default search action
IACR Cryptology ePrint Archive, Volume 2011, 2011
- Bing Zeng, Xueming Tang, Peng Xu, Jiandu Jing:
Practical Frameworks For h-Out-Of-n Oblivious Transfer With Security Against Covert and Malicious Adversaries. 1 - Gunnar Kreitz:
A Zero-One Law for Secure Multi-Party Computation with Ternary Outputs (full version). 2 - Daniel J. Bernstein, Tanja Lange, Peter Schwabe:
On the correct use of the negation map in the Pollard rho method. 3 - Gaetan Bisson, Andrew V. Sutherland:
A low-memory algorithm for finding short product representations in finite groups. 4 - David Xiao:
Is privacy compatible with truthfulness? 5 - Hemanta K. Maji, Pichayoot Ouppaphan, Manoj Prabhakaran, Mike Rosulek:
Exploring the Limits of Common Coins Using Frontier Analysis of Protocols. 6 - Greg Rose:
KISS: A Bit Too Simple. 7 - Ping Wang, Fangguo Zhang:
Computing Elliptic Curve Discrete Logarithms with the Negation Map. 8 - Helger Lipmaa:
Progression-Free Sets and Sublinear Pairing-Based Non-Interactive Zero-Knowledge Arguments. 9 - Melissa Chase, Seny Kamara:
Structured Encryption and Controlled Disclosure. 10 - Shai Halevi, Huijia Lin:
After-the-Fact Leakage in Public-Key Encryption. 11 - Jens Groth:
Minimizing Non-interactive Zero-Knowledge Proofs Using Fully Homomorphic Encryption. 12 - Shashank Agrawal, Abhinav Mehta, Kannan Srinathan:
Secure Message Transmission In Asynchronous Directed Networks. 13 - Shashank Agrawal, Abhinav Mehta, Kannan Srinathan:
Unconditionally Reliable Message Transmission in Directed Neighbour Networks. 14 - (Withdrawn) Exponential attacks on 6-round Luby-Rackoff and on 5-round Lai-Massey. 15
- Melissa Chase, Kristin E. Lauter:
An Anonymous Health Care System. 16 - Jiazhe Chen, Keting Jia, Hongbo Yu, Xiaoyun Wang:
New Impossible Differential Attacks of Reduced-Round Camellia-192 and Camellia-256. 17 - Dan Boneh, David Mandell Freeman:
Homomorphic Signatures for Polynomial Functions. 18 - Jooyoung Lee, Deukjo Hong:
Collision Resistance of the JH Hash Function. 19 - Antoine Joux, Vanessa Vitse:
Cover and Decomposition Index Calculus on Elliptic Curves made practical. Application to a seemingly secure curve over Fp6. 20 - Jae Hong Seo, Jung Hee Cheon:
Fully Secure Anonymous Hierarchical Identity-Based Encryption with Constant Size Ciphertexts. 21 - Farzaneh Abazari, Babak Sadeghian:
Cryptanalysis with Ternary Difference: Applied to Block Cipher PRESENT. 22 - Ming Duan, Xuejia Lai:
Improved zero-sum distinguisher for full round Keccak-f permutation. 23 - Alexander Rostovtsev, Alexey Bogdanov, Mikhail Mikhaylov:
Secure evaluation of polynomial using privacy ring homomorphisms. 24 - Mihaela Ion, Giovanni Russello, Bruno Crispo:
Supporting Publication and Subscription Confidentiality in Pub/Sub Networks. 25 - Emiliano De Cristofaro, Mark Manulis, Bertram Poettering:
Private Discovery of Common Social Contacts. 26 - Ashish Choudhury, Kaoru Kurosawa, Arpita Patra:
Simple and Efficient Single Round Almost Perfectly Secure Message Transmission Tolerating Generalized Adversary. 27 - Elena Andreeva, Bart Mennink, Bart Preneel:
The Parazoa Family: Generalizing the Sponge Hash Functions. 28 - Benjamin Gittins:
Outline of a proposal responding to E.U. and U.S. calls for trustworthy global-scale IdM and CKM designs. 29 - Vorapong Suppakitpaisarn, Masato Edahiro, Hiroshi Imai:
Fast Elliptic Curve Cryptography Using Optimal Double-Base Chains. 30 - Ashish Choudhury, Arpita Patra:
Statistical Asynchronous Weak Commitment Scheme: A New Primitive to Design Statistical Asynchronous Verifiable Secret Sharing Scheme. 31 - Piotr Mroczkowski, Janusz Szmidt:
Corrigendum to: The Cube Attack on Stream Cipher Trivium and Quadraticity Tests. 32 - Jean Marc Couveignes, Jean-Gabriel Kammerer:
The Geometry of Flex Tangents to a Cubic Curve and its Parameterizations. 33 - Niek J. Bouman, Serge Fehr:
Secure Authentication from a Weak Key, Without Leaking Information. 34 - Andrew C. Yao, Yunlei Zhao:
A New Family of Practical Non-Malleable Protocols. 35 - (Withdrawn) The Complexity Analysis of the MutantXL Family. 36
- Mario Lamberger, Florian Mendel:
Higher-Order Differential Attack on Reduced SHA-256. 37 - Martin R. Albrecht, Carlos Cid:
Cold Boot Key Recovery by Solving Polynomial Systems with Noise. 38 - Duc-Phong Le:
Fast Quadrupling of a Point in Elliptic Curve Cryptography. 39 - Hoon Hong, Eunjeong Lee, Hyang-Sook Lee, Cheol-Min Park:
Simple and Exact Formula for Minimum Loop Length in Atei Pairing based on Brezing-Weng Curves. 40 - Emiliano De Cristofaro, Anthony Durussel, Imad Aad:
Reclaiming Privacy for Smartphone Applications. 41 - Gaetan Bisson:
Computing endomorphism rings of elliptic curves under the GRH. 42 - Jayaprakash Kar:
Proxy Blind Multi-signature Scheme using ECC for handheld devices. 43 - G. N. Purohit, Asmita Singh Rawat:
Fast Scalar Multiplication in ECC using The Multi base Number System. 44 - Farshid Farhat, Somayeh Salimi, Ahmad Salahi:
Private Identification, Authentication and Key Agreement Protocol with Security Mode Setup. 45 - Rikke Bendlin, Jesper Buus Nielsen, Peter Sebastian Nordholt, Claudio Orlandi:
Lower and Upper Bounds for Deniable Public-Key Encryption. 46 - Yuyin Yu, Mingsheng Wang, Yongqiang Li:
Constructing differential 4-uniform permutations from know ones. 47 - Srinath Baba, Srinivas Kotyad, Raghu Teja:
A non-Abelian factorization problem and an associated cryptosystem. 48 - Allison B. Lewko, Brent Waters:
Unbounded HIBE and Attribute-Based Encryption. 49 - (Withdrawn) Authenticated Key Exchange with Synchronized States. 50
- (Withdrawn) Towards Strong Adaptive Corruption Security of Authenticated Key Exchange. 51
- Alex Escala, Javier Herranz, Paz Morillo:
Revocable Attribute-Based Signatures with Adaptive Security in the Standard Model. 52 - Dario Catalano, Dario Fiore, Bogdan Warinschi:
Adaptive Pseudo-Free Groups and Applications. 53 - (Withdrawn) Non-Applicability of Pseudobasis for Designing Perfectly Secure Message Transmission Protocols Against Non-Threshold Adversary. 54
- Dongdai Lin, Jean-Charles Faugère, Ludovic Perret, Tianze Wang:
On Enumeration of Polynomial Equivalence Classes and Their Application to MPKC. 55 - Amine Dehbaoui, Sébastien Tiran, Philippe Maurine, François-Xavier Standaert, Nicolas Veyrat-Charvillon:
Spectral Coherence Analysis - First Experimental Results -. 56 - Jean-Sébastien Coron, David Naccache, Mehdi Tibouchi:
Another Look at RSA Signatures With Affine Padding. 57 - Jean-Sébastien Coron, Aline Gouget, Thomas Icart, Pascal Paillier:
Supplemental Access Control (PACE v2): Security Analysis of PACE Integrated Mapping. 58 - Martin Stanek:
Extending Baby-step Giant-step algorithm for FACTOR problem. 59 - S. Dov Gordon, Jonathan Katz, Vinod Vaikuntanathan:
A Group Signature Scheme from Lattice Assumptions. 60 - Masoumeh Safkhani, Majid Naderi, Nasour Bagheri, Somitra Kumar Sanadhya:
Cryptanalysis of Some Protocols for RFID Systems. 61 - Swapnoneel Roy, Amlan K. Das, Yu Li:
Cryptanalysis and Security Enhancement of an Advanced Authentication Scheme using Smart Cards, and a Key Agreement Scheme for Two-Party Communication. 62 - Hadi Ahmadi, Reihaneh Safavi-Naini:
Secret Keys from Channel Noise. 63 - Felix Günther, Mark Manulis, Thorsten Strufe:
Cryptographic Treatment of Private User Profiles. 64 - Carolin Lunemann, Jesper Buus Nielsen:
Fully Simulatable Quantum-Secure Coin-Flipping and Applications. 65 - Markus Dürmuth, David Mandell Freeman:
Deniable Encryption with Negligible Detection Probability: An Interactive Construction. 66 - Simon R. Blackburn, Alina Ostafe, Igor E. Shparlinski:
On the Distribution of the Subset Sum Pseudorandom Number Generator on Elliptic Curves. 67 - William K. Moses Jr., C. Pandu Rangan:
Rational Secret Sharing with Honest Players over an Asynchronous Channel. 68 - Chao Ning, Qiuliang Xu:
Constant-Rounds, Linear Multi-party Computation for Exponentiation and Modulo Reduction with Perfect Security. 69 - Long Hoang Nguyen:
Rational authentication protocols. 70 - Gilles Barthe, Boris Köpf:
Information-theoretic Bounds for Differentially Private Mechanisms. 71 - Jiali Choy, Aileen Zhang, Khoongming Khoo, Matt Henricksen, Axel Poschmann:
AES Variants Secure Against Related-Key Differential and Boomerang Attacks. 72 - Simon R. Blackburn, Carlos Cid, Ciaran Mullan:
Cryptanalysis of three matrix-based key establishment protocols. 73 - Daniel J. Bernstein, Tanja Lange, Christiane Peters, Peter Schwabe:
Really fast syndrome-based hashing. 74 - (Withdrawn) A Novel RFID Distance Bounding Protocol Based on Physically Unclonable Functions. 75
- Maura B. Paterson, Douglas R. Stinson:
A Unified Approach to Combinatorial Key Predistribution Schemes for Sensor Networks. 76 - Ming Tang, Xiaorong Wang, Zhenlong Qiu, Si Gao, Huanguo Zhang, Qianhong Wu:
DPA Leakage Evaluation and Countermeasure Plug-in. 77 - Jean-Luc Beuchat, Eiji Okamoto, Teppei Yamazaki:
A Low-Area Unified Hardware Architecture for the AES and the Cryptographic Hash Function ECHO. 78 - Debiao He, Jianhua Chen, Jin Hu:
Identity-based Digital Signature Scheme Without Bilinear Pairings. 79 - Xiao Ma:
Turbo Codes Can Be Asymptotically Information-Theoretically Secure. 80 - Tomas Toft:
Secure Datastructures based on Multiparty Computation. 81 - (Withdrawn) Does Pseudo-basis Extend to General Adversary? 82
- Natalia N. Tokareva:
On the number of bent functions: lower bounds and hypotheses. 83 - Xingwen Zhao, Fangguo Zhang:
Traitor Tracing against Public Collaboration (Full Version). 84 - (Withdrawn) Co-induction and Computational Semantics for Public-key Encryption with Key Cycles. 85
- Xin-jie Zhao, Tao Wang, Shize Guo:
Fault-propagation Pattern Based DFA on SPN Structure Block Ciphers using Bitwise Permutation, with Application to PRESENT and PRINTcipher. 86 - Yevgeniy Dodis, Iftach Haitner, Aris Tentes:
On the (In)Security of RSA Signatures. 87 - Boaz Barak, Yevgeniy Dodis, Hugo Krawczyk, Olivier Pereira, Krzysztof Pietrzak, François-Xavier Standaert, Yu Yu:
Leftover Hash Lemma, Revisited. 88 - Pantelimon Stanica, Thor Martinsen:
Octal Bent Generalized Boolean Functions. 89 - Yu Chen, Liqun Chen, Zhong Chen:
Generic Methods to Achieve Tighter Security Reductions for a Category of IBE Schemes. 90 - Jesper Buus Nielsen, Peter Sebastian Nordholt, Claudio Orlandi, Sai Sheshank Burra:
A New Approach to Practical Active-Secure Two-Party Computation. 91 - Akinori Kawachi, Christopher Portmann, Keisuke Tanaka:
Characterization of the relations between information-theoretic non-malleability, secrecy, and authenticity. 92 - Miia Hermelin, Kaisa Nyberg:
Linear Cryptanalysis Using Multiple Linear Approximations. 93 - Martin Hirt, Christoph Lucas, Ueli Maurer, Dominik Raub:
Graceful Degradation in Multi-Party Computation. 94 - Orr Dunkelman, Nathan Keller, Adi Shamir:
ALRED Blues: New Attacks on AES-Based MAC's. 95 - Jae Hyun Ahn, Dan Boneh, Jan Camenisch, Susan Hohenberger, Abhi Shelat, Brent Waters:
Computing on Authenticated Data. 96 - Shi Pu, Pu Duan, Jyh-Charn Liu:
Fastplay-A Parallelization Model and Implementation of SMC on CUDA based GPU Cluster Architecture. 97 - Mark Velichka, Michael J. Jacobson Jr., Andreas Stein:
Computing Discrete Logarithms in the Jacobian of High-Genus Hyperelliptic Curves over Even Characteristic Finite Fields. 98 - Antoine Amarilli, Sascha Müller, David Naccache, Daniel Page, Pablo Rauzy, Michael Tunstall:
Can Code Polymorphism Limit Information Leakage? 99 - Guangdong Yang, Shaohua Tang, Li Yang:
A Novel Group Signature Scheme Based on MPKC. 100 - Liqun Chen, Kurt Dietrich, Hans Löhr, Ahmad-Reza Sadeghi, Christian Wachsmann, Johannes Winter:
Lightweight Anonymous Authentication with TLS and DAA for Embedded Mobile Devices. 101 - Charalampos Papamanthou, Roberto Tamassia:
Cryptography for Efficiency: Authenticated Data Structures Based on Lattices and Parallel Online Memory Checking. 102 - István Vajda:
Cryptographically Sound Security Proof for On-Demand Source Routing Protocol EndairA. 103 - Colleen Swanson, Douglas R. Stinson:
Unconditionally Secure Signature Schemes Revisited. 104 - Stefan Erickson, Michael J. Jacobson Jr., Andreas Stein:
Explicit Formulas for Real Hyperelliptic Curves of Genus 2 in Affine Representation. 105 - Hadi Ahmadi, Reihaneh Safavi-Naini:
Common Randomness and Secret Key Capacities of Two-way Channels. 106 - Martin Stanek:
Threshold Encryption into Multiple Ciphertexts. 107 - Jannik Dreier, Florian Kerschbaum:
Practical Secure and Efficient Multiparty Linear Programming Based on Problem Transformation. 108 - Matthew Green:
Secure Blind Decryption. 109 - (Withdrawn) Fully Homomorphic Encryption over the Binary Polynomials. 110
- Natalia N. Tokareva:
Generalizations of Bent Functions. A Survey. 111 - Debiao He, Jin Hu:
An efficient certificateless two-party authenticated key agreement scheme from pairings. 112 - Emiliano De Cristofaro, Yanbin Lu, Gene Tsudik:
Efficient Techniques for Privacy-Preserving Sharing of Sensitive Information. 113 - Chunsheng Gu:
Fully Homomorphic Encryption, Approximate Lattice Problem and LWE. 114 - Céline Blondeau, Benoît Gérard:
Multiple Differential Cryptanalysis: Theory and Practice (Corrected). 115 - Long Hoang Nguyen, Andrew William Roscoe:
On the construction of digest functions for manual authentication protocols. 116 - Lei Wei, Scott E. Coull, Michael K. Reiter:
Bounded Vector Signatures and their Applications. 117 - Chunsheng Gu:
New Fully Homomorphic Encryption over the Integers. 118 - (Withdrawn) Multiplicative Learning with Errors and Cryptosystems. 119
- Daniel J. Bernstein, Tanja Lange, Christiane Peters, Peter Schwabe:
Faster 2-regular information-set decoding. 120 - Chunsheng Gu:
More Practical Fully Homomorphic Encryption. 121 - Kristján Valur Jónsson, Gunnar Kreitz, Misbah Uddin:
Secure Multi-Party Sorting and Applications. 122 - Andrey Bogdanov, Vincent Rijmen:
Zero-Correlation Linear Cryptanalysis of Block Ciphers. 123 - Masao Kasahara:
A New Class of Biometrics on the Basis of Forgotten Secret Recovering Scheme, KSS(I). 124 - Masao Kasahara:
A Construction of A New Class of Knapsack-Type Public Key Cryptosystem, K(III)Sigma PKC. 125 - Daniel W. Engels, Markku-Juhani O. Saarinen, Peter Schweitzer, Eric M. Smith:
The Hummingbird-2 Lightweight Authenticated Encryption Algorithm. 126 - Gideon Samid:
Integer Arithmetic without Arithmetic Addition. 127 - (Withdrawn) The Ligo Block Cipher. 128
- Cas Cremers, Kasper Bonne Rasmussen, Srdjan Capkun:
Distance Hijacking Attacks on Distance Bounding Protocols. 129 - Dongdai Lin, Tao Shi, Zifeng Yang:
Ergodic Theory Over F2[[T]]. 130 - Virendra Sule:
Trapdoor oneway functions associated with exponentiation. 131 - Siavosh Benabbas, Rosario Gennaro, Yevgeniy Vahlis:
Verifiable Delegation of Computation over Large Datasets. 132 - Nigel P. Smart, Frederik Vercauteren:
Fully Homomorphic SIMD Operations. 133 - George Danezis, Markulf Kohlweiss, Alfredo Rial:
Differentially Private Billing with Rebates. 134 - Omran Ahmadi, Robert Granger:
On isogeny classes of Edwards curves over finite fields. 135 - Gilad Asharov, Yehuda Lindell:
A Full Proof of the BGW Protocol for Perfectly-Secure Multiparty Computation. 136 - Gilad Asharov, Ran Canetti, Carmit Hazay:
Towards a Game Theoretic View of Secure Computation. 137 - Jeongdae Hong, Jung Woo Kim, Jihye Kim, Kunsoo Park, Jung Hee Cheon:
Constant-Round Privacy Preserving Multiset Union. 138 - Mingjie Liu, Xiaoyun Wang, Guangwu Xu, Xuexin Zheng:
Shortest Lattice Vectors in the Presence of Gaps. 139 - Martin Ågren:
Some Instant- and Practical-Time Related-Key Attacks on KTANTAN32/48/64. 140 - Emiliano De Cristofaro, Paolo Gasti, Gene Tsudik:
Fast and Private Computation of Set Intersection Cardinality. 141 - (Withdrawn) A Parallel Hardware Architecture for the Solution of Linear Equation Systems Implemented over GF(2n). 142
- Romain Cosset, Damien Robert:
Computing (l, l)-isogenies in polynomial time on Jacobians of genus 2 curves. 143 - (Withdrawn) Deniable Encryption from the McEliece Assumptions. 144
- (Withdrawn) Linear Diophantine Equation Discrete Log Problem, Matrix Decomposition Problem and the AA-beta-cryptosystem. 145
- Lei Xu, Dongdai Lin, Jing Zou:
ECDLP on GPU. 146 - Chunming Tang, Shuhong Gao, Chengli Zhang:
The Optimal Linear Secret Sharing Scheme for Any Given Access Structure. 147 - Hongbo Yu, Jiazhe Chen, Keting Jia, Xiaoyun Wang:
Near-Collision Attack on the Step-Reduced Compression Function of Skein-256. 148 - Nicolas Veyrat-Charvillon, François-Xavier Standaert:
Generic Side-Channel Distinguishers: Improvements and Limitations. 149 - Jue-Sam Chou, Cheng-Lun Wu, Yalin Chen:
A Novel k-out-of-n Oblivious Transfer Protocol from Bilinear Pairing. 150 - Ghulam Murtaza, Nassar Ikram:
Direct Exponent and Scalar Multiplication Classes of an MDS Matrix. 151 - Yehuda Lindell, Eran Omri:
A Practical Application of Differential Privacy to Personalized Online Advertising. 152 - Jingguo Bi, Qi Cheng:
Lower bounds of shortest vector lengths in random knapsack lattices and random NTRU lattices. 153 - (Withdrawn) The Block Cipher Vuna. 154
- (Withdrawn) High-speed Hardware Implementation of Rainbow Signatures on FPGAs. 155
- Madeline González Muñiz, Peeter Laud:
Strong Forward Security in Identity-Based Signcryption. 156 - Shai Halevi, Yehuda Lindell, Benny Pinkas:
Secure Computation on the Web: Computing without Simultaneous Interaction. 157 - Yanbin Lu, Gene Tsudik:
Enhancing Data Privacy in the Cloud. 158 - (Withdrawn) The Block Cipher Thuca. 159
- Mohamed Ahmed Abdelraheem, Céline Blondeau, María Naya-Plasencia, Marion Videau, Erik Zenner:
Cryptanalysis of ARMADILLO2. 160 - Debrup Chakraborty, Cuauhtemoc Mancillas-López, Francisco Rodríguez-Henríquez, Palash Sarkar:
Efficient Hardware Implementations of BRW Polynomials and Tweakable Enciphering Schemes. 161 - Amir Moradi, Oliver Mischke, Christof Paar:
Collision Timing Attack when Breaking 42 AES ASIC Cores. 162 - (Withdrawn) Improved Integral Attacks on Reduced Round Camellia. 163
- Martin R. Albrecht, Carlos Cid, Jean-Charles Faugère, Ludovic Perret:
On the Relation Between the Mutant Strategy and the Normal Selection Strategy in Gröbner Basis Algorithms. 164 - Xin-jie Zhao, Tao Wang, Shize Guo:
Improved Side Channel Cube Attacks on PRESENT. 165 - Jeremy Clark, Urs Hengartner:
Selections: Internet Voting with Over-the-Shoulder Coercion-Resistance. 166 - Yalin Chen, Jue-Sam Chou, Cheng-Lun Wu, Chi-Fong Lin:
Identifying Large-Scale RFID Tags Using Non-Cryptographic Approach. 167 - Douglas Wikström:
A Commitment-Consistent Proof of a Shuffle. 168 - Hongwei Li, Yuanshun Dai, Bo Yang:
Identity-Based Cryptography for Cloud Security. 169 - Jonathan Taverne, Armando Faz-Hernández, Diego F. Aranha, Francisco Rodríguez-Henríquez, Darrel Hankerson, Julio López:
Software implementation of binary elliptic curves: impact of the carry-less multiplier on scalar multiplication. 170 - Manish Garg, Sugata Gangopadhyay:
On lower bounds on second-order nonliearities of bent functions obtained by using Niho power functions. 171 - T. V. Laptyeva, Sergej Flach, K. Kladko:
The weak password problem: chaos, criticality, and encrypted p-CAPTCHAs. 172 - (Withdrawn) An efficient certificateless short signature scheme from pairings. 173
- László Csirmaz, Gábor Tardos:
On-line secret sharing. 174 - Marine Minier, María Naya-Plasencia, Thomas Peyrin:
Analysis of reduced-SHAvite-3-256 v2. 175 - Sylvain Duquesne, Nicolas Guillermin:
A FPGA pairing implementation using the Residue Number System. 176 - Muhammad Yasir Malik, Jong-Seon No:
Dynamic MDS Matrices for Substantial Cryptographic Strength. 177 - Chong Hee Kim:
Differential Fault Analysis of AES: Toward Reducing Number of Faults. 178 - Edoardo Persichetti:
Compact McEliece keys based on Quasi-Dyadic Srivastava codes. 179 - Yehuda Lindell:
Highly-Efficient Universally-Composable Commitments based on the DDH Assumption. 180 - Santosh Ghosh, Debdeep Mukhopadhyay, Dipanwita Roy Chowdhury:
Security of Prime Field Pairing Cryptoprocessor Against Differential Power Attack. 181 - Guilin Wang, Fubiao Xia, Yunlei Zhao:
Designated Confirmer Signatures With Unified Verification. 182 - (Withdrawn) Elliptic Curve Point Multiplication Using MBNR and Point Halving. 183
- Ghulam Murtaza, Azhar Ali Khan, Syed Wasi Alam, Aqeel Farooqi:
Fortification of AES with Dynamic Mix-Column Transformation. 184 - Zhibin Zhou, Dijiang Huang:
Efficient and Secure Data Storage Operations for Mobile Cloud Computing. 185 - (Withdrawn) Some aspects of multi-variable secret sharing. 186
- Hyung Tae Lee, Jung Hee Cheon, Jin Hong:
Analysis of Discrete Logarithm Algorithm using Pre-computation. 187 - Ulrich Rührmair:
Physical Turing Machines and the Formalization of Physical Cryptography. 188 - Ulrich Rührmair:
SIMPL Systems as a Keyless Cryptographic and Security Primitive. 189 - Peng Xu, Hai Jin:
SHS: Secure Hybrid Search by Combining Dynamic and Static Indexes in PEKS. 190 - Johannes Buchmann, Erik Dahmen, Sarah Ereth, Andreas Hülsing, Markus Rückert:
On the Security of the Winternitz One-Time Signature Scheme. 191 - Joseph K. Liu, Feng Bao, Jianying Zhou:
Short and Efficient Certificate-Based Signature. 192 - Nasour Bagheri, Masoumeh Safkhani, Majid Naderi, Somitra Kumar Sanadhya:
Security Analysis of LMAP++, an RFID Authentication Protocol. 193 - Masoumeh Safkhani, Nasour Bagheri, Majid Naderi:
Cryptanalysis of Chen et al.'s RFID Access Control Protocol. 194 - (Withdrawn) An ID-based three-party authenticated key exchange protocol using elliptic curve cryptography for mobile-commerce environments. 195
- Ye Zhang, Chun Jason Xue, Duncan S. Wong, Nikos Mamoulis, Siu-Ming Yiu:
Acceleration of Composite Order Bilinear Pairing on Graphics Hardware. 196 - Puwen Wei, Yuliang Zheng, Xiaoyun Wang:
Public Key Encryption for the Forgetful. 197 - Guillaume Hanrot, Xavier Pujol, Damien Stehlé:
Terminating BKZ. 198 - Omran Ahmadi, Robert Granger:
An efficient deterministic test for Kloosterman sum zeros. 199 - Georg Neugebauer, Ulrike Meyer, Susanne Wetzel:
Fair and Privacy-Preserving Multi-Party Protocols for Reconciling Ordered Input Sets (Extended version). 200 - Lei Wei, Christian Rechberger, Jian Guo, Hongjun Wu, Huaxiong Wang, San Ling:
Improved Meet-in-the-Middle Cryptanalysis of KTANTAN. 201 - Markku-Juhani O. Saarinen:
GCM, GHASH and Weak Keys. 202 - Juha Partala:
Key agreement based on homomorphisms of algebraic structures. 203 - Nir Bitansky, Ran Canetti, Shai Halevi:
Leakage Tolerant Interactive Protocols. 204 - Chunbo Ma, Jun Ao:
Group-oriented ring signature. 205 - Reza Rezaeian Farashahi, Dustin Moody, Hongfeng Wu:
Isomorphism classes of Edwards curves over finite fields. 206 - Shai Halevi, Danny Harnik, Benny Pinkas, Alexandra Shulman-Peleg:
Proofs of Ownership in Remote Storage Systems. 207 - Jian Weng, Yunlei Zhao:
Direct Constructions of Bidirectional Proxy Re-Encryption with Alleviated Trust in Proxy. 208 - Zvika Brakerski, Gil Segev:
Better Security for Deterministic Public-Key Encryption: The Auxiliary-Input Setting. 209 - Jooyoung Lee, Martijn Stam, John P. Steinberger:
The preimage security of double-block-length compression functions. 210 - Nicolas T. Courtois:
Security Evaluation of GOST 28147-89 In View Of International Standardisation. 211 - Nicholas Kolokotronis, Konstantinos Limniotis:
Maiorana-McFarland Functions with High Second-Order Nonlinearity. 212 - Martin R. Albrecht, Pooya Farshim, Kenneth G. Paterson, Gaven J. Watson:
On Cipher-Dependent Related-Key Attacks in the Ideal-Cipher Model. 213 - Charles Rackoff:
On "identities", "names", "NAMES", "ROLES" and Security: A Manifesto. 214 - Manuel Barbosa, Pooya Farshim:
Delegatable Homomorphic Encryption with Applications to Secure Outsourcing of Computation. 215 - Shaohua Tang, Jintai Ding, Zhiming Yang:
Secure Group Key Management Approach Based upon N-dimensional Hyper-sphere. 216 - S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Rangan:
Identity Based Deterministic Signature Scheme Without Forking-Lemma. 217 - Markku-Juhani O. Saarinen:
Cryptographic Analysis of All 4 x 4 - Bit S-Boxes. 218 - Tibor Jager, Florian Kohlar, Sven Schäge, Jörg Schwenk:
A Standard-Model Security Analysis of TLS-DHE. 219 - István Vajda:
Framework for Security Proofs for On-demand Routing Protocols in Multi-Hop Wireless Networks. 220 - Leo Dorrendorf:
Protecting Drive Encryption Systems Against Memory Attacks. 221 - Kyle Brogle, Sharon Goldberg, Leonid Reyzin:
Sequential Aggregate Signatures with Lazy Verification from Trapdoor Permutations. 222 - Bing Zeng, Liang Chen, Xueming Tang:
A Perfectly Binding Commitment Scheme Against Quantum Attacks. 223 - Xu An Wang, Liqiang Wu, Xiaoyuan Yang, Huaqun Wang:
Cryptanalysis and Improvement of an Efficient CCA Secure PKE Scheme. 224 - Shaohua Tang, Jintai Ding, Yujun Liang:
A Simple and Efficient New Group Key Management Approach Based on Linear Geometry. 225 - Eric Miles, Emanuele Viola:
The Advanced Encryption Standard, Candidate Pseudorandom Functions, and Natural Proofs. 226 - Alexander Barg, Grigory Kabatiansky:
Robust parent-identifying codes and combinatorial arrays. 227 - Jan Camenisch, Stephan Krenn, Victor Shoup:
A Framework for Practical Universally Composable Zero-Knowledge Protocols. 228 - Md. Golam Kaosar:
Routing Protocol Based Shared and Session Key Exchange Protocol for Wireless Mobile Ad-hoc Network. 229 - Dennis Hofheinz:
All-But-Many Lossy Trapdoor Functions. 230 - Marc Fischlin, Anja Lehmann, Dominique Schröder:
History-Free Sequential Aggregate Signatures. 231 - Billy Bob Brumley, Nicola Tuveri:
Remote Timing Attacks are Still Practical. 232 - Vipul Goyal, Adam O'Neill, Vanishree Rao:
Correlated-Input Secure Hash Functions. 233 - Debiao He:
Comments on a secure dynamic ID-based remote user authentication scheme for multi-server environment using smart cards. 234 - Simon Kramer, Rajeev Goré, Eiji Okamoto:
Computer-Aided Decision-Making for Formal Relations and Domains of Trust, Distrust, and Mistrust with Cryptographic Applications. 235 - Neil Hanley, Michael Tunstall, William P. Marnane:
Using Templates to Distinguish Multiplications from Squaring Operations. 236 - Alice Nguyenova-Stepanikova, Tran Ngoc Duong:
The block cipher NSABC (public domain). 237 - Yiyuan Luo, Xuejia Lai:
Attacks On a Double Length Blockcipher-based Hash Proposal. 238 - Shay Gueron:
Efficient Software Implementations of Modular Exponentiation. 239 - Mike Rosulek:
Universal Composability from Essentially Any Trusted Setup. 240 - Xiuqun Wang:
A Novel Adaptive Proactive Secret Sharing without a Trusted Party. 241 - Idan Sheetrit, Avishai Wool:
Cryptanalysis of KeeLoq code-hopping using a Single FPGA. 242 - Tolga Acar, Kristin E. Lauter, Michael Naehrig, Daniel Shumow:
Affine Pairings on ARM. 243 - Erik-Oliver Blass, Roberto Di Pietro, Refik Molva, Melek Önen:
PRISM - Privacy-Preserving Search in MapReduce. 244 - Jean-Pierre Flori, Hugues Randriam:
On the Number of Carries Occuring in an Addition mod 2k-1. 245 - Bernardo Machado David, Anderson C. A. Nascimento, Rafael Tonicelli:
A Framework for Secure Single Sign-On. 246 - Qi Chai, Xinxin Fan, Guang Gong:
An Ultra-Efficient Key Recovery Attack on the Lightweight Stream Cipher A2U2. 247 - Fanbao Liu, Yi Liu, Tao Xie, Yumeng Feng:
Fast Password Recovery Attack: Application to APOP. 248 - (Withdrawn) Breaking a certificateless key agreement protocol withour bilinear pairing. 249
- Zvika Brakerski, Yael Tauman Kalai:
A Parallel Repetition Theorem for Leakage Resilience. 250 - Sanjam Garg, Vipul Goyal, Abhishek Jain, Amit Sahai:
Concurrently Secure Computation in Constant Rounds. 251 - Mihir Bellare, David Cash, Rachel Miller:
Cryptography Secure Against Related-Key Attacks and Tampering. 252 - Mingqiang Wang, Xiaoyun Wang, Tao Zhan:
Attack Cryptosystems Based on HCDLP. 253 - Thorsten Kleinjung, Arjen K. Lenstra, Dan Page, Nigel P. Smart:
Using the Cloud to Determine Key Strengths. 254 - Sascha Müller, Stefan Katzenbeisser:
Hiding the Policy in Cryptographic Access Control. 255 - (Withdrawn) Leakage Resilient Secure Two-Party Computation. 256
- Seung Geol Choi, Kyung-Wook Hwang, Jonathan Katz, Tal Malkin, Dan Rubenstein:
Secure Multi-Party Computation of Boolean Circuits with Applications to Privacy in On-Line Marketplaces. 257 - Gavin Xiaoxu Yao, Junfeng Fan, Ray C. C. Cheung, Ingrid Verbauwhede:
A High Speed Pairing Coprocessor Using RNS and Lazy Reduction. 258 - Douglas R. Stinson:
Comments on a sensor network key redistribution technique of Cichon, Golebiewski and Kutylowski. 259 - Cristina Onete, Daniele Venturi:
Security & Indistinguishability in the Presence of Traffic Analysis. 260 - Danilo Gligoroski, Rune Steinsmo Ødegård, Rune Erlend Jensen:
OBSERVATION: An explicit form for a class of second preimages for any message M for the SHA-3 candidate Keccak. 261 - Mohamed Ahmed Abdelraheem, Julia Borghoff, Erik Zenner:
Cryptanalysis of the Light-Weight Cipher A2U2 - Reduced draft version. 262 - Fangguo Zhang:
The Computational Square-Root Exponent Problem- Revisited. 263 - Dominique Schröder, Dominique Unruh:
Round Optimal Blind Signatures. 264 - Qiushi Yang, Yvo Desmedt:
Efficient 2-Round General Perfectly Secure Message Transmission: A Minor Correction to Yang and Desmedt's Protocol. 265 - Daniel R. L. Brown:
Identity-Based Decryption. 266 - Myungsun Kim, Hyung Tae Lee, Jung Hee Cheon:
Mutual Private Set Intersection with Linear Complexity. 267 - Raja Zeshan Haider:
Birthday Forgery Attack on 128-EIA3 Version 1.5. 268 - Mihir Bellare, Sriram Keelveedhi:
Authenticated and Misuse-Resistant Encryption of Key-Dependent Data. 269 - Dennis Hofheinz, Eike Kiltz:
Programmable Hash Functions and Their Applications. 270 - Charles Bouillaguet, Pierre-Alain Fouque, Gilles Macario-Rat:
Practical Key-recovery For All Possible Parameters of SFLASH. 271 - Seny Kamara, Payman Mohassel, Mariana Raykova:
Outsourcing Multi-Party Computation. 272 - Kai-Min Chung, Yael Tauman Kalai, Feng-Hao Liu, Ran Raz:
Memory Delegation. 273 - (Withdrawn) A Splice-and-Cut Cryptanalysis of the AES. 274
- Jintai Ding:
Inverting the Square systems is exponential. 275 - Stephen C. Williams:
Analysis of the SSH Key Exchange Protocol. 276 - Zvika Brakerski, Craig Gentry, Vinod Vaikuntanathan:
Fully Homomorphic Encryption without Bootstrapping. 277 - Can Zhang:
Comparing Different Definitions of Secure Session. 278 - Craig Gentry, Shai Halevi:
Fully Homomorphic Encryption without Squashing Using Depth-3 Arithmetic Circuits. 279 - Ronald Cramer, Ivan Damgård, Eike Kiltz, Sarah Zakarias, Angela Zottarel:
DDH-like Assumptions Based on Extension Rings. 280 - Michael Backes, Aniket Kate, Arpita Patra:
Computational Verifiable Secret Sharing Revisited. 281 - Itai Dinur, Tim Güneysu, Christof Paar, Adi Shamir, Ralf Zimmermann:
An Experimentally Verified Attack on Full Grain-128 Using Dedicated Reconfigurable Hardware. 282 - Mingqiang Wang, Xiaoyun Wang, Tao Zhan:
The Fault Attack ECDLP Revisited. 283 - (Withdrawn) On the Security of PPPoE Network. 284
- Andrea Röck, Kaisa Nyberg:
Exploiting Linear Hull in Matsui's Algorithm 1 (extended version). 285 - Dmitry Khovratovich, Christian Rechberger, Alexandra Savelieva:
Bicliques for Preimages: Attacks on Skein-512 and the SHA-2 family. 286 - Stanislav Bulygin:
Algebraic cryptanalysis of the round-reduced and side channel analysis of the full PRINTCipher-48. 287 - Ashish Choudhury, Arpita Patra:
On the Communication Complexity of Reliable and Secure Message Transmission in Asynchronous Networks. 288 - Martin R. Albrecht, Pooya Farshim, Jean-Charles Faugère, Ludovic Perret:
Polly Cracker, Revisited. 289 - Pantelimon Stanica, Sugata Gangopadhyay, Brajesh Kumar Singh:
Some Results Concerning Generalized Bent Functions. 290 - Elette Boyle, Shafi Goldwasser, Yael Tauman Kalai:
Leakage-Resilient Coin Tossing. 291 - Namhun Koo, Gooc Hwa Jo, Soonhak Kwon:
On Nonlinear Polynomial Selection and Geometric Progression (mod N) for Number Field Sieve. 292 - (Withdrawn) Weakness of a Secured Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography. 293
- Albrecht Petzoldt, Enrico Thomae, Stanislav Bulygin, Christopher Wolf:
Small Public Keys and Fast Verification for Multivariate Quadratic Public Key Systems. 294 - Pierrick Gaudry, David R. Kohel, Benjamin A. Smith:
Counting Points on Genus 2 Curves with Real Multiplication. 295 - Dennis Hofheinz, Tibor Jager, Eike Kiltz:
Short Signatures From Weaker Assumptions. 296 - Igor A. Semaev, Mehdi M. Hassanzadeh:
New Statistical Box-Test and its Power. 297 - Igor A. Semaev:
Local limit theorem for large deviations and statistical box-tests. 298 - Palash Sarkar:
On Authenticated Encryption Using Stream Ciphers Supporting an Initialisation Vector. 299 - Cas Cremers, Michèle Feltz:
One-round Strongly Secure Key Exchange with Perfect Forward Secrecy and Deniability. 300 - Ronald Cramer, Ivan Damgård, Valerio Pastro:
On the Amortized Complexity of Zero Knowledge Protocols for Multiplicative Relations. 301 - Julien Doget, Emmanuel Prouff, Matthieu Rivain, François-Xavier Standaert:
Univariate Side Channel Attacks and Leakage Modeling. 302 - Dennis Hofheinz, Victor Shoup:
GNUC: A New Universal Composability Framework. 303 - Jia Xu:
Auditing the Auditor: Secure Delegation of Auditing Operation over Cloud Storage. 304 - Seyyed Amir Mortazavi:
A new attack on Jakobsson Hybrid Mix-Net. 305 - Craig Costello, Kristin E. Lauter:
Group Law Computations on Jacobians of Hyperelliptic Curves. 306 - ZiJie Xu, Ke Xu:
Ways to restrict the differential path. 307 - Michael Backes, Ian Goldberg, Aniket Kate, Esfandiar Mohammadi:
Provably Secure and Practical Onion Routing. 308 - Frederik Armknecht, Daniel Augot, Ludovic Perret, Ahmad-Reza Sadeghi:
On Constructing Homomorphic Encryption Schemes from Coding Theory. 309 - Jonathan Katz, Ueli Maurer, Björn Tackmann, Vassilis Zikas:
Universally Composable Synchronous Computation. 310 - Dan Boneh, Gil Segev, Brent Waters:
Targeted Malleability: Homomorphic Encryption for Restricted Computations. 311 - Nicolas T. Courtois, Michal Misztal:
Differential Cryptanalysis of GOST. 312 - Arpita Patra:
Error-free Multi-valued Broadcast and Byzantine Agreement with Optimal Communication Complexity. 313 - Sebastian Faust, Krzysztof Pietrzak, Daniele Venturi:
Tamper-Proof Circuits: How to Trade Leakage for Tamper-Resilience. 314 - Zhi Hu, Patrick Longa, Maozhi Xu:
Implementing 4-Dimensional GLV Method on GLS Elliptic Curves with j-Invariant 0. 315 - Dominique Schröder, Dominique Unruh:
Security of Blind Signatures Revisited. 316 - Helger Lipmaa:
Two Simple Code-Verification Voting Protocols. 317 - Sujoy Sinha Roy, Chester Rebeiro, Debdeep Mukhopadhyay, Junko Takahashi, Toshinori Fukunaga:
Scalar Multiplication on Koblitz Curves using tau2-NAF. 318 - Jan Camenisch, Kristiyan Haralambiev, Markulf Kohlweiss, Jorn Lapon, Vincent Naessens:
Structure Preserving CCA Secure Encryption and Its Application to Oblivious Third Parties. 319 - Manan Nayak, Shashank Agrawal, Kannan Srinathan:
Minimal Connectivity for Unconditionally Secure Message Transmission in Synchronous Directed Networks. 320 - Ulrich Dürholz, Marc Fischlin, Michael Kasper, Cristina Onete:
A Formal Approach to Distance-Bounding RFID Protocols. 321 - Carolyn Whitnall, Elisabeth Oswald:
A Comprehensive Evaluation of Mutual Information Analysis Using a Fair Evaluation Framework. 322 - Shusheng Liu, Libin Wang, Zheng Gong:
Improved Related-Key Boomerang Distinguishing Attack of Threefish-256. 323 - Samuel Ranellucci, Alain Tapp, Severin Winkler, Jürg Wullschleger:
On the Efficiency of Bit Commitment Reductions. 324 - Aram Jivanyan, Gurgen Khachatryan:
New Receipt-Free E-Voting Scheme and Self-Proving Mix Net as New Paradigm. 325 - Markku-Juhani O. Saarinen:
SGCM: The Sophie Germain Counter Mode. 326 - Eyal Kushilevitz, Steve Lu, Rafail Ostrovsky:
On the (In)security of Hash-based Oblivious RAM and a New Balancing Scheme. 327 - Chunsheng Gu:
Cryptanalysis of the Smart-Vercauteren and Gentry-Halevi's Fully Homomorphic Encryption. 328 - Alexandre Duc, Dimitar Jetchev:
Hardness of Computing Individual Bits for Pairing-based One-way Functions. 329 - Ashish Choudhury:
Simple and Asymptotically Optimal t-Cheater Identifiable Secret Sharing Scheme. 330 - Masoumeh Safkhani, Pedro Peris-Lopez, Julio César Hernández Castro, Nasour Bagheri, Majid Naderi:
Cryptanalysis of Cho et al.'s Protocol, A Hash-Based Mutual Authentication Protocol for RFID Systems. 331 - Joan Boyar, René Peralta:
A depth-16 circuit for the AES S-box. 332 - Debiao He:
Cryptanalysis of a key agreement protocol based on chaotic Hash. 333 - Michael Scott:
On the Efficient Implementation of Pairing-Based Protocols. 334 - István Vajda:
New look at impossibility result on Dolev-Yao models with hashes. 335 - (Withdrawn) Weakness in an ECC-based AKA Protocol for Wireless Mobile Communications. 336
- Nishanth Chandran, Melissa Chase, Vinod Vaikuntanathan:
Collusion Resistant Obfuscation and Functional Re-encryption. 337 - Matthieu Rivain:
Fast and Regular Algorithms for Scalar Multiplication over Elliptic Curves. 338 - Thomas Ristenpart, Hovav Shacham, Thomas Shrimpton:
Careful with Composition: Limitations of Indifferentiability and Universal Composability. 339 - Feng Liu, Peng Li, Chuan Kun Wu:
Encrypting More Information in Visual Cryptography Scheme. 340 - (Withdrawn) An Improved Internet Voting Protocol. 341
- Melissa Chase, Markulf Kohlweiss:
A Domain Transformation for Structure-Preserving Signatures on Group Elements. 342 - Neal Koblitz, Alfred Menezes:
Another Look at Security Definitions. 343 - Zvika Brakerski, Vinod Vaikuntanathan:
Efficient Fully Homomorphic Encryption from (Standard) LWE. 344 - Wenling Wu, Lei Zhang:
LBlock: A Lightweight Block Cipher. 345 - Hai Huang:
Strongly Secure One Round Authenticated Key Exchange Protocol with Perfect Forward Security. 346 - (Withdrawn) An efficient certificateless authenticated key agreement protocol without bilinear pairings. 347
- Marcel Medwed, François-Xavier Standaert:
Extractors Against Side-Channel Attacks: Weak or Strong? 348 - Chong Hee Kim:
Efficient Methods for Exploiting Faults Induced at AES Middle Rounds. 349 - Carl Bosley, Kristiyan Haralambiev, Antonio Nicolosi:
HBN: An HB-like protocol secure against man-in-the-middle attacks. 350 - (Withdrawn) Cryptanalysis of the AAbeta Cryptosystem based on Linear Diophantine Equation Discrete Log Problem. 351
- Adam O'Neill, Chris Peikert, Brent Waters:
Bi-Deniable Public-Key Encryption. 352 - Masahito Gotaishi, Shigeo Tsujii:
Hidden Pair of Bijection Signature Scheme. 353 - Nicolas Guillermin:
A coprocessor for secure and high speed modular arithmetic. 354 - Oana Ciobotaru:
Comparing UC Security Variants. 355 - Ayoub Otmani, Jean-Pierre Tillich:
An Efficient Attack on All Concrete KKS Proposals. 356 - Gilbert Baumslag, Nelly Fazio, Antonio Nicolosi, Vladimir Shpilrain, William E. Skeith III:
Generalized Learning Problems and Applications to Non-Commutative Cryptography. 357 - Zhiqiang Lin, Dingyi Pei:
Constructing a Diversified FCSR with a Given Connection Integer. 358 - Nathaniel Wesley Filardo, Giuseppe Ateniese:
High-Entropy Visual Identification for Touch Screen Devices. 359 - Ziba Eslami, Nasrollah Pakniat:
Certificateless Aggregate Signcryption Schemes. 360 - S. Sree Vivek, S. Sharmila Deva Selvi, C. Pandu Rangan:
Compact CCA-Secure Encryption with Ciphertext Verifiability. 361 - Jia Xu, Ee-Chien Chang:
Practically Efficient Proof of Retrievability in Cloud Storage. 362 - (Withdrawn) Dynamic Group Blind Signatures. 363
- Jean-Pierre Flori, Sihem Mesnager, Gérard D. Cohen:
The Value 4 of Binary Kloosterman Sums. 364 - Debiao He:
Security flaws in a biometrics-based multi-server authentication with key agreement scheme. 365 - Deng Tang, Claude Carlet, Xiaohu Tang:
Highly Nonlinear Boolean Functions with Optimal Algebraic Immunity and Good Behavior Against Fast Algebraic Attacks. 366 - Nicolas Sendrier:
Decoding One Out of Many. 367 - Daniel J. Bernstein, Niels Duif, Tanja Lange, Peter Schwabe, Bo-Yin Yang:
High-speed high-security signatures. 368 - Yevgeniy Dodis, Allison B. Lewko, Brent Waters, Daniel Wichs:
Storing Secrets on Continually Leaky Devices. 369 - Mehrdad Nojoumian:
Socio-Rational Secret Sharing as a New Direction in Both Rational Cryptography and Game Theory. 370 - Paulo S. L. M. Barreto, Richard Lindner, Rafael Misoczki:
Monoidic Codes in Cryptography. 371 - Prashant Kushwah, Sunder Lal:
Identity based signcryption schemes without random oracles. 372 - Jean-Pierre Flori, Sihem Mesnager:
An efficient characterization of a family of hyperbent functions with multiple trace terms. 373 - Ethan Heilman:
Restoring the Differential Resistance of MD6. 374 - László Csirmaz:
Complexity of universal access structures. 375 - Julien Bringer, Alain Patey:
Backward Unlinkability for a VLR Group Signature Scheme with Efficient Revocation Check. 376 - Paul Kirchner:
Improved Generalized Birthday Attack. 377 - Amadou Tall:
A generalization of the Lucas addition chains. 378 - (Withdrawn) Cryptanalysis and improvement of a certificateless multi-proxy signature scheme. 379
- Carolyn Whitnall, Elisabeth Oswald, Luke Mather:
An Exploration of the Kolmogorov-Smirnov Test as Competitor to Mutual Information Analysis. 380 - Yalin Chen, Jue-Sam Chou, Chi-Fong Lin, Cheng-Lun Wu:
A Novel RFID Authentication Protocol based on Elliptic Curve Cryptosystem. 381 - Kaoru Kurosawa, Ryo Nojima, Le Trieu Phong:
Generic Fully Simulatable Adaptive Oblivious Transfer. 382 - Stefan Maubach:
A representation of the p-sylow subgroup of Perm(Fpn) and a cryptographic application. 383 - Steve Lu, Rafail Ostrovsky:
Multi-Server Oblivious RAM. 384 - Azhar Ali Khan, Ghulam Murtaza:
Efficient Implementation of Grand Cru with TI C6x+ Processor. 385 - László Csirmaz:
How to share secrets simultaneously. 386 - Jin Hong, Ga Won Lee, Daegun Ma:
Analysis of the Parallel Distinguished Point Tradeoff. 387 - Eric Brier, David Naccache, Phong Q. Nguyen, Mehdi Tibouchi:
Modulus Fault Attacks Against RSA-CRT Signatures. 388 - Mike Hamburg:
Spatial Encryption. 389 - Amir Moradi, Alessandro Barenghi, Timo Kasper, Christof Paar:
On the Vulnerability of FPGA Bitstream Encryption against Power Analysis Attacks - Extracting Keys from Xilinx Virtex-II FPGAs. 390 - Amir Moradi, Markus Kasper, Christof Paar:
On the Portability of Side-Channel Attacks - An Analysis of the Xilinx Virtex 4 and Virtex 5 Bitstream Encryption Mechanism. 391 - Yun Zhang, Christophe Tartary, Huaxiong Wang:
An Efficient Rational Secret Sharing Scheme Based on the Chinese Remainder Theorem (Revised Version). 392 - (Withdrawn) Analysis and Improvement of Thing's Time-Memory Trade-Off Attack. 393
- Helger Lipmaa, Bingsheng Zhang:
A More Efficient Computationally Sound Non-Interactive Zero-Knowledge Shuffle Argument. 394 - Michael Beye, Thijs Veugen:
Improved Anonymity for Key-Trees. 395 - Adam Groce, Jonathan Katz:
Fair Computation with Rational Players. 396 - Liqun Chen, Yu Chen:
The n-Diffie-Hellman Problem and its Applications. 397 - Nelly Fazio, Kevin Iga, Antonio Nicolosi, Ludovic Perret, William E. Skeith III:
Random Self-Reducibility Properties of Learning Problems over Burnside Groups of Exponent 3. 398 - Luk Bettale, Jean-Charles Faugère, Ludovic Perret:
Cryptanalysis of HFE, Multi-HFE and Variants for Odd and Even Characteristic. 399 - Gérard D. Cohen, Jean-Pierre Flori:
On a generalized combinatorial conjecture involving addition mod 2k-1. 400 - Abhishek Banerjee, Chris Peikert, Alon Rosen:
Pseudorandom Functions and Lattices. 401 - Essam Ghadafi:
Formalizing Group Blind Signatures and Practical Constructions without Random Oracles. 402 - Carolyn Whitnall, Elisabeth Oswald:
A Fair Evaluation Framework for Comparing Side-Channel Distinguishers. 403 - Seiko Arita:
A constant-round resettably-sound resettable zero-knowledge argument in the BPK model. 404 - Kristin E. Lauter, Michael Naehrig, Vinod Vaikuntanathan:
Can Homomorphic Encryption be Practical? 405 - Ralf Küsters, Max Tuengerthal:
Composition Theorems Without Pre-Established Session Identifiers. 406 - Elaine Shi, T.-H. Hubert Chan, Emil Stefanov, Mingfei Li:
Oblivious RAM with O((log N)3) Worst-Case Cost. 407 - Yi Deng, Dengguo Feng, Vipul Goyal, Dongdai Lin, Amit Sahai, Moti Yung:
Resettable Cryptography in Constant Rounds - the Case of Zero Knowledge. 408 - (Withdrawn) Efficient Predicate Encryption Supporting Construction of Fine-Grained Searchable Encryption. 409
- Shweta Agrawal, David Mandell Freeman, Vinod Vaikuntanathan:
Functional Encryption for Inner Product Predicates from Learning with Errors. 410 - Debiao He:
Comments on a password authentication and update scheme based on elliptic curve cryptography. 411 - Andrew Moss, Elisabeth Oswald, Dan Page, Michael Tunstall:
Automatic Insertion of DPA Countermeasures. 412 - Emmanuel Prouff, Thomas Roche:
Higher-Order Glitches Free Implementation of the AES using Secure Multi-Party Computation. 413 - Shweta Agrawal, Xavier Boyen, Vinod Vaikuntanathan, Panagiotis Voulgaris, Hoeteck Wee:
Fuzzy Identity Based Encryption from Lattices. 414 - Lei Li, Siman Yang:
On the Access Structures of Hyperelliptic Secret Sharing. 415 - Ilya Popovyan:
Efficient Parallelization of Lanczos Type Algorithms. 416 - Eli Biham, Orr Dunkelman, Nathan Keller, Adi Shamir:
New Data-Efficient Attacks on Reduced-Round IDEA. 417 - Jue-Sam Chou, Yalin Chen, Cheng-Lun Wu, Chi-Fong Lin:
An efficient RFID mutual authentication scheme based on ECC. 418 - (Withdrawn) On the security of a certificateless short signature scheme. 419
- Alexandre Duc, Jian Guo, Thomas Peyrin, Lei Wei:
Unaligned Rebound Attack - Application to Keccak. 420 - Ivan Damgård, Jakob Funder, Jesper Buus Nielsen, Louis Salvail:
Superposition Attacks on Cryptographic Protocols}. 421 - Jérémy Jean, María Naya-Plasencia, Martin Schläffer:
Improved Analysis of ECHO-256. 422 - Martin Ågren, Thomas Johansson:
Linear Cryptanalysis of PRINTcipher - Trails and Samples Everywhere. 423 - Masoumeh Safkhani, Nasour Bagheri, Majid Naderi:
Cryptanalysis of AZUMI: an EPC Class-1 Generation-2 Standard Compliant RFID Authentication Protocol. 424 - Laurie Genelle, Emmanuel Prouff, Michaël Quisquater:
Thwarting Higher-Order Side Channel Analysis with Additive and Multiplicative Maskings. 425 - Masoumeh Safkhani, Nasour Bagheri, Somitra Kumar Sanadhya, Majid Naderi:
Cryptanalysis of improved Yeh et al.'s authentication Protocol: An EPC Class-1 Generation-2 standard compliant protocol. 426 - Abderrahmane Nitaj:
A new attack on the KMOVcryptosystem. 427 - Tatsuya Takehisa, Hiroki Nogawa, Masakatu Morii:
AES Flow Interception: Key Snooping Method on Virtual Machine - Exception Handling Attack for AES-NI -. 428 - Sven Laur, Jan Willemson, Bingsheng Zhang:
Round-efficient Oblivious Database Manipulation. 429 - Dustin Moody, Daniel Shumow:
Analogues of Velu's formulas for Isogenies on Alternate Models of Elliptic Curves. 430 - Enrico Thomae, Christopher Wolf:
Roots of Square: Cryptanalysis of Double-Layer Square and Square+. 431 - Mihir Bellare, David Cash, Sriram Keelveedhi:
Ciphers that Securely Encipher their own Keys. 432 - Joël Alwen, Jonathan Katz, Ueli Maurer, Vassilis Zikas:
Collusion-Preserving Computation. 433 - Payman Mohassel, Salman Niksefat, Seyed Saeed Sadeghian, Babak Sadeghiyan:
A New Protocol for Oblivious DFA Evaluation and Applications. 434 - Yehuda Lindell, Benny Pinkas, Eli Oxman:
The IPS Compiler: Optimizations, Variants and Concrete Efficiency. 435 - Yuanmi Chen, Phong Q. Nguyen:
Faster Algorithms for Approximate Common Divisors: Breaking Fully-Homomorphic-Encryption Challenges over the Integers. 436 - Henry Cohn, Nadia Heninger:
Approximate common divisors via lattices. 437 - Philippe Camacho, Alejandro Hevia:
Short Transitive Signatures for Directed Trees. 438 - Philippe Camacho:
Optimal Data Authentication from Directed Transitive Signatures. 439 - Jean-Sébastien Coron, David Naccache, Mehdi Tibouchi:
Optimization of Fully Homomorphic Encryption. 440 - Jean-Sébastien Coron, Avradip Mandal, David Naccache, Mehdi Tibouchi:
Fully Homomorphic Encryption over the Integers with Shorter Public Keys. 441 - Sanjit Chatterjee, Alfred Menezes, Palash Sarkar:
Another Look at Tightness. 442 - Nir Bitansky, Ran Canetti, Alessandro Chiesa, Eran Tromer:
From Extractable Collision Resistance to Succinct Non-Interactive Arguments of Knowledge, and Back Again. 443 - Robert Granger, Andrew Moss:
Generalised Mersenne Numbers Revisited. 444 - (Withdrawn) Privacy-Preserving Friend Search over Online Social Networks. 445
- (Withdrawn) Private Information Extraction over Online Social Networks. 446
- Ayad F. Barsoum, M. Anwar Hasan:
On Verifying Dynamic Multiple Data Copies over Cloud Servers. 447 - Sourav Sen Gupta, Subhamoy Maitra, Goutam Paul, Santanu Sarkar:
RC4: (Non-)Random Words from (Non-)Random Permutations. 448 - Andrey Bogdanov, Dmitry Khovratovich, Christian Rechberger:
Biclique Cryptanalysis of the Full AES. 449 - (Withdrawn) R-hash : Hash Function Using Random Quadratic Polynomials Over GF(2). 450
- Hakhyun Kim, Woongryul Jeon, Yunho Lee, Dongho Won:
Cryptanalysis and improvement of a biometrics-based multi-server authentication with key agreement scheme. 451 - Manish Garg, Sugata Gangopadhyay:
The Good lower bound of Second-order nonlinearity of a class of Boolean function. 452 - Michael Tunstall:
Practical Complexity Differential Cryptanalysis and Fault Analysis of AES. 453 - Steven A. Myers, Mona Sergi, Abhi Shelat:
Threshold Fully Homomorphic Encryption and Secure Computation. 454 - Jie Chen, Hoon Wei Lim, San Ling, Huaxiong Wang:
The Relation and Transformation between Hierarchical Inner Product Encryption and Spatial Encryption. 455 - Shafi Goldwasser, Huijia Lin, Aviad Rubinstein:
Delegation of Computation without Rejection Problem from Designated Verifier CS-Proofs. 456 - Sanjam Garg, Rafail Ostrovsky, Ivan Visconti, Akshay Wadia:
Resettable Statistical Zero Knowledge. 457 - Michael Schneider:
Sieving for Shortest Vectors in Ideal Lattices. 458 - Joan Daemen, Tony Dusenge, Gilles Van Assche:
Sufficient conditions for sound hashing using a truncated permutation. 459 - Zijian Zhang, Liehuang Zhu, Lejian Liao:
Computationally Sound Symbolic Security Reduction Analysis of Group Key Exchange Protocol using Bilinear Pairings. 460 - Fangguo Zhang, Ping Wang:
Speeding Up Elliptic Curve Discrete Logarithm Computations with Point Halving. 461 - Marina Blanton, Mehrdad Aliasgari:
Secure Outsourced Computation of Iris Matching. 462 - Duong Hieu Phan, David Pointcheval, Mario Strefler:
Adaptively Secure Broadcast Encryption with Forward Secrecy. 463 - Marina Blanton, Everaldo Aguiar:
Private and Oblivious Set and Multiset Operations. 464 - Craig Costello, Kristin E. Lauter, Michael Naehrig:
Attractive Subfamilies of BLS Curves for Implementing High-Security Pairings. 465 - Keting Jia, Hongbo Yu, Xiaoyun Wang:
A Meet-in-the-Middle Attack on the Full KASUMI. 466 - Muhammad Rezal Kamel Ariffin, M. A. Asbullah, Nor Azman Abu:
Security Features of an Asymmetric Cryptosystem based on the Diophantine Equation Discrete Log Problem. 467 - Hongfeng Wu, Changan Zhao:
Faster Scalar Multiplication on Ordinary Weierstrass Elliptic Curves over Fields of Characteristic Three. 468 - ChangKyun Kim, Eun-Gu Jung, Dong Hoon Lee, Chang-Ho Jung, Daewan Han:
Cryptanalysis of INCrypt32 in HID's iCLASS Systems. 469 - István Vajda:
Non-malleable public key encryption in BRSIM/UC. 470 - Peter Scholl, Nigel P. Smart:
Improved Key Generation For Gentry's Fully Homomorphic Encryption Scheme. 471 - Joseph K. Liu, Tsz Hon Yuen, Jianying Zhou:
Forward Secure Ring Signature without Random Oracles. 472 - Jia Xu:
Practically Efficient Verifiable Delegation of Polynomial and its Applications. 473 - Anja Becker, Jean-Sébastien Coron, Antoine Joux:
Improved Generic Algorithms for Hard Knapsacks. 474 - Nicolas T. Courtois, Daniel Hulme, Theodosis Mourouzis:
Solving Circuit Optimisation Problems in Cryptography and Cryptanalysis. 475 - Benoît Libert, Kenneth G. Paterson, Elizabeth A. Quaglia:
Anonymous Broadcast Encryption. 476 - Abderrahmane Nitaj:
Cryptanalysis of NTRU with two public keys. 477 - Debiao He, Sahadeo Padhye:
A Pairing-free Certificateless Authenticated Key Agreement Protocol in the eCK Model. 478 - Mihir Bellare, Eike Kiltz, Chris Peikert, Brent Waters:
Identity-Based (Lossy) Trapdoor Functions and Applications. 479 - Sanjay Bhattacherjee, Palash Sarkar:
Complete Tree Subset Difference Broadcast Encryption Scheme and its Analysis. 480 - Pierre-Alain Fouque, Mehdi Tibouchi:
Close to Uniform Prime Number Generation With Fewer Random Bits. 481 - S. Dov Gordon, Jonathan Katz, Vladimir Kolesnikov, Tal Malkin, Mariana Raykova, Yevgeniy Vahlis:
Secure Computation with Sublinear Amortized Work. 482 - Mario Romsy:
Adaption of Pollard's kangaroo algorithm to the FACTOR problem. 483 - Johannes Buchmann, Erik Dahmen, Andreas Hülsing:
XMSS - A Practical Forward Secure Signature Scheme based on Minimal Security Assumptions. 484 - Neal Koblitz:
Another Look at Automated Theorem-Proving. II. 485 - Kenneth G. Paterson, Jacob C. N. Schuldt, Martijn Stam, Susan Thomson:
On the Joint Security of Encryption and Signature, Revisited. 486 - Raghav Bhaskar, Abhishek Bhowmick, Vipul Goyal, Srivatsan Laxman, Abhradeep Thakurta:
Noiseless Database Privacy. 487 - Kai-Yuen Cheong:
A Survey of Cryptography Based on Physically Unclonable Objects. 488 - A. N. Alekseychuk, L. V. Kovalchuk:
Towards a Theory of Security Evaluation for GOST-like Ciphers against Differential and Linear Cryptanalysis. 489 - Allison B. Lewko:
Tools for Simulating Features of Composite Order Bilinear Groups in the Prime Order Setting. 490 - (Withdrawn) Cryptanalysis of a Privacy-Preserving Communication Architecture for V2G Networks in Smart Grid. 491
- Long Hoang Nguyen:
Rational distance-bounding protocols over noisy channels. 492 - Nir Bitansky, Omer Paneth:
From Point Obfuscation To 3-round Zero-Knowledge. 493 - Carmit Hazay, Gert Læssøe Mikkelsen, Tal Rabin, Tomas Toft:
Efficient RSA Key Generation and Threshold Paillier in the Two-Party Setting. 494 - Dario Catalano, Dario Fiore:
Concise Vector Commitments and their Applications to Zero-Knowledge Elementary Databases. 495 - Avradip Mandal, Jacques Patarin, Yannick Seurin:
On the Public Indifferentiability and Correlation Intractability of the 6-Round Feistel Construction. 496 - Antoine Amarilli, David Naccache, Pablo Rauzy, Emil Simion:
Can a Program Reverse-Engineer Itself? 497 - Jue-Sam Chou, Shih-Che Hung, Yalin Chen:
An Efficient Secure Anonymous Proxy Signature Scheme. 498 - Guido Bertoni, Joan Daemen, Michaël Peeters, Gilles Van Assche:
Duplexing the sponge: single-pass authenticated encryption and other applications. 499 - Hamid Mala:
Biclique Cryptanalysis of the Block Cipher SQUARE. 500 - Daniele Micciancio, Chris Peikert:
Trapdoors for Lattices: Simpler, Tighter, Faster, Smaller. 501 - Daniel J. Bernstein, Tanja Lange, Christiane Peters:
Wild McEliece Incognito. 502 - Christina Boura, Anne Canteaut:
On the influence of the algebraic degree of F-1 on the algebraic degree of G circ F. 503 - Iftach Haitner, Itay Berman:
From Non-Adaptive to Adaptive Pseudorandom Functions. 504 - Julien Doget, Guillaume Dabosville, Emmanuel Prouff:
Defeat Masking With a (Very) Few Knowledge About the Leakage. 505 - David Jao, Luca De Feo:
Towards quantum-resistant cryptosystems from supersingular elliptic curve isogenies. 506 - Charanjit S. Jutla, Arnab Roy:
Relatively-Sound NIZKs and Password-Based Key-Exchange. 507 - Ivan Damgård, Sebastian Faust, Carmit Hazay:
Secure Two-Party Computation with Low Communication. 508 - Emil Stefanov, Elaine Shi, Dawn Song:
Policy-Enhanced Private Set Intersection: Sharing Information While Enforcing Privacy Policies. 509 - Seung Geol Choi, Jonathan Katz, Ranjit Kumaresan, Hong-Sheng Zhou:
On the Security of the Free-XOR Technique. 510 - Matthias Krause, Matthias Hamann:
The Cryptographic Power of Random Selection. 511 - Benny Applebaum, Andrej Bogdanov, Alon Rosen:
A Dichotomy for Local Small-Bias Generators. 512 - Abhishek Jain, Omkant Pandey:
Non-Malleable Zero Knowledge: Black-Box Constructions and Definitional Relationships. 513 - Mohammad Sadeq Dousti, Rasool Jalili:
Milder Definitions of Computational Approximability: The Case of Zero-Knowledge Protocols. 514 - Qingfang Jin, Zhuojun Liu, Baofeng Wu, Xiaoming Zhang:
A general conjecture similar to T-D conjecture and its applications in constructing Boolean functions with optimal algebraic immunity. 515 - Louis Goubin, Ange Martinelli:
Protecting AES with Shamir's Secret Sharing Scheme. 516 - Ralf Küsters, Tomasz Truderung, Andreas Vogt:
Verifiability, Privacy, and Coercion-Resistance: New Insights from a Case Study. 517 - Ran Canetti, Ben Riva, Guy N. Rothblum:
Two 1-Round Protocols for Delegation of Computation. 518 - Stefan Dziembowski, Sebastian Faust:
Leakage-Resilient Cryptography From the Inner-Product Extractor. 519 - Houssem Maghrebi, Sylvain Guilley, Claude Carlet, Jean-Luc Danger:
Classification of High-Order Boolean Masking Schemes and Improvements of their Efficiency. 520 - Daniele Micciancio, Petros Mol:
Pseudorandom Knapsacks and the Sample Complexity of LWE Search-to-Decision Reductions. 521 - Imran Abbasi, Mehreen Afzal:
A Compact S-Box Design for SMS4 Block Cipher. 522 - (Withdrawn) Security analysis of a fuzzy identity-based encryption scheme. 523
- Leibo Li, Jiazhe Chen, Xiaoyun Wang:
Multiplied Conditional Impossible Differential Attack on Reduced-Round Camellia. 524 - Yanbin Pan, Feng Zhang:
A Note on the Density of the Multiple Subset Sum Problems. 525 - Suresh Chari, Charanjit S. Jutla, Arnab Roy:
Universally Composable Security Analysis of OAuth v2.0. 526 - (Withdrawn) Security Weaknesses of password-only authenticated key establishment protocol without public key cryptography. 527
- Jian-Zhu Lu, Hong-Qing Ren, Jipeng Zhou:
Efficient Delegation-Based Authentication Protocol with Strong Mobile Privacy. 528 - Qingji Zheng, Shouhuai Xu:
Secure and Efficient Proof of Storage with Deduplication. 529 - Stefan Dziembowski, Tomasz Kazana, Daniel Wichs:
Key-Evolution Schemes Resilient to Space-Bounded Leakage. 530 - Philippe Loubet-Moundi, David Vigilant, Francis Olivier:
Static Fault Attacks on Hardware DES Registers. 531 - Bart Mennink, Bart Preneel:
Hash Functions Based on Three Permutations: A Generic Security Analysis. 532 - Abhi Shelat, Chih-Hao Shen:
Two-Output Secure Computation with Malicious Adversaries. 533 - Maxime Nassar, Sylvain Guilley, Jean-Luc Danger:
Formal Analysis of the Entropy / Security Trade-off in First-Order Masking Countermeasures against Side-Channel Attacks. 534 - Ivan Damgård, Valerio Pastro, Nigel P. Smart, Sarah Zakarias:
Multiparty Computation from Somewhat Homomorphic Encryption. 535 - Rafail Ostrovsky, Vanishree Rao, Alessandra Scafuro, Ivan Visconti:
Revisiting Lower and Upper Bounds for Selective Decommitments. 536 - Vadim Lyubashevsky:
Lattice Signatures Without Trapdoors. 537 - Jia Xu:
Secure Cloud Storage with Encrypted Data using File-Based Authentication. 538 - Ching-Hua Yu:
Sign Modules in Secure Arithmetic Circuits. 539 - Yosuke Katoh, Yun-Ju Huang, Chen-Mou Cheng, Tsuyoshi Takagi:
Efficient Implementation of the etaT Pairing on GPU. 540 - Orr Dunkelman, Nathan Keller, Adi Shamir:
Minimalism in Cryptography: The Even-Mansour Scheme Revisited. 541 - Yang Lu, Jiguo Li:
Certificate-Based Signcryption: Security Model and Efficient Construction. 542 - Tatsuaki Okamoto, Katsuyuki Takashima:
Adaptively Attribute-Hiding (Hierarchical) Inner Product Encryption. 543 - Andres Molina-Markham, George Danezis, Kevin Fu, Prashant J. Shenoy, David E. Irwin:
Designing Privacy-preserving Smart Meters with Low-cost Microcontrollers. 544 - Masao Kasahara:
Public Key Cryptosystems Constructed Based on Random Pseudo Cyclic Codes, K(IX)SE(1)PKC, Realizing Coding Rate of Exactly 1.0. 545 - Angelo De Caro, Vincenzo Iovino, Giuseppe Persiano:
Hidden Vector Encryption Fully Secure Against Unrestricted Queries. 546 - Zhaopeng Dai, Zhuojun Liu:
The Single Cycle T-functions. 547 - Vladimir O. Drelikhov, Grigory B. Marshalko, Alexey V. Pokrovskiy:
On the security of MQ_DRBG. 548 - Qingfang Jin, Zhuojun Liu, Baofeng Wu:
1-Resilient Boolean Function with Optimal Algebraic Immunity. 549 - Javad Alizadeh, Abdolrasoul Mirghadri:
A New Distinguisher for CubeHash-8/b and CubeHash-15/b Compression Functions. 550 - Shengbao Wu, Mingsheng Wang:
Security Evaluation against Differential Cryptanalysis for Block Cipher Structures. 551 - Stefan Katzenbeisser, Ünal Koçabas, Vincent van der Leest, Ahmad-Reza Sadeghi, Geert Jan Schrijen, Heike Schröder, Christian Wachsmann:
Recyclable PUFs: Logically Reconfigurable PUFs. 552 - Mohammad Mahmoody, Tal Moran, Salil P. Vadhan:
Non-Interactive Time-Stamping and Proofs of Work in the Random Oracle Model. 553 - Yu-Chi Chen, Gwoboa Horng:
On the security models for certificateless signature schemes achieving level 3 security. 554 - Michelle Kendall, Keith M. Martin:
On the Role of Expander Graphs in Key Predistribution Schemes for Wireless Sensor Networks. 555 - Yongjia Wang, Haining Fan:
GF(2n) redundant representation using matrix embedding. 556 - Cai-Sen Chen, Tao Wang, Xiaocen Chen, Ping Zhou:
An Improved Trace Driven Instruction Cache Timing Attack on RSA. 557 - Itai Dinur, Orr Dunkelman, Adi Shamir:
Improved Attacks on Full GOST. 558 - Eike Kiltz, Adam O'Neill, Adam D. Smith:
Instantiability of RSA-OAEP under Chosen-Plaintext Attack. 559 - Ching-Hua Yu, Bo-Yin Yang:
Randomized Secure Two-Party Computation for Modular Conversion, Zero Test, Comparison, MOD and Exponentiation. 560 - Alex Bain, John C. Mitchell, Rahul Sharma, Deian Stefan, Joe Zimmerman:
A Domain-Specific Language for Computing on Encrypted Data. 561 - Annalisa De Bonis, Giovanni Di Crescenzo:
A Group Testing Approach to Improved Corruption Localizing Hashing. 562 - Masoumeh Safkhani, Nasour Bagheri, Majid Naderi:
On the Security of RFID Anti Cloning Security Protocol(ACSP). 563 - Naveed Ahmed, Christian Damsgaard Jensen, Erik Zenner:
Private-key Symbolic Encryption. 564 - Saif Al-Kuwari, James H. Davenport, Russell J. Bradford:
Cryptographic Hash Functions: Recent Design Trends and Security Notions. 565 - Craig Gentry, Shai Halevi, Nigel P. Smart:
Fully Homomorphic Encryption with Polylog Overhead. 566 - Moon Sung Lee:
On the sparse subset sum problem from Gentry-Halevi's implementation of fully homomorphic encryption. 567 - Aleksander Essex, Christian Henrich, Urs Hengartner:
Single Layer Optical-scan Voting with Fully Distributed Trust. 568 - Ming Li, Ali Miri, Daming Zhu:
Analysis of the Hamming Weight of the Extended wmbNAF. 569 - Jintai Ding, Thorsten Kleinjung:
Degree of regularity for HFE-. 570 - (Withdrawn) Lower Bound on Covering Radius of Reed-Muller Codes in Set of Balanced Functions. 571
- Ayan Mahalanobis:
The ElGamal cryptosystem over circulant matrices. 572 - Masao Kasahara:
A New Class of Multivariate Public Key Cryptosystems Constructed Based on Random Pseudo Cyclic Codes, K(XIII)SE(2)PKC, Realizing Coding Rate of Exactly 1.0. 573 - Jia Xu, Ee-Chien Chang:
Towards Efficient Provable Data Possession. 574 - Jing Liu, Changji Wang:
Exclusive Key-Based Group Rekeying. 575 - Jing Liu, Qiong Huang, Bo Yang:
Efficient Multicast Key Distribution Using HOWF-based Access Control Structures. 576 - Ou Ruan, Cai Fu, Guohua Cui:
An Efficient Protocol for the Commit-Prove-Fair-Open functionality. 577 - Balasingham Balamohan:
ACCELERATING THE SCALAR MULTIPLICATION ON GENUS 2 HYPERELLIPTIC CURVE CRYPTOSYSTEMS. 578 - Yang Li, Daisuke Nakatsu, Qi Li, Kazuo Ohta, Kazuo Sakiyama:
Clockwise Collision Analysis - Overlooked Side-Channel Leakage Inside Your Measurements. 579 - Abdoul Aziz Ciss, Djiby Sow:
On a new generalization of Huff curves. 580 - Mihir Bellare, Rafael Dowsley, Brent Waters, Scott Yilek:
Standard Security Does Not Imply Security Against Selective-Opening. 581 - Abdoul Aziz Ciss, Djiby Sow:
Randomness Extraction in finite fields Fpn. 582 - Jie Chen, Hoon Wei Lim, San Ling, Huaxiong Wang, Khoa Nguyen:
Revocable Identity-Based Encryption from Lattices. 583 - Teruo Saito:
A Single-Key Attack on 6-Round KASUMI. 584 - Emil Stefanov, Marten van Dijk, Alina Oprea, Ari Juels:
Iris: A Scalable Cloud File System with Efficient Integrity Checks. 585 - Mainack Mondal, Avik Chakraborti, Nilanjan Datta, Debdeep Mukhopadhyay:
TweLEX: A Tweaked Version of the LEX Stream Cipher. 586 - Charalampos Papamanthou, Elaine Shi, Roberto Tamassia:
Publicly Verifiable Delegation of Computation. 587 - Arpita Maitra, Goutam Paul:
A Note on Four-State BB84 Protocol. 588 - Chen Su, Haining Fan:
Impact of Intel's New Instruction Sets on Software Implementation of GF(2)[x] Multiplication. 589 - Jianwei Li, Yanbin Pan, Mingjie Liu, Guizhen Zhu:
An Efficient Broadcast Attack against NTRU. 590 - Noboru Kunihiro, Naoyuki Shinohara, Tetsuya Izu:
A Unified Framework for Small Secret Exponent Attack on RSA. 591 - Laila El Aimani:
Generic Constructions for Verifiable Signcryption. 592 - Yu Chen, Liqun Chen, Zongyang Zhang:
CCA Secure IB-KEM from the Computational Bilinear Diffie-Hellman Assumption in the Standard Model. 593 - Dalia Khader, Peter Y. A. Ryan:
Receipt Freeness of Prêt à Voter Provably Secure. 594 - (Withdrawn) Efficient Multi-Query CPIR from Ring-LWE. 595
- Seny Kamara, Mariana Raykova:
Parallel Homomorphic Encryption. 596 - Bryan Parno, Mariana Raykova, Vinod Vaikuntanathan:
How to Delegate and Verify in Public: Verifiable Computation from Attribute-based Encryption. 597 - Jean-Charles Faugère, Ludovic Perret, Christophe Petit, Guénaël Renault:
New Subexponential Algorithms for Factoring in SL(2, fq). 598 - (Withdrawn) Efficient Password-Based Authenticated Key Exchange from Lattices. 599
- Baocheng Wang, Chunming Tang, Yanfeng Qi, Yixian Yang, Maozhi Xu:
A New Class of Hyper-bent Boolean Functions with Multiple Trace Terms. 600 - Caixue Zhou:
A Multi-Receiver ID-Based Generalized Signcryption Scheme. 601 - Vipul Goyal:
Positive Results for Concurrently Secure Computation in the Plain Model. 602 - (Withdrawn) Advanced Zero-Sum Distinguishers for the Permutations of the PHOTON Family. 603
- Aurore Guillevic, Damien Vergnaud:
Genus 2 Hyperelliptic Curve Families with Explicit Jacobian Order Evaluation and Pairing-Friendly Constructions. 604 - Payman Mohassel:
Efficient and Secure Delegation of Linear Algebra. 605 - (Withdrawn) GF(2n) Subquadratic Polynomial Basis Multipliers for Some Irreducible Trinomials. 606
- Carlos Aguilar Melchor, Slim Bettaieb, Philippe Gaborit, Javier Herranz:
Improving Additive and Multiplicative Homomorphic Encryption Schemes Based on Worst-Case Hardness Assumptions}. 607 - Peter Birkner, Patrick Longa, Francesco Sica:
Four-Dimensional Gallant-Lambert-Vanstone Scalar Multiplication. 608 - Jian Guo, Thomas Peyrin, Axel Poschmann:
The PHOTON Family of Lightweight Hash Functions. 609 - Nicolas Veyrat-Charvillon, Benoît Gérard, Mathieu Renauld, François-Xavier Standaert:
An optimal Key Enumeration Algorithm and its Application to Side-Channel Attacks. 610 - Dana Dachman-Soled, Tal Malkin, Mariana Raykova, Muthuramakrishnan Venkitasubramaniam:
Adaptive and Concurrent Secure Computation from New Notions of Non-Malleability. 611 - Vladimir Kolesnikov, Ganapathy S. Sundaram:
IBAKE: Identity-Based Authenticated Key Exchange Protocol. 612 - Gilad Asharov, Abhishek Jain, Daniel Wichs:
Multiparty Computation with Low Communication, Computation and Interaction via Threshold FHE. 613 - Keke Chen:
On Security of the Utility Preserving RASP Encryption. 614 - Jean Paul Degabriele, Anja Lehmann, Kenneth G. Paterson, Nigel P. Smart, Mario Strefler:
On the Joint Security of Encryption and Signature in EMV. 615 - Jiazhe Chen, Meiqin Wang, Bart Preneel:
Impossible Differential Cryptanalysis of the Lightweight Block Ciphers TEA, XTEA and HIGHT. 616 - Joseph A. Akinyele, Matthew Green, Aviel D. Rubin:
Charm: A framework for Rapidly Prototyping Cryptosystems. 617 - Lishoy Francis, Gerhard P. Hancke, Keith Mayes, Konstantinos Markantonakis:
Practical Relay Attack on Contactless Transactions by Using NFC Mobile Phones. 618 - Bo Zhu, Guang Gong:
Guess-then-Meet-in-the-Middle Attacks on the KTANTAN Family of Block Ciphers. 619 - Elena Andreeva, Atul Luykx, Bart Mennink:
Provable Security of BLAKE with Non-Ideal Compression Function. 620 - Zhenfu Cao, Zongyang Zhang, Yunlei Zhao:
Adaptive Security of Concurrent Non-Malleable Zero-Knowledge. 621 - Andrej Bogdanov, Chin Ho Lee:
Homomorphic encryption from codes. 622 - Donghoon Chang, Mridul Nandi, Moti Yung:
Indifferentiability of the Hash Algorithm BLAKE. 623 - Itai Dinur, Orr Dunkelman, Adi Shamir:
New attacks on Keccak-224 and Keccak-256. 624 - (Withdrawn) Two RFID Privacy Models in Front of a Court. 625
- Nicolas T. Courtois:
Algebraic Complexity Reduction and Cryptanalysis of GOST. 626 - Sihem Mesnager:
A note on semi-bent functions with multiple trace terms and hyperelliptic curves. 627 - Kaoru Kurosawa, Le Trieu Phong:
Maximum Leakage Resilient IBE and IPE. 628 - Eli Ben-Sasson, Serge Fehr, Rafail Ostrovsky:
Near-Linear Unconditionally-Secure Multiparty Computation with a Dishonest Minority. 629 - Dustin Moody, Souradyuti Paul, Daniel Smith-Tone:
Indifferentiability Security of the Fast Widepipe Hash: Breaking the Birthday Barrier. 630 - Yu-Chi Chen, Du-shiau Tsai, Gwoboa Horng:
On the Security of a Cheating Immune Visual Secret Sharing Scheme. 631 - Elena Dubrova:
A Scalable Method for Constructing Galois NLFSRs with Period 2n-1 using Cross-Join Pairs. 632 - Billy Bob Brumley, Manuel Barbosa, Dan Page, Frederik Vercauteren:
Practical realisation and elimination of an ECC-related software bug attack. 633 - Mohammad Sabzinejad Farash, Mahmoud Ahmadian-Attari, Majid Bayat:
Security of Multiple-Key Agreement Protocols and Propose an Enhanced Protocol. 634 - Marcin Rogawski, Kris Gaj:
Groestl Tweaks and their Effect on FPGA Results. 635 - (Withdrawn) Untangling RFID Privacy Models. 636
- Laszlo Hars:
Random Number Generation Based on Oscillatory Metastability in Ring Circuits. 637 - Christophe Petit, Jean-Jacques Quisquater:
Rubik's for cryptographers. 638 - Jiejun Kong, Dapeng Wu, Xiaoyan Hong, Mario Gerla:
Towards a Probabilistic Complexity-theoretic Modeling of Biological Cyanide Poisoning as Service Attack in Self-organizing Networks. 639 - Emiliano De Cristofaro, Claudio Soriente, Gene Tsudik, Andrew Williams:
Hummingbird: Privacy at the time of Twitter. 640 - Evgeny A. Grechnikov, Andrew V. Adinetz:
Collision for 75-step SHA-1: Intensive Parallelization with GPU. 641 - Yongqiang Li, Mingsheng Wang:
Constructing differentially 4-uniform permutations over 22m from quadratic APN permutations over 22m+1. 642 - Alexey A. Chilikov, Evgeny K. Alekseev:
Some Words About Cryptographic Key Recognition In Data Streams. 643 - Ewan Fleischmann, Christian Forler, Stefan Lucks, Jakob Wenzel:
McOE: A Foolproof On-Line Authenticated Encryption Scheme. 644 - Chunsheng Gu:
New Fully Homomorphic Encryption without Bootstrapping. 645 - Daniel J. Bernstein, Tanja Lange, Peter Schwabe:
The security impact of a new cryptographic library. 646 - Fanbao Liu, Tao Xie, Changxiang Shen:
Breaking H2-MAC Using Birthday Paradox. 647 - Tatsuaki Okamoto, Katsuyuki Takashima:
Achieving Short Ciphertexts or Short Secret-Keys for Adaptively Secure General Inner-Product Encryption. 648 - Fanbao Liu, Changxiang Shen, Tao Xie, Dengguo Feng:
On the Security of NMAC and Its Variants. 649 - Jie Chen, Hoon Wei Lim, San Ling, Huaxiong Wang:
Fully Secure Spatial Encryption under Simple Assumptions with Constant-Size Ciphertexts. 650 - Kaoutar Elkhiyaoui, Erik-Oliver Blass, Refik Molva:
CHECKER: On-site checking in RFID-based supply chains. 651 - Shay Gueron, Michael E. Kounavis:
Security Enhancement of the Vortex Family of Hash Functions. 652 - (Withdrawn) An Improved Certificateless Authenticated Key Agreement Protocol. 653
- Laurie Haustenne, Quentin De Neyer, Olivier Pereira:
Elliptic Curve Cryptography in JavaScript. 654 - T.-H. Hubert Chan, Elaine Shi, Dawn Song:
Privacy-Preserving Stream Aggregation with Fault Tolerance. 655 - ZiJie Xu, Ke Xu:
Use Data-depend Function Build Message Expansion Function. 656 - Abhranil Maiti, Vikash Gunreddy, Patrick Schaumont:
A Systematic Method to Evaluate and Compare the Performance of Physical Unclonable Functions. 657 - David Bernhard, Georg Fuchsbauer, Essam Ghadafi, Nigel P. Smart, Bogdan Warinschi:
Anonymous attestation with user-controlled linkability. 658 - Daniel R. L. Brown:
Formally Assessing Cryptographic Entropy. 659 - Nir Bitansky, Ran Canetti, Shafi Goldwasser, Shai Halevi, Yael Tauman Kalai, Guy N. Rothblum:
Program Obfuscation with Leaky Hardware. 660 - Dongxia Bai, Leibo Li:
New Impossible Differential Attacks on Camellia. 661 - Dan Bogdanov, Riivo Talviste, Jan Willemson:
Deploying secure multi-party computation for financial data analysis. 662 - Adriana López-Alt, Eran Tromer, Vinod Vaikuntanathan:
Cloud-Assisted Multiparty Computation from Fully Homomorphic Encryption. 663 - S. Sharmila Deva Selvi, S. Sree Vivek, Dhinakaran Vinayagamurthy, C. Pandu Rangan:
On the Security of ID Based Signcryption Schemes. 664 - Jothi Rangasamy, Douglas Stebila, Lakshmi Kuppusamy, Colin Boyd, Juan Manuel González Nieto:
Efficient Modular Exponentiation-based Puzzles for Denial-of-Service Protection. 665 - Eyal Z. Goren, Kristin E. Lauter:
A Gross-Zagier formula for quaternion algebras over totally real fields. 666 - (Withdrawn) An Efficient and Private RFID Authentication Protocol Supporting Ownership Transfer. 667
- Piotr K. Tysowski, M. Anwarul Hasan:
Re-Encryption-Based Key Management Towards Secure and Scalable Mobile Applications in Clouds. 668 - Christopher Wolf, Enrico Thomae:
Small Linearization: Memory Friendly Solving of Non-Linear Equations over Finite Fields. 669 - Peter Schwabe, Bo-Yin Yang, Shang-Yi Yang:
SHA-3 on ARM11 processors. 670 - Ya Liu, Dawu Gu, Zhiqiang Liu, Wei Li, Ying Man:
Improved Results on Impossible Differential Cryptanalysis of Reduced-Round Camellia-192/256. 671 - Falko Strenzke:
Fast and Secure Root-Finding for Code-based Cryptosystems. 672 - Nils Fleischhacker, Felix Günther, Franziskus Kiefer, Mark Manulis, Bertram Poettering:
Pseudorandom Signatures. 673 - Colleen Swanson, Douglas R. Stinson:
Extended Combinatorial Constructions for Peer-to-peer User-Private Information Retrieval. 674 - Nico Döttling, Thilo Mie, Jörn Müller-Quade, Tobias Nilges:
Basing Obfuscation on Simple Tamper-Proof Hardware Assumptions. 675 - Jian-Zhu Lu, Shaoyuan Zhang, Shijie Qie:
Enhanced Biometrics-based Remote User Authentication Scheme Using Smart Cards. 676 - Jeremy Clark, Aleksander Essex:
CommitCoin: Carbon Dating Commitments with Bitcoin. 677 - Florian Böhl, Dennis Hofheinz, Daniel Kraschewski:
On definitions of selective opening security. 678 - Junaid Jameel Ahmad, Shujun Li, Ahmad-Reza Sadeghi, Thomas Schneider:
CTL: A Platform-Independent Crypto Tools Library Based on Dataflow Programming Paradigm. 679 - Craig Gentry, Shai Halevi, Nigel P. Smart:
Better Bootstrapping in Fully Homomorphic Encryption. 680 - Christina Brzuska, Marc Fischlin, Heike Schröder, Stefan Katzenbeisser:
Physically Uncloneable Functions in the Universal Composition Framework. 681 - István Vajda:
UC framework for anonymous communication. 682 - Falko Strenzke:
Timing Attacks against the Syndrome Inversionin Code-based Cryptosystems. 683 - Rkia Aouinatou, Mostafa Belkasmi:
Identification Based Encryption with RSA-OAEP. Using SEM and Without. 684 - Roman Oliynykov:
Cryptanalysis of Symmetric Block Ciphers Based on the Feistel Network with Non-bijective S-boxes in the Round Function. 685 - Rodolphe Lampe, Jacques Patarin:
Analysis of some natural variants of the PKP Algorithm. 686 - Mohammad Ali Orumiehchiha, Josef Pieprzyk, Ron Steinfeld:
Cryptanalysis of WG-7 (A Lightweight Stream Cipher for RFID Encryption). 687 - Guomin Yang, Shanshan Duan, Duncan S. Wong, Chik How Tan, Huaxiong Wang:
Authenticated Key Exchange under Bad Randomness. 688 - (Withdrawn) (Efficient) Universally Composable Two-Party Computation Using a Minimal Number of Stateless Tokens. 689
- Masao Kasahara:
A New Class of Multivariate Public Key Cryptosystem Constructed on the Basis of Message-Dependent Transformation. 690 - Gildas Avoine, Xavier Carpent:
Yet Another Ultralightweight Authentication Protocol that is Broken. 691 - Cheng Chen, Zhenfeng Zhang, Dengguo Feng:
Fully Secure (Doubly-)Spatial Encryption under Simpler Assumptions. 692 - Bin Wang, Qing Zhao, Ke Dai:
A non-interactive deniable authentication scheme in the standard model. 693 - Jiye Liu, Yongbin Zhou, Shuguo Yang, Dengguo Feng:
Generic Side-channel Distinguisher Based on Kolmogorov-Smirnov Test: Explicit Construction and Practical Evaluation. 694 - S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Rangan:
Deterministic Identity Based Signature Scheme and its Application for Aggregate Signatures. 695 - Dario Catalano, Dario Fiore, Bogdan Warinschi:
Efficient Network Coding Signatures in the Standard Model. 696 - Andrey Bogdanov, Miroslav Knezevic, Gregor Leander, Deniz Toz, Kerem Varici, Ingrid Verbauwhede:
SPONGENT: The Design Space of Lightweight Cryptographic Hashing. 697 - Baocheng Wang, Chunming Tang, Yanfeng Qi, Yixian Yang:
A generalization of the class of hyper-bent Boolean functions in binomial forms. 698 - (Withdrawn) Public-Key Encryption with Cluster-Chain-based Keyword Search. 699
- Tatsuaki Okamoto, Katsuyuki Takashima:
Efficient Attribute-Based Signatures for Non-Monotone Predicates in the Standard Model. 700 - Tatsuaki Okamoto, Katsuyuki Takashima:
Decentralized Attribute-Based Signatures. 701 - Yitao Chen:
Comments of an efficient and secure multi-server authentication scheme with key agreement. 702 - Dennis Hofheinz, Tibor Jager:
Waters Signatures with Optimal Security Reduction. 703 - Masoumeh Safkhani, Nasour Bagheri, Majid Naderi:
Security Analysis of a PUF based RFID Authentication Protocol. 704 - Valérie Nachef, Emmanuel Volte, Jacques Patarin:
Differential Attacks on Generalized Feistel Schemes. 705 - Johannes Blömer, Peter Günther, Gennadij Liske:
Improved Side Channel Attacks on Pairing Based Cryptography. 706 - Alex Biryukov, Ilya Kizhvatov, Bin Zhang:
Cryptanalysis of The Atmel Cipher in SecureMemory, CryptoMemory and CryptoRF. 707 - Dana Dachman-Soled, Rosario Gennaro, Hugo Krawczyk, Tal Malkin:
Computational Extractors and Pseudorandomness. 708 - Nadia El Mrabet:
Fault Attack against Miller's algorithm. 709 - Alex Biryukov, Johann Großschädl:
Cryptanalysis of the Full AES Using GPU-Like Special-Purpose Hardware. 710 - Meltem Sönmez Turan:
Evolutionary Construction of de Bruijn Sequences. 711 - Johann Großschädl, Dan Page:
Efficient Java Implementation of Elliptic Curve Cryptography for J2ME-Enabled Mobile Devices. 712 - Bin Wang, Qing Zhao:
A server-aided verification signature scheme without random oracles. 713 - Huajun Zhang, Zongyang Zhang, Zhenfu Cao:
Position-Verification in Multi-Channel Models. 714
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.