples to Hardness Amplification Beyond Negligible. 32 - Sihem Mesnager, Jean-Pierre Flori:
A note on hyper-bent functions via Dillon-like exponents. 33 - Boris Köpf, Laurent Mauborgne, Martín Ochoa:
Automatic Quantification of Cache Side-Channels. 34 - Andrey Bogdanov, Lars R. Knudsen, Gregor Leander, François-Xavier Standaert, John P. Steinberger, Elmar Tischhauser:
Key-Alternating Ciphers in a Provable Setting: Encryption Using a Small Number of Public Permutations. 35 - Ashish Kundu, Mikhail J. Atallah, Elisa Bertino:
Efficient Leakage-free Authentication of Trees, Graphs and Forests. 36 - Deep Singh, Maheshanand Bhaintwal, Brajesh Kumar Singh:
Recent Results on Generalized q-ary Bent Functions. 37 - François Durvaux, Mathieu Renauld, François-Xavier Standaert, Loïc van Oldeneel tot Oldenzeel, Nicolas Veyrat-Charvillon:
Cryptanalysis of the CHES 2009/2010 Random Delay Countermeasure. 38 - Feng Hao, Dylan Clarke:
Security Analysis of a Multi-Factor Authenticated Key Exchange Protocol. 39 - Marc Stevens:
Single-block collision attack on MD5. 40 - (Withdrawn) STITCH-256: A New Dedicated Cryptographic Hash Function. 41
- Naoyuki Shinohara, Takeshi Shimoyama, Takuya Hayashi, Tsuyoshi Takagi:
Key Length Estimation of Pairing-based Cryptosystems using ηT Pairing. 42 - Ching-Fang Hsu, Bing Zeng, Qi Cheng, Guohua Cui:
A novel Group Key Transfer Protocol. 43 - Jun Zhou, Zhenfu Cao:
PSCPA: Patient Self-controllable Privacy-preserving Cooperative Authentication in Distributed m-Healthcare Systems. 44 - Sebastian Faust, Carmit Hazay, Jesper Buus Nielsen, Peter Sebastian Nordholt, Angela Zottarel:
Signature Schemes Secure against Hard-to-Invert Leakage. 45 - Konstantinos Limniotis, Nicholas Kolokotronis, Nicholas Kalouptsidis:
Modifying Boolean Functions to Ensure Maximum Algebraic Immunity. 46 - Ilya Mironov, Omkant Pandey, Omer Reingold, Gil Segev:
Incremental Deterministic Public-Key Encryption. 47 - Sourav Sen Gupta, Anupam Chattopadhyay, Ayesha Khalid:
Designing Integrated Accelerator for Stream Ciphers with Structural Similarities. 48 - Yu Sasaki, Lei Wang:
2-Dimension Sums: Distinguishers Beyond Three Rounds of RIPEMD-128 and RIPEMD-160. 49 - Jeremy Constantin, Andreas Burg, Frank K. Gürkaynak:
Investigating the Potential of Custom Instruction Set Extensions for SHA-3 Candidates on a 16-bit Microcontroller Architecture. 50 - Benedikt Driessen:
Eavesdropping on Satellite Telecommunication Systems. 51 - Alexandra Boldyreva, Vipul Goyal, Virendra Kumar:
Identity-based Encryption with Efficient Revocation. 52 - Yevgeniy Dodis:
Beating Shannon requires BOTH efficient adversaries AND non-zero advantage. 53 - Emiliano De Cristofaro, Gene Tsudik:
On the performance of certain Private Set Intersection protocols. (And some remarks on the recent paper by Huang et al. in NDSS'12). 54 - (Withdrawn) Cryptanalysis of Mun et al.'s anonymous authentication scheme for roaming service in global mobility networks. 55
- Alexandra Boldyreva, Virendra Kumar:
A New Pseudorandom Generator from Collision-Resistant Hash Functions. 56 - Somindu C. Ramanna, Palash Sarkar:
Constant-Size Ciphertext HIBE From Asymmetric Pairings Using the Dual-System Technique. 57 - Christopher Portmann:
Key recycling in authentication. 58 - Yevgeniy Dodis, Eike Kiltz, Krzysztof Pietrzak, Daniel Wichs:
Message Authentication, Revisited. 59 - David Mandell Freeman:
Improved Security for Linearly Homomorphic Signatures: A Generic Framework. 60 - Maryam Rajabzadeh Asaar, Mahmoud Salmasizadeh:
A Pairing Based Strong Designated Verifier Signature Scheme without Random Oracles. 61 - (Withdrawn) On the Security of Attribute Based Signature Schemes. 62
- Shahram Khazaei, Douglas Wikström:
Randomized Partial Checking Revisited. 63 - Arjen K. Lenstra, James P. Hughes, Maxime Augier, Joppe W. Bos, Thorsten Kleinjung, Christophe Wachter:
Ron was wrong, Whit is right. 64 - Tsukasa Ishiguro:
Modified version of "Latin Dances Revisited: New Analytic Results of Salsa20 and ChaCha". 65 - Jiqiang Lu, Wun-She Yap, Yongzhuang Wei:
Weak Keys of the Full MISTY1 Block Cipher for Related-Key Cryptanalysis. 66 - Shay Gueron, Vlad Krasnov:
Parallelizing message schedules to accelerate the computations of hash functions. 67 - (Withdrawn) Extended Security Arguments for (Ring) Signature Schemes. 68
- Charles Bouillaguet, Patrick Derbez, Pierre-Alain Fouque:
Automatic Search of Attacks on round-reduced AES and Applications. 69 - Razvan Barbulescu, Joppe W. Bos, Cyril Bouvier, Thorsten Kleinjung, Peter L. Montgomery:
Finding ECM-Friendly Curves through a Study of Galois Properties. 70 - Eli Ben-Sasson, Alessandro Chiesa, Daniel Genkin, Eran Tromer:
Fast Reductions from RAMs to Delegatable Succinct Constraint Satisfaction Problems. 71 - Craig Costello:
Particularly Friendly Members of Family Trees. 72 - Wei Gao, Guilin Wang, Xueli Wang, Kefei Chen:
Efficient identity-based threshold signature scheme from bilinear pairings in the standard model. 73 - Neal Koblitz, Alfred Menezes:
Another look at HMAC. 74 - Wei Gao, Guilin Wang, Kefei Chen, Xueli Wang, Guoyan Zhang:
Efficient identity-based threshold decryption scheme from bilinear pairings. 75 - Mark Zhandry:
Identity-based Encryption is Secure in the Quantum Random Oracle Model. 76 - Sébastien Tiran, Philippe Maurine:
Magnitude Squared Coherence based SCA. 77 - Zvika Brakerski:
Fully Homomorphic Encryption without Modulus Switching from Classical GapSVP. 78 - Masao Kasahara:
Public Key Cryptosystems Constructed Based on Reed-Solomon Codes, K(XV)SE(2)PKC, Realizing Coding Rate of Exactly 1.0. 79 - S. Sree Vivek, S. Sharmila Deva Selvi, Guhan Balasubramanian, C. Pandu Rangan:
Strongly Unforgeable Proxy Re-Signature Schemes in the Standard model. 80 - Michael Backes, Fabian Bendun, Dominique Unruh:
Computational Soundness of Symbolic Zero-knowledge Proofs: Weaker Assumptions and Mechanized Verification. 81 - Liran Lerman, Stephane Fernandes Medeiros, Nikita Veshchikov, Cédric Meuter, Gianluca Bontempi, Olivier Markowitch:
Semi-Supervised Template Attack. 82 - Casey Devet, Ian Goldberg, Nadia Heninger:
Optimally Robust Private Information Retrieval. 83 - Mohamed Saied Emam Mohamed, Stanislav Bulygin, Michael Zohner, Annelie Heuser, Michael Walter:
Improved Algebraic Side-Channel Attack on AES. 84 - Stanislav Bulygin, Michael Walter:
Study of the invariant coset attack on PRINTcipher: more weak keys with practical key recovery. 85 - (Withdrawn) Remarks on- an ideal multi-secret sharing scheme based on MSP. 86
- Joppe W. Bos, Alina Dudeanu, Dimitar Jetchev:
Collision Bounds for the Additive Pollard Rho Algorithm for Solving Discrete Logarithms. 87 - (Withdrawn) A Lattice-Based Traitor Tracing Scheme. 88
- Joppe W. Bos, Thorsten Kleinjung:
ECM at Work. 89 - Adeline Langlois, Damien Stehlé:
Worst-Case to Average-Case Reductions for Module Lattices. 90 - (Withdrawn) Hardness of decision (R)LWE for any modulus. 91
- Yossef Oren, Avishai Wool:
Tolerant Algebraic Side-Channel Analysis of AES. 92 - Ying-ming Guo, Guang-pu Gao, Ya-qun Zhao:
Recent Results on Balanced Symmetric Boolean Functions. 93 - Jintai Ding, Dieter Schmidt:
Algebraic attack on lattice based cryptosystems via solving equations over real numbers. 94 - Nir Bitansky, Ran Canetti, Alessandro Chiesa, Eran Tromer:
Recursive Composition and Bootstrapping for SNARKs and Proof-Carrying Data. 95 - Ewan Fleischmann, Christian Forler, Stefan Lucks, Jakob Wenzel:
The Collision Security of MDC-4 The Collision Security of MDC-4. 96 - Yingpu Deng, Yanbin Pan:
An algorithm for factoring integers. 97 - François Dassance, Alexandre Venelli:
Combined Attacks on the AES Key Schedule. 98 - Craig Gentry, Shai Halevi, Nigel P. Smart:
Homomorphic Evaluation of the AES Circuit. 99 - Shahram Khazaei, Björn Terelius, Douglas Wikström:
Cryptanalysis of a Universally Verifiable Efficient Re-encryption Mixnet. 100 - (Withdrawn) Unbalanced Elementary Symmetric Boolean Functions with the Degree "d" and "wt(d)≥ 3". 101
- Ron Rothblum:
On the Circular Security of Bit-Encryption. 102 - Marten van Dijk, Ari Juels, Alina Oprea, Ronald L. Rivest:
FlipIt: The Game of "Stealthy Takeover". 103 - Wei Gao, Guilin Wang, Kefei Chen, Xueli Wang:
Provably Secure Generic Construction of Certificate Based Signature from Certificateless Signature in Standard Model. 104 - Wei Gao, Guilin Wang, Kefei Chen, Xueli Wang:
Generic Construction of Certificate Based Encryption from Certificateless Encryption Revisited. 105 - Santanu Sarkar, Subhamoy Maitra:
More on Correcting Errors in RSA Private Keys: Breaking CRT-RSA with Low Weight Decryption Exponents. 106 - Guilin Wang, Jiangshan Yu, Qi Xie:
Security Analysis of A Single Sign-On Mechanism for Distributed Computer Networks. 107 - Yoshinori Aono, Manindra Agrawal, Takakazu Satoh, Osamu Watanabe:
On the Optimality of Lattices for the Coppersmith Technique. 108 - (Withdrawn) Chosen-Ciphertext Secure Efficiently Searchable Encryption in the Standard Model. 109
- Razvan Barbulescu, Jérémie Detrey, Nicolas Estibals, Paul Zimmermann:
Finding Optimal Formulae for Bilinear Maps. 110 - Yin Zhang, Meicheng Liu, Dongdai Lin:
On the Immunity of Rotation Symmetric Boolean Functions Against Fast Algebraic Attacks. 111 - Meltem Sönmez Turan:
On The Nonlinearity of Maximum-length NFSR Feedbacks. 112 - Bart Mennink:
On the Collision and Preimage Security of MDC-4 in the Ideal Cipher Model. 113 - Danyang Chen, Yongbin Zhou, Yang Han, Rui Xue, Qing He:
On Hardening Leakage Resilience of Random Extractors for Instantiations of Leakage Resilient Cryptographic Primitives. 114 - X. U. Chun-xiang, H. E. Xiao-hu, Daniel Abraha:
Cryptanalysis of auditing protocol proposed by Wang et al. for data storage security in Cloud Computing. 115 - Ralf Küsters, Tomasz Truderung, Andreas Vogt:
Clash Attacks on the Verifiability of E-Voting Systems. 116 - Ran Canetti, Margarita Vald:
Universally Composable Security With Local Adversaries. 117 - S. Sree Vivek, S. Sharmila Deva Selvi, C. Pandu Rangan:
Stronger Public Key Encryption Schemes Withstanding RAM Scraper Like Attacks. 118 - Taechan Kim, Sungwook Kim, Jung Hee Cheon:
Accelerating the Final Exponentiation in the Computation of the Tate Pairings. 119 - Yongge Wang:
Password Protected Smart Card and Memory Stick Authentication Against Off-line Dictionary Attacks. 120 - Mitra Fatemi, Taraneh Eghlidos, Mohammad Reza Aref:
An Efficient Multistage Secret Sharing Scheme Using Linear One-way Functions and Bilinear Maps. 121 - Reza Rezaeian Farashahi, Hongfeng Wu, Changan Zhao:
Efficient Arithmetic on Hessian Curves over Fields of Characteristic Three. 122 - Amine Dehbaoui, Jean-Max Dutertre, Bruno Robisson, P. Orsatelli, Philippe Maurine, Assia Tria:
Injection of transient faults using electromagnetic pulses -Practical results on a cryptographic system-. 123 - Sandra Diaz-Santiago, Debrup Chakraborty:
On Securing Communication From Profilers. 124 - (Withdrawn) Short and Efficient Expressive Attribute-Based Signature in the Standard Model. 125
- Nuray At, Jean-Luc Beuchat, Ismail San:
Compact Implementation of Threefish and Skein on FPGA. 126 - Deep Singh, Maheshanand Bhaintwal:
Additive autocorrelation of some classes of cubic semi-bent Boolean functions. 127 - Marc Fischlin, Cristina Onete:
Provably Secure Distance-Bounding: an Analysis of Prominent Protocols. 128 - Nelly Fazio, Irippuge Milinda Perera:
Outsider-Anonymous Broadcast Encryption with Sublinear Ciphertexts. 129 - Juan A. Garay, Clint Givens, Rafail Ostrovsky:
Broadcast-Efficient Secure Multiparty Computation. 130 - Rodolphe Lampe, Jacques Patarin:
Security of Feistel Schemes with New and Various Tools. 131 - Grégory Landais, Nicolas Sendrier:
CFS Software Implementation. 132 - Jacob R. Lorch, James W. Mickens, Bryan Parno, Mariana Raykova, Joshua Schiffman:
Toward Practical Private Access to Data Centers via Parallel ORAM. 133 - Dimitrios Poulakis, Robert Rolland:
A Digital Signature Scheme for Long-Term Security. 134 - Nico Döttling, Daniel Kraschewski, Jörn Müller-Quade:
David & Goliath Oblivious Affine Function Evaluation - Asymptotically Optimal Building Blocks for Universally Composable Two-Party Computation from a Single Untrusted Stateful Tamper-Proof Hardware Token. 135 - Zilong Wang, Danfeng (Daphne) Yao, Rongquan Feng:
Adaptive Key Protection in Complex Cryptosystems with Attributes. 136 - Daniel J. Bernstein, Hsieh-Chung Chen, Chen-Mou Cheng, Tanja Lange, Ruben Niederhagen, Peter Schwabe, Bo-Yin Yang:
Usable assembly language for GPUs: a success story. 137 - Nicolas T. Courtois:
An Improved Differential Attack on Full GOST. 138 - Vinh-Thong Ta:
Formal verification of secure ad-hoc network routing protocols using deductive model-checking. 139 - Selçuk Baktir, Erkay Savas:
Highly-Parallel Montgomery Multiplication for Multi-core General-Purpose Microprocessors. 140 - Dmitry Khovratovich:
Bicliques for permutations: collision and preimage attacks in stronger settings. 141 - David Galindo, Javier Herranz, Jorge Luis Villar:
Identity-Based Encryption with Master Key-Dependent Message Security and Applications. 142 - Rafail Ostrovsky, Alessandra Scafuro, Ivan Visconti, Akshay Wadia:
Universally Composable Secure Computation with (Malicious) Physically Uncloneable Functions. 143 - Junfeng Fan, Frederik Vercauteren:
Somewhat Practical Fully Homomorphic Encryption. 144 - Shigeo Tsujii, Kohtaro Tadaki, Masahito Gotaishi, Ryou Fujita:
Construction of the Tsujii-Shamir-Kasahara (TSK) Type Multivariate Public Key Cryptosystem, which relies on the Difficulty of Prime Factorization. 145 - Christophe Petit, Jean-Jacques Quisquater:
On Polynomial Systems Arising from a Weil Descent. 146 - Elena Andreeva, Andrey Bogdanov, Bart Mennink, Bart Preneel, Christian Rechberger:
On Security Arguments of the Second Round SHA-3 Candidates. 147 - Michael Scott:
Client-Server Authentication Using Pairings. 148 - Martin Stanek:
Attacking Scrambled Burrows-Wheeler Transform. 149 - Dennis Hofheinz:
Circular chosen-ciphertext security with compact ciphertexts. 150 - Alexander Rostovtsev, Alexey Mizyukin:
On Boolean Ideals and Varieties with Application to Algebraic Attacks. 151 - Limin Shen, Yinxia Sun:
On security of a Certificateless Aggregate Signature Scheme. 152 - Ralf Küsters, Tomasz Truderung, Juergen Graf:
A Framework for the Cryptographic Verification of Java-like Programs. 153 - (Withdrawn) The Joint Signature and Encryption Revisited. 154
- Laila El Aimani, Marc Joye:
Toward Practical Group Encryption. 155 - Dag Arne Osvik:
Fast Embedded Software Hashing. 156 - Chunsheng Gu:
Attack on Fully Homomorphic Encryption over the Integers. 157 - Peter Gazi, Stefano Tessaro:
Efficient and Optimally Secure Key-Length Extension for Block Ciphers via Randomized Cascading. 158 - Gregory M. Zaverucha:
Hybrid Encryption in the Multi-User Setting. 159 - (Withdrawn) New Construction of Perfect Sequence Set and Low Correlation Zone Sequence Set. 160
- Hai Xiong, Chao Li, Qingping Dai, Shaojing Fu:
New Constructions of Low Correlation Sequences with High Linear Complexity. 161 - Jayaprakash Kar:
Provably Secure Online/Off-line Identity-Based Signature Scheme for Wireless Sensor Network. 162 - Joan Daemen, Gilles Van Assche:
Differential propagation analysis of Keccak. 163 - Morten Dahl, Chao Ning, Tomas Toft:
On Secure Two-party Integer Division. 164 - Cristina Onete:
Key Updates for RFID Distance-Bounding Protocols: Achieving Narrow-Destructive Privacy. 165 - Elena Dubrova:
A List of Maximum Period NLFSRs. 166 - Sorina Ionica:
Pairing-based algorithms for jacobians of genus 2 curves with maximal endomorphism ring. 167 - Valérie Gauthier, Ayoub Otmani, Jean-Pierre Tillich:
A Distinguisher-Based Attack of a Homomorphic Encryption Scheme Relying on Reed-Solomon Codes. 168 - Xiaopei Guo, Kejian Xu, Tongsen Sun, Xiubin Fan:
Analysis of Minimum Numbers of Linearly Active S-Boxes of a Class of Generalized Feistel Block Ciphers. 169 - Vladyslav Kovtun, Andrew Okhrimenko:
Approaches for the performance increasing of software implementation of integer multiplication in prime fields. 170 - Scott Aaronson, Paul F. Christiano:
Quantum Money from Hidden Subspaces. 171 - Pierre-Alain Fouque, Nicolas Guillermin, Delphine Leresteux, Mehdi Tibouchi, Jean-Christophe Zapalowicz:
Attacking RSA-CRT Signatures with Faults on Montgomery Multiplication. 172 - Bruno Blanchet:
Automatically Verified Mechanized Proof of One-Encryption Key Exchange. 173 - Emmanuel Volte, Jacques Patarin, Valérie Nachef:
Zero Knowledge with Rubik's Cubes. 174 - Houssem Maghrebi, Claude Carlet, Sylvain Guilley, Jean-Luc Danger:
Optimal First-Order Masking with Linear and Non-Linear Bijections. 175 - Satrajit Ghosh, Abhijit Das:
Improvements of Algebraic Attacks Based on Structured Gaussian Elimination. 176 - Dominique Unruh:
Everlasting Quantum Security. 177 - Aleksander Essex, Jeremy Clark, Urs Hengartner, Carlisle Adams:
Eperio: Mitigating Technical Complexity in Cryptographic Election Verification. 178 - Benjamin Kreuter, Abhi Shelat, Chih-Hao Shen:
Towards Billion-Gate Secure Computation with Malicious Adversaries. 179 - Brian Baldwin, William P. Marnane:
Yet Another SHA-3 Round 3 FPGA Results Paper. 180 - Nils Fleischhacker, Mark Manulis, Amir Azodi:
Modular Design and Analysis Framework for Multi-Factor Authentication and Key Exchange. 181 - Mark Zhandry:
How to Construct Quantum Random Functions. 182 - Michael Backes, Sebastian Meiser:
Differentially Private Smart Metering with Battery Recharging. 183 - Dion Boesten, Boris Skoric:
Asymptotic fingerprinting capacity in the Combined Digit Model. 184 - Ben Smyth:
Replay attacks that violate ballot secrecy in Helios. 185 - Brajesh Kumar Singh:
Third-order nonlinearities of some biquadratic monomial Boolean functions. 186 - Alexandra Dmitrienko, Ahmad-Reza Sadeghi, Sandeep Tamrakar, Christian Wachsmann:
SmartTokens: Delegable Access Control with NFC-enabled Smartphones (Full Version). 187 - Xin Li:
Non-Malleable Extractors, Two-Source Extractors and Privacy Amplification. 188 - Steve Kremer, Robert Künnemann, Graham Steel:
Universally Composable Key-Management. 189 - Ding Wang, Chunguang Ma:
On the Security of an Improved Password Authentication Scheme Based on ECC. 190 - Liangliang Xiao, I-Ling Yen:
Security Analysis and Enhancement for Prefix-Preserving Encryption Schemes. 191 - Liangliang Xiao, I-Ling Yen, Dung T. Huynh:
Extending Order Preserving Encryption for Multi-User Systems. 192 - Liangliang Xiao, Osbert Bastani, I-Ling Yen:
An Efficient Homomorphic Encryption Protocol for Multi-User Systems. 193 - Albrecht Petzoldt, Stanislav Bulygin, Johannes Buchmann:
A Multivariate based Threshold Ring Signature Scheme. 194 - Markku-Juhani O. Saarinen:
The BlueJay Ultra-Lightweight Hybrid Cryptosystem. 195 - Mihir Bellare, Stefano Tessaro, Thomas Ristenpart:
Multi-Instance Security and its Application to Password-Based Cryptography. 196 - Foteini Baldimtsi, Anna Lysyanskaya:
On The Security of One-Witness Blind Signature Schemes. 197 - Jae Hong Seo, Jung Hee Cheon:
Beyond the Limitation of Prime-Order Bilinear Groups, and Round Optimal Blind Signatures. 198 - Jean-Charles Faugère, Pierrick Gaudry, Louise Huot, Guénaël Renault:
Using Symmetries in the Index Calculus for Elliptic Curves Discrete Logarithm. 199 - Alexander W. Dent:
Aggregate Signcryption. 200 - J. H. Zhang, Y. B. Cui:
Comment an Anonymous Multi-receiver Identity-based Encryption Scheme. 201 - Bo Zhang, Fangguo Zhang:
Secure Similarity Coefficients Computation with Malicious Adversaries. 202 - Debiao He:
Robust biometric-based user authentication scheme for wireless sensor networks. 203 - Matthew K. Franklin, Haibin Zhang:
Unique Group Signatures. 204 - John C. Mitchell, Rahul Sharma, Deian Stefan, Joe Zimmerman:
Information-flow control for programming on encrypted data. 205 - Shuang Wu, Dengguo Feng, Wenling Wu, Jian Guo, Le Dong, Jian Zou:
(Pseudo) Preimage Attack on Round-Reduced Grøstl Hash Function and Others (Extended Version). 206 - (Withdrawn) Cryptanalysis of Hummingbird-2. 207
- Jay Shah, Ayan Mahalanobis:
A New Guess-and-Determine Attack on the A5/1. 208 - Donghoon Chang, Moti Yung:
Adaptive Preimage Resistance Analysis Revisited: \\ Requirements, Subtleties and Implications. 209 - Yusong Du, Fangguo Zhang:
On the Existence of Boolean Functions with Optimal Resistance against Fast Algebraic Attacks. 210 - Atsushi Fujioka, Koutarou Suzuki, Keita Xagawa, Kazuki Yoneyama:
Strongly Secure Authenticated Key Exchange from Factoring, Codes, and Lattices. 211 - Meicheng Liu, Yin Zhang, Dongdai Lin:
Perfect Algebraic Immune Functions. 212 - Kaoru Kurosawa, Ryo Nojima, Le Trieu Phong:
Relation between Verifiable Random Functions and Convertible Undeniable Signatures, and New Constructions. 213 - Shengbao Wu, Mingsheng Wang:
Automatic Search of Truncated Impossible Differentials and Applications. 214 - Rosario Gennaro, Craig Gentry, Bryan Parno, Mariana Raykova:
Quadratic Span Programs and Succinct NIZKs without PCPs. 215 - Duong Hieu Phan, David Pointcheval, Siamak Fayyaz Shahandashti, Mario Strefler:
Adaptive CCA Broadcast Encryption with Constant-Size Secret Keys and Ciphertexts. 216 - Itai Dinur, Orr Dunkelman, Nathan Keller, Adi Shamir:
Efficient Dissection of Composite Problems, with Applications to Cryptanalysis, Knapsacks, and Combinatorial Search Problems. 217 - T.-H. Hubert Chan, Mingfei Li, Elaine Shi, Wenchang Xu:
Differentially Private Continual Monitoring of Heavy Hitters from Distributed Streams. 218 - Siamak Fayyaz Shahandashti, Reihaneh Safavi-Naini, Philip Ogunbona:
Private Fingerprint Matching. 219 - Mihir Bellare, Zvika Brakerski, Moni Naor, Thomas Ristenpart, Gil Segev, Hovav Shacham, Scott Yilek:
Hedged Public-key Encryption: How to Protect against Bad Randomness. 220 - Nishanth Chandran, Juan A. Garay, Rafail Ostrovsky:
Almost-Everywhere Secure Computation with Edge Corruptions. 221 - Kai-Yuen Cheong:
A secret sharing scheme of prime numbers based on hardness of factorization. 222 - Enrico Thomae:
A Generalization of the Rainbow Band Separation Attack and its Applications to Multivariate Schemes. 223 - Jie Chen, Hoon Wei Lim, San Ling, Huaxiong Wang, Hoeteck Wee:
Shorter IBE and Signatures via Asymmetric Pairings. 224 - Zvika Brakerski:
When Homomorphism Becomes a Liability. 225 - Sarah Meiklejohn, C. Christopher Erway, Alptekin Küpçü, Theodora Hinkle, Anna Lysyanskaya:
ZKPDL: A Language-Based System for Efficient Zero-Knowledge Proofs and Electronic Cash. 226 - (Withdrawn) Secure password-based remote user authentication scheme with non-tamper resistant smart cards. 227
- Marten van Dijk, Ulrich Rührmair:
Physical Unclonable Functions in Cryptographic Protocols: Security Proofs and Impossibility Results. 228 - Mohammad Mahmoody, David Xiao:
Languages with Efficient Zero-Knowledge PCP's are in SZK. 229 - Vadim Lyubashevsky, Chris Peikert, Oded Regev:
On Ideal Lattices and Learning with Errors Over Rings. 230 - Reihaneh Safavi-Naini, Mohammed Ashraful Tuhin, Pengwei Wang:
A General Construction for 1-round δ-RMT and (0, δ)-SMT. 231 - Diego F. Aranha, Laura Fuentes-Castañeda, Edward Knapp, Alfred Menezes, Francisco Rodríguez-Henríquez:
Implementing Pairings at the 192-bit Security Level. 232 - Qi Chai, Guang Gong:
A Cryptanalysis of HummingBird-2: The Differential Sequence Analysis. 233 - Jiali Choy, Huihui Yap, Khoongming Khoo, Jian Guo, Thomas Peyrin, Axel Poschmann, Chik How Tan:
SPN-Hash: Improving the Provable Resistance Against Differential Collision Attacks. 234 - Léo Ducas, Alain Durmus:
Ring-LWE in Polynomial Rings. 235 - David Bernhard, Olivier Pereira, Bogdan Warinschi:
On Necessary and Sufficient Conditions for Private Ballot Submission. 236 - Rkia Aouinatou, Mostafa Belkasmi:
In the point of view security, An efficient scheme in IBE with random oracle. 237 - Hongbo Yu, Jiazhe Chen, Xiaoyun Wang:
The Boomerang Attacks on the Round-Reduced Skein-512. 238 - Valérie Nachef, Jacques Patarin, Emmanuel Volte:
Zero-Knowledge for Multivariate Polynomials. 239 - Craig Gentry, Shai Halevi, Nigel P. Smart:
Ring Switching in BGV-Style Homomorphic Encryption. 240 - Masahiro Yagisawa:
Key distribution system and attribute-based encryption. 241 - Christina Brzuska, Marc Fischlin, Nigel P. Smart, Bogdan Warinschi, Stephen C. Williams:
Less is More: Relaxed yet Composable Security Notions for Key Exchange. 242 - Myungsun Kim, Jihye Kim, Jung Hee Cheon:
Compress Multiple Ciphertexts Using ElGamal Encryption Schemes. 243 - Leonard J. Schulman:
Cryptography from tensor problems. 244 - Qiang Li, Xiangxue Li, Dong Zheng, Zheng Huang, Kefei Chen:
On the Equivalence between the Set Covering Problem and the Problem of Finding Optimal Cumulative Assignment Schemes. 245 - Maggie E. Habeeb, Delaram Kahrobaei, Vladimir Shpilrain:
A Secret Sharing Scheme Based on Group Presentations and the Word Problem. 246 - Xusheng Zhang, Kunpeng Wang, Dongdai Lin:
On Efficient Pairings on Elliptic Curves over Extension Fields. 247 - Ghassan Karame, Elli Androulaki, Srdjan Capkun:
Two Bitcoins at the Price of One? Double-Spending Attacks on Fast Payments in Bitcoin. 248 - Boris Skoric, Jan-Jaap Oosterwijk:
Binary and q-ary Tardos codes, revisited. 249 - Xu An Wang, Xiaoyuan Yang:
New Identity Based Encryption And Its Proxy Re-encryption. 250 - Patrick Lacharme, Andrea Röck, Vincent Strubel, Marion Videau:
The Linux Pseudorandom Number Generator Revisited. 251 - Changyu Dong, Liqun Chen, Jan Camenisch, Giovanni Russello:
Fair Private Set Intersection with a Semi-trusted Arbiter. 252 - Zhian Zhu:
Cryptanalysis of pairing-free certificateless authenticated key agreement protocol. 253 - Emil Stefanov, Elaine Shi:
FastPRP: Fast Pseudo-Random Permutations for Small Domains. 254 - Benny Applebaum, Yuval Ishai, Eyal Kushilevitz:
How to Garble Arithmetic Circuits. 255 - Carolyn Whitnall, Elisabeth Oswald, François-Xavier Standaert:
The myth of generic DPA...and the magic of learning. 256 - (Withdrawn) The Transformation from the Galois NLFSR to the Fibonacci Configuration. 257
- José Bacelar Almeida, Manuel Barbosa, Endre Bangerter, Gilles Barthe, Stephan Krenn, Santiago Zanella Béguelin:
Full Proof Cryptography: Verifiable Compilation of Efficient Zero-Knowledge Protocols. 258 - Maryam Rajabzadeh Asaar, Mahmoud Salmasizadeh:
A Novel Strong Designated Verifier Signature Scheme without Random Oracles. 259 - Jialin Huang, Xuejia Lai:
Transposition of AES Key Schedule. 260 - Michael Gerbush, Allison B. Lewko, Adam O'Neill, Brent Waters:
Dual Form Signatures: An Approach for Proving Security from Static Assumptions. 261 - Ivan Damgård, Marcel Keller, Enrique Larraia, Christian Miles, Nigel P. Smart:
Implementing AES via an Actively/Covertly Secure Dishonest-Majority MPC Protocol. 262 - Kai-Yuen Cheong:
One-way Functions from Chebyshev Polynomials. 263 - Lei Wei, Thomas Peyrin, Przemyslaw Sokolowski, San Ling, Josef Pieprzyk, Huaxiong Wang:
On the (In)Security of IDEA in Various Hashing Modes. 264 - Mihir Bellare, Viet Tung Hoang, Phillip Rogaway:
Garbling Schemes. 265 - Christopher W. Fletcher, Marten van Dijk, Srinivas Devadas:
Compilation Techniques for Efficient Encrypted Computation. 266 - Steven D. Galbraith, Chang-An Zhao:
Self-pairings on Hyperelliptic Curves. 267 - Edoardo Persichetti:
On a CCA2-secure variant of McEliece in the standard model. 268 - Luke Mather, Elisabeth Oswald:
Quantifying Side-Channel Information Leakage from Web Applications. 269 - Enrico Thomae:
Quo Vadis Quaternion? Cryptanalysis of Rainbow over Non-Commutative Rings. 270 - (Withdrawn) Homomorphic Signature for Identity Authentication in Cloud Computing. 271
- Martin Hirt, Christoph Lucas, Ueli Maurer, Dominik Raub:
Passive Corruption in Statistical Multi-Party Computation. 272 - Yun-Ju Huang, Feng-Hao Liu, Bo-Yin Yang:
Public-Key Cryptography from New Multivariate Quadratic Assumptions. 273 - Aleksandar Kircanski, Amr M. Youssef:
Boomerang and Slide-Rotational Analysis of the SM3 Hash Function. 274 - Samuel Neves, Jean-Philippe Aumasson:
Implementing BLAKE with AVX, AVX2, and XOP. 275 - Alptekin Küpçü:
Official Arbitration and its Application to Secure Cloud Storage. 276 - Rkia Aouinatou, Mostafa Belkasmi:
Cyptanalysis CDHP , BDHP and Tate pairing under certain conditions The Tate pairing is less secure than Weil. 277 - Dustin Moody, Souradyuti Paul, Daniel Smith-Tone:
Improved Indifferentiability Security Bound for the JH Mode. 278 - Abhishek Jain, Rafail Ostrovsky, Silas Richelson, Ivan Visconti:
Concurrent Zero Knowledge in the Bounded Player Model. 279 - Michael Tunstall:
Improved "Partial Sums"-based Square Attack on AES. 280 - Dario Fiore, Rosario Gennaro:
Publicly Verifiable Delegation of Large Polynomials and Matrix Computations, with Applications. 281 - Md. Iftekhar Salam, Hoon-Jae Lee:
Algebraic Countermeasure to Enhance the Improved Summation Generator with 2-Bit Memory. 282 - Deep Singh, Maheshanand Bhaintwal:
Some properties of q-ary functions based on spectral analysis. 283 - Olivier Blazy, Céline Chevalier, David Pointcheval, Damien Vergnaud:
Efficient UC-Secure Authenticated Key-Exchange for Algebraic Languages. 284 - Masayuki Abe, Melissa Chase, Bernardo David, Markulf Kohlweiss, Ryo Nishimaki, Miyako Ohkubo:
Constant-Size Structure-Preserving Signatures: Generic Constructions and Simple Assumptions. 285 - Subidh Ali, Debdeep Mukhopadhyay:
Protecting Last Four Rounds of CLEFIA is Not Enough Against Differential Fault Analysis. 286 - Andrew C. Yao, Yunlei Zhao:
Computationally-Fair Group and Identity-Based Key-Exchange. 287 - Philippe Camacho:
Fair Exchange of Short Signatures without Trusted Third Party. 288 - Liqun Chen:
Ring Group Signatures. 289 - Rosario Gennaro, Daniel Wichs:
Fully Homomorphic Message Authenticators. 290 - Yihua Zhang, Marina Blanton:
Efficient Dynamic Provable Possession of Remote Data via Update Trees. 291 - Jon Passki, Tom Ritter:
An Adaptive-Ciphertext Attack against "I ⊕ C" Block Cipher Modes With an Oracle. 292 - Wei Wei, Chengliang Tian, Xiaoyun Wang:
New Transference Theorems on Lattices Possessing nε-unique Shortest Vectors. 293 - Daniel J. Bernstein, Tanja Lange:
Two grumpy giants and a baby. 294 - Michelle Kendall, Keith M. Martin, Siaw-Lynn Ng, Maura B. Paterson, Douglas R. Stinson:
Broadcast-enhanced Key Predistribution Schemes. 295 - Sergei Skorobogatov, Christopher Woods:
In the blink of an eye: There goes your AES key. 296 - Feng-Hao Liu, Anna Lysyanskaya:
Tamper and Leakage Resilience in the Split-State Model. 297 - Foteini Baldimtsi, Anna Lysyanskaya:
Anonymous Credentials Light. 298 - Ming Tang, Pingpan Cheng, Zhenlong Qiu:
Differential Power Analysis on ZUC Algorithm. 299 - Begül Bilgin, Svetla Nikova, Ventzislav Nikov, Vincent Rijmen, Georg Stütz:
Threshold Implementations of all 3x3 and 4x4 S-boxes. 300 - Myungsun Kim, Jinsu Kim, Jung Hee Cheon:
A Public Shuffle without Private Permutations. 301 - István Vajda:
On instance separation in the UC-framework. 302 - Mohamed Ahmed Abdelraheem, Martin Ågren, Peter Beelen, Gregor Leander:
On The Distribution of Linear Biases: Three Instructive Examples. 303 - Frédéric Dupuis, Jesper Buus Nielsen, Louis Salvail:
Actively Secure Two-Party Evaluation of any Quantum Operation. 304 - Duong Hieu Phan, Viet Cuong Trinh:
Resistance to Pirates 2.0: A Method from Leakage Resilient Cryptography. 305 - Marcel Keller, Gert Læssøe Mikkelsen, Andy Rupp:
Efficient Threshold Zero-Knowledge with Applications to User-Centric Protocols. 306 - Duong Hieu Phan, David Pointcheval, Viet Cuong Trinh:
Multi-Channel Broadcast Encryption. 307 - Gilles Barthe, David Pointcheval, Santiago Zanella Béguelin:
Verified Security of Redundancy-Free Encryption from Rabin and RSA. 308 - Mike Hamburg:
Fast and compact elliptic-curve cryptography. 309 - Koji Nuida, Takuro Abe, Shizuo Kaji, Toshiaki Maeno, Yasuhide Numata:
A mathematical problem for security analysis of hash functions and pseudorandom generators. 310 - Dennis Hofheinz, Tibor Jager:
Tightly Secure Signatures and Public-Key Encryption. 311 - Debiao He:
Cryptanalysis of a Provably Secure Gateway-Oriented Password-Based Authenticated Key Exchange Protocol. 312 - (Withdrawn) An anonymous proxy signature scheme without random oracles. 313
- Tomasz Rachwalik, Janusz Szmidt, Robert Wicik, Janusz Zablocki:
Generation of Nonlinear Feedback Shift Registers with special-purpose hardware. 314 - Teng Guo, Feng Liu, Chuan Kun Wu, YoungChang Hou:
Using Variance to Analyze Visual Cryptography Schemes. 315 - Gergei Bana, Pedro Adão, Hideki Sakurada:
Computationally Sound Verification of the NSL Protocol via Computationally Complete Symbolic Attacker. 316 - Markku-Juhani O. Saarinen, Daniel W. Engels:
A Do-It-All-Cipher for RFID: Design Requirements (Extended Abstract). 317 - Daniel J. Bernstein, Tanja Lange:
Non-uniform cracks in the concrete: the power of free precomputation. 318 - Ignacio Cascudo Pueyo, Ronald Cramer, Chaoping Xing:
Bounds on the Threshold Gap in Secret Sharing over Small Fields. 319 - Matan Banin, Boaz Tsaban:
The Discrete Logarithm Problem in non-representable rings. 320 - Erik Tews:
DECT Security Analysis. 321 - Anupam Pattanayak:
Revisiting Dedicated and Block Cipher based Hash Functions. 322 - Thore Graepel, Kristin E. Lauter, Michael Naehrig:
ML Confidential: Machine Learning on Encrypted Data. 323 - Sébastien Briais, Stéphane Caron, Jean-Michel Cioranesco, Jean-Luc Danger, Sylvain Guilley, Jacques-Henri Jourdan, Arthur Milchior, David Naccache, Thibault Porteboeuf:
3D Hardware Canaries. 324 - Sugata Gangopadhyay, Enes Pasalic, Pantelimon Stanica:
A note on generalized bent criteria for Boolean functions. 325 - Allison B. Lewko, Brent Waters:
New Proof Methods for Attribute-Based Encryption: Achieving Full Security through Selective Techniques. 326 - Shaohui Wang, Zhijie Han, Sujuan Liu, Dan-wei Chen:
Security Analysis of RAPP An RFID Authentication Protocol based on Permutation. 327 - Danilo Gligoroski, Simona Samardjiska:
The Multivariate Probabilistic Encryption Scheme MQQ-ENC. 328 - Claude Crépeau, Raza Ali Kazmi:
An Analysis of ZVP-Attack on ECC Cryptosystems. 329 - ZiJie Xu, Ke Xu:
A Way Reduce Signed Bitwise Differences that Transformed Into Same Modular Differences. 330 - ZhaoHui Tang:
Homomorphic A-codes for Network Coding. 331 - Maryam Rajabzadeh Asaar, Mahmoud Salmasizadeh:
A Non-delegatable Identity-based Designated Verifier Signature Scheme without Bilinear Pairings. 332 - Yehuda Lindell, Hila Zarosim:
On the Feasibility of Extending Oblivious Transfer. 333 - Masoumeh Safkhani, Nasour Bagheri, Majid Naderi:
On the Traceability of Tags in SUAP RFID Authentication Protocols. 334 - Yu Lou, Huiting Han, Chunming Tang, Maozhi Xu:
Constructing Vectorial Boolean Functions with High Algebraic Immunity Based on Group Decomposition. 335 - Gérald Gavin:
RSA modulus generation in the two-party case. 336 - Sanjay Bhattacherjee, Palash Sarkar:
Analysis and Trade-Offs for the (Complete Tree) Layered Subset Difference Broadcast Encryption Scheme. 337 - Xiao Zhong, Mingsheng Wang:
Algebraic Attack on LFSR-Based Multi-Output Stream Ciphers and Research on Algebraic Immunity for Multi-Output Boolean Functions. 338 - Adi Shamir, Eldad Zinger:
A Practical Polynomial-Time Known-Plaintext Attack on a Cryptosystem Proposed by John Nash. 339 - Henning Schnoor:
Deciding Epistemic and Strategic Properties of Cryptographic Protocols. 340 - Michel Abdalla, Dario Fiore, Vadim Lyubashevsky:
From Selective to Full Security: Semi-Generic Transformations in the Standard Model. 341 - Joseph K. Liu, Man Ho Au, Willy Susilo, Jianying Zhou:
Enhancing Location Privacy for Electric Vehicles (at the right time). 342 - Tamas Györfi, Octavian Cret, Guillaume Hanrot, Nicolas Brisebarre:
High-Throughput Hardware Architecture for the SWIFFT / SWIFFTX Hash Functions. 343 - Masao Kasahara:
Construction of New Classes of Knapsack Type Public Key Cryptosystem Using Uniform Secret Sequence, K(II)ΣΠPKC, Constructed Based on Maximum Length Code. 344 - Takuya Hayashi, Takeshi Shimoyama, Naoyuki Shinohara, Tsuyoshi Takagi:
Breaking pairing-based cryptosystems using ηT pairing over GF(397). 345 - Oumar Diao, Emmanuel Fouotsa:
Edwards model of elliptic curves defined over any fields. 346 - Xin-jie Zhao, Shize Guo, Fan Zhang, Tao Wang, Zhijie Shi, Keke Ji:
Algebraic Differential Fault Attacks on LED using a Single Fault Injection. 347 - Jan Camenisch, Maria Dubovitskaya, Robert R. Enderlein, Gregory Neven:
Oblivious Transfer with Hidden Access Control from Attribute-Based Encryption. 348 - Subhadeep Banik, Subhamoy Maitra, Santanu Sarkar:
A Differential Fault Attack on Grain-128a using MACs. 349 - Liangliang Xiao, I-Ling Yen:
A Note for the Ideal Order-Preserving Encryption Object and Generalized Order-Preserving Encryption. 350 - Jean-Philippe Aumasson, Daniel J. Bernstein:
SipHash: a fast short-input PRF. 351 - Ashish Kundu, Elisa Bertino:
On Hashing Graphs. 352 - Robert Beat, Philipp Grabher, Dan Page, Stefan Tillich, Marcin Wójcik:
On Reconfigurable Fabrics and Generic Side-Channel Countermeasures. 353 - Arno Mittelbach:
Hash Combiners for Second Pre-Image Resistance, Target Collision Resistance and Pre-Image Resistance have Long Output. 354 - Daniel J. Bernstein, Tanja Lange:
Never trust a bunny. 355 - Jan Camenisch, Gregory Neven, Markus Rückert:
Fully Anonymous Attribute Tokens from Lattices. 356 - Juan Manuel González Nieto, Mark Manulis, Bertram Poettering, Jothi Rangasamy, Douglas Stebila:
Publicly Verifiable Ciphertexts. 357 - Gilles Piret, Thomas Roche, Claude Carlet:
PICARO - A Block Cipher Allowing Efficient Higher-Order Side-Channel Resistance - Extended Version -. 358 - Neal Koblitz, Alfred Menezes:
Another look at non-uniformity. 359 - Céline Blondeau, Benoît Gérard, Kaisa Nyberg:
Multiple Differential Cryptanalysis using \LLR and χ2 Statistics. 360 - Michele Mosca, Douglas Stebila, Berkant Ustaoglu:
Quantum Key Distribution in the Classical Authenticated Key Exchange Framework. 361 - Omkant Pandey:
Achieving Constant Round Leakage-Resilient Zero-Knowledge. 362 - Anne Canteaut, Thomas Fuhr, María Naya-Plasencia, Pascal Paillier, Jean-René Reinhard, Marion Videau:
A Unified Indifferentiability Proof for Permutation- or Block Cipher-Based Hash Functions. 363 - Ivan Damgård, Adriana López-Alt:
Zero-Knowledge Proofs with Low Amortized Communication from Lattice Assumptions. 364 - Shaohui Wang, Dan-wei Chen, Zhi-Wei Wang, Suqin Chang:
Public Auditing for Ensuring Cloud Data Storage Security With Zero Knowledge Privacy. 365 - Dana Dachman-Soled, Yael Tauman Kalai:
Securing Circuits Against Constant-Rate Tampering. 366 - Shweta Agrawal, Yevgeniy Dodis, Vinod Vaikuntanathan, Daniel Wichs:
On Continual Leakage of Discrete Log Representations. 367 - Kris Gaj, Ekawat Homsirikamol, Marcin Rogawski, Rabia Shahid, Malik Umar Sharif:
Comprehensive Evaluation of High-Speed and Medium-Speed Implementations of Five SHA-3 Finalists Using Xilinx and Altera FPGAs. 368 - Shi Bai, Emmanuel Thomé, Paul Zimmermann:
Factorisation of RSA-704 with CADO-NFS. 369 - Renaud Dubois, Aurore Guillevic, Marine Sengelin Le Breton:
Improved Broadcast Encryption Scheme with Constant-Size Ciphertext. 370 - Shay Gueron, Vlad Krasnov:
Simultaneous hashing of multiple messages. 371 - (Withdrawn) New Preimage Attacks on Hash Modes of AES-256. 372
- T.-H. Hubert Chan, Elaine Shi, Dawn Song:
Optimal Lower Bound for Differentially Private Multi-Party Aggregation. 373 - Omar Choudary, Felix Gröbert, Joachim Metz:
Infiltrate the Vault: Security Analysis and Decryption of Lion Full Disk Encryption. 374 - Reto E. Koenig, Rolf Haenni:
How to Store some Secrets. 375 - Colleen Swanson, Douglas R. Stinson:
Combinatorial Solutions Providing Improved Security for the Generalized Russian Cards Problem. 376 - Aniket Kate, Yizhou Huang, Ian Goldberg:
Distributed Key Generation in the Wild. 377 - Ran Gelles, Rafail Ostrovsky, Kina Winoto:
Multiparty Proximity Testing with Dishonest Majority from Equality Testing. 378 - Eiichiro Fujisaki:
A Framework for Efficient Fully-Equipped UC Commitments. 379 - Ioana Boureanu, Serge Vaudenay:
Several Weak Bit-Commitments Using Seal-Once Tamper-Evident Devices. 380 - (Withdrawn) Strongly Authenticated Key Exchange Protocol from Bilinear Groups without Random Oracles. 381
- Afonso Arriaga, Manuel Barbosa, Pooya Farshim:
On the Joint Security of Signature and Encryption Schemes under Randomness Reuse: Efficiency and Security Amplification. 382 - Junji Shikata:
Formalization of Information-Theoretic Security for Encryption and Key Agreement, Revisited. 383 - Brent Waters:
Functional Encryption for Regular Languages. 384 - Chang Liu, Xuyun Zhang, Chi Yang, Jinjun Chen:
CCBKE - Session Key Negotiation for Fast and Secure Scheduling of Scientific Applications in Cloud Computing. 385 - Rafael Martínez-Peláez, Francisco Rico-Novella:
Cryptanalysis of Sood et al.'s Authentication Scheme using Smart Cards. 386 - Jintai Ding:
New cryptographic constructions using generalized learning with errors problem. 387 - Ignacio Cascudo Pueyo, Ronald Cramer, Chaoping Xing:
The Arithmetic Codex. 388 - Roel Peeters, Jens Hermans:
Wide Strong Private RFID Identification based on Zero-Knowledge. 389 - Chol-Sun Sin:
Regular Ternary Algorithm for Scalar Multiplication on Elliptic Curves over Finite Fields of Characteristic Three. 390 - Shaohui Wang, Sujuan Liu, Dan-wei Chen:
Analysis and Construction of Efficient RFID Authentication Protocol with Backward Privacy. 391 - S. Sharmila Deva Selvi, S. Sree Vivek, Dhinakaran Vinayagamurthy, C. Pandu Rangan:
ID Based Signcryption Scheme in Standard Model. 392 - Mohammad Sabzinejad Farash, Mahmoud Ahmadian-Attari, Majid Bayat:
A Certificateless Multiple-key Agreement Protocol Based on Bilinear Pairings. 393 - Mohammad Sabzinejad Farash, Mahmoud Ahmadian-Attari:
An ID-Based Key Agreement Protocol Based on ECC Among Users of Separate Networks. 394 - Morteza Arifi, Mahmoud Gardeshi, Mohammad Sabzinejad Farash:
A New Efficient Authenticated ID-Based Group Key Agreement Protocol. 395 - Brajesh Kumar Singh:
On second-order nonlinearity and maximum algebraic immunity of some bent functions in PS+. 396 - Liqun Chen, Hoon Wei Lim, Guomin Yang:
Cross-Domain Password-Based Authenticated Key Exchange Revisited. 397 - Travis Mayberry, Erik-Oliver Blass, Agnes Hui Chan:
PIRMAP: Efficient Private Information Retrieval for MapReduce. 398 - Kitae Jeong:
Differential Fault Analysis on Block Cipher Piccolo. 399 - Philipp Jovanovic, Martin Kreuzer, Ilia Polian:
An Algebraic Fault Attack on the LED Block Cipher. 400 - Martin R. Albrecht, Gregor Leander:
An All-In-One Approach to Differential Cryptanalysis for Small Block Ciphers. 401 - Juan Manuel González Nieto, Mark Manulis, Dongdong Sun:
Forward-Secure Hierarchical Predicate Encryption. 402 - Juan Manuel González Nieto, Mark Manulis, Dongdong Sun:
Fully Private Revocable Predicate Encryption. 403 - Amos Beimel, Oriol Farràs, Yuval Mintz:
Secret Sharing Schemes for Very Dense Graphs. 404 - Mehrdad Aliasgari, Marina Blanton, Yihua Zhang, Aaron Steele:
Secure Computation on Floating Point Numbers. 405 - Jue-Sam Chou, Yalin Chen, Chun-Hui Huang, Yu-Siang Huang:
Comments on four multi-server authentication protocols using smart card. 406 - Julien Bringer, Hervé Chabanne, Alain Patey:
Cross-Unlinkable Hierarchical Group Signatures. 407 - Gurleen Grewal, Reza Azarderakhsh, Patrick Longa, Shi Hu, David Jao:
Efficient Implementation of Bilinear Pairings on ARM Processors. 408 - Rafael Misoczki, Jean-Pierre Tillich, Nicolas Sendrier, Paulo S. L. M. Barreto:
MDPC-McEliece: New McEliece Variants from Moderate Density Parity-Check Codes. 409 - Qingfeng Cheng:
Cryptanalysis of an Identity-Based Multiple Key Agreement Scheme. 410 - Alexander Dibert, László Csirmaz:
Infinite Secret Sharing - Examples. 411 - László Csirmaz:
Probabilistic Infinite Secret Sharing. 412 - Mukund Kalyanaraman, Michael Orshansky:
Highly Secure Strong PUF based on Nonlinearity of MOSFET Subthreshold Operation. 413 - Yin Li, Gongliang Chen, Xiao-ning Xie:
Low complexity bit-parallel GF(2m) multiplier for all-one polynomials. 414 - Jialin Huang, Xuejia Lai:
Revisiting Key Schedule's Diffusion In Relation With Round Function's Diffusion. 415 - Cas Cremers, Michèle Feltz:
Beyond eCK: Perfect Forward Secrecy under Actor Compromise and Ephemeral-Key Reveal. 416 - Romain Bardou, Riccardo Focardi, Yusuke Kawamoto, Lorenzo Simionato, Graham Steel, Joe-Kai Tsay:
Efficient Padding Oracle Attacks on Cryptographic Hardware. 417 - Rafael Martínez-Peláez, Francisco Rico-Novella:
Weaknesses of an Improvement Authentication Scheme using. 418 - (Withdrawn) DAC-MACS: Effective Data Access Control for Multi-Authority Cloud Storage Systems. 419
- Denise Demirel, Jeroen van de Graaf:
A Publicly-Veri able Mix-net with Everlasting Privacy Towards Observers. 420 - Ekawat Homsirikamol, Pawel Morawiecki, Marcin Rogawski, Marian Srebrny:
Security margin evaluation of SHA-3 contest finalists through SAT-based attacks. 421 - Mustafa Çoban, Ferhat Karakoç, Özkan Boztas:
Biclique Cryptanalysis of TWINE. 422 - Dominique Unruh:
Programmable encryption and key-dependent messages. 423 - Benoît Libert, Thomas Peters, Moti Yung:
Scalable Group Signatures with Revocation. 424 - Gautham Sekar:
The Stream Cipher Core of the 3GPP Encryption Standard 128-EEA3: Timing Attacks and Countermeasures. 425 - Ed Kendall, Michelle Kendall, Wilfrid S. Kendall:
A Generalised Formula for Calculating the Resilience of Random Key Predistribution Schemes. 426 - Robert Drylo:
Constructing Pairing-Friendly Genus 2 Curves with Split Jacobian. 427 - Long Hoang Nguyen:
Rational authentication protocols and their use in financial transactions. 428 - Long Hoang Nguyen, Andrew William Roscoe:
Simple construction of epsilon-biased distribution. 429 - Sébastien Briais, Sylvain Guilley, Jean-Luc Danger:
A formal study of two physical countermeasures against side channel attacks. 430 - Yusuke Sakai, Jacob C. N. Schuldt, Keita Emura, Goichiro Hanaoka, Kazuo Ohta:
On the Security of Dynamic Group Signatures: Preventing Signature Hijacking. 431 - Alex Biryukov, Ivan Pustogarov, Ralf-Philipp Weinmann:
TorScan: Tracing Long-lived Connections and Differential Scanning Attacks. 432 - Sanjam Garg, Abishek Kumarasubramanian, Rafail Ostrovsky, Ivan Visconti:
Impossibility Results for Static Input Secure Computation. 433 - Dario Fiore, Rosario Gennaro:
Improved Publicly Verifiable Delegation of Large Polynomials and Matrix Computations. 434 - Yevgeniy Dodis, Adriana López-Alt, Ilya Mironov, Salil P. Vadhan:
Differential Privacy with Imperfect Randomness. 435 - Melissa Chase, Ivan Visconti:
Secure Database Commitments and Universal Arguments of Quasi Knowledge. 436 - Amit Sahai, Hakan Seyalioglu, Brent Waters:
Dynamic Credentials and Ciphertext Delegation for Attribute-Based Encryption. 437 - Tetsu Iwata, Keisuke Ohashi, Kazuhiko Minematsu:
Breaking and Repairing GCM Security Proofs. 438 - Ding Wang, Chunguang Ma:
Robust Smart Card based Password Authentication Scheme against Smart Card Loss Problem. 439 - Simon Knellwolf, Dmitry Khovratovich:
New Preimage Attacks Against Reduced SHA-1. 440 - Sanjam Garg, Amit Sahai:
Adaptively Secure Multi-Party Computation with Dishonest Majority. 441 - Benoît Libert, Thomas Peters, Moti Yung:
Group Signatures with Almost-for-free Revocation. 442 - Kristin E. Lauter, Damien Robert:
Improved CRT Algorithm for Class Polynomials in Genus 2. 443 - Greg Childers:
Factorization of a 1061-bit number by the Special Number Field Sieve. 444 - Debiao He, Miaomiao Tian:
A note on 'An efficient certificateless aggregate signature with constant pairing computations'. 445 - Subidh Ali, Debdeep Mukhopadhyay, Michael Tunstall:
Differential Fault Analysis of AES: Towards Reaching its Limits. 446 - ZhaoHui Tang, Hoon Wei Lim:
Multi-receiver Homomorphic Authentication Codes for Network Coding. 447 - Goichiro Hanaoka, Takahiro Matsuda, Jacob C. N. Schuldt:
On the Impossibility of Constructing Efficient Key Encapsulation and Programmable Hash Functions in Prime Order Groups. 448 - Johannes Braun, Johannes Buchmann, Ciaran Mullan, Alexander Wiesmaier:
Long Term Confidentiality: a Survey. 449 - Will Landecker, Thomas Shrimpton, R. Seth Terashima:
Tweakable Blockciphers with Beyond Birthday-Bound Security. 450 - John P. Steinberger, Xiaoming Sun, Zhe Yang:
Stam's Conjecture and Threshold Phenomena in Collision Resistance. 451 - Erik-Oliver Blass, Guevara Noubir, Triet Vo Huu:
EPiC: Efficient Privacy-Preserving Counting for MapReduce. 452 - Kaoru Kurosawa, Ryo Nojima, Le Trieu Phong:
New Leakage Resilient CCA-Secure Public Key Encryption. 453 - Abhishek Parakh:
A Probabilistic Quantum Key Transfer Protocol. 454 - Mike Rosulek:
Must you know the code of f to securely compute f? 455 - Johannes Gehrke, Michael Hay, Edward Lui, Rafael Pass:
Crowd-Blending Privacy. 456 - Gideon Samid:
Hush Functions Extended to Any Size Input versus Any Size Output. 457 - Daniel J. Bernstein, Tanja Lange:
Computing small discrete logarithms faster. 458 - Daniel Wichs:
Barriers in Cryptography with Weak, Correlated and Leaky Sources. 459 - Yohei Watanabe, Takenobu Seito, Junji Shikata:
Information-Theoretic Timed-Release Security: Key-Agreement, Encryption, and Authentication Codes. 460 - Nir Bitansky, Alessandro Chiesa:
Succinct Arguments from Multi-Prover Interactive Proofs and their Efficiency Benefits. 461 - Yang Wang, Man Ho Au, Willy Susilo:
Perfect Ambiguous Optimistic Fair Exchange. 462 - Xiang Xie, Rui Xue, Rui Zhang:
Deterministic Public Key Encryption and Identity-Based Encryption from Lattices in the Auxiliary-Input Setting. 463 - Carles Padró, Leonor Vázquez, An Yang:
Finding Lower Bounds on the Complexity of Secret Sharing Schemes by Linear Programming. 464 - Kaoutar Elkhiyaoui, Erik-Oliver Blass, Refik Molva:
T-MATCH: Privacy-Preserving Item Matching for Storage-Only RFID Tags. 465 - Benjamin Fuller, Leonid Reyzin:
Computational Entropy and Information Leakage. 466 - Yupeng Jiang, Yingpu Deng:
New results on nonexistence of generalized bent functions. 467 - Shweta Agrawal, Sergey Gorbunov, Vinod Vaikuntanathan, Hoeteck Wee:
Functional Encryption: New Perspectives and Lower Bounds. 468 - Mototsugu Nishioka:
Perfect Keyword Privacy in PEKS Systems. 469 - Sorin Iftene:
Some Connections Between Primitive Roots and Quadratic Non-Residues Modulo a Prime. 470 - Matthew Battey, Abhishek Parakh:
A Quasigroup Based Random Number Generator for Resource Constrained Environments. 471 - Amir Moradi, Oliver Mischke:
On the Simplicity of Converting Leakages from Multivariate to Univariate - Case Study of a Glitch-Resistant Masking Scheme -. 472 - Zhengan Huang, Shengli Liu, Baodong Qin:
Sender Equivocable Encryption Schemes Secure against Chosen-Ciphertext Attacks Revisited. 473 - Manuel Barbosa, Pooya Farshim:
Semantically Secure Functional Encryption, Revisited. 474 - David Bernhard, Georg Fuchsbauer, Essam Ghadafi:
Efficient Signatures of Knowledge and DAA in the Standard Model. 475 - Shay Gueron:
A j-lanes tree hashing mode and j-lanes SHA-256. 476 - Patrick Derbez, Pierre-Alain Fouque, Jérémy Jean:
Improved Key Recovery Attacks on Reduced-Round AES in the Single-Key Setting. 477 - Qinglong Wang, Li Xu:
Cryptanalysis on a novel unconditionally secure oblivious polynomial evaluation protocol. 478 - Reza Reyhanitabar, Willy Susilo:
Mix-Compress-Mix Revisited: Dispensing with Non-invertible Random Injection Oracles. 479 - Jae Hong Seo:
Short Signatures From Diffie-Hellman: Realizing Short Public Key. 480 - John P. Steinberger:
Improved Security Bounds for Key-Alternating Ciphers via Hellinger Distance. 481 - Vladyslav Kovtun, Andrew Okhrimenko:
Approaches for the Parallelization of Software Implementation of Integer Multiplication. 482 - Jayaprakash Kar:
An Efficient Signcryption Scheme from q-Diffie-Hellman Problems. 483 - Ding Wang, Chunguang Ma, De-li Gu, Zhen-shan Cui:
Cryptanalysis of Two Dynamic ID-based Remote User Authentication Schemes for Multi-Server Architecture. 484 - Neil Hanley, HeeSeok Kim, Michael Tunstall:
Exploiting Collisions in Addition Chain-based Exponentiation Algorithms. 485 - Michael Backes, Ankit Malik, Dominique Unruh:
Computational Soundness without Protocol Restrictions. 486 - Benjamin Pousse:
Short communication: An interpretation of the Linux entropy estimator. 487 - Mohammad Beheshti-Atashgah, Majid Bayat, Mahmoud Gardeshi, Mohammad Reza Aref:
Designated Verifier Threshold Proxy Signature Scheme without Random Oracles. 488 - Zahra Ahmadian, Mahmoud Salmasizadeh, Mohammad Reza Aref:
Recursive Linear and Differential Cryptanalysis of Ultralightweight Authentication Protocols. 489 - Zahra Ahmadian, Mahmoud Salmasizadeh, Mohammad Reza Aref:
Desynchronization Attack on RAPP Ultralightweight Authentication Protocol. 490 - Lidong Han, Wei Wei, Mingjie Liu:
On the Multiple Fault Attack on RSA Signatures with LSBs of Messages Unknown. 491 - Elena Dubrova:
A Method for Generating Full Cycles by a Composition of NLFSRs. 492 - Qingji Zheng, Shouhuai Xu, Giuseppe Ateniese:
Efficient Query Integrity for Outsourced Dynamic Databases. 493 - Kevin P. Dyer, Scott E. Coull, Thomas Ristenpart, Thomas Shrimpton:
Format-Transforming Encryption: More than Meets the DPI. 494 - Alfredo De Santis, Moti Yung:
"Metaproofs" (and their Cryptographic Applications). 495 - Nishant Doshi, Devesh Jinwala:
Updating attribute in CP-ABE: A New Approach. 496 - Mike Bond, George French, Nigel P. Smart, Gaven J. Watson:
The low-call diet: Authenticated Encryption for call counting HSM users. 497 - Meicheng Liu, Yin Zhang, Dongdai Lin:
On the immunity of Boolean functions against fast algebraic attacks using bivariate polynomial representation. 498 - (Withdrawn) Authenticity, Integrity and Proof-of-Existence for Long-Term Archiving: a Survey. 499
- Nishant Doshi, Devesh Jinwala:
Constant Ciphertext Length in CP-ABE. 500 - Nishanth Chandran, Bhavana Kanukurthi, Rafail Ostrovsky, Leonid Reyzin:
Privacy Amplification with Asymptotically Optimal Entropy Loss. 501 - Viet Pham, Carlos Cid:
Are We Compromised? Modelling Security Assessment Games. 502 - Alex Escala, Javier Herranz, Benoît Libert, Carla Ràfols:
Hierarchical Identity-Based (Lossy) Trapdoor Functions. 503 - Kashi Neupane, Rainer Steinwandt, Adriana Suárez Corona:
Scalable Deniable Group Key Establishment. 504 - Koji Nuida:
On pseudorandomization of information-theoretically secure schemes without hardness assumptions. 505 - Melissa Chase, Markulf Kohlweiss, Anna Lysyanskaya, Sarah Meiklejohn:
Succinct Malleable NIZKs and an Application to Compact Shuffles. 506 - Josep Balasch, Baris Ege, Thomas Eisenbarth, Benoît Gérard, Zheng Gong, Tim Güneysu, Stefan Heyse, Stéphanie Kerckhof, François Koeune, Thomas Plos, Thomas Pöppelmann, Francesco Regazzoni, François-Xavier Standaert, Gilles Van Assche, Ronny Van Keer, Loïc van Oldeneel tot Oldenzeel, Ingo von Maurich:
Compact Implementation and Performance Evaluation of Hash Functions in ATtiny Devices. 507 - Yi Deng, Juan A. Garay, San Ling, Huaxiong Wang, Moti Yung:
On the (Im)Plausibility of Constant-Round Public-Coin Straight-Line-Simulatable Zero-Knowledge Proofs. 508 - Sebastian Kutzner, Phuong Ha Nguyen, Axel Poschmann, Huaxiong Wang:
On 3-share Threshold Implementations for 4-bit S-boxes. 509 - Sebastian Kutzner, Phuong Ha Nguyen, Axel Poschmann:
Enabling 3-share Threshold Implementations for any 4-bit S-box. 510 - Giuseppe Ateniese, Özgür Dagdelen, Ivan Damgård, Daniele Venturi:
Entangled Cloud Storage. 511 - Ivan Damgård, Sarah Zakarias:
Constant-Overhead Secure Computation for Boolean Circuits in the Preprocessing Model. 512 - Abhishek Jain, Stephan Krenn, Krzysztof Pietrzak, Aris Tentes:
Commitments and Efficient Zero-Knowledge Proofs from Hard Learning Problems. 513 - Mihir Bellare, Kenneth G. Paterson, Susan Thomson:
RKA Security beyond the Linear Barrier: IBE, Encryption and Signatures. 514 - Mihir Bellare, Adam O'Neill:
Semantically-Secure Functional Encryption: Possibility Results, Impossibility Results and the Quest for a General Definition. 515 - Benny Applebaum:
Garbling XOR Gates "For Free" in the Standard Model. 516 - Ashish Choudhury, Martin Hirt, Arpita Patra:
Unconditionally Secure Asynchronous Multiparty Computation with Linear Communication Complexity. 517 - Kwangsu Lee, Dong Hoon Lee, Moti Yung:
Sequential Aggregate Signatures with Short Public Keys: Design, Analysis and Implementation Studies. 518 - Diego F. Aranha, Armando Faz-Hernández, Julio López, Francisco Rodríguez-Henríquez:
Faster implementation of scalar multiplication on Koblitz curves. 519 - Miroslaw Kutylowski, Maciej Gebala:
Optimizing Segment Based Document Protection (Corrected Version). 520 - Sergey Gorbunov, Vinod Vaikuntanathan, Hoeteck Wee:
Functional Encryption with Bounded Collusions via Multi-Party Computation. 521 - Antonino Simone, Boris Skoric:
False Positive probabilities in q-ary Tardos codes: comparison of attacks. 522 - Mohammad Mahmoody, Rafael Pass:
The Curious Case of Non-Interactive Commitments. 523 - Zooko Wilcox-O'Hearn, Brian Warner:
Tahoe - The Least-Authority Filesystem. 524 - Gaetan Bisson:
Computing endomorphism rings of abelian varieties of dimension two. 525 - Hyung Tae Lee, Hyunsook Hong, Jung Hee Cheon:
Invertible Polynomial Representation for Private Set Operations. 526 - Michael Scott:
Cryptanalysis of a recent two factor authentication scheme. 527 - Graham Enos, Yuliang Zheng:
An ID-Based Signcryption Scheme with Compartmented Secret Sharing for Unsigncryption. 528 - Julia Borghoff, Anne Canteaut, Tim Güneysu, Elif Bilge Kavun, Miroslav Knezevic, Lars R. Knudsen, Gregor Leander, Ventzislav Nikov, Christof Paar, Christian Rechberger, Peter Rombouts, Søren S. Thomsen, Tolga Yalçin:
PRINCE - A Low-latency Block Cipher for Pervasive Computing Applications (Full version). 529 - Seny Kamara, Charalampos Papamanthou, Tom Roeder:
Dynamic Searchable Symmetric Encryption. 530 - Murat Ak, Aggelos Kiayias, Serdar Pehlivanoglu, Ali Aydin Selçuk:
Generic Construction of Trace and Revoke Schemes. 531 - Liangze Li, Hongfeng Wu, Fan Zhang:
Pairing computation on Edwards curves with high-degree twists. 532 - Thijs Laarhoven, Joop van de Pol, Benne de Weger:
Solving Hard Lattice Problems and the Security of Lattice-Based Cryptosystems. 533 - Maura B. Paterson, Douglas R. Stinson:
A Simplified Combinatorial Treatment of Constructions and Threshold Gaps of Ramp Schemes. 534 - Nuray At, Jean-Luc Beuchat, Eiji Okamoto, Ismail San, Teppei Yamazaki:
A Low-Area Unified Hardware Architecture for the AES and the Cryptographic Hash Function Grøstl. 535 - Ivan Bjerre Damgård, Jonas Kölker, Peter Bro Miltersen:
Secret Sharing and Secure Computing from Monotone Formulae. 536 - Özgür Dagdelen, Marc Fischlin:
Unconditionally-Secure Universally Composable Password-Based Key-Exchange based on One-Time Memory Tokens. 537 - Myungsun Kim, Abedelaziz Mohaisen, Jung Hee Cheon, Yongdae Kim:
Private Top-k Aggregation Protocols. 538 - Sami A. Nagar, Saad Alshamma:
Efficient Implementation of RSA Algorithm with MKE. 539 - Ga Won Lee, Jin Hong:
A Comparison of Perfect Table Cryptanalytic Tradeoff Algorithms. 540 - (Withdrawn) 2048XKS - A Software Oriented High Security Block Cipher. 541
- Seny Kamara, Payman Mohassel, Ben Riva:
Salus: A System for Server-Aided Secure Function Evaluation. 542 - Dana Dachman-Soled, Georg Fuchsbauer, Payman Mohassel, Adam O'Neill:
Enhanced Chosen-Ciphertext Security and Applications. 543 - Florian Mendel, Vincent Rijmen, Deniz Toz, Kerem Varici:
Differential Analysis of the LED Block Cipher. 544 - Haibo Yi, Shaohua Tang:
A Versatile Multi-Input Multiplier over Finite Fields. 545 - Pawel Morawiecki, Josef Pieprzyk, Marian Srebrny:
Rotational cryptanalysis of round-reduced Keccak. 546 - Bodhisatwa Mazumdar, Debdeep Mukhopadhyay, Indranil Sengupta:
Constrained Search for a Class of Good S-Boxes with Improved DPA Resistivity. 547 - Helger Lipmaa, Bingsheng Zhang:
New Non-Interactive Zero-Knowledge Subset Sum, Decision Knapsack And Range Arguments. 548 - Daniel J. Bernstein, Jeroen Doumen, Tanja Lange, Jan-Jaap Oosterwijk:
Faster batch forgery identification. 549 - David Cash, Alptekin Küpçü, Daniel Wichs:
Dynamic Proofs of Retrievability via Oblivious RAM. 550 - Liangze Li, Hongfeng Wu, Fan Zhang:
Faster Pairing Computation on Jacobi quartic Curves with High-Degree Twists. 551 - Xiaofei Guo, Debdeep Mukhopadhyay, Ramesh Karri:
Provably Secure Concurrent Error Detection Against Differential Fault Analysis. 552 - Andrey Sidorenko, Joachim van den Berg, Remko Foekema, Michiel Grashuis, Jaap de Vos:
Bellcore attack in practice. 553 - Young-joo Shin, Junbeom Hur, Kwangjo Kim:
Security weakness in the Proof of Storage with Deduplication. 554 - Shweta Agrawal, Vipul Goyal, Abhishek Jain, Manoj Prabhakaran, Amit Sahai:
New Impossibility Results for Concurrent Composition and a Non-Interactive Completeness Theorem for Secure Computation. 555 - Juan A. Garay, David S. Johnson, Aggelos Kiayias, Moti Yung:
Resource-based Corruptions and the Combinatorics of Hidden Diversity. 556 - Stefan Katzenbeisser, Ünal Koçabas, Vladimir Rozic, Ahmad-Reza Sadeghi, Ingrid Verbauwhede, Christian Wachsmann:
PUFs: Myth, Fact or Busted? A Security Evaluation of Physically Unclonable Functions (PUFs) Cast in Silicon (Extended Version). 557 - Jens Bender, Özgür Dagdelen, Marc Fischlin, Dennis Kügler:
Domain-Specifi c Pseudonymous Signatures for the German Identity Card. 558 - Mark Manulis, Bertram Poettering, Douglas Stebila:
Plaintext Awareness in Identity-Based Key Encapsulation. 559 - Mohammad Hajiabadi, Bruce M. Kapron:
Computational Soundness of Coinductive Symbolic Security under Active Attacks. 560 - Yupu Hu, Fenghe Wang:
An Attack on a Fully Homomorphic Encryption Scheme. 561 - Kwangsu Lee, Dong Hoon Lee, Moti Yung:
Aggregating CL-Signatures Revisited: Extended Functionality and Better Efficiency. 562 - Kai-Min Chung, Huijia Lin, Rafael Pass:
Constant-Round Concurrent Zero Knowledge From Falsifiable Assumptions. 563 - Mihir Bellare, Viet Tung Hoang, Phillip Rogaway:
Adaptively Secure Garbling with Applications to One-Time Programs and Secure Outsourcing. 564 - Zvika Brakerski, Craig Gentry, Shai Halevi:
Packed Ciphertexts in LWE-based Homomorphic Encryption. 565 - Joep A. de Groot, Boris Skoric, Niels de Vreede, Jean-Paul M. G. Linnartz:
Information Leakage of Continuous-Source Zero Secrecy Leakage Helper Data Schemes. 566 - Claude Carlet, Jean-Luc Danger, Sylvain Guilley, Houssem Maghrebi:
Leakage Squeezing of Order Two. 567 - Stefan G. Weber:
On Transaction Pseudonyms with Implicit Attributes. 568 - San Ling, Khoa Nguyen, Damien Stehlé, Huaxiong Wang:
Improved Zero-knowledge Proofs of Knowledge for the ISIS Problem, and Applications. 569 - Hadi Soleimany:
Zero-Correlation Linear Cryptanalysis of Reduced-Round LBlock. 570 - Changyong Peng, Chuangying Zhu, Yuefei Zhu, Fei Kang:
Improved side channel attack on the block cipher NOEKEON. 571 - Divya Gupta, Amit Sahai:
On Constant-Round Concurrent Zero-Knowledge from a Knowledge Assumption. 572 - Iftach Haitner, Eran Omri, Hila Zarosim:
On the Power of Random Oracles. 573 - Alex D. Myasnikov, Alexander Ushakov:
Quantum algorithm for the discrete logarithm problem for matrices over finite group rings. 574 - Jeyavijayan Rajendran, Ramesh Karri, James B. Wendt, Miodrag Potkonjak, Nathan R. McDonald, Garrett S. Rose, Bryant T. Wysocki:
Nanoelectronic Solutions for Hardware Security. 575 - Xiao Tan, Qiong Huang, Duncan S. Wong:
Concurrent Signature without Random Oracles. 576 - Matthew K. Franklin, Haibin Zhang:
A Framework for Unique Ring Signatures. 577 - Nicolas Veyrat-Charvillon, Benoît Gérard, François-Xavier Standaert:
Security Evaluations Beyond Computing Power: How to Analyze Side-Channel Attacks you Cannot Mount? 578 - Kevin D. Bowers, Marten van Dijk, Robert Griffin, Ari Juels, Alina Oprea, Ronald L. Rivest, Nikos Triandopoulos:
Defending Against the Unknown Enemy: Applying FlipIt to System Security. 579 - Peng Wang, Wenling Wu, Liting Zhang:
Cryptanalysis of the OKH Authenticated Encryption Scheme. 580 - Ding Wang, Chunguang Ma:
On the (in)security of some smart-card-based password authentication schemes for WSN. 581 - Sabyasachi Karati, Abhijit Das, Dipanwita Roy Chowdhury:
Using Randomizers for Batch Verification of ECDSA Signatures. 582 - Yannis Rouselakis, Brent Waters:
New Constructions and Proof Methods for Large Universe Attribute-Based Encryption. 583 - Dorit Ron, Adi Shamir:
Quantitative Analysis of the Full Bitcoin Transaction Graph. 584 - K. Preetha Mathew, Sachin Vasant, C. Pandu Rangan:
On Provably Secure Code-Based Signature and Signcryption Scheme. 585 - Julien Bringer, Hervé Chabanne, Alain Patey:
SHADE: Secure HAmming DistancE computation from oblivious transfer. 586 - Changyong Peng, Chuangying Zhu, Yuefei Zhu, Fei Kang:
Symbolic computation in block cipher with application to PRESENT. 587 - Hans-Joachim Knobloch:
Breaking Public Keys - How to Determine an Unknown RSA Public Modulus. 588 - Farzaneh Abed, Christian Forler, Eik List, Stefan Lucks, Jakob Wenzel:
Biclique Cryptanalysis of the PRESENT and LED Lightweight Ciphers. 591 - Amit Sahai, Brent Waters:
Attribute-Based Encryption for Circuits from Multilinear Maps. 592 - Tomoko Yonemura, Taichi Isogai, Hirofumi Muratani, Yoshikazu Hanatani:
Factor-4 and 6 (De)compression for Values of Pairings using Trace Maps. 593 - Ya Liu, Dawu Gu, Zhiqiang Liu, Wei Li:
Improved Impossible Differential Attack on Reduced Version of Camellia-192/256. 594 - Oriol Farràs, Carles Padró:
Extending Brickell-Davenport Theorem to Non-Perfect Secret Sharing Schemes. 595 - Elli Androulaki, Ghassan Karame, Marc Roeschlin, Tobias Scherer, Srdjan Capkun:
Evaluating User Privacy in Bitcoin. 596 - Souradyuti Paul, Ekawat Homsirikamol, Kris Gaj:
A Novel Permutation-based Hash Mode of Operation FP and the Hash Function SAMOSA. 597 - Srinath T. V. Setty, Victor Vu, Nikhil Panpalia, Benjamin Braun, Andrew J. Blumberg, Michael Walfish:
Taking proof-based verified computation a few steps closer to practicality (extended version). 598 - Min Yang, Qingshu Meng, Zhang-yi Wang, Huanguo Zhang:
Some observations to speed the polynomial selection in the number field sieve. 599 - Jian Guo, Thomas Peyrin, Axel Poschmann, Matthew J. B. Robshaw:
The LED Block Cipher. 600 - Steve Lu, Rafail Ostrovsky:
How to Garble RAM Programs. 601 - Andreas Wiemers:
A note on invariant linear transformations in multivariate public key cryptography. 602 - Alexis Bonnecaze, Robert Rolland:
Collecting Data while Preserving Individuals' Privacy: A Case Study. 603 - Carmit Hazay, Adriana López-Alt, Hoeteck Wee, Daniel Wichs:
Leakage-Resilient Cryptography from Minimal Assumptions. 604 - Jin Li, Xiaofeng Chen, Jingwei Li, Chunfu Jia, Duncan S. Wong, Willy Susilo:
Secure Outsourced Attribute-Based Signatures. 605 - Dan Boneh, Mark Zhandry:
Quantum-Secure Message Authentication Codes. 606 - Charles Bouillaguet, Pierre-Alain Fouque, Amandine Véber:
Graph-Theoretic Algorithms for the "Isomorphism of Polynomials" Problem. 607 - Marina Blanton, Mehrdad Aliasgari:
On the (Non-)Reusability of Fuzzy Sketches and Extractors and Security Improvements in the Computational Setting. 608 - Taechan Kim, Jung Hee Cheon:
A New Approach to Discrete Logarithm Problem with Auxiliary Inputs. 609 - Sanjam Garg, Craig Gentry, Shai Halevi:
Candidate Multilinear Maps from Ideal Lattices and Applications. 610 - Maura B. Paterson, Douglas R. Stinson, Jalaj Upadhyay:
A coding theory foundation for the analysis of general unconditionally secure proof-of-retrievability schemes for cloud storage. 611 - Byoung-Il Kim, Jin Hong:
Analysis of the Non-Perfect Table Fuzzy Rainbow Tradeoff. 612 - Grégory Demay, Peter Gazi, Martin Hirt, Ueli Maurer:
Resource-Restricted Indifferentiability. 613 - Kristin E. Lauter, Bianca Viray:
An arithmetic intersection formula for denominators of Igusa class polynomials. 614 - Boaz Tsaban:
Polynomial time cryptanalysis of noncommutative-algebraic key exchange protocols. 615 - Nishanth Chandran, Sanjam Garg:
Hardness Preserving Constructions of Pseudorandom Functions, Revisited. 616 - Stefan Tillich, Marcin Wójcik:
Security Analysis of an Open Car Immobilizer Protocol Stack. 617 - (Withdrawn) Towards fully collusion-resistant ID-based establishment of pairwise keys. 618
- Michael Backes, Amit Datta, Aniket Kate:
Asynchronous Computational VSS with Reduced Communication Complexity. 619 - Claus-Peter Schnorr, Taras Shevchenko:
Solving Subset Sum Problems of Densioty close to 1 by "randomized" BKZ-reduction. 620 - Kitae Jeong, HyungChul Kang, Changhoon Lee, Jaechul Sung, Seokhie Hong:
Biclique Cryptanalysis of Lightweight Block Ciphers PRESENT, Piccolo and LED. 621 - Srinath T. V. Setty, Benjamin Braun, Victor Vu, Andrew J. Blumberg, Bryan Parno, Michael Walfish:
Resolving the conflict between generality and plausibility in verified computation. 622 - David A. McGrew:
Impossible plaintext cryptanalysis and probable-plaintext collision attacks of 64-bit block cipher modes. 623 - Alexandra Boldyreva, Nathan Chenette, Younho Lee, Adam O'Neill:
Order-Preserving Symmetric Encryption. 624 - Alexandra Boldyreva, Nathan Chenette, Adam O'Neill:
Order-Preserving Encryption Revisited: Improved Security Analysis and Alternative Solutions. 625 - Xi Xiong, Haining Fan:
Bit-Parallel GF(2n) Squarer Using Shifted Polynomial Basis. 626 - Laila El Aimani, Olivier Sanders:
Efficient Group Signatures in the Standard Model. 627 - Muhammad Yasir Malik:
Efficient Group Key Management Schemes for Multicast Dynamic Communication Systems. 628 - Yael Ejgenberg, Moriya Farbstein, Meital Levy, Yehuda Lindell:
SCAPI: The Secure Computation Application Programming Interface. 629 - Florian Giesen, Florian Kohlar, Douglas Stebila:
On the Security of TLS Renegotiation. 630 - Mihir Bellare, Sriram Keelveedhi, Thomas Ristenpart:
Message-Locked Encryption and Secure Deduplication. 631 - Abdoul Aziz Ciss, Djiby Sow:
Pairings on Generalized Huff Curves. 632 - Deukjo Hong, Daesung Kwon:
New Preimage Attack on MDC-4. 633 - Deukjo Hong, Daesung Kwon:
Cryptanalysis of Double-Block-Length Hash Mode MJH. 634 - (Withdrawn) Secure Outsourced Attribute-based Encryption. 635
- Martin R. Albrecht, Carlos Cid, Jean-Charles Faugère, Robert Fitzpatrick, Ludovic Perret:
On the Complexity of the BKW Algorithm on LWE. 636 - Aviad Kipnis, Eliphaz Hibshoosh:
Efficient Methods for Practical Fully Homomorphic Symmetric-key Encrypton, Randomization and Verification. 637 - Cai-xue Zhou:
Cryptanalysis and Improvement of a Multi-Receiver Generalized Signcryption Scheme. 638 - Daniel Loebenberger, Michael Nüsken:
Coarse-grained integer - Smooth? Rough? Both! 639 - Gaoli Wang, Yanzhao Shen:
Preimage and Pseudo-Collision Attacks on Step-Reduced SM3 Hash Function. 640 - Bin Wang:
A unidirectional conditional proxy re-encryption scheme based on non-monotonic access structure. 641 - Ivan Damgård, Marcel Keller, Enrique Larraia, Valerio Pastro, Peter Scholl, Nigel P. Smart:
Practical Covertly Secure MPC for Dishonest Majority - or: Breaking the SPDZ Limits. 642 - Amos Beimel, Eran Omri, Ilan Orlov:
Protocols for Multiparty Coin Toss With Dishonest Majority. 643 - Atul Luykx, Elena Andreeva, Bart Mennink, Bart Preneel:
Impossibility Results for Indifferentiability with Resets. 644 - Eduarda S. V. Freire, Kenneth G. Paterson, Bertram Poettering:
Simple, Efficient and Strongly KI-Secure Hierarchical Key Assignment Schemes. 645 - Sanjit Chatterjee, Chethan Kamath, Vikas Kumar:
Galindo-Garcia Identity-Based Signature Revisited. 646 - Daniel Smith-Tone, Cristina Tone:
A Measure of Dependence for Cryptographic Primitives Relative to Ideal Functions. 647 - Qiang Tang:
Search in Encrypted Data: Theoretical Models and Practical Applications. 648 - Yannick Seurin, Joana Treger:
A Robust and Plaintext-Aware Variant of Signed ElGamal Encryption. 649 - Ben Smyth, Mark Dermot Ryan, Liqun Chen:
Formal analysis of privacy in Direct Anonymous Attestation schemes. 650 - (Withdrawn) TAAC: Temporal Attribute-based Access Control for Multi-Authority Cloud Storage Systems. 651
- Vipul Goyal, Omkant Pandey, Amit Sahai:
Round-Efficient Concurrently Composable Secure Computation via a Robust Extraction Lemma. 652 - Periklis A. Papakonstantinou, Charles Rackoff, Yevgeniy Vahlis:
How powerful are the DDH hard groups? 653 - Qiang Tang, Yuanjie Zhao, Xiaofeng Chen, Hua Ma:
Refine the Concept of Public Key Encryption with Delegated Search. 654 - Kwangsu Lee, Intae Kim, Seong Oun Hwang:
Privacy Preserving Revocable Predicate Encryption Revisited. 655 - Mohammad Ali Orumiehchiha, Josef Pieprzyk, Elham Shakour, Ron Steinfeld:
Security Evaluation of Rakaposhi Stream Cipher. 656 - Sungwook Kim, Jung Hee Cheon:
Fixed Argument Pairing Inversion on Elliptic Curves. 657 - Eike Kiltz, Krzysztof Pietrzak, Mario Szegedy:
Digital Signatures with Minimal Overhead. 658 - Hassan Jameel Asghar, Shujun Li, Ron Steinfeld, Josef Pieprzyk:
Does Counting Still Count? Revisiting the Security of Counting based User Authentication Protocols against Statistical Attacks. 659 - (Withdrawn) Design of Secure Image Transmission in MANET using Number Theory Based Image Compression and Quasigroup Encryption (NTICQE) Algorithm. 660
- Markus Dichtl, Pascale Böffgen:
Breaking Another Quasigroup-Based Cryptographic Scheme. 661 - Julian P. Murphy:
Asynchronous Physical Unclonable Functions - AsyncPUF. 662 - Alexander Rostovtsev:
Virtual isomorphisms of ciphers: is AES secure against differential / linear attack? 663 - Jiang Zhang, Zhenfeng Zhang, Yu Chen:
PRE - Stronger Security Notion and Efficient Construction with New Property. 664 - Daniel R. L. Brown:
Uniform Compression Functions Can Fail to Preserve "Full" Entropy. 665 - Rock C. Liu, Zhiwi Yeh:
Estimating the φ(n) of Upper/Lower Bound in its RSA Cryptosystem. 666 - Antonino Simone, Boris Skoric:
False Negative probabilities in Tardos codes. 667 - Gaëtan Leurent:
Construction of Differential Characteristics in ARX Designs - Application to Skein. 668 - Zhen Liu, Zhenfu Cao, Duncan S. Wong:
Expressive Black-box Traceable Ciphertext-Policy Attribute-Based Encryption. 669 - Joppe W. Bos, Craig Costello, Hüseyin Hisil, Kristin E. Lauter:
Two is Greater than One. 670 - Tatsuaki Okamoto, Katsuyuki Takashima:
Fully Secure Unbounded Inner-Product and Attribute-Based Encryption. 671 - Itai Dinur, Orr Dunkelman, Adi Shamir:
Self-Differential Cryptanalysis of Up to 5 Rounds of SHA-3. 672 - Pooya Farshim, Benoît Libert, Kenneth G. Paterson, Elizabeth A. Quaglia:
Robust Encryption, Revisited. 673 - Carles Padró:
Lecture Notes in Secret Sharing. 674 - Yoshinori Aono:
Minkowski sum based lattice construction for solving simultaneous modular equations and applications to RSA. 675 - Julia Borghoff:
Mixed-integer Linear Programming in the Analysis of Trivium and Ktantan. 676 - Jialin Huang, Xuejia Lai:
What is the Effective Key Length for a Block Cipher: an Attack on Every Block Cipher. 677 - Benedikt Gierlichs, Jörn-Marc Schmidt, Michael Tunstall:
Infective Computation and Dummy Rounds: Fault Protection for Block Ciphers without Check-before-Output. 678 - Yehuda Lindell, Kobbi Nissim, Claudio Orlandi:
Hiding the Input-Size in Secure Two-Party Computation. 679 - Oriol Farràs, Carles Padró, Chaoping Xing, An Yang:
Natural Generalizations of Threshold Secret Sharing. 680 - Guang Gong, Mark D. Aagaard, Xinxin Fan:
Resilience to Distinguishing Attacks on WG-7 Cipher and Their Generalizations. 681 - Jiawei Yuan, Shucheng Yu:
Proofs of Retrievability with Public Verifiability and Constant Communication Cost in Cloud. 682 - (Withdrawn) Discarding the Endpoints makes the Cryptanalytic Time-Memory Trade-Offs even Faster. 683
- Thomas Peyrin, Yu Sasaki, Lei Wang:
Generic Related-key Attacks for HMAC. 684 - Gora Adj, Francisco Rodríguez-Henríquez:
Square root computation over even extension fields. 685 - Jian Zou, Wenling Wu, Shuang Wu, Le Dong:
Improved (Pseudo) Preimage Attack and Second Preimage Attack on Round-Reduced Grøstl. 686 - Karyn Benson, Hovav Shacham, Brent Waters:
The k-BDH Assumption Family: Bilinear Map Cryptography from Progressively Weaker Assumptions. 687 - Jintai Ding:
A Simple Provably Secure Key Exchange Scheme Based on the Learning with Errors Problem. 688 - Abishek Kumarasubramanian, Rafail Ostrovsky, Omkant Pandey, Akshay Wadia:
Cryptography Using CAPTCHA Puzzles. 689 - Teng Wu, Guang Gong:
The Weakness of Integrity Protection for LTE. 690 - Shi Bai, Richard P. Brent, Emmanuel Thomé:
Root Optimization of Polynomials in the Number Field Sieve. 691 - Yu Chen, Jiang Zhang, Zhenfeng Zhang, Dongdai Lin:
Integrated PKE and PEKS - Stronger Security Notions and New Constructions. 692 - Benny Applebaum, Yuval Ishai, Eyal Kushilevitz, Brent Waters:
Encoding Functions with Constant Online Rate or How to Compress Keys in Garbled Circuits. 693 - Alex D. Myasnikov, Alexander Ushakov:
Cryptanalysis of matrix conjugation schemes. 694 - Gilles Barthe, Juan Manuel Crespo, Benjamin Grégoire, César Kunz, Yassine Lakhnech, Santiago Zanella Béguelin:
Automated Analysis and Synthesis of Padding-Based Encryption Schemes. 695 - Lin Ding, Jie Guan:
Cryptanalysis of RAKAPOSHI Stream Cipher. 696 - Melissa Chase, Markulf Kohlweiss, Anna Lysyanskaya, Sarah Meiklejohn:
Verifiable Elections That Scale for Free. 697 - Joshua Baron, Karim El Defrawy, Kirill Minkovich, Rafail Ostrovsky, Eric Tressler:
5PM: Secure Pattern Matching. 698 - Ivan Damgård, Sunoo Park:
Is Public-Key Encryption Based on LPN Practical? 699 - Seung Geol Choi, Jonathan Katz, Hoeteck Wee, Hong-Sheng Zhou:
Efficient, Adaptively Secure, and Composable Oblivious Transfer with a Single, Global CRS. 700 - Noboru Kunihiro, Naoyuki Shinohara, Tetsuya Izu:
Recovering RSA Secret Keys from Noisy Key Bits with Erasures and Errors. 701 - Nasour Bagheri, Masoumeh Safkhani, Pedro Peris-Lopez, Juan E. Tapiador:
Cryptanalysis of RAPP, an RFID Authentication Protocol. 702 - Nicolas Debande, Maël Berthier, Yves Bocktaels, Thanh-Ha Le:
Profiled Model Based Power Simulator for Side Channel Evaluation. 703 - Sebastian Faust, Markulf Kohlweiss, Giorgia Azzurra Marson, Daniele Venturi:
On the Non-malleability of the Fiat-Shamir Transform. 704 - Nir Bitansky, Sanjam Garg, Daniel Wichs:
Why "Fiat-Shamir for Proofs" Lacks a Proof. 705 - Dana Dachman-Soled, Abhishek Jain, Yael Tauman Kalai, Adriana López-Alt:
On the (In)security of the Fiat-Shamir Paradigm, Revisited. 706 - Gaëtan Leurent:
Cryptanalysis of WIDEA. 707 - Gilad Asharov, Claudio Orlandi:
Calling out Cheaters: Covert Security With Public Verifiability. 708 - Qun-Xiong Zheng, Wen-Feng Qi:
Further results on the distinctness of binary sequences derived from primitive sequences modulo square-free odd integers. 709 - Prabhanjan Ananth, Raghav Bhaskar:
Non Observability in the Random Oracle Model. 710 - Kai-Min Chung, Edward Lui, Mohammad Mahmoody, Rafael Pass:
Unprovable Security of Two-Message Zero Knowledge. 711 - Farzaneh Abed, Eik List, Stefan Lucks:
On the Security of the Core of PRINCE Against Biclique and Differential Cryptanalysis. 712 - Aurélien Francillon, Quan Nguyen, Kasper Bonne Rasmussen, Gene Tsudik:
Systematic Treatment of Remote Attestation. 713 - Shweta Agrawal, Craig Gentry, Shai Halevi, Amit Sahai:
Sampling Discrete Gaussians Efficiently and Obliviously. 714 - Jingyuan Zhao, Meiqin Wang, Jiazhe Chen, Yuliang Zheng:
New Impossible Differential Attack on SAFER+ and SAFER++. 715 - Xavier Boyen:
Attribute-Based Functional Encryption on Lattices. 716 - Jan Camenisch, Anna Lysyanskaya, Gregory Neven:
Practical Yet Universally Composable Two-Server Password-Authenticated Secret Sharing. 717 - Nir Bitansky, Alessandro Chiesa, Yuval Ishai, Rafail Ostrovsky, Omer Paneth:
Succinct Non-Interactive Arguments via Linear Interactive Proofs. 718 - Yun Song, Zhihui Li:
An ideal multi-secret sharing scheme based on minimal privileged coalitions. 719 - Antoine Joux:
Faster index calculus for the medium prime case. Application to 1175-bit and 1425-bit finite fields. 720 - Prabhanjan Ananth, Raghav Bhaskar, Vipul Goyal, Vanishree Rao:
On the (In)security of Fischlin's Paradigm. 721 - Itay Berman, Iftach Haitner, Ilan Komargodski, Moni Naor:
Hardness Preserving Reductions via Cuckoo Hashing. 722 - Yaacov Belenky, Zeev Geyzel, Michael Kara-Ivanov, Avraham Entelis:
Two Exponentiation Algorithms Resistant to Cross-correlation Power Analysis and to Other Known Attacks. 723 - Kenneth G. Paterson, Antigoni Polychroniadou, Dale L. Sibborn:
A Coding-Theoretic Approach to Recovering Noisy RSA Keys. 724 - Qingfeng Cheng:
Cryptanalysis of an efficient certificateless two-party authenticated key agreement protocol. 725 - Marc Obrador, Paz Morillo, Sandra Guasch:
Applications of Polynomial Properties to Verifiable Delegation of Computation and Electronic Voting. 726 - Dana Dachman-Soled:
On the Impossibility of Sender-Deniable Public Key Encryption. 727 - Eric Brier, Quentin Fortier, Roman Korkikian, Khalid W. Magld, David Naccache, Guilherme Ozari de Almeida, Adrien Pommellet, A. H. Ragab, Jean Vuillemin:
Defensive Leakage Camouflage. 728 - Nir Bitansky, Omer Paneth:
On the Impossibility of Approximate Obfuscation and Applications to Resettable Cryptography. 729 - Dalin Chu, Johann Großschädl, Zhe Liu:
Twisted Edwards-Form Elliptic Curve Cryptography for 8-bit AVR-based Sensor Nodes. 730 - Gaëtan Leurent:
Time-memory Trade-offs for Near-collisions. 731 - Eduarda S. V. Freire, Dennis Hofheinz, Eike Kiltz, Kenneth G. Paterson:
Non-Interactive Key Exchange. 732 - Shafi Goldwasser, Yael Tauman Kalai, Raluca A. Popa, Vinod Vaikuntanathan, Nickolai Zeldovich:
Succinct Functional Encryption and Applications: Reusable Garbled Circuits and Beyond. 733
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.