default search action
IACR Cryptology ePrint Archive, Volume 2013
Volume 2013, 2013
- Eric Miles, Emanuele Viola:
Shielding circuits with groups. 1 - Yu Chen, Zongyang Zhang, Dongdai Lin, Zhenfu Cao:
Generalized (Identity-Based) Hash Proof System and Its Applications. 2 - Guillermo Morales-Luna:
On Formal Expressions of BRW-polynomials. 3 - Damien Stehlé, Ron Steinfeld:
Making NTRUEncrypt and NTRUSign as Secure as Standard Worst-Case Problems over Ideal Lattices. 4 - Riadh Brinci, Walid Khmiri, Mefteh Mbarek, Abdellatif Ben Rabaa, Ammar Bouallegue, Faouzi Chekir:
Efficient Multiplier for pairings over Barreto-Naehrig Curves on Virtex-6 FPGA. 5 - Qingfeng Cheng:
Cryptanalysis of a pairing-free identity-based authenticated group key agreement protocol for imbalanced mobile networks. 6 - Yuyin Yu, Mingsheng Wang, Yongqiang Li:
A Matrix Approach for Constructing Quadratic APN Functions. 7 - Kai-Min Chung, Rafael Pass, Karn Seth:
Non-Black-Box Simulation from One-Way Functions And Applications to Resettable Security. 8 - Benedikt Driessen, Markus Dürmuth:
Achieving Anonymity Against Major Face Recognition Algorithms. 9 - Kai-Min Chung, Rafael Pass:
Simultaneous Resettable WI from One-way Functions. 10 - James McLaughlin, John A. Clark:
Evolving balanced Boolean functions with optimal resistance to algebraic and fast algebraic attacks, maximal algebraic degree, and very high nonlinearity. 11 - Dima Grigoriev, Vladimir Shpilrain:
Tropical cryptography. 12 - Andreas Peter, Erik Tews, Stefan Katzenbeisser:
Efficiently Outsourcing Multiparty Computation under Multiple Keys. 13 - Ta Vinh Thong, Amit Dvir:
On formal and automatic security verification of WSN transport protocols. 14 - Graham Enos:
Complete and Unified Group Laws are not Enough for Elliptic Curve Cryptography. 15 - Jae Hong Seo, Keita Emura:
Revocable Identity-Based Encryption Revisited: Security Model and Construction. 16 - Alexandra Boldyreva, Robert Lychev:
Provable Security of S-BGP and other Path Vector Protocols: Model, Analysis and Extensions. 17 - Jae Hong Seo, Keita Emura:
Efficient Delegation of Key Generation and Revocation Functionalities in Identity-Based Encryption. 18 - Peter Gazi:
On the Security of Plain and Randomized Cascades. 19 - Markus Rückert, Dominique Schröder:
Aggregate and Verifiably Encrypted Signatures from Multilinear Maps Without Random Oracles. 20 - Özgür Dagdelen, Payman Mohassel, Daniele Venturi:
Rate-Limited Secure Function Evaluation: Definitions and Constructions. 21 - James McLaughlin, John A. Clark:
Nonlinear cryptanalysis of reduced-round Serpent and metaheuristic search for S-box approximations. 22 - Jong Hwan Park, Dong Hoon Lee:
A New Practical Identity-Based Encryption System. 23 - Gook Hwa Cho, Namhun Koo, Eunhye Ha, Soonhak Kwon:
New Cube Root Algorithm Based on Third Order Linear Recurrence Relation in Finite Field. 24 - Ralf Küsters, Max Tuengerthal:
The IITM Model: a Simple and Expressive Model for Universal Composability. 25 - Constantinos Patsakis:
RSA private key reconstruction from random bits using SAT solvers. 26 - Ming-Feng Lee, Nigel P. Smart, Bogdan Warinschi, Gaven J. Watson:
Anonymity Guarantees of the UMTS/LTE Authentication and Connection Protocol. 27 - Stanislav Bulygin:
More on linear hulls of PRESENT-like ciphers and a cryptanalysis of full-round EPCBC-96. 28 - Subhadeep Banik, Subhamoy Maitra:
A Differential Fault Attack on MICKEY 2.0. 29 - Haiyan Sun:
On the security of an identity-based authenticated group key agreement protocol for imbalanced mobile networks. 30 - Christina Brzuska, Nigel P. Smart, Bogdan Warinschi, Gaven J. Watson:
An Analysis of the EMV Channel Establishment Protocol. 31 - Maki Yoshida, Satoshi Obana:
Detection of Cheaters in Non-interactive Polynomial Evaluation. 32 - Yu Chen, Zongyang Zhang, Dongdai Lin, Zhenfu Cao:
CCA-Secure IB-KEM from Identity-Based Extractable Hash Proof Systems. 33 - Fabrice Ben Hamouda, Olivier Blazy, Céline Chevalier, David Pointcheval, Damien Vergnaud:
New Smooth Projective Hash Functions and One-Round Authenticated Key Exchange. 34 - (Withdrawn) Improvements to NFC Mobile Transaction and Authentication Protocol. 35
- Jean-Sébastien Coron, Tancrède Lepoint, Mehdi Tibouchi:
Batch Fully Homomorphic Encryption over the Integers. 36 - Jayaprakash Kar:
Provably Secure Identity-Based Aggregate Signcryption Scheme in Random Oracles. 37 - Dominique Schröder, Heike Schröder:
Verifiable Data Streaming. 38 - Thomas Plantard, Michael Schneider:
Creating a Challenge for Ideal Lattices. 39 - Roohallah Rastaghi:
An Effi cient CCA2-Secure Variant of the McEliece Cryptosystem in the Standard Model. 40 - Gook Hwa Cho, Namhun Koo, Eunhye Ha, Soonhak Kwon:
Trace Expression of r-th Root over Finite Field. 41 - Hemanta K. Maji, Manoj Prabhakaran, Mike Rosulek:
Complexity of Multi-Party Computation Functionalities. 42 - Ling Song, Lei Hu:
Differential Fault Attack on the PRINCE Block Cipher. 43 - Fangguo Zhang, Xu Ma, Shengli Liu:
Efficient Computation Outsourcing for Inverting a Class of Homomorphic Functions. 44 - (Withdrawn) Towards Efficient Verifiable SQL Query for Outsourced Dynamic Databases in Cloud. 45
- Tore Kasper Frederiksen, Jesper Buus Nielsen:
Fast and Maliciously Secure Two-Party Computation Using the GPU. 46 - Carles Padró:
Lower Bounds on the Information Ratio of Linear Secret Sharing Schemes. 47 - Basel Halak, Julian P. Murphy, Alex Yakovlev:
Power Balanced Circuits for Leakage-Power-Attacks Resilient Design. 48 - Christopher Meyer, Jörg Schwenk:
Lessons Learned From Previous SSL/TLS Attacks - A Brief Chronology Of Attacks And Weaknesses. 49 - Roohallah Rastaghi:
Cryptanalysis and Improvement of Akleylek et al.'s cryptosystem. 50 - Payman Mohassel, Ben Riva:
Garbled Circuits Checking Garbled Circuits: More Efficient and Secure Two-Party Computation. 51 - Kuan Cheng:
Some Improved Complexity Results for uSVP and GapSVP. 52 - Yinxia Sun, Futai Zhang, Limin Shen, Robert H. Deng:
A revocable certificateless signature scheme. 53 - Ali Aydin Selçuk, Ramazan Yilmaz:
Joint Compartmented Threshold Access Structures. 54 - Dima Grigoriev, Vladimir Shpilrain:
Secrecy without one-way functions. 55 - Kishan Chand Gupta, Indranil Ghosh Ray:
On Constructions of MDS Matrices from Companion Matrices for Lightweight Cryptography. 56 - Jinsu Kim, Moon Sung Lee, Aaram Yun, Jung Hee Cheon:
CRT-based Fully Homomorphic Encryption over the Integers. 57 - Dylan Clarke, Feng Hao:
Cryptanalysis of the Dragonfly Key Exchange Protocol. 58 - Ayesha Khalid, Deblin Bagchi, Goutam Paul, Anupam Chattopadhyay:
Optimized GPU Implementation and Performance Analysis of HC Series of Stream Ciphers. 59 - Aayush Jain:
On FHE without bootstrapping. 60 - Elena Andreeva, Andrey Bogdanov, Yevgeniy Dodis, Bart Mennink, John P. Steinberger:
On the Indifferentiability of Key-Alternating Ciphers. 61 - Florian Böhl, Dominique Unruh:
Symbolic Universal Composability. 62 - Christian L. F. Corniaux, Hossein Ghodosi:
A Verifiable 1-out-of-n Distributed Oblivious Transfer Protocol. 63 - Sven Laur, Bingsheng Zhang:
Lightweight Zero-Knowledge Proofs for Crypto-Computing Protocols. 64 - Patrick Weiden, Andreas Hülsing, Daniel Cabarcas, Johannes Buchmann:
Instantiating Treeless Signature Schemes. 65 - Amin Mohammadali, Zahra Ahmadian, Mohammad Reza Aref:
Analysis and Improvement of the securing RFID systems conforming to EPC Class 1 Generation 2 standard. 66 - Guido Bertoni, Joan Daemen, Nicolas Debande, Thanh-Ha Le, Michaël Peeters, Gilles Van Assche:
Power Analysis of Hardware Implementations Protected with Secret Sharing. 67 - Allison B. Lewko, Brent Waters:
Why Proving HIBE Systems Secure is Difficult. 68 - Daniele Micciancio, Chris Peikert:
Hardness of SIS and LWE with Small Parameters. 69 - Markku-Juhani O. Saarinen:
Related-key Attacks Against Full Hummingbird-2. 70 - Jérémie Detrey, Pierrick Gaudry, Marion Videau:
Relation collection for the Function Field Sieve. 71 - István Vajda:
The UC approach: an application view. 72 - Marek Jawurek, Florian Kerschbaum, Claudio Orlandi:
Zero-Knowledge Using Garbled Circuits: How To Prove Non-Algebraic Statements Efficiently. 73 - Faruk Göloglu, Robert Granger, Gary McGuire, Jens Zumbrägel:
On the Function Field Sieve and the Impact of Higher Splitting Probabilities: Application to Discrete Logarithms in F21971. 74 - Joppe W. Bos, Kristin E. Lauter, Jake Loftus, Michael Naehrig:
Improved Security for a Ring-Based Fully Homomorphic Encryption Scheme. 75 - Ling Ren, Xiangyao Yu, Christopher W. Fletcher, Marten van Dijk, Srinivas Devadas:
Design Space Exploration and Optimization of Path Oblivious RAM in Secure Processors. 76 - Kaoru Kurosawa, Ryo Nojima, Le Trieu Phong:
UC-Secure Multi-Session OT Using Tamper-Proof Hardware. 77 - Nelly Fazio, Antonio Nicolosi, Irippuge Milinda Perera:
Broadcast Steganography. 78 - Yehuda Lindell:
Fast Cut-and-Choose Based Protocols for Malicious and Covert Adversaries. 79 - Grégory Landais, Jean-Pierre Tillich:
An efficient attack of a McEliece cryptosystem variant based on convolutional codes. 80 - Yan Huang, Jonathan Katz, David Evans:
Efficient Secure Two-Party Computation Using Symmetric Cut-and-Choose. 81 - Sebastià Martín Molleví, Carles Padró, An Yang:
Secret Sharing, Rank Inequalities and Information Inequalities. 82 - Frederik Armknecht, Ahmad-Reza Sadeghi, Steffen Schulz, Christian Wachsmann:
Towards Provably Secure Software Attestation. 83 - Boris Skoric, Allard P. Mosk, Pepijn W. H. Pinkse:
Security of Quantum-Readout PUFs against quadrature based challenge estimation attacks. 84 - Ashish Choudhury, Jake Loftus, Emmanuela Orsini, Arpita Patra, Nigel P. Smart:
Between a Rock and a Hard Place: Interpolating Between MPC and FHE. 85 - Travis Mayberry, Erik-Oliver Blass, Agnes Hui Chan:
Path-PIR: Lower Worst-Case Bounds by Combining ORAM and PIR. 86 - Namhun Koo, Gook Hwa Cho, Soonhak Kwon:
Square Root Algorithm in Fq for q≡2s+1 (mod 2s+1). 87 - Dan Boneh, Mark Zhandry:
Secure Signatures and Chosen Ciphertext Security in a Post-Quantum World. 88 - James McLaughlin, John A. Clark:
Filtered nonlinear cryptanalysis of reduced-round Serpent, and the Wrong-Key Randomization Hypothesis. 89 - (Withdrawn) Functional Encryption Supporting Recursive Languages. 90
- Hui Zhao, Yongbin Zhou, François-Xavier Standaert, Hailong Zhang:
Systematic Construction and Comprehensive Evaluation of Kolmogorov-Smirnov Test based Side-Channel Distinguishers. 91 - Vadim Lyubashevsky, Daniel Masny:
Man-in-the-Middle Secure Authentication Schemes from LPN and Weak PRFs. 92 - Lin Cheng, Qiaoyan Wen, Zhengping Jin, Hua Zhang, Liming Zhou:
On the security of a certificateless aggregate signature scheme. 93 - Adriana López-Alt, Eran Tromer, Vinod Vaikuntanathan:
On-the-Fly Multiparty Computation on the Cloud via Multikey Fully Homomorphic Encryption. 94 - Antoine Joux:
A new index calculus algorithm with complexity L(1/4+o(1)) in very small characteristic. 95 - Sui-Guan Teo, Harry Bartlett, Ali Al-Hamdan, Leonie Simpson, Kenneth Koon-Ho Wong, Ed Dawson:
State convergence in bit-based stream ciphers. 96 - Zahra Ahmadian, Mahmoud Salmasizadeh, Mohammad Reza Aref:
Biclique Cryptanalysis of the Full-Round KLEIN Block Cipher. 97 - Joël Alwen, Stephan Krenn, Krzysztof Pietrzak, Daniel Wichs:
Learning with Rounding, Revisited: New Reduction, Properties and Applications. 98 - Samuel Ranellucci, Alain Tapp:
Secure Two-Party Computation via Leaky Generalized Oblivious Transfer. 99 - Niu Liu, Shaohua Tang, Lingling Xu:
Attacks and Comments on Several Recently Proposed Key Management Schemes. 100 - Paul Baecher, Christina Brzuska, Marc Fischlin:
Notions of Black-Box Reductions, Revisited. 101 - Yuchen Cao, Yongbin Zhou, Zhenmei Yu:
On the Negative Effects of Trend Noise and Its Applications in Side-Channel Cryptanalysis. 102 - Martin Hirt, Pavel Raykov:
On the Complexity of Broadcast Setup. 103 - James A. Muir:
A Tutorial on White-box AES. 104 - Yuval Ishai, Eyal Kushilevitz, Omer Strulovich:
Lossy Chains and Fractional Secret Sharing. 105 - (Withdrawn) URDP: General Framework for Direct CCA2 Security from any Lattice-Based PKE Scheme. 106
- Murat Cenk, M. Anwar Hasan:
On the Arithmetic Complexity of Strassen-Like Matrix Multiplications. 107 - Ivan Damgård, Alessandra Scafuro:
Unconditionally Secure and Universally Composable Commitments from Physical Assumptions. 108 - Charanjit S. Jutla, Arnab Roy:
Shorter Quasi-Adaptive NIZK Proofs for Linear Subspaces. 109 - Gilad Asharov, Yehuda Lindell, Tal Rabin:
Full Characterization of Functions that Imply Fair Coin Tossing and Ramifications to Fairness. 110 - Keita Xagawa:
Message Authentication Codes Secure against Additively Related-Key Attacks. 111 - Ulrich Rührmair, Jan Sölter, Frank Sehnke, Xiaolin Xu, Ahmed Mahmoud, Vera Stoyanova, Gideon Dror, Jürgen Schmidhuber, Wayne P. Burleson, Srinivas Devadas:
PUF Modeling Attacks on Simulated and Silicon Data. 112 - Nuray At, Jean-Luc Beuchat, Eiji Okamoto, Ismail San, Teppei Yamazaki:
Compact Hardware Implementations of ChaCha, BLAKE, Threefish, and Skein on FPGA. 113 - Delaram Kahrobaei, Charalambos Koupparis, Vladimir Shpilrain:
Public Key Exchange Using Matrices Over Group Rings. 114 - Kaitai Liang, Qiong Huang, Roman Schlegel, Duncan S. Wong, Chunming Tang:
A Conditional Proxy Broadcast Re-Encryption Scheme Supporting Timed-Release. 115 - Shiyong Zhang, Gongliang Chen, Lei Fan:
The Algorithm of AAES. 116 - Namhun Koo, Gook Hwa Cho, Soonhak Kwon:
On r-th Root Extraction Algorithm in Fq For q≡lrs+1 (mod rs+1) with 0 < l < r and Small s. 117 - Jason R. Hamlet, Robert W. Brocato:
Speed Optimized Implementations of the QUAD Algorithm. 118 - Duc-Phong Le, Chik How Tan:
Speeding up Ate Pairing Computation in Affine Coordinates. 119 - Gergely Alpár, Jaap-Henk Hoepman, Wouter Lueks:
An Attack Against Fixed Value Discrete Logarithm Representations. 120 - Helger Lipmaa:
Succinct Non-Interactive Zero Knowledge Arguments from Span Programs and Linear Error-Correcting Codes. 121 - Gaoli Wang:
Practical collision attack on 40-step RIPEMD-128. 122 - Olivier Blazy, Céline Chevalier, David Pointcheval, Damien Vergnaud:
Analysis and Improvement of Lindell's UC-Secure Commitment Schemes. 123 - (Withdrawn) Tamper Resilient Cryptography Without Self-Destruct. 124
- Ananth Raghunathan, Gil Segev, Salil P. Vadhan:
Deterministic Public-Key Encryption for Adaptively Chosen Plaintext Distributions. 125 - Aysajan Abidin, Jan-Åke Larsson:
Direct Proof of Security of Wegman-Carter Authentication with Partially Known Key. 126 - Franziskus Kiefer, Mark Manulis:
Oblivious PAKE and Efficient Handling of Password Trials. 127 - Sanjam Garg, Craig Gentry, Shai Halevi, Amit Sahai, Brent Waters:
Attribute-Based Encryption for Circuits from Multilinear Maps. 128 - Raluca A. Popa, Frank H. Li, Nickolai Zeldovich:
An Ideal-Security Protocol for Order-Preserving Encoding. 129 - Christian Hanser, Daniel Slamanig:
Blank Digital Signatures. 130 - Thomaz Oliveira, Julio López, Diego F. Aranha, Francisco Rodríguez-Henríquez:
Two is the fastest prime. 131 - Niu Liu, Shaohua Tang, Lingling Xu:
Yet Another Attack On the Chinese Remainder Theorem Based Hierarchical Access Control Scheme. 132 - Hemlata Nagesh, Birendra Kumar Sharma:
New Lattice Based Signature Using The Jordan Normal Form. 133 - Nelly Fazio, Rosario Gennaro, Irippuge Milinda Perera, William E. Skeith III:
Hardcore Predicates for a Diffie-Hellman Problem over Finite Fields. 134 - Leonard J. Schulman:
An MQ/Code Cryptosystem Proposal. 135 - Dieter Schmidt:
2048XKS-F & 4096XKS-F - Two Software Oriented High Security Block Ciphers. 136 - Payman Mohassel, Seyed Saeed Sadeghian:
How to Hide Circuits in MPC: An Efficient Framework for Private Function Evaluation. 137 - Wei Zhang, Shuguang Liu, Xiaoyuan Yang:
Multi-bit homomorphic encryption based on learning with errors over rings. 138 - Wesley George, Charles Rackoff:
Rethinking Definitions of Security for Session Key Agreement. 139 - Marc Fischlin, Nils Fleischhacker:
Limitations of the Meta-Reduction Technique: The Case of Schnorr Signatures. 140 - Mohsen Shakiba, Mohammad Dakhilalian, Hamid Mala:
Non-isomorphic Biclique Cryptanalysis and Its Application to Full-Round mCrypton. 141 - Kisoon Yoon:
A new Method of Choosing Primitive Elements for Brezing-Weng Families of Pairing Friendly Elliptic Curves. 142 - Marcel Keller, Peter Scholl, Nigel P. Smart:
An architecture for practical actively secure MPC with dishonest majority. 143 - Gordon Procter, Carlos Cid:
On Weak Keys and Forgery Attacks against Polynomial-based MAC Schemes. 144 - Dmitry Khovratovich:
Key Wrapping with a Fixed Permutation. 145 - Joppe W. Bos, Craig Costello, Hüseyin Hisil, Kristin E. Lauter:
High-Performance Scalar Multiplication using 8-Dimensional GLV/GLS Decomposition. 146 - Naomi Benger, Manuel Charlemagne, Kefei Chen:
A note on the practical complexity of the NFS in the medium prime case: Smoothness of Norms. 147 - Alexander Rostovtsev:
AES-like ciphers: are special S-boxes better then random ones? (Virtual isomorphisms again). 148 - Jiawei Yuan, Shucheng Yu:
Secure and Constant Cost Public Cloud Storage Auditing with Deduplication. 149 - Gautham Sekar, Soumyadeep Bhattacharya:
Practical (Second) Preimage Attacks on TCS_SHA-3. 150 - ZiJie Hu:
Some Fixes To SSH. 151 - Christian Cachin, Kristiyan Haralambiev, Hsu-Chun Hsiao, Alessandro Sorniotti:
Policy-based Secure Deletion. 152 - Lin Cheng, Qiaoyan Wen, Zhengping Jin, Hua Zhang:
On the security of a certi cateless signature scheme in the standard model. 153 - Jan-Jaap Oosterwijk, Boris Skoric, Jeroen Doumen:
Optimal Suspicion Functions for Tardos Traitor Tracing Schemes. 154 - Tore Kasper Frederiksen, Thomas Pelle Jakobsen, Jesper Buus Nielsen, Peter Sebastian Nordholt, Claudio Orlandi:
MiniLEGO: Efficient Secure Two-Party Computation From General Assumptions. 155 - Mira Belenkiy, Melissa Chase, C. Christopher Erway, John Jannotti, Alptekin Küpçü, Anna Lysyanskaya:
Incentivizing Outsourced Computation. 156 - Shay Gueron, Vlad Krasnov:
The fragility of AES-GCM authentication algorithm. 157 - Armando Faz-Hernández, Patrick Longa, Ana Helena Sánchez:
Keep Calm and Stay with One (and p>3). 158 - Dingding Jia, Bao Li, Yamin Liu, Qixiang Mei:
Improving the Message-ciphertext Rate of Lewko's Fully Secure IBE Scheme. 159 - Kai-Min Chung, Rafael Pass, Sidharth Telang:
Interactive Coding, Revisited. 160 - Daniel Kraschewski:
Completeness Theorems for All Finite Stateless 2-Party Primitives. 161 - Yann Hamdaoui, Nicolas Sendrier:
A Non Asymptotic Analysis of Information Set Decoding. 162 - Chang Liu, Liehuang Zhu, Mingzhong Wang, Yu-an Tan:
Search Pattern Leakage in Searchable Encryption: Attacks and New Constructions. 163 - Daniel Cabarcas, Florian Göpfert, Patrick Weiden:
Provably Secure LWE-Encryption with Uniform Secret. 164 - (Withdrawn) A New Security and Privacy Framework for RFID In Cloud Computing. 165
- Brajesh Kumar Singh:
On generalized semi-bent (and partially bent) Boolean functions. 166 - Tolga Acar, Mira Belenkiy, Alptekin Küpçü:
Single Password Authentication. 167 - Simon Hoerder, Kimmo Järvinen, Dan Page:
On secure embedded token design (Long Version) - Quasi-looped Yao circuits and bounded leakage. 168 - David Cash, Stanislaw Jarecki, Charanjit S. Jutla, Hugo Krawczyk, Marcel-Catalin Rosu, Michael Steiner:
Highly-Scalable Searchable Symmetric Encryption with Support for Boolean Queries. 169 - Tao Xie, Fanbao Liu, Dengguo Feng:
Fast Collision Attack on MD5. 170 - Florian Böhl, Dennis Hofheinz, Tibor Jager, Jessica Koch, Christoph Striecks:
Confined Guessing: New Signatures From Standard Assumptions. 171 - Raphael Spreitzer, Thomas Plos:
On the Applicability of Time-Driven Cache Attacks on Mobile Devices (Extended Version). 172 - Ray A. Perlner, Daniel Smith-Tone:
On the Classification of Differential Invariants for Multivariate Post-Quantum Cryptosystems". 173 - Deukjo Hong, Daesung Kwon:
Cryptanalysis of Some Double-Block-Length Hash Modes of Block Ciphers with n-Bit Block and n-Bit Key. 174 - Joseph A. Akinyele, Matthew Green, Susan Hohenberger, Matthew W. Pagano:
Machine-Generated Algorithms, Proofs and Software for the Batch Verification of Digital Signature Schemes. 175 - Jing Lv, Bin Zhang, Dongdai Lin:
Distinguishing Attacks on RC4 and A New Improvement of the Cipher. 176 - Véronique Cortier, David Galindo, Stéphane Glondu, Malika Izabachène:
A generic construction for voting correctness at minimum cost - Application to Helios. 177 - Mohammad Ali Orumiehchiha, Josef Pieprzyk, Elham Shakour, Ron Steinfeld:
Cryptanalysis of RC4(n, m) Stream Cipher. 178 - Melissa Chase, Markulf Kohlweiss, Anna Lysyanskaya, Sarah Meiklejohn:
Malleable Signatures: Complex Unary Transformations and Delegatable Anonymous Credentials. 179 - Masao Kasahara:
A New Class of Product-sum Type Public Key Cryptosystem, K(V)ΣΠPKC, Constructed Based on Maximum Length Code. 180 - Andrew V. Sutherland:
On the evaluation of modular polynomials. 181 - Julien Bringer, Hervé Chabanne, Alain Patey:
Collusion-Resistant Domain-Specific Pseudonymous Signatures. 182 - Jean-Sébastien Coron, Tancrède Lepoint, Mehdi Tibouchi:
Practical Multilinear Maps over the Integers. 183 - Boris Ryabko:
The Vernam cipher is robust to small deviations from randomness. 184 - Mohammad Ali Orumiehchiha, Josef Pieprzyk, Ron Steinfeld, Harry Bartlett:
Security Analysis of Linearly Filtered NLFSRs. 185 - Jae Hong Seo:
On the (Im)possibility of Projecting Property in Prime-Order Setting. 186 - Jorge Munilla, Alberto Peinado, Guomin Yang, Willy Susilo:
Enhanced Ownership Transfer Protocol for RFID in an Extended Communication Model. 187 - Daniel Loebenberger, Michael Nüsken:
A family of 6-to-4-bit S-boxes with large linear branch number. 188 - Appala Naidu Tentu, Prabal Paul, V. Ch. Venkaiah:
Ideal and Perfect Hierarchical Secret Sharing Schemes based on MDS codes. 189 - Shaohua Tang, Jianhao Wu, Weijian Li, Zheng Gong:
Power Analysis Attacks against FPGA Implementations of KLEIN. 190 - Yuseop Lee, Kitae Jeong, Jaechul Sung, Seokhie Hong:
Improved Differential Fault Analysis on ARIA using Small Number of Faults. 191 - David Lubicz, Damien Robert:
A generalisation of Miller's algorithm and applications to pairing computations on abelian varieties. 192 - Yu-Chi Chen, Raylin Tso, Willy Susilo, Xinyi Huang, Gwoboa Horng:
Certificateless Signatures: Structural Extensions of Security Models and New Provably Secure Schemes. 193 - Per Austrin, Kai-Min Chung, Mohammad Mahmoody, Rafael Pass, Karn Seth:
On the (Im)Possibility of Tamper-Resilient Cryptography: Using Fourier Analysis in Computer Viruses. 194 - Philipp Grabher, Dan Page, Marcin Wójcik:
On the (re)design of an FPGA-based PUF. 195 - Abhi Shelat, Chih-Hao Shen:
Fast Two-Party Secure Computation with Minimal Assumptions. 196 - Razvan Barbulescu, Cyril Bouvier, Jérémie Detrey, Pierrick Gaudry, Hamza Jeljeli, Emmanuel Thomé, Marion Videau, Paul Zimmermann:
Discrete logarithm in GF(2809) with FFS. 197 - Zhizhou Li, Ten-Hwang Lai:
On Evaluating Circuits with Inputs Encrypted by Different Fully Homomorphic Encryption Schemes. 198 - Daniel J. Bernstein, Stacey Jeffery, Tanja Lange, Alexander Meurer:
Quantum algorithms for the subset-sum problem. 199 - Razvan Barbulescu:
Selecting polynomials for the Function Field Sieve. 200 - Divesh Aggarwal, Yevgeniy Dodis, Shachar Lovett:
Non-malleable Codes from Additive Combinatorics. 201 - Mohammad Ali Orumiehchiha, Josef Pieprzyk, Ron Steinfeld:
Breaking NLM-MAC Generator. 202 - Sven Laur, Riivo Talviste, Jan Willemson:
From oblivious AES to efficient and secure database join in the multiparty setting. 203 - Shi Pu, Jyh-Charn Liu:
Computing Privacy-Preserving Edit Distance and Smith-Waterman Problems on the GPU Architecture. 204 - Jan Camenisch, Robert R. Enderlein, Victor Shoup:
Practical and Employable Protocols for UC-Secure Circuit Evaluation over Zn. 205 - Florian Kerschbaum, Hoon Wei Lim, Ivan Gudymenko:
Privacy-Preserving Billing for e-Ticketing Systems in Public Transportation. 206 - Yanjiang Yang, Xuhua Ding, Haibing Lu, Jian Weng:
Self-blindable Credential: Towards LightWeight Anonymous Entity Authentication. 207 - Yi-Ruei Chen, Cheng-Kang Chu, Wen-Guey Tzeng, Jianying Zhou:
CloudHKA: A Cryptographic Approach for Hierarchical Access Control in Cloud Computing. 208 - Mourad Gouicem:
New modular multiplication and division algorithms based on continued fraction expansion. 209 - Arno Mittelbach:
Cryptophia's Short Combiner for Collision-Resistant Hash Functions. 210 - Christina Boura, Anne Canteaut:
A new criterion for avoiding the propagation of linear relations through an Sbox (Full version). 211 - Krzysztof Pietrzak:
A Closer Look at HMAC. 212 - Guangjun Fan, Yongbin Zhou, François-Xavier Standaert, Dengguo Feng:
On (Destructive) Impacts of Mathematical Realizations over the Security of Leakage Resilient ElGamal Encryption. 213 - Filip Zagórski, Richard Carback, David Chaum, Jeremy Clark, Aleksander Essex, Poorvi L. Vora:
Remotegrity: Design and Use of an End-to-End Verifiable Remote Voting System. 214 - Ulrich Rührmair, Christian Hilgers, Sebastian Urban, Agnes Weiershäuser, Elias Dinter, Brigitte Forster, Christian Jirauschek:
Revisiting Optical Physical Unclonable Functions. 215 - Edouard Cuvelier, Olivier Pereira, Thomas Peters:
Election Verifiability or Ballot Privacy: Do We Need to Choose? 216 - Björn Deiseroth, Victoria Fehr, Marc Fischlin, Manuel Maasz, Nils Fabian Reimers, Richard Stein:
Computing on Authenticated Data for Adjustable Predicates. 217 - Aurore Guillevic:
Comparing the Pairing Efficiency over Composite-Order and Prime-Order Elliptic Curves. 218 - Stefan G. Weber:
Designing a Hybrid Attribute-Based Encryption Scheme Supporting Dynamic Attributes. 219 - Shlomi Dolev, Juan A. Garay, Niv Gilboa, Vladimir Kolesnikov, Yelena Yuditsky:
Towards Efficient Private Distributed Computation on Unbounded Input Streams. 220 - Yang Zhang, Junliang Chen:
Identity-based Aggregate Signatures with Verifiable Single Ones. 221 - Shan Chen, John P. Steinberger:
Tight security bounds for key-alternating ciphers. 222 - Jens Bender, Özgür Dagdelen, Marc Fischlin, Dennis Kügler:
The PACE|AA Protocol for Machine Readable Travel Documents, and its Security. 223 - Yuanyuan Zhou, Yu Yu, François-Xavier Standaert, Jean-Jacques Quisquater:
On the Need of Physical Security for Small Embedded Devices: a Case Study with COMP128-1 Implementations in SIM Cards. 224 - Mohammad Etemad, Alptekin Küpçü:
Transparent, Distributed, and Replicated Dynamic Provable Data Possession. 225 - Maggie E. Habeeb, Delaram Kahrobaei, Charalambos Koupparis, Vladimir Shpilrain:
Public key exchange using semidirect product of (semi)groups. 226 - Chunyu Tang, David A. Naumann, Susanne Wetzel:
Analysis of authentication and key establishment in inter-generational mobile telephony. 227 - Kwangsu Lee, Woo Kwon Koo, Dong Hoon Lee, Jong Hwan Park:
Public-Key Revocation and Tracing Schemes with Subset Difference Methods. 228 - Shafi Goldwasser, Yael Tauman Kalai, Raluca A. Popa, Vinod Vaikuntanathan, Nickolai Zeldovich:
Overcoming the Worst-Case Curse for Cryptographic Constructions. 229 - Yang Wang, Mark Manulis, Man Ho Au, Willy Susilo:
Relations among Privacy Notions for Signcryption and Key Invisible "Sign-then-Encrypt". 230 - Guido Bertoni, Joan Daemen, Michaël Peeters, Gilles Van Assche:
Sakura: a flexible coding for tree hashing. 231 - Kaushik Chakraborty, Subhamoy Maitra:
Quantum algorithm to check Resiliency of a Boolean function. 232 - Yiyuan Luo, Xuejia Lai:
Attacks on JH, Grstl and SMASH Hash Functions. 233 - Özgür Dagdelen, Marc Fischlin, Tommaso Gagliardoni, Giorgia Azzurra Marson, Arno Mittelbach, Cristina Onete:
A Cryptographic Analysis of OPACITY. 234 - Ben Smyth, David Bernhard:
Ballot secrecy and ballot independence coincide. 235 - Kaitai Liang, Liming Fang, Duncan S. Wong, Willy Susilo:
A Ciphertext-Policy Attribute-Based Proxy Re-Encryption with Chosen-Ciphertext Security. 236 - Pedro Adão, Riccardo Focardi, Flaminia L. Luccio:
Type-Based Analysis of Generic Key Management APIs (Long Version). 237 - Markulf Kohlweiss, Ueli Maurer, Cristina Onete, Björn Tackmann, Daniele Venturi:
Anonymity-preserving Public-Key Encryption: A Constructive Approach. 238 - Craig Gentry, Kenny A. Goldman, Shai Halevi, Charanjit S. Jutla, Mariana Raykova, Daniel Wichs:
Optimizing ORAM and Using it Efficiently for Secure Computation. 239 - Sui-Guan Teo, Kenneth Koon-Ho Wong, Harry Bartlett, Leonie Simpson, Ed Dawson:
Algebraic analysis of Trivium-like ciphers. 240 - Joachim Strömbergson, Simon Josefsson:
The Perils of Repeating Patterns: Observation of Some Weak Keys in RC4. 241 - Chanathip Namprempre, Phillip Rogaway, Tom Shrimpton:
AE5 Security Notions: Definitions Implicit in the CAESAR Call. 242 - Kai-Min Chung, Rafael Pass:
A Simple ORAM. 243 - Ted Hurley:
Cryptographic schemes, key exchange, public key. 244 - Özgür Dagdelen, Marc Fischlin, Tommaso Gagliardoni:
The Fiat-Shamir Transformation in a Quantum World. 245 - Shenghui Su, Maozhi Xu, Shuwang Lü:
A Lever Function to a New Codomain with Adequate Indeterminacy. 246 - Mingwu Zhang, Wei Shi, Chunzhi Wang, Zhenhua Chen, Yi Mu:
Leakage-resilient Attribute-based Encryptions with Fast Decryption: Model, Analysis and Construction. 247 - Neal Koblitz, Alfred Menezes:
Another Look at Security Theorems for 1-Key Nested MACs. 248 - Kaoru Kurosawa, Takuma Ueda:
How to Factor N1 and N2 When p1=p2 mod 2t. 249 - Alice Silverberg:
Fully Homomorphic Encryption for Mathematicians. 250 - Yuyin Yu, Mingsheng Wang:
Permutation Polynomials and Their Differential Properties over Residue Class Rings. 251 - Yujuan Li, Huaifu Wang, Jinhua Zhao:
On the Primitivity of some Trinomials over Finite Fields. 252 - Goran Doychev, Dominik Feld, Boris Köpf, Laurent Mauborgne, Jan Reineke:
CacheAudit: A Tool for the Static Analysis of Cache Side Channels. 253 - Amir Herzberg, Haya Schulmann:
Towards Adoption of DNSSEC: Availability and Security Challenges. 254 - Rodolphe Lampe, Yannick Seurin:
How to Construct an Ideal Cipher from a Small Set of Public Permutations. 255 - Yannick Seurin:
On the Lossiness of the Rabin Trapdoor Function. 256 - Paolo D'Arco, Roberto De Prisco:
Secure two-party computation: a visual way. 257 - Sanjam Garg, Craig Gentry, Amit Sahai, Brent Waters:
Witness Encryption and its Applications. 258 - Ran Gelles, Amit Sahai, Akshay Wadia:
Private Interactive Communication Across an Adversarial Channel. 259 - Kai-Min Chung, Edward Lui, Rafael Pass:
From Weak to Strong Zero-Knowledge and Applications. 260 - Dima Grigoriev, Vladimir Shpilrain:
Secure information transmission based on physical principles. 261 - Gérald Gavin:
An efficient FHE based on the hardness of solving systems of non-linear multivariate equations. 262 - Albrecht Petzoldt:
Speeding up QUAD. 263 - Stephen R. Tate, Roopa Vishwanathan, Scott Weeks:
Encrypted Secret Sharing and Analysis by Plaintext Randomization. 264 - Susan Hohenberger, Brent Waters:
Attribute-Based Encryption with Fast Decryption. 265 - Jing Lv, Dongdai Lin:
L-P States of RC4 Stream Cipher. 266 - S. Dov Gordon, Tal Malkin, Mike Rosulek, Hoeteck Wee:
Multi-Party Computation of Polynomials and Branching Programs without Simultaneous Interaction. 267 - Majid Rahimi, Mostafa Barmshory, Mohammad Hadi Mansouri, Mohammad Reza Aref:
Dynamic Cube Attack on Grain-v1. 268 - Jonathan T. Trostle:
Chosen Ciphertext Secure (CCS): Stateful Symmetric Key CCA Encryption with Minimal Ciphertext Expansion. 269 - Yu Yu:
Pseudorandom Generators from Regular One-way Functions: New Constructions with Improved Parameters. 270 - Christoph Sorge:
The Legal Classification of Identity-Based Signatures. 271 - Sashank Dara:
Cryptography Challenges for Computational Privacy in Public Clouds. 272 - Deepak Kumar Dalai:
Computing the Rank of Incidence Matrix and Algebraic Immunity of Boolean Functions. 273 - (Withdrawn) A time series approach for profiling attack. 274
- Johannes Braun, Gregor Rynkowski:
The Potential of Individualized Trusted Root Stores: Minimizing the Attack Surface in the Light of CA Failures. 275 - David Bernhard, Stephan Neumann, Melanie Volkamer:
Towards a Practical Cryptographic Voting Scheme Based on Malleable Proofs. 276 - Muhammad Rizwan Asghar, Mihaela Ion, Giovanni Russello, Bruno Crispo:
ESPOON: Enforcing Encrypted Security Policies in Outsourced Environments. 277 - Sébastien Tiran, Sébastien Ordas, Yannick Teglia, Michel Agoyan, Philippe Maurine:
A Frequency Leakage Model and its application to CPA and DPA. 278 - Bryan Parno, Craig Gentry, Jon Howell, Mariana Raykova:
Pinocchio: Nearly Practical Verifiable Computation. 279 - Emil Stefanov, Marten van Dijk, Elaine Shi, Christopher W. Fletcher, Ling Ren, Xiangyao Yu, Srinivas Devadas:
Path ORAM: An Extremely Simple Oblivious RAM Protocol. 280 - Carlos Aguilar Melchor, Slim Bettaieb, Xavier Boyen, Laurent Fousse, Philippe Gaborit:
Adapting Lyubashevsky's Signature Schemes to the Ring Signature Setting. 281 - Goutam Paul, Anupam Chattopadhyay:
Three Snakes in One Hole: A 67 Gbps Flexible Hardware for SOSEMANUK with Optional Serpent and SNOW 2.0 Modes. 282 - Dan Boneh, Ananth Raghunathan, Gil Segev:
Function-Private Identity-Based Encryption: Hiding the Function in Functional Encryption. 283 - Asghar Tavakkoli, Reza Ebrahimi Atani:
A Secure Paper-Based Electronic Voting With No Encryption. 284 - Sutirtha Sanyal:
A Novel Proof on Weil Pairing. 285 - Arno Mittelbach:
Salvaging Indifferentiability in a Multi-stage Setting. 286 - I. V. Chizhov, Mikhail A. Borodin:
The failure of McEliece PKC based on Reed-Muller codes. 287 - Maghsood Parviz, Seyed Hassan Mousavi, Saeed Mirahmadi:
Key Classification Attack on Block Ciphers. 288 - Boaz Catane, Amir Herzberg:
Secure Second Price Auctions with a Rational Auctioneer. 289 - Boaz Catane, Amir Herzberg:
Massive Group Message Authentication with Revocable Anonymity. 290 - Antoine Joux, Antoine Rojat:
On Diffie-Hellman - like Security Assumptions. 291 - Daniel P. Martin, Elisabeth Oswald, Martijn Stam:
A Leakage Resilient MAC. 292 - Vadim Lyubashevsky, Chris Peikert, Oded Regev:
A Toolkit for Ring-LWE Cryptography. 293 - Colin O'Flynn, Zhizhang (David) Chen:
Synchronous Sampling and Clock Recovery of Internal Oscillators for Side Channel Analysis. 294 - Mickaël Cazorla, Kevin Marquet, Marine Minier:
Survey and Benchmark of Lightweight Block Ciphers for Wireless Sensor Networks. 295 - Morten Dahl, Ivan Damgård:
Universally Composable Symbolic Analysis for Two-Party Protocols based on Homomorphic Encryption. 296 - Rachid El Bansarkhani, Johannes Buchmann:
Improvement and Effi cient Implementation of a Lattice-based Signature Scheme. 297 - Luke Mather, Elisabeth Oswald, Joe Bandenburg, Marcin Wójcik:
A Comparison of Statistical Techniques for Detecting Side-Channel Information Leakage in Cryptographic Devices. 298 - Andreas Enge, Emmanuel Thomé:
Computing class polynomials for abelian surfaces. 299 - Allison B. Lewko, Sarah Meiklejohn:
A Profitable Sub-Prime Loan: Obtaining the Advantages of Composite-Order in Prime-Order Bilinear Groups. 300 - Zheng Yuan, Xian Li, Haixia Liu:
Impossible Differential-Linear Cryptanalysis of Full-Round CLEFIA-128. 301 - Nicolas T. Courtois:
Cryptanalysis of Grigoriev-Shpilrain Physical Asymmetric Scheme With Capacitors. 302 - Shivam Bhasin, Claude Carlet, Sylvain Guilley:
Theory of masking with codewords in hardware: low-weight dth-order correlation-immune Boolean functions. 303 - Anthony Van Herrewege, Vincent van der Leest, André Schaller, Stefan Katzenbeisser, Ingrid Verbauwhede:
Secure PRNG Seeding on Commercial Off-the-Shelf Microcontrollers. 304 - Sonia Belaïd, Fabrizio De Santis, Johann Heyszl, Stefan Mangard, Marcel Medwed, Jörn-Marc Schmidt, François-Xavier Standaert, Stefan Tillich:
Towards Fresh Re-Keying with Leakage-Resilient PRFs: Cipher Design Principles and Analysis. 305 - Faruk Göloglu, Robert Granger, Gary McGuire, Jens Zumbrägel:
Solving a 6120-bit DLP on a Desktop Computer. 306 - Rafail Ostrovsky, Anat Paskin-Cherniavsky, Beni Paskin-Cherniavsky:
Maliciously Circuit-private FHE. 307 - Fabien Laguillaumie, Adeline Langlois, Benoît Libert, Damien Stehlé:
Lattice-Based Group Signatures with Logarithmic Signature Size. 308 - Tomás Rosa:
Bypassing Passkey Authentication in Bluetooth Low Energy. 309 - W. Michael Petullo, Xu Zhang, Jon A. Solworth, Daniel J. Bernstein, Tanja Lange:
MinimaLT: Minimal-latency Networking Through Better Security. 310 - Aurore Guillevic, Sorina Ionica:
Four dimensional GLV via the Weil restriction. 311 - Benjamin Smith:
Families of fast elliptic curves from Q-curves. 312 - Seunghwan Chang, Hoon Hong, Eunjeong Lee, Hyang-Sook Lee:
Reducing Pairing Inversion to Exponentiation Inversion using Non-degenerate Auxiliary Pairing. 313 - Timo Bartkewitz:
Keyed Side-Channel Based Hashing for IP Protection using Wavelets. 314 - Albrecht Petzoldt:
Hybrid Approach for the Fast Verification for Improved Versions of the UOV and Rainbow Signature Schemes. 315 - José Bacelar Almeida, Manuel Barbosa, Gilles Barthe, François Dupressoir:
Certified computer-aided cryptography: efficient provably secure machine code from high-level implementations. 316 - Michael Z. Lee, Alan M. Dunn, Jonathan Katz, Brent Waters, Emmett Witchel:
Anon-Pass: Practical Anonymous Subscriptions. 317 - Yutaka Kawai, Katsuyuki Takashima:
Fully-Anonymous Functional Proxy-Re-Encryption. 318 - Amadou Moctar Kane:
On the use of continued fractions for stream ciphers. 319 - Roman Korkikian, David Naccache, Guilherme Ozari de Almeida:
Instantaneous Frequency Analysis. 320 - Keita Emura, Atsuko Miyaji, Mohammad Shahriar Rahman, Kazumasa Omote:
Generic Constructions of Secure-Channel Free Searchable Encryption with Adaptive Security. 321 - Jean-Philippe Aumasson, Samuel Neves, Zooko Wilcox-O'Hearn, Christian Winnerlein:
BLAKE2: simpler, smaller, fast as MD5. 322 - Tsz Hon Yuen, Ye Zhang, Siu-Ming Yiu:
Encryption Schemes with Post-Challenge Auxiliary Inputs. 323 - Anne Canteaut, María Naya-Plasencia, Bastien Vayssière:
Sieve-in-the-Middle: Improved MITM Attacks (Full Version). 324 - Daniel J. Bernstein, Anna Krasnova, Tanja Lange:
Elligator: Elliptic-curve points indistinguishable from uniform random strings. 325 - Mihir Bellare, Sarah Meiklejohn, Susan Thomson:
Key-Versatile Signatures and Applications: RKA, KDM and Joint Enc/Sig. 326 - Shenghui Su, Tao Xie, Shuwang Lü:
A Lightweight Hash Function Resisting Birthday Attack and Meet-in-the-middle Attack. 327 - Nicky Mouha, Bart Preneel:
A Proof that the ARX Cipher Salsa20 is Secure against Differential Cryptanalysis. 328 - Kristian Gjøsteen:
Protocol Variants and Electronic Identification. 329 - Afonso Arriaga, Qiang Tang:
Trapdoor Privacy in Asymmetric Searchable Encryption Schemes. 330 - Yannick Seurin:
New Constructions and Applications of Trapdoor DDH Groups. 331 - Mikhail Lobanov:
A method for obtaining lower bounds on the higher order nonlinearity of Boolean function. 332 - Bertram Poettering, Douglas Stebila:
Double-authentication-preventing signatures. 333 - Dominik Merli, Frederic Stumpf, Georg Sigl:
Protecting PUF Error Correction by Codeword Masking. 334 - Seny Kamara, Charalampos Papamanthou:
Parallel and Dynamic Searchable Symmetric Encryption. 335 - (Withdrawn) A Novel Technique in Linear Cryptanalysis. 336
- Sergey Gorbunov, Vinod Vaikuntanathan, Hoeteck Wee:
Attribute-Based Encryption for Circuits. 337 - Yevgeniy Dodis, David Pointcheval, Sylvain Ruhault, Damien Vergnaud, Daniel Wichs:
Security Analysis of Pseudo-Random Number Generators with Input: /dev/random is not Robust. 338 - Hugo Krawczyk, Kenneth G. Paterson, Hoeteck Wee:
On the Security of the TLS Protocol: A Systematic Analysis. 339 - Craig Gentry, Amit Sahai, Brent Waters:
Homomorphic Encryption from Learning with Errors: Conceptually-Simpler, Asymptotically-Faster, Attribute-Based. 340 - Fabrice Ben Hamouda, David Pointcheval:
Trapdoor Smooth Projective Hash Functions. 341 - Xiang Xie, Rui Xue:
Attribute-Based Encryption for a Subclass of Circuits with Bounded Depth from Lattices. 342 - Anne Broadbent, Gus Gutoski, Douglas Stebila:
Quantum one-time programs. 343 - Andrej Bogdanov, Chin Ho Lee:
Limits of provable security for homomorphic encryption. 344 - Arnab Roy, Srinivas Vivek:
Analysis and Improvement of the Generic Higher-Order Masking Scheme of FSE 2012. 345 - Elke De Mulder, Michael Hutter, Mark E. Marson, Peter Pearson:
Using Bleichenbacher's Solution to the Hidden Number Problem to Attack Nonce Leaks in 384-Bit ECDSA. 346 - Debrup Chakraborty, Cuauhtemoc Mancillas-López, Palash Sarkar:
STES: A Stream Cipher Based Low Cost Scheme for Securing Stored Data. 347 - Bin Wang, Xiaojing Hong:
Multi-file proofs of retrievability for cloud storage auditing. 348 - Martin Hirt, Ueli Maurer, Christoph Lucas:
A Dynamic Tradeoff Between Active and Passive Corruptions in Secure Multi-Party Computation. 349 - Paul Baecher, Pooya Farshim, Marc Fischlin, Martijn Stam:
Ideal-Cipher (Ir)reducibility for Blockcipher-Based Hash Functions. 350 - Justin Thaler:
Time-Optimal Interactive Proofs for Circuit Evaluation. 351 - Dan Boneh, Brent Waters:
Constrained Pseudorandom Functions and Their Applications. 352 - Carolyn Whitnall, Elisabeth Oswald:
Profiling DPA: Efficacy and efficiency trade-offs. 353 - Eduarda S. V. Freire, Dennis Hofheinz, Kenneth G. Paterson, Christoph Striecks:
Programmable Hash Functions in the Multilinear Setting. 354 - Peeter Laud, Alisa Pankova:
New Attacks against Transformation-Based Privacy-Preserving Linear Programming. 355 - Benjamin Braun, Ariel J. Feldman, Zuocheng Ren, Srinath T. V. Setty, Andrew J. Blumberg, Michael Walfish:
Verifying computations with state. 356 - Dmitry Khovratovich, Christian Rechberger:
The LOCAL attack: Cryptanalysis of the authenticated encryption scheme ALE. 357 - Marc Stevens:
Counter-cryptanalysis. 358 - Aleksandar Kircanski, Riham AlTawy, Amr M. Youssef:
A heuristic for finding compatible differential paths with application to HAS-160. 359 - Frédéric Dupuis, Omar Fawzi, Stephanie Wehner:
Achieving the limits of the noisy-storage model using entanglement sampling. 360 - Benoît Libert, Thomas Peters, Marc Joye, Moti Yung:
Linearly Homomorphic Structure-Preserving Signatures and Their Applications. 361 - Shigeo Mitsunari:
A Fast Implementation of the Optimal Ate Pairing over BN curve on Intel Haswell Processor. 362 - Masao Kasahara:
A New Class of Public Key Cryptosystems Constructed Based on Reed-Solomon Codes, K(XII)SE(1)PKC.- Along with a presentation of K(XII)SE(1)PKC over the extension field extensively used for present day various storage and transmission systems -. 363 - Angelo De Caro, Vincenzo Iovino, Abhishek Jain, Adam O'Neill, Omer Paneth, Giuseppe Persiano:
On the Achievability of Simulation-Based Security for Functional Encryption. 364 - Zheng Yang:
Efficient eCK-secure Authenticated Key Exchange Protocols in the Standard Model. 365 - Pierre-Alain Fouque, Jérémy Jean, Thomas Peyrin:
Structural Evaluation of AES and Chosen-Key Distinguisher of 9-round AES-128. 366 - Florian Kohlar, Sven Schäge, Jörg Schwenk:
On the Security of TLS-DH and TLS-RSA in the Standard Model. 367 - Jacques Patarin:
Security in O(2n) for the Xor of Two Random Permutations \\ - Proof with the standard H technique -. 368 - Benoît Gérard, Vincent Grosso, María Naya-Plasencia, François-Xavier Standaert:
Block Ciphers that are Easier to Mask: How Far Can we Go? 369 - François-Xavier Standaert, Olivier Pereira, Yu Yu:
Leakage-Resilient Symmetric Cryptography Under Empirically Verifiable Assumptions. 370 - Dan Bogdanov, Peeter Laud, Jaak Randmets:
Domain-Polymorphic Programming of Privacy-Preserving Applications. 371 - Jacob Alperin-Sheriff, Chris Peikert:
Practical Bootstrapping in Quasilinear Time. 372 - Pierre-Alain Fouque, Antoine Joux, Mehdi Tibouchi:
Injective Encoding to Elliptic Curves. 373 - Majid Bayat, Mohammad Reza Aref:
A Secure and efficient elliptic curve based authentication and key agreement protocol suitable for WSN. 374 - Michael Hutter, Peter Schwabe:
NaCl on 8-Bit AVR Microcontrollers. 375 - Roel Maes:
An Accurate Probabilistic Reliability Model for Silicon PUFs. 376 - Alex Escala, Gottfried Herold, Eike Kiltz, Carla Ràfols, Jorge L. Villar:
An Algebraic Framework for Diffie-Hellman Assumptions. 377 - Martin Roetteler, Rainer Steinwandt:
A note on quantum related-key attacks. 378 - Aggelos Kiayias, Stavros Papadopoulos, Nikos Triandopoulos, Thomas Zacharias:
Delegatable Pseudorandom Functions and Applications. 379 - Yalin Chen, Jue-Sam Chou, Wen-Yi Tsai:
Comments on Three Multi-Server Authentication Protocols. 380 - (Withdrawn) Breaking the Even-Mansour Hash Function: Collision and Preimage Attacks on JH and Grøstl. 381
- Yevgeniy Dodis, Thomas Ristenpart, John P. Steinberger, Stefano Tessaro:
To Hash or Not to Hash Again? (In)differentiability Results for H2 and HMAC. 382 - Léo Ducas, Alain Durmus, Tancrède Lepoint, Vadim Lyubashevsky:
Lattice Signatures and Bimodal Gaussians. 383 - Kwangsu Lee, Dong Hoon Lee, Moti Yung:
Sequential Aggregate Signatures Made Shorter. 384 - (Withdrawn) Cryptanalysis of ultralightweight RFID authentication protocol. 385
- Nadia El Mrabet:
Side Channel Attacks against Pairing over Theta Functions. 386 - Jonathan T. Trostle, Hosei Matsuoka, James Kempf, Toshiro Kawahara, Ravi Jain:
Cryptographically Protected Prefixes for Location Privacy in IPv6. 387 - Tsukasa Ishiguro, Shinsaku Kiyomoto, Yutaka Miyake, Tsuyoshi Takagi:
Parallel Gauss Sieve Algorithm: Solving the SVP in the Ideal Lattice of 128 dimensions. 388 - Jan-Jaap Oosterwijk, Boris Skoric, Jeroen Doumen:
A Capacity-Achieving Simple Decoder for Bias-Based Traitor Tracing Schemes. 389 - Keita Emura, Goichiro Hanaoka, Koji Nuida, Go Ohtake, Takahiro Matsuda, Shota Yamada:
Chosen Ciphertext Secure Keyed-Homomorphic Public-Key Encryption. 390 - Itai Dinur, Orr Dunkelman, Nathan Keller, Adi Shamir:
Key Recovery Attacks on 3-round Even-Mansour, 8-step LED-128, and Full AES2. 391 - Christian Hanser, Daniel Slamanig:
Efficient Simultaneous Privately and Publicly Verifiable Robust Provable Data Possession from Elliptic Curves. 392 - Yong Li, Zheng Yang:
Strongly Secure One-round Group Authenticated Key Exchange in the Standard Model. 393 - Shenghui Su, Maozhi Xu, Shuwang Lü:
A Public Key Cryptoscheme Using the Bit-pair Method. 394 - Emmanuel Prouff, Matthieu Rivain, Thomas Roche:
On the Practical Security of a Leakage Resilient Masking Scheme. 396 - Giorgia Azzurra Marson, Bertram Poettering:
Practical Secure Logging: Seekable Sequential Key Generators. 397 - Colin Boyd, Cas Cremers, Michèle Feltz, Kenneth G. Paterson, Bertram Poettering, Douglas Stebila:
ASICS: Authenticated Key Exchange Security Incorporating Certification Systems. 398 - Roel Peeters, Jens Hermans:
Attack on Liao and Hsiao's Secure ECC-based RFID Authentication Scheme integrated with ID-Verifier Transfer Protocol. 399 - Razvan Barbulescu, Pierrick Gaudry, Antoine Joux, Emmanuel Thomé:
A quasi-polynomial algorithm for discrete logarithm in finite fields of small characteristic. 400 - Elette Boyle, Shafi Goldwasser, Ioana Ivan:
Functional Signatures and Pseudorandom Functions. 401 - Jue-Sam Chou, Chun-Hui Huang, Yu-Siang Huang, Yalin Chen:
Efficient Two-Pass Anonymous Identity Authentication Using Smart Card. 402 - Dan Boneh, Ananth Raghunathan, Gil Segev:
Function-Private Subspace-Membership Encryption and Its Applications. 403 - Ray Beaulieu, Douglas Shors, Jason Smith, Stefan Treatman-Clark, Bryan Weeks, Louis Wingers:
The SIMON and SPECK Families of Lightweight Block Ciphers. 404 - Chunming Tang, Yanfeng Qi, Maozhi Xu:
New Quadratic Bent Functions in Polynomial Forms with Coefficients in Extension Fields. 405 - (Withdrawn) Attribute-Based Server-Aided Verification Signature. 406
- Martin Gagné, Pascal Lafourcade, Yassine Lakhnech:
Automated Security Proofs for Almost-Universal Hash for MAC verification. 407 - Michael Backes, Sebastian Meiser, Dominique Schröder:
Highly Controlled, Fine-grained Delegation of Signing Capabilities. 408 - Tal Malkin, Isamu Teranishi, Moti Yung:
Order-Preserving Encryption Secure Beyond One-Wayness. 409 - Yossi Gilad, Amir Herzberg:
Plug-and-Play IP Security: Anonymity Infrastructure Instead of PKI. 410 - Shaohui Wang, Fu Xiao, Dan-wei Chen, Ruchuan Wang:
Security Analysis of Lightweight Authentication Protocol from WISTP 2013. 411 - Yuan Tian, Xueyong Zhu, Rongxin Sun:
Moduar Form Aprroach to Solving Lattice Problems. 412 - Mihir Bellare, Georg Fuchsbauer:
Policy-Based Signatures. 413 - Chunhua Jin, Chunxiang Xu, Xiaojun Zhang, Qianna Xie, Fagen Li:
A novel certificateless deniable authentication protocol. 414 - Ciaran Mullan, Boaz Tsaban:
Short collision search in arbitrary SL2 homomorphic hash functions. 415 - Benjamin Fuller, Xianrui Meng, Leonid Reyzin:
Computational Fuzzy Extractors. 416 - Yongjuan Wang, Liren Ding, Wenbao Han, Xiangyu Wang:
The Improved Cube Attack on Grain-v1. 417 - Nils Fleischhacker, Tibor Jager, Dominique Schröder:
Unconditional Tightness Bounds for Generic Reductions: The Exact Security of Schnorr Signatures, Revisited. 418 - Rikke Bendlin, Sara Krehbiel, Chris Peikert:
How to Share a Lattice Trapdoor: Threshold Protocols for Signatures and (H)IBE. 419 - Boris Skoric, Jan-Jaap Oosterwijk, Jeroen Doumen:
The Holey Grail: A special score function for non-binary traitor tracing. 420 - Valentina Banciu, Simon Hoerder, Dan Page:
Light-weight primitive, feather-weight security? A cryptanalytic knock-out. (Preliminary results). 421 - Dan Boneh, Craig Gentry, Shai Halevi, Frank Wang, David J. Wu:
Private Database Queries Using Somewhat Homomorphic Encryption. 422 - Benny Applebaum, Yoni Moses:
Locally Computable UOWHF with Linear Shrinkage. 423 - Mihir Bellare, Viet Tung Hoang, Sriram Keelveedhi:
Instantiating Random Oracles via UCEs. 424 - Rafik Chaabouni:
Break WEP Faster with Statistical Analysis. 425 - Mihir Bellare, Viet Tung Hoang, Sriram Keelveedhi, Phillip Rogaway:
Efficient Garbling from a Fixed-Key Blockcipher. 426 - Jiangtao Han, Haining Fan:
Toeplitz matrix-vector product based GF(2n) shifted polynomial basis multipliers for all irreducible pentanomials. 427 - Roberto Avanzi, Billy Bob Brumley:
Faster 128-EEA3 and 128-EIA3 Software. 428 - Mihir Bellare, Sriram Keelveedhi, Thomas Ristenpart:
DupLESS: Server-Aided Encryption for Deduplicated Storage. 429 - Jooyoung Lee:
Security of the Misty Structure Beyond the Birthday Bound. 430 - Orr Dunkelman, Nathan Keller:
Practical-Time Attacks Against Reduced Variants of MISTY1. 431 - Eric Brier, David Naccache, Li-yao Xia:
How to Sign Paper Contracts? Conjectures & Evidence Related to Equitable & Efficient Collaborative Task Scheduling. 432 - Alexandra Boldyreva, Jean Paul Degabriele, Kenneth G. Paterson, Martijn Stam:
On Symmetric Encryption with Distinguishable Decryption Failures. 433 - Susan Hohenberger, Amit Sahai, Brent Waters:
Full Domain Hash from (Leveled) Multilinear Maps and Identity-Based Aggregate Signatures. 434 - Marc Joye, Benoît Libert:
Efficient Cryptosystems From 2k-th Power Residue Symbols. 435 - Charles Bouillaguet, Chen-Mou Cheng, Tung Chou, Ruben Niederhagen, Bo-Yin Yang:
Fast Exhaustive Search for Quadratic Systems in 𝔽2 on FPGAs - Extended Version. 436 - Salil P. Vadhan, Colin Jia Zheng:
A Uniform Min-Max Theorem with Applications in Cryptography. 437 - Johann Heyszl, Andreas Ibing, Stefan Mangard, Fabrizio De Santis, Georg Sigl:
Clustering Algorithms for Non-Profiled Single-Execution Attacks on Exponentiations. 438 - Peter Pessl, Michael Hutter:
Pushing the Limits of SHA-3 Hardware Implementations to Fit on RFID. 439 - Mitsugu Iwamoto, Junji Shikata:
Information Theoretic Security for Encryption Based on Conditional Renyi Entropies. 440 - (Withdrawn) On Stochastic Security of Java Crypto and NIST DRBG Pseudorandom Sequences. 441
- Shashank Agrawal, Manoj Prabhakaran:
On Fair Exchange, Fair Coins and Fair Sampling. 442 - Jiangxiao Zhang, Hua Guo, Zhoujun Li, Chang Xu:
Optimally Anonymous and Transferable Conditional E-cash. 443 - Bin Wang, Xiaojing Hong:
Sequential message authentication code without random oracles. 444 - Ryad Benadjila, Jian Guo, Victor Lomné, Thomas Peyrin:
Implementing Lightweight Block Ciphers on x86 Architectures. 445 - Gora Adj, Alfred Menezes, Thomaz Oliveira, Francisco Rodríguez-Henríquez:
Weakness of 𝔽36·509 for Discrete Logarithm Cryptography. 446 - Karine Gandolfi-Villegas, Nabil Hamzi:
Dynamic Runtime Methods to Enhance Private Key Blinding. 447 - Yuval Yarom, Katrina Falkner:
Flush+Reload: a High Resolution, Low Noise, L3 Cache Side-Channel Attack. 448 - Zhengjun Cao:
A Note On the Storage Requirement for AKS Primality Testing Algorithm. 449 - Yoni De Mulder, Peter Roelse, Bart Preneel:
Revisiting the BGE Attack on a White-Box AES Implementation. 450 - Sanjam Garg, Craig Gentry, Shai Halevi, Mariana Raykova, Amit Sahai, Brent Waters:
Candidate Indistinguishability Obfuscation and Functional Encryption for all circuits. 451 - Behnam Mafakheri, Taraneh Eghlidos, Hossein Pilaram:
Secure Channel Coding Schemes based on Polar Codes. 452 - Nasour Bagheri, Masoumeh Safkhani:
Secret Disclosure attack on Kazahaya, a Yoking-Proof For Low-Cost RFID Tags. 453 - Amit Sahai, Brent Waters:
How to Use Indistinguishability Obfuscation: Deniable Encryption, and More. 454 - Tancrède Lepoint, Matthieu Rivain:
Another Nail in the Coffin of White-Box AES Implementations. 455 - B. R. Purushothama, B. B. Amberker:
On the Security of Group-based Proxy Re-encryption Scheme. 456 - Florian Böhl, Véronique Cortier, Bogdan Warinschi:
Deduction Soundness: Prove One, Get Five for Free. 457 - Joppe W. Bos, Craig Costello, Michael Naehrig:
Exponentiating in Pairing Groups. 458 - Paul Baecher, Christina Brzuska, Arno Mittelbach:
Reset Indifferentiability and its Consequences. 459 - Rafik Chaabouni:
Solving Terminal Revocation in EAC by Augmenting Terminal Authentication. 460 - Zongbin Liu, Neng Gao, Jiwu Jing, Peng Liu:
HPAZ: a High-throughput Pipeline Architecture of ZUC in Hardware. 461 - Qingji Zheng, Shouhuai Xu, Giuseppe Ateniese:
VABKS: Verifiable Attribute-based Keyword Search over Outsourced Encrypted Data. 462 - Reza Hooshmand, Masoumeh Koochak Shooshtari, Mohammad Reza Aref:
Secret Key Cryptosystem based on Polar Codes over Binary Erasure Channel. 463 - Stephan Neumann, Christian Feier, Melanie Volkamer, Reto E. Koenig:
Towards A Practical JCJ / Civitas Implementation. 464 - Ioana Boureanu, Aikaterini Mitrokotsa, Serge Vaudenay:
Practical & Provably Secure Distance-Bounding. 465 - Amadou Tall, Ali Yassin Sanghare:
Efficient computation of addition-subtraction chains using generalized continued Fractions. 466 - Jian Guo, Pierre Karpman, Ivica Nikolic, Lei Wang, Shuang Wu:
Analysis of BLAKE2. 467 - Nir Bitansky, Ran Canetti, Omer Paneth:
How To Construct Extractable One-Way Functions Against Uniform Adversaries. 468 - Michael Backes, Dario Fiore, Raphael M. Reischuk:
Verifiable Delegation of Computation on Outsourced Data. 469 - Martin R. Albrecht, Jean-Charles Faugère, Robert Fitzpatrick, Ludovic Perret:
Practical Cryptanalysis of a Public-Key Encryption Scheme Based on New Multivariate Quadratic Assumptions. 470 - Zvika Brakerski, Guy N. Rothblum:
Obfuscating Conjunctions. 471 - Kristian Gjøsteen:
Partially blind password-based signatures using elliptic curves. 472 - Kristian Gjøsteen:
The Norwegian Internet Voting Protocol. 473 - Zhengjun Cao:
Eavesdropping or Disrupting a Communication - On the Weakness of Quantum Communications. 474 - Pascale Charpin, Gohar M. Kyureghyan:
A note on verifying the APN property. 475 - Sourav Sen Gupta, Subhamoy Maitra, Willi Meier:
Distinguishing WPA. 476 - Renaud Dubois, Margaux Dugardin, Aurore Guillevic:
Golden Sequence for the PPSS Broadcast Encryption Scheme with an Asymmetric Pairing. 477 - Stefan G. Weber:
Enabling End-to-End Secure Communication with Anonymous and Mobile Receivers - an Attribute-Based Messaging Approach. 478 - Boris Skoric:
Security analysis of Quantum-Readout PUFs in the case of generic challenge-estimation attacks. 479 - Gil Cohen, Ivan Bjerre Damgård, Yuval Ishai, Jonas Kölker, Peter Bro Miltersen, Ran Raz, Ron D. Rothblum:
Efficient Multiparty Protocols via Log-Depth Threshold Formulae. 480 - Yosuke Todo, Keita Xagawa:
Cryptanalysis of the Huang-Liu-Yang Cryptosystem from PKC 2012. 481 - Céline Blondeau, Andrey Bogdanov, Gregor Leander:
Bounds in Shallows and in Miseries. 482 - Jean-Sébastien Coron, Jean-Charles Faugère, Guénaël Renault, Rina Zeitoun:
A Variant of Coppersmith's Algorithm with Improved Complexity and Efficient Exhaustive Search. 483 - (Withdrawn) Efficient Public Integrity Checking for Cloud Data Sharing with Multi-User Modification. 484
- (Withdrawn) A New Object Searching Protocol for Multi-tag RFID. 485
- (Withdrawn) Handling Authentication and Detection Probability in Multi-tag RFID Environment. 486
- Tsutomu Iijima, Fumiyuki Momose, Jinhui Chao:
Classification of Elliptic/hyperelliptic Curves with Weak Coverings against GHS Attack under an Isogeny Condition. 487 - Kwangsu Lee, Dong Hoon Lee:
Adaptively Secure Broadcast Encryption under Standard Assumptions with Better Efficiency. 488 - Constantinos Patsakis, Agusti Solanas:
An Efficient Scheme for Centralized Group Key Management in Collaborative Environments. 489 - Masoumeh Safkhani, Nasour Bagheri:
For an EPC-C1 G2 RFID compliant Protocol, CRC with Concatenation : No; PRNG with Concatenation : Yes. 490 - Vladimir Kolesnikov, Ranjit Kumaresan:
Improved OT Extension for Transferring Short Secrets. 491 - Anna Lisa Ferrara, Georg Fuchsbauer, Bogdan Warinschi:
Cryptographically Enforced RBAC. 492 - Chunming Tang, Yanfeng Qi:
A new class of semi-bent quadratic Boolean functions. 493 - Santanu Sarkar, Subhadeep Banik, Subhamoy Maitra:
Differential Fault Attack against Grain family with very few faults and minimal assumptions. 494 - Le Su, Hoon Wei Lim, San Ling, Huaxiong Wang:
Revocable IBE Systems with Almost Constant-size Key Update. 495 - Juan A. Garay, Jonathan Katz, Ueli Maurer, Björn Tackmann, Vassilis Zikas:
Rational Protocol Design: Cryptography Against Incentive-driven Adversaries. 496 - Zhengjun Cao, Hanyue Cao:
Improvement of Camenisch-Neven-Shelat Oblivious Transfer Scheme. 497 - Stefan Dziembowski, Tomasz Kazana, Maciej Obremski:
Non-Malleable Codes from Two-Source Extractors. 498 - Pavel Hubácek, Jesper Buus Nielsen, Alon Rosen:
Limits on the Power of Cryptographic Cheap Talk. 499 - Ran Canetti, Vinod Vaikuntanathan:
Obfuscating Branching Programs Using Black-Box Pseudo-Free Groups. 500 - Jianxiong Shao, Dengguo Feng, Yu Qin:
Type-Based Analysis of Protected Storage in the TPM (full version). 501 - Santanu Sarkar, Sourav Sen Gupta, Goutam Paul, Subhamoy Maitra:
Proving TLS-attack related open biases of RC4. 502 - Ignacio Cascudo Pueyo, Ronald Cramer, Diego Mirandola, Carles Padró, Chaoping Xing:
On secret sharing with nonlinear product reconstruction. 503 - Reza Azarderakhsh, Koray Karabina:
A Comparison of Double Point Multiplication Algorithms and their Implementation over Binary Elliptic Curves. 504 - Zhengjun Cao, Lihua Liu:
Improvement of One Anonymous Identity-Based Encryption. 505 - Pablo Rauzy, Sylvain Guilley:
A Formal Proof of Countermeasures against Fault Injection Attacks on CRT-RSA. 506 - Eli Ben-Sasson, Alessandro Chiesa, Daniel Genkin, Eran Tromer, Madars Virza:
SNARKs for C: Verifying Program Executions Succinctly and in Zero Knowledge. 507 - Raluca A. Popa, Nickolai Zeldovich:
Multi-Key Searchable Encryption. 508 - Susan Hohenberger, Amit Sahai, Brent Waters:
Replacing a Random Oracle: Full Domain Hash From Indistinguishability Obfuscation. 509 - Johannes Buchmann, Daniel Cabarcas, Florian Göpfert, Andreas Hülsing, Patrick Weiden:
Discrete Ziggurat: A Time-Memory Trade-off for Sampling from a Gaussian Distribution over the Integers. 510 - Siavash Ahmadi, Zahra Ahmadian, Javad Mohajeri, Mohammad Reza Aref:
Low Data Complexity Biclique Cryptanalysis of Block Ciphers with Application to Piccolo and HIGHT. 511 - Jingguo Bi, Phong Q. Nguyen:
Rounding LLL: Finding Faster Small Roots of Univariate Polynomial Congruences. 512 - Stephen Chong, Eran Tromer, Jeffrey A. Vaughan:
Enforcing Language Semantics Using Proof-Carrying Data. 513 - Jia Xu, Jianying Zhou:
Leakage Resilient Proofs of Ownership in Cloud Storage, Revisited. 514 - Changyu Dong, Liqun Chen, Zikai Wen:
When Private Set Intersection Meets Big Data: An Efficient and Scalable Protocol. 515 - Melissa Chase, Gregory M. Zaverucha:
MAC Schemes with Efficient Protocols and Keyed-Verification Anonymous Credentials. 516 - Zhengjun Cao, Lihua Liu:
Improvement of One Adaptive Oblivious Transfer Scheme. 517 - (Withdrawn) Universal Leaky Random Oracle Model. 518
- Joppe W. Bos, Peter L. Montgomery, Daniel Shumow, Gregory M. Zaverucha:
Montgomery Multiplication Using Vector Instructions. 519 - Nishanth Chandran, Bhavana Kanukurthi, Rafail Ostrovsky:
Locally Updatable and Locally Decodable Codes. 520 - Jérémy Jean, María Naya-Plasencia, Thomas Peyrin:
Multiple Limited-Birthday Distinguishers and Applications. 521 - Sareh Emami, San Ling, Ivica Nikolic, Josef Pieprzyk, Huaxiong Wang:
The Resistance of PRESENT-80 Against Related-Key Differential Attacks. 522 - Cécile Delerablée, Tancrède Lepoint, Pascal Paillier, Matthieu Rivain:
White-Box Security Notions for Symmetric Encryption Schemes. 523 - Teng Guo, Feng Liu, Chuan Kun Wu, Ching-Nung Yang, Wen Wang, YaWei Ren:
Threshold Secret Image Sharing. 524 - Christian Forler, Stefan Lucks, Jakob Wenzel:
Catena: A Memory-Consuming Password Scrambler. 525 - Farzaneh Abed, Eik List, Stefan Lucks, Jakob Wenzel:
Differential Cryptanalysis of Reduced-Round Simon. 526 - Boris Skoric, Niels de Vreede:
The Spammed Code Offset Method. 527 - Somindu C. Ramanna, Palash Sarkar:
Anonymous HIBE from Standard Assumptions over Type-3 Pairings using Dual System Encryption. 528 - Joshua Baron, Karim El Defrawy, Joshua Lampkins, Rafail Ostrovsky:
How to Withstand Mobile Virus Attacks, Revisited. 529 - Ivica Nikolic, Lei Wang, Shuang Wu:
The Parallel-Cut Meet-In-The-Middle Attack. 530 - Nethanel Gelernter, Amir Herzberg:
On the Limits of Provable Anonymity. 531 - Takakazu Satoh:
On a Relation between the Ate Pairing and the Weil Pairing for Supersingular Elliptic Curves. 532 - Nethanel Gelernter, Amir Herzberg:
Gossip Latin Square and The Meet-All Gossipers Problem. 533 - Nethanel Gelernter, Amir Herzberg:
Efficient Unobservable Anonymous Reporting against Strong Adversaries. 534 - Sujoy Sinha Roy, Junfeng Fan, Ingrid Verbauwhede:
Accelerating Scalar Conversion for Koblitz Curve Cryptoprocessors on Hardware Platforms. 535 - Feng Zhang, Yanbin Pan, Gengran Hu:
A Three-Level Sieve Algorithm for the Shortest Vector Problem. 536 - Shay Nachmani, Amir Herzberg:
Inter-FSP Funds Transfer Protocol. 537 - Arnis Parsovs:
Practical Issues with TLS Client Certificate Authentication. 538 - Riham AlTawy, Aleksandar Kircanski, Amr M. Youssef:
Rebound attacks on Stribog. 539 - Junghyun Nam, Kim-Kwang Raymond Choo, Juryon Paik, Dongho Won:
On the security of a password-only authenticated three-party key exchange protocol. 540 - Zvika Brakerski, Vinod Vaikuntanathan:
Lattice-Based FHE as Secure as PKE. 541 - Przemyslaw Dabrowski, Grzegorz Labuzek, Tomasz Rachwalik, Janusz Szmidt:
Searching for Nonlinear Feedback Shift Registers with Parallel Computing. 542 - Hoda Alkhzaimi, Martin M. Lauridsen:
Cryptanalysis of the SIMON Family of Block Ciphers. 543 - Christian Hanser, Daniel Slamanig:
Warrant-Hiding Delegation-by-Certificate Proxy Signature Schemes. 544 - Myungsun Kim, Abedelaziz Mohaisen, Jung Hee Cheon, Yongdae Kim:
Private Over-threshold Aggregation Protocols over Distributed Databases. 545 - Jean-Marie Chauvet:
TRS-80 with a grain of salt. 546 - Siwei Sun, Lei Hu, Ling Song, Yonghong Xie, Peng Wang:
Automatic Security Evaluation of Block Ciphers with S-bP Structures against Related-key Differential Attacks. 547 - Koh-ichi Nagao:
Decomposition formula of the Jacobian group of plane curve. 548 - Koh-ichi Nagao:
Equations System coming from Weil descent and subexponential attack for algebraic curve cryptosystem. 549 - (Withdrawn) More Efficient Cryptosystems From k-th Power Residues. 550
- Gregory Alvarez, Charles Berenguer:
Puzzle Encryption Algorithm. 551 - Gilad Asharov, Yehuda Lindell, Thomas Schneider, Michael Zohner:
More Efficient Oblivious Transfer and Extensions for Faster Secure Computation. 552 - Martin Hirt, Pavel Raykov:
Multi-Valued Byzantine Broadcast: the t<n Case. 553 - Pablo Rauzy, Sylvain Guilley, Zakaria Najm:
Formally Proved Security of Assembly Code Against Leakage. 554 - Ueli Maurer, Björn Tackmann, Sandro Coretti:
Key Exchange with Unilateral Authentication: Composable Security Definition and Modular Protocol Design. 555 - Oleksandr Kazymyrov, Valentyna Kazymyrova:
Algebraic Aspects of the Russian Hash Standard GOST R 34.11-2012. 556 - Zvika Brakerski, Guy N. Rothblum:
Black-Box Obfuscation for d-CNFs. 557 - Kevin J. Henry, Maura B. Paterson, Douglas R. Stinson:
Practical approaches to varying network size in combinatorial key predistribution schemes. 558 - Christian Matt, Ueli Maurer:
A Constructive Approach to Functional Encryption. 559 - Ben Morris, Phillip Rogaway:
Sometimes-Recurse Shuffle: Almost-Random Permutations in Logarithmic Expected Time. 560 - Pawel Morawiecki, Josef Pieprzyk, Marian Srebrny, Michal Straus:
Preimage attacks on the round-reduced Keccak with the aid of differential cryptanalysis. 561 - Binglong Chen, Chang-An Zhao:
Self-pairings on supersingular elliptic curves with embedding degree three. 562 - Zvika Brakerski, Guy N. Rothblum:
Virtual Black-Box Obfuscation for All Circuits via Generic Graded Encoding. 563 - Mahdi Cheraghchi, Venkatesan Guruswami:
Capacity of Non-Malleable Codes. 564 - Mahdi Cheraghchi, Venkatesan Guruswami:
Non-Malleable Coding Against Bit-wise and Split-State Tampering. 565 - Jeroen Delvaux, Ingrid Verbauwhede:
Attacking PUF-Based Pattern Matching Key Generators via Helper Data Manipulation. 566 - Gareth T. Davies, Martijn Stam:
KDM Security in the Hybrid Framework. 567 - Farzaneh Abed, Eik List, Stefan Lucks, Jakob Wenzel:
Cryptanalysis of the Speck Family of Block Ciphers. 568 - Zhenfu Cao, Xiaolei Dong, Licheng Wang, Jun Shao:
More Efficient Cryptosystems From k-th Power Residues. 569 - Jun Shao, Licheng Wang, Xiaolei Dong, Zhenfu Cao:
New Efficient Identity-Based Encryption From Factorization. 570 - Martin Hirt, Daniel Tschudi:
Efficient General-Adversary Multi-Party Computation. 571 - Goutam Paul, Subhamoy Maitra, Anupam Chattopadhyay:
Quad-RC4: Merging Four RC4 States towards a 32-bit Stream Cipher. 572 - Leibo Li, Keting Jia, Xiaoyun Wang:
Improved Meet-in-the-Middle Attacks on AES-192 and PRINCE. 573 - Mridul Nandi:
On the Minimum Number of Multiplications Necessary for Universal Hash Constructions. 574 - Nilanjan Datta, Mridul Nandi:
Equivalence between MAC and PRF for Blockcipher based Constructions. 575 - Oleksandr Kazymyrov, Valentyna Kazymyrova:
Extended Criterion for Absence of Fixed Points. 576 - Luís T. A. N. Brandão:
Secure Two-Party Computation with Reusable Bit-Commitments, via a Cut-and-Choose with Forge-and-Lose Technique. 577 - Oleksandr Kazymyrov, Valentyna Kazymyrova, Roman Oliynykov:
A Method For Generation Of High-Nonlinear S-Boxes Based On Gradient Descent. 578 - Takeshi Sugawara, Daisuke Suzuki, Minoru Saeki, Mitsuru Shiozaki, Takeshi Fujino:
On Measurable Side-Channel Leaks inside ASIC Design Primitives. 579 - Jalaj Upadhyay:
Random Projections, Graph Sparsification, and Differential Privacy. 580 - Bingsheng Zhang, Zhan Qin, Junfei Wang, Kui Ren, Cong Wang, Di Ma:
PriWhisper: Enabling Keyless Secure Acoustic Communication for Smartphones. 581 - Antoine Joux, Cécile Pierrot:
The Special Number Field Sieve in Fpn, Application to Pairing-Friendly Constructions. 582 - Min Yang, Qingshu Meng, Zhang-yi Wang, Lina Wang, Huanguo Zhang:
polynomial selection for the number field sieve in geometric view. 583 - Zongyue Wang, Hongbo Yu, Xiaoyun Wang:
Cryptanalysis of GOST R Hash Function. 584 - Xiutao Feng:
On Algebraic Immunity of Tr(x-1) over 𝔽2n. 585 - Enes Pasalic, Yongzhuang Wei:
Generic related-key and induced chosen IV attacks using the method of key differentiation. 586 - Muhammad Rizwan Asghar, Mihaela Ion, Giovanni Russello, Bruno Crispo:
ESPOON ERBAC: Enforcing Security Policies in Outsourced Environments. 587 - Michel Abdalla, Fabrice Benhamouda, Olivier Blazy, Céline Chevalier, David Pointcheval:
SPHF-Friendly Non-Interactive Commitments. 588 - Vladimir Antipkin:
Smashing MASH-1. 589 - Andrea G. Forte, Juan A. Garay, Trevor Jim, Yevgeniy Vahlis:
EyeDecrypt - Private Interactions in Plain Sight. 590 - Jung Woo Kim, Jin Hong, Kunsoo Park:
Analysis of the Rainbow Tradeoff Algorithm Used in Practice. 591 - Liam Keliher, Anthony Z. Delaney:
Cryptanalysis of the Toorani-Falahati Hill Ciphers. 592 - Carmit Hazay, Arpita Patra:
One-Sided Adaptively Secure Two-Party Computation. 593 - Yuan Tian, Rongxin Sun, Xueyong Zhu:
A Local-Global Approach to Solving Ideal Lattice Problems. 594 - Mark Dermot Ryan:
Enhanced certificate transparency (how Johnny could encrypt). 595 - Michael Shantz, Edlyn Teske:
Solving the Elliptic Curve Discrete Logarithm Problem Using Semaev Polynomials, Weil Descent and Gröbner Basis Methods - an Experimental Study. 596 - Sylvain Duquesne, Nadia El Mrabet, Emmanuel Fouotsa:
Efficient Pairings Computation on Jacobi Quartic Elliptic Curves. 597 - Daehyun Strobel, Benedikt Driessen, Timo Kasper, Gregor Leander, David F. Oswald, Falk Schellenberg, Christof Paar:
Fuming Acid and Cryptanalysis: Handy Tools for Overcoming a Digital Locking and Access Control System - Full Version. 598 - Daniel J. Bernstein, Yun-An Chang, Chen-Mou Cheng, Li-Ping Chou, Nadia Heninger, Tanja Lange, Nicko van Someren:
Factoring RSA keys from certified smart cards: Coppersmith in the wild. 599 - Florian Mendel, Thomas Peyrin, Martin Schläffer, Lei Wang, Shuang Wu:
Improved Cryptanalysis of Reduced RIPEMD-160. 600 - Sanjam Garg, Craig Gentry, Shai Halevi, Mariana Raykova:
Two-round secure MPC from Indistinguishability Obfuscation. 601 - Martin R. Albrecht, Robert Fitzpatrick, Florian Göpfert:
On the Efficacy of Solving LWE by Reduction to Unique-SVP. 602 - Xiaofei Guo, Ramesh Karri:
Invariance-Based Concurrent Error Detection for Advanced Encryption Standard. 603 - Jörg Schwenk:
Modelling Time, or A Step Towards Reduction-based Security Proofs for OTP and Kerberos. 604 - Masao Kasahara:
Presentation of a new class of public key cryptosystems K(XIII)SE(1)PKC along with Kp(XIII)SE(1)PKC that realizes the coding rate of exactly 1.0, constructed by modifying K(XII)SE(1)PKC. 605 - Dominique Unruh:
Revocable quantum timed-release encryption. 606 - Franck Landelle, Thomas Peyrin:
Cryptanalysis of Full RIPEMD-128. 607 - Guangjun Fan, Yongbin Zhou, Hailong Zhang, Dengguo Feng:
Towards Leakage Exploitation Optimality in Profiled Side-Channel Attacks. 608 - Ruan de Clercq, Leif Uhsadel, Anthony Van Herrewege, Ingrid Verbauwhede:
Ultra Low-Power implementation of ECC on the ARM Cortex-M0+. 609 - Jeroen Delvaux, Ingrid Verbauwhede:
Key-recovery Attacks on Various RO PUF Constructions via Helper Data Manipulation. 610 - Mitsugu Iwamoto, Thomas Peyrin, Yu Sasaki:
Limited-birthday Distinguishers for Hash Functions - Collisions Beyond the Birthday Bound can be Meaningful. 611 - Essam Ghadafi:
Sub-linear Blind Ring Signatures without Random Oracles. 612 - Xiaofei Guo, Ramesh Karri:
Recomputing with Permuted Operands: A Concurrent Error Detection Approach. 613 - Douglas R. Stinson, Jalaj Upadhyay:
Is extracting data the same as possessing data? 614 - Hugo Jonker, Sjouke Mauw, Jun Pang:
Privacy and Verifiability in Voting Systems: Methods, Developments and Trends. 615 - Xiaolin Cao, Ciara Moore, Máire O'Neill, Elizabeth O'Sullivan, Neil Hanley:
Accelerating Fully Homomorphic Encryption over the Integers with Super-size Hardware Multiplier and Modular Reduction. 616 - Brajesh Kumar Singh:
Some results concerning global avalanche characteristics of two q-ary functions. 617 - Pierre-Alain Fouque, Pierre Karpman:
Security Amplification against Meet-in-the-Middle Attacks Using Whitening. 618 - Jeroen Delvaux, Ingrid Verbauwhede:
Fault Injection Modeling Attacks on 65nm Arbiter and RO Sum PUFs via Environmental Changes. 619 - Marcin Nagy, Emiliano De Cristofaro, Alexandra Dmitrienko, N. Asokan, Ahmad-Reza Sadeghi:
Do I know you? - Efficient and Privacy-Preserving Common Friend-Finder Protocols and Applications. 620 - Marika Mitrengová:
Multi-LHL protocol. 621 - Christina Garman, Matthew Green, Ian Miers:
Decentralized Anonymous Credentials. 622 - Yossi Gilad, Amir Herzberg, Haya Schulmann:
Off-Path Hacking: The Illusion of Challenge-Response Authentication. 623 - (Withdrawn) New Integer-FFT Multiplication Architectures and Implementations for Accelerating Fully Homomorphic Encryption. 624
- Kevin D. Bowers, Catherine Hart, Ari Juels, Nikos Triandopoulos:
Securing the Data in Big Data Security Analytics. 625 - Mingjie Liu, Jiazhe Chen:
Improved Linear Attacks on the Chinese Block Cipher Standard. 626 - Jiawei Yuan, Shucheng Yu:
Flexible and Publicly Verifiable Aggregation Query for Outsourced Databases in Cloud. 627 - Kazuhiko Minematsu:
Parallelizable Authenticated Encryption from Functions. 628 - Ivan Damgård, Thomas P. Jakobsen, Jesper Buus Nielsen, Jakob Illeborg Pagter:
Secure Key Management in the Cloud. 629 - Joop van de Pol, Nigel P. Smart:
Estimating Key Sizes For High Dimensional Lattice Based Systems. 630 - Boaz Barak, Sanjam Garg, Yael Tauman Kalai, Omer Paneth, Amit Sahai:
Protecting Obfuscation Against Algebraic Attacks. 631 - Ahmed Mahmoud, Ulrich Rührmair, Mehrdad Majzoobi, Farinaz Koushanfar:
Combined Modeling and Side Channel Attacks on Strong PUFs. 632 - Joan Boyar, Magnus Find, René Peralta:
Four Measures of Nonlinearity. 633 - Itai Dinur, Orr Dunkelman, Nathan Keller, Adi Shamir:
Improved Linear Sieving Techniques with Applications to Step-Reduced LED-64. 634 - Arjen K. Lenstra, Thorsten Kleinjung, Emmanuel Thomé:
Universal security; from bits and mips to pools, lakes - and beyond. 635 - Matthieu Rivain, Thomas Roche:
SCARE of Secret Ciphers with SPN Structures. 636 - Hadi Ahmadi, Reihaneh Safavi-Naini:
Detection of Algebraic Manipulation in the Presence of Leakage. 637 - Somindu C. Ramanna:
DFA-Based Functional Encryption: Adaptive Security from Dual System Encryption. 638 - Deng Tang, Claude Carlet, Xiaohu Tang:
Differentially 4-Uniform Bijections by Permuting the Inverse Function. 639 - Joshua Lampkins, Rafail Ostrovsky:
Communication-Efficient MPC for General Adversary Structures. 640 - Nir Bitansky, Ran Canetti, Omer Paneth, Alon Rosen:
Indistinguishability Obfuscation vs. Auxiliary-Input Extractable Functions: One Must Fall. 641 - Dan Boneh, Mark Zhandry:
Multiparty Key Exchange, Efficient Traitor Tracing, and More from Indistinguishability Obfuscation. 642 - Tal Moran, Alon Rosen:
There is no Indistinguishability Obfuscation in Pessiland. 643 - Joppe W. Bos, Craig Costello, Andrea Miele:
Elliptic and Hyperelliptic Curves: a Practical Security Analysis. 644 - Ertem Esiner, Adilet Kachkeev, Samuel Braunfeld, Alptekin Küpçü, Öznur Özkasap:
FlexDPDP: FlexList-based Optimized Dynamic Provable Data Possession. 645 - Johannes Blömer, Gennadij Liske:
Direct Chosen-Ciphertext Secure Attribute-Based Key Encapsulations without Random Oracles. 646 - Diego F. Aranha, Paulo S. L. M. Barreto, C. C. F. Pereira Geovandro, Jefferson E. Ricardini:
A note on high-security general-purpose elliptic curves. 647 - Riham AlTawy, Amr M. Youssef:
Integral Distinguishers for Reduced-round Stribog. 648 - SeongHan Shin, Kazukuni Kobara:
Security Analysis of Password-Authenticated Key Retrieval. 649 - Elette Boyle, Kai-Min Chung, Rafael Pass:
On Extractability Obfuscation. 650 - Sanjit Chatterjee, Chethan Kamath:
A Closer Look at Multiple-Forking: Leveraging (In)dependence for a Tighter Bound. 651 - Wilke Trei:
Efficient Modular Arithmetic for SIMD Devices. 652 - Florian Böhl, Gareth T. Davies, Dennis Hofheinz:
RKA-KDM secure encryption from public-key encryption. 653 - Baodong Qin, Shengli Liu:
Leakage-Resilient Chosen-Ciphertext Secure Public-Key Encryption from Hash Proof System and One-Time Lossy Filter. 654 - Georg Neugebauer, Lucas Brutschy, Ulrike Meyer, Susanne Wetzel:
Privacy-Preserving Multi-Party Reconciliation Secure in the Malicious Model (Extended version). 655 - Robbert van den Berg, Boris Skoric, Vincent van der Leest:
Bias-based modeling and entropy analysis of PUFs. 656 - Sarah Meiklejohn, Hovav Shacham:
New Trapdoor Projection Maps for Composite-Order Bilinear Groups. 657 - Pawel Morawiecki, Josef Pieprzyk:
Parallel authenticated encryption with the duplex construction. 658 - (Withdrawn) A provable secure anonymous proxy signature scheme without random oracles. 659
- Mohammad Sadek:
Discrete Logarithms and Mordell-Weil Groups. 660 - Constantinos Patsakis:
Anonymous aggregation for lightweight multiparty computations. 661 - Alex Escala, Jens Groth:
Fine-Tuning Groth-Sahai Proofs. 662 - Javad Alizadeh, Nasour Bagheri, Praveen Gauravaram, Abhishek Kumar, Somitra Kumar Sanadhya:
Linear Cryptanalysis of Round Reduced SIMON. 663 - Michael Backes, Praveen Manoharan, Esfandiar Mohammadi:
TUC: Time-sensitive and Modular Analysis of Anonymous Communication. 664 - Shafi Goldwasser, Yael Tauman Kalai:
A Note on the Impossibility of Obfuscation with Auxiliary Input. 665 - Junghyun Nam, Kim-Kwang Raymond Choo, Juryon Paik, Dongho Won:
An Offline Dictionary Attack against a Three-Party Key Exchange Protocol. 666 - Tolga Acar, Lan Nguyen, Greg Zaverucha:
A TPM Diffie-Hellman Oracle. 667 - Boaz Barak, Nir Bitansky, Ran Canetti, Yael Tauman Kalai, Omer Paneth, Amit Sahai:
Obfuscation for Evasive Functions. 668 - Dan Boneh, Valeria Nikolaenko, Gil Segev:
Attribute-Based Encryption for Arithmetic Circuits. 669 - Charanjit S. Jutla, Arnab Roy:
Switching Lemma for Bilinear Tests and Constant-size NIZK Proofs for Linear Subspaces. 670 - Yuval Ishai, Eyal Kushilevitz, Xin Li, Rafail Ostrovsky, Manoj Prabhakaran, Amit Sahai, David Zuckerman:
Robust Pseudorandom Generators. 671 - Benjamin Smith:
Easy scalar decompositions for efficient scalar multiplication on elliptic curves and genus 2 Jacobians. 672 - Qi Cheng, Daqing Wan, Jincheng Zhuang:
Traps to the BGJT-Algorithm for Discrete Logarithms. 673 - Eli Biham, Yaniv Carmeli, Itai Dinur, Orr Dunkelman, Nathan Keller, Adi Shamir:
Cryptanalysis of Iterated Even-Mansour Schemes with Two Keys. 674 - Tomer Ashur, Orr Dunkelman:
A Practical Related-Key Boomerang Attack for the Full MMB Block Cipher. 675 - Siwei Sun, Lei Hu, Peng Wang:
Automatic Security Evaluation for Bit-oriented Block Ciphers in Related-key Model: Application to PRESENT-80, LBlock and Others. 676 - Ivan Damgård, Sebastian Faust, Pratyay Mukherjee, Daniele Venturi:
Bounded Tamper Resilience: How to go beyond the Algebraic Barrier. 677 - Peeter Laud, Jan Willemson:
Universally composable privacy preserving finite automata execution with low online and offline complexity. 678 - Karine Heydemann, Nicolas Moro, Emmanuelle Encrenaz, Bruno Robisson:
Formal verification of a software countermeasure against instruction skip attacks. 679 - Dana Dachman-Soled:
A Black-Box Construction of a CCA2 Encryption Scheme from a Plaintext Aware Encryption Scheme. 680 - Damien Vergnaud, David Xiao:
Public-Key Encryption with Weak Randomness: Security against Strong Chosen Distribution Attacks. 681 - Reza Hooshmand:
Secret Key Cryptosystem based on Non-Systematic Polar Codes. 682 - Venkata Koppula, Kim Ramchen, Brent Waters:
Separations in Circular Security for Arbitrary Length Key Cycles. 683 - Marcel Sebek:
Fully Bideniable Public-Key Encryption. 684 - Anja Becker, Nicolas Gama, Antoine Joux:
Solving shortest and closest vector problems: The decomposition approach. 685 - Shiwei Xu, Sergiu Bursuc, Julian P. Murphy:
New abstractions in applied pi-calculus and automated verification of protected executions. 686 - Craig Gentry, Sergey Gorbunov, Shai Halevi, Vinod Vaikuntanathan, Dhinakaran Vinayagamurthy:
How to Compress (Reusable) Garbled Circuits. 687 - Michael Scott:
Unbalancing Pairing-Based Key Exchange Protocols. 688 - Prabhanjan Ananth, Dan Boneh, Sanjam Garg, Amit Sahai, Mark Zhandry:
Differing-Inputs Obfuscation and Applications. 689 - Antonio Marcedone, Claudio Orlandi:
Obfuscation ==> (IND-CPA Security =/=> Circular Security). 690 - Benoît Libert, Thomas Peters, Marc Joye, Moti Yung:
Non-Malleability from Malleability: Simulation-Sound Quasi-Adaptive NIZK Proofs and CCA2-Secure Encryption from Homomorphic Signatures. 691 - Craig Costello, Hüseyin Hisil, Benjamin Smith:
Faster Compact Diffie-Hellman: Endomorphisms on the x-line. 692 - Ran Canetti, Vladimir Kolesnikov, Charles Rackoff, Yevgeniy Vahlis:
Secure Key Exchange and Sessions Without Credentials. 693 - Lichun Li, Anwitaman Datta:
Write-Only Oblivious RAM based Privacy-Preserved Access of Outsourced Data. 694 - Hongjun Wu, Bart Preneel:
AEGIS: A Fast Authenticated Encryption Algorithm. 695 - Ziya Alper Genç, Süleyman Kardas, Mehmet Sabir Kiraz:
Examination of a New Defense Mechanism: Honeywords. 696 - Begül Bilgin, Benedikt Gierlichs, Svetla Nikova, Ventzislav Nikov, Vincent Rijmen:
A More Efficient AES Threshold Implementation. 697 - Xi Jun Lin, Lin Sun:
Cryptanalysis and improvement of a dynamic and secure key management model for hierarchical heterogeneous sensor networks. 698 - Benny Applebaum:
Bootstrapping Obfuscators via Fast Pseudorandom Functions. 699 - Jean-Sébastien Coron:
Higher Order Masking of Look-up Tables. 700 - Nir Bitansky, Ran Canetti, Omer Paneth, Alon Rosen:
More on the Impossibility of Virtual-Black-Box Obfuscation with Auxiliary Input. 701 - Sebastian Faust, Pratyay Mukherjee, Daniele Venturi, Daniel Wichs:
Efficient Non-Malleable Codes and Key-Derivation for Poly-Size Tampering Circuits. 702 - Elette Boyle, Rafael Pass:
Limits of Extractability Assumptions with Distributional Auxiliary Input. 703 - Mihir Bellare, Viet Tung Hoang:
Adaptive Witness Encryption and Asymmetric Password-based Cryptography. 704 - Clemens Heuberger, Michela Mazzoli:
Symmetric Digit Sets for Elliptic Curve Scalar Multiplication without Precomputation. 705 - François Durvaux, François-Xavier Standaert, Nicolas Veyrat-Charvillon:
How to Certify the Leakage of a Chip? 706 - Matan Banin, Boaz Tsaban:
A reduction of semigroup DLP to classic DLP. 707 - Yevgeniy Dodis, Krzysztof Pietrzak, Daniel Wichs:
Key Derivation Without Entropy Waste. 708 - Mohammad Sadeq Dousti, Rasool Jalili:
Efficient Statistical Zero-Knowledge Authentication Protocols for Smart Cards Secure Against Active & Concurrent Quantum Attacks. 709 - Jung Hee Cheon, Jinsu Kim:
An Approach to Reduce Storage for Homomorphic Computations. 710 - Dennis Y. W. Liu, Duncan S. Wong, Qiong Huang:
Ambiguous One-Move Nominative Signature Without Random Oracles. 711 - Daisuke Moriyama, Shin'ichiro Matsuo, Moti Yung:
PUF-Based RFID Authentication Secure and Private under Complete Memory Leakage. 712 - Jian Guo, Ivica Nikolic, Thomas Peyrin, Lei Wang:
Cryptanalysis of Zorro. 713 - Sanchita Barman, Bimal Roy:
Method to secure data in the cloud while preserving summary statistics. 714 - Erik-Oliver Blass, Travis Mayberry, Guevara Noubir:
Practical Privacy-Preserving Range and Sort Queries with Update-Oblivious Linked Lists. 715 - Xiao Feng, Zheng Yuan:
A Secure Obfuscator for Encrypted Blind Signature Functionality. 716 - Shivam Bhasin, Jean-Luc Danger, Sylvain Guilley, Zakaria Najm:
NICV: Normalized Inter-Class Variance for Detection of Side-Channel Leakage. 717 - Xinyu Lei, Xiaofeng Liao:
NTRU-KE: A Lattice-based Public Key Exchange Protocol. 718 - Sandro Coretti, Ueli Maurer, Björn Tackmann:
Constructing Confidential Channels from Authenticated Channels - Public-Key Encryption Revisited. 719 - Stanislaw Jarecki, Charanjit S. Jutla, Hugo Krawczyk, Marcel-Catalin Rosu, Michael Steiner:
Outsourced Symmetric Private Information Retrieval. 720 - Bo Yang, Zhao Yang, Zibi Xiao, Shougui Li:
Deep Attacks of a Certificateless Signature Scheme. 721 - Diego F. Aranha, Paulo S. L. M. Barreto, Patrick Longa, Jefferson E. Ricardini:
The Realm of the Pairings. 722 - Divesh Aggarwal, Yevgeniy Dodis, Zahra Jafargholi, Eric Miles, Leonid Reyzin:
Amplifying Privacy in Privacy Amplification. 723 - Ran Canetti, Omer Paneth, Dimitrios Papadopoulos, Nikos Triandopoulos:
Verifiable Set Operations over Outsourced Databases. 724 - (Withdrawn) Mobile Transaction over NFC and GSM. 725
- Chihong Joo, Aaram Yun:
Homomorphic Authenticated Encryption Secure Against Chosen-Ciphertext Attack. 726 - Shafi Goldwasser, Vipul Goyal, Abhishek Jain, Amit Sahai:
Multi-Input Functional Encryption. 727 - Robert Wicik, Tomasz Rachwalik:
Modified Alternating Step Generators. 728 - Vipul Goyal, Abhishek Jain, Venkata Koppula, Amit Sahai:
Functional Encryption for Randomized Functionalities. 729 - Lukasz Krzywiecki, Przemyslaw Kubiak, Miroslaw Kutylowski:
Stamp \& Extend - Instant but Undeniable Timestamping based on Lazy Trees. 730 - Yongqiang Li, Mingsheng Wang, Yuyin Yu:
Constructing Differentially 4-uniform Permutations over GF(22k) from the Inverse Function Revisited. 731 - Hyun-A. Park:
SSS-V2: Secure Similarity Search. 732 - (Withdrawn) A Key Compromise Impersonation attack against Wang's Provably Secure Identity-based Key Agreement Protocol. 733
- Joppe W. Bos, J. Alex Halderman, Nadia Heninger, Jonathan Moore, Michael Naehrig, Eric Wustrow:
Elliptic Curve Cryptography in Practice. 734 - Michael Tunstall, Carolyn Whitnall, Elisabeth Oswald:
Masking Tables - An Underestimated Security Risk. 735 - Jean-Marie Chauvet:
TRS-80 With A Keccak Sponge Cake. 736 - Gora Adj, Alfred Menezes, Thomaz Oliveira, Francisco Rodríguez-Henríquez:
Weakness of F36*1429 and F24*3041 for Discrete Logarithm Cryptography. 737 - Chris Litsas, Aris Pagourtzis, Giorgos Panagiotakos, Dimitris Sakavalas:
On the Resilience and Uniqueness of CPA for Secure Broadcast. 738 - (Withdrawn) New Digital Signature Scheme Using Multiple Private Keys over Non-Commutative Division Semirings. 739
- Gérald Gavin:
An efficient FHE proposal based on the hardness of solving systems of nonlinear multivariate equations (II). 740 - Manuel Bluhm, Shay Gueron:
Fast Software Implementation of Binary Elliptic Curve Cryptography. 741 - Jürgen Müller:
CODING - Stream Cipher Methods by Varying Components during Ciphering Data. 742 - (Withdrawn) Privacy Preserving Unique Statistics in a Smart Grid. 743
- Shashank Agrawal, Shweta Agrawal, Saikrishna Badrinarayanan, Abishek Kumarasubramanian, Manoj Prabhakaran, Amit Sahai:
Function Private Functional Encryption and Property Preserving Encryption : New Definitions and Positive Results. 744 - Michael Backes, Fabian Bendun, Ashish Choudhury, Aniket Kate:
Asynchronous MPC with t<n/2 Using Non-equivocation. 745 - Vadim Lyubashevsky, Daniele Micciancio:
Asymptotically Effi cient Lattice-Based Digital Signatures. 746 - Jayaprakash Kar:
Authenticated Multiple Key Establishment Protocol for Wireless Sensor Networks. 747 - Kenneth G. Paterson, Bertram Poettering, Jacob C. N. Schuldt:
Plaintext Recovery Attacks Against WPA/TKIP. 748 - Xi Jun Lin, Lin Sun:
Efficient CCA-secure Threshold Public-Key Encryption Scheme. 749 - Xi Jun Lin, Lin Sun:
Fully Deniable Mutual Authentication Protocol Based on RSA Signature. 750 - Hervé Chabanne, Jean-Michel Cioranesco, Vincent Despiegel, Jean-Christophe Fondeur, David Naccache:
Using Hamiltonian Totems as Passwords. 751 - Angelo De Caro, Vincenzo Iovino:
On the Power of Rewinding Simulators in Functional Encryption. 752 - Lejla Batina, Amitabh Das, Baris Ege, Elif Bilge Kavun, Nele Mentens, Christof Paar, Ingrid Verbauwhede, Tolga Yalçin:
Dietary Recommendations for Lightweight Block Ciphers: Power, Energy and Area Analysis of Recently Developed Architectures. 753 - Omkant Pandey, Manoj Prabhakaran, Amit Sahai:
Obfuscation-based Non-black-box Simulation and Four Message Concurrent Zero Knowledge for NP. 754 - (Withdrawn) Improving security and efficiency for multi-authority access control system in cloud storage. 755
- Yonglin Hao, Dongxia Bai:
A Meet-in-the-middle Attack on Round-Reduced mCrypton. 756 - Jeffrey Hoffstein, Jill Pipher, John M. Schanck, Joseph H. Silverman, William Whyte:
Practical Signatures from the Partial Fourier Recovery Problem. 757 - Martin Goll, Shay Gueron:
Vectorization of ChaCha Stream Cipher. 759 - Johannes Mykkeltveit, Janusz Szmidt:
On cross joining de Bruijn sequences. 760 - Pierre-Alain Fouque, Antoine Joux, Chrysanthi Mavromati:
Multi-user collisions: Applications to Discrete Logs, Even-Mansour and Prince. 761 - Kwangsu Lee, Seung Geol Choi, Dong Hoon Lee, Jong Hwan Park, Moti Yung:
Self-Updatable Encryption: Time Constrained Access Control with Hidden Attributes and Better Efficiency. 762 - Yutaka Kawai, Katsuyuki Takashima:
Predicate- and Attribute-Hiding Inner Product Encryption in a Public Key Setting. 763 - Jean-Luc Danger, Sylvain Guilley, Philippe Hoogvorst, Cédric Murdica, David Naccache:
Dynamic Countermeasure Against the Zero Power Analysis. 764 - Kaoru Kurosawa, Le Trieu Phong:
Kurosawa-Desmedt Key Encapsulation Mechanism, Revisited. 765 - Philippe Gaborit, Olivier Ruatta, Julien Schrek, Gilles Zémor:
RankSign : an efficient signature algorithm based on the rank metric. 766 - Nilanjan Datta, Mridul Nandi:
Misuse Resistant Parallel Authenticated Encryptions. 767 - Bartosz Zoltak:
VMPC-R Cryptographically Secure Pseudo-Random Number Generator Alternative to RC4. 768 - Martin Hirt, Ueli Maurer, Pavel Raykov:
Broadcast Amplification. 769 - Omar Choudary, Markus G. Kuhn:
Efficient Template Attacks. 770 - Wuqiang Shen, Shaohua Tang:
TOT, a Fast Multivariate Public Key Cryptosystem with Basic Secure Trapdoor. 771 - Markku-Juhani O. Saarinen:
Beyond Modes: Building a Secure Record Protocol from a Cryptographic Sponge Permutation. 772 - Markku-Juhani O. Saarinen:
CBEAM: Efficient Authenticated Encryption from Feebly One-Way φ Functions. 773 - S. Dov Gordon, Jonathan Katz, Feng-Hao Liu, Elaine Shi, Hong-Sheng Zhou:
Multi-Input Functional Encryption. 774 - Yanfeng Wang, Wenling Wu, Zhiyuan Guo, Xiaoli Yu:
Differential Cryptanalysis and Linear Distinguisher of Full-Round Zorro. 775 - Aikaterini Mitrokotsa, Cristina Onete, Serge Vaudenay:
Location Leakage in Distance Bounding: Why Location Privacy does not Work. 776 - Yuenai Chen, Chunming Tang:
Construction of Multiplicative Monotone Span Program. 777 - Philipp Jovanovic, Martin Kreuzer, Ilia Polian:
Multi-Stage Fault Attacks on Block Ciphers. 778 - Mike Burmester, Jorge Munilla:
Distributed Group Authentication for RFID Supply Management. 779 - Nasser Ramazani Darmian:
A Distinguish attack on Rabbit Stream Cipher Based on Multiple Cube Tester. 780 - Rafael Pass, Sidharth Telang, Karn Seth:
Obfuscation from Semantically-Secure Multi-linear Encodings. 781 - Dorit Ron, Adi Shamir:
How Did Dread Pirate Roberts Acquire and Protect His Bitcoin Wealth? 782 - Yalin Chen, Jue-Sam Chou:
ECC-Based Non-Interactive Deniable Authentication with Designated Verifier. 783 - Marcin Andrychowicz, Stefan Dziembowski, Daniel Malinowski, Lukasz Mazurek:
Secure Multiparty Computations on BitCoin. 784 - Fei Tang, Hongda Li, Qihua Niu, Bei Liang:
Efficient Leakage-Resilient Signature Schemes in the Generic Bilinear Group Model. 785 - Sanjay Bhattacherjee, Palash Sarkar:
Tree Based Symmetric Key Broadcast Encryption. 786 - Raghuvir Songhela, Manik Lal Das:
Wide-weak Privacy Preserving RFID Mutual Authentication Protocol. 787 - Zhengjun Cao, Lihua Liu:
Improvement of Lin-Tzeng Solution to Yao's Millionaires Problem and Its Cheating Advantage Analysis. 788 - Shuai Han, Shengli Liu, Kefei Chen, Dawu Gu:
Proofs of Data Possession and Retrievability Based on MRD Codes. 789 - Elena Andreeva, Andrey Bogdanov, Atul Luykx, Bart Mennink, Elmar Tischhauser, Kan Yasuda:
Parallelizable and Authenticated Online Ciphers. 790 - Elena Andreeva, Begül Bilgin, Andrey Bogdanov, Atul Luykx, Bart Mennink, Nicky Mouha, Kan Yasuda:
APE: Authenticated Permutation-Based Encryption for Lightweight Cryptography. 791 - Kazuhiko Minematsu, Stefan Lucks, Tetsu Iwata:
Improved Authenticity Bound of EAX, and Refinements. 792 - Long Zhang, Qiuling Yue:
A fast integer-based batch full-homomorphic encryption scheme over finite field. 793 - Victor Lomné, Emmanuel Prouff, Thomas Roche:
Behind the Scene of Side Channel Attacks. 794 - Xi Jun Lin, Lin Sun:
Insecurity of An Anonymous Authentication For Privacy-preserving IoT Target-driven Applications. 795 - Stefan Dziembowski, Sebastian Faust, Vladimir Kolmogorov, Krzysztof Pietrzak:
Proofs of Space. 796 - Aggelos Kiayias, Yiannis Tselekounis:
Tamper Resilient Circuits: The Adversary at the Gates. 797 - (Withdrawn) A Generic Chosen-Ciphertext Key-Leakage Secure Public Key Encryption Scheme from Hash Proof System. 798
- Gilles Macario-Rat, Jérôme Plût, Henri Gilbert:
New Insight into the Isomorphism of Polynomials problem IP1S and its Use in Cryptography. 799 - Frank-M. Quedenfeld, Christopher Wolf:
Algebraic Properties of the Cube Attack. 800 - Dario Catalano, Antonio Marcedone, Orazio Puglisi:
Linearly Homomorphic Structure Preserving Signatures: New Methodologies and Applications. 801 - Guangjun Fan, Yongbin Zhou, Chengyu Hu, Dengguo Feng:
Cryptosystems Resilient to Both Continual Key Leakages and Leakages from Hash Function. 802 - Jie Chen, Hoeteck Wee:
Fully, (Almost) Tightly Secure IBE from Standard Assumptions. 803 - Mohammad Saiful Islam Mamun, Atsuko Miyaji:
Group Signature with relaxed-privacy and revocability for VANET. 804 - Giuseppe Ateniese, Ilario Bonacina, Antonio Faonio, Nicola Galesi:
Proofs of Space: When Space is of the Essence. 805 - Somindu C. Ramanna, Palash Sarkar:
(Anonymous) Compact HIBE From Standard Assumptions. 806 - Yitao Duan:
Distributed Key Generation for Secure Encrypted Deduplication. 807 - Michael Backes, Aniket Kate, Sebastian Meiser, Tim Ruffing:
Differential Indistinguishability for Cryptographic Primitives with Imperfect Randomness. 808 - Sarah Ibrahimi, Boris Skoric, Jan-Jaap Oosterwijk:
Riding the Saddle Point: asymptotics of the capacity-achieving simple decoder for bias-based traitor tracing. 809 - Pablo Rauzy, Sylvain Guilley:
Formal Analysis of CRT-RSA Vigilant's Countermeasure Against the BellCoRe Attack. 810 - Susumu Kiyoshima, Yoshifumi Manabe, Tatsuaki Okamoto:
Constant-Round Black-Box Construction of Composable Multi-Party Computation Protocol. 811 - Zhengjun Cao, Lihua Liu:
A Note on Bilinear Groups of a Large Composite Order. 812 - Benjamin Dowling, Florian Giesen, Florian Kohlar, Jörg Schwenk, Douglas Stebila:
Multi-ciphersuite security and the SSH protocol. 813 - Lil María Rodríguez-Henríquez, Debrup Chakraborty:
RDAS: A Symmetric Key Scheme for Authenticated Query Processing in Outsourced Databases. 814 - Eric Miles:
Iterated group products and leakage resilience against NC1. 815 - Shay Gueron, Vlad Krasnov:
Fast Prime Field Elliptic Curve Cryptography with 256 Bit Primes. 816 - Yevgeniy Dodis, Dario Fiore:
Interactive Encryption, Message Authentication, and Anonymous Key Exchange. 817 - Roberto De Prisco, Alfredo De Santis:
On the Relation of Random Grid, Probabilistic and Deterministic Visual Cryptography. 818 - Sergiu Bursuc, Julian P. Murphy:
Safe enclosures: towards cryptographic techniques for server protection. 819 - (Withdrawn) On the Security of Recently Proposed RFID Protocols. 820
- (Withdrawn) Errorless Smooth Projective Hash Function based on LWE. 821
- Alexandra Berkoff, Feng-Hao Liu:
Leakage Resilient Fully Homomorphic Encryption. 822 - Debrup Chakraborty, Vicente Hernandez-Jimenez, Palash Sarkar:
Another Look at XCB. 823 - Gilad Asharov, Yehuda Lindell, Hila Zarosim:
Fair and Efficient Secure Multiparty Computation with Reputation Systems. 824 - (Withdrawn) EPCGen2 Pseudorandom Number Generators: Analysis of J3Gen. 825
- Dan Bogdanov, Liina Kamm, Sven Laur, Pille Pruulmann-Vengerfeldt:
Secure multi-party data analysis: end user validation and practical experiments. 826 - Shashank Agrawal, Prabhanjan Ananth, Vipul Goyal, Manoj Prabhakaran, Alon Rosen:
Lower Bounds in the Hardware Token Model. 827 - Ali El Kaafarani, Essam Ghadafi, Dalia Khader:
Decentralized Traceable Attribute-Based Signatures. 828 - Arthur Gervais, Ghassan Karame, Srdjan Capkun, Vedran Capkun:
Is Bitcoin a Decentralized Currency? 829 - Sanjit Chatterjee, M. Prem Laxman Das:
Property Preserving Symmetric Encryption: Revisited. 830 - Vikram Singh:
Provable Security Proofs and their Interpretation in the Real World. 831 - Emil Stefanov, Charalampos Papamanthou, Elaine Shi:
Practical Dynamic Searchable Encryption with Small Leakage. 832 - Fabrice Benhamouda, David Pointcheval:
Verifier-Based Password-Authenticated Key Exchange: New Models and Constructions. 833 - Ahto Buldas, Andres Kroonmaa, Risto Laanoja:
Keyless Signatures' Infrastructure: How to Build Global Distributed Hash-Trees. 834 - Thomas Shrimpton, R. Seth Terashima:
A Modular Framework for Building Variable-Input Length Tweakable Ciphers. 835 - Hao Wang, Lei Wu, Zhihua Zheng, Yilei Wang:
Identity-Based Key-Encapsulation Mechanism from Multilinear Maps. 836 - Marcin Andrychowicz, Stefan Dziembowski, Daniel Malinowski, Lukasz Mazurek:
Fair Two-Party Computations via the BitCoin Deposits. 837 - Shi Bai, Steven D. Galbraith:
An improved compression technique for signatures based on learning with errors. 838 - Shi Bai, Steven D. Galbraith:
Lattice Decoding Attacks on Binary LWE. 839 - Seung Geol Choi, Jonathan Katz, Dominique Schröder, Arkady Yerukhimovich, Hong-Sheng Zhou:
(Efficient) Universally Composable Oblivious Transfer Using a Minimal Number of Stateless Tokens. 840 - Johannes Braun, Florian Volk, Johannes Buchmann, Max Mühlhäuser:
Trust Views for the Web PKI. 841 - Amir Moradi, Sylvain Guilley, Annelie Heuser:
Detecting Hidden Leakages. 842 - Jian Ye, Chenglian Liu:
A Study of Goldbach's conjecture and Polignac's conjecture equivalence issues. 843 - Dennis Hofheinz, Christoph Striecks:
A generic view on trace-and-revoke broadcast encryption schemes. 844 - Aggelos Kiayias, Qiang Tang:
How to Keep a Secret: Leakage Deterring Public-key Cryptography. 845 - (Withdrawn) A new attack on RSA with a composed decryption exponent. 846
- (Withdrawn) Ultralightweight cryptography for passive RFID system. 847
- Xi Jun Lin, Lin Sun:
Weakness of Several Identity-based Tripartite Authenticated Key Agreement Protocols. 848 - Suvadeep Hajra, Debdeep Mukhopadhyay:
Pushing the Limit of Non-Profiling DPA using Multivariate Leakage Model. 849 - Liina Kamm, Jan Willemson:
Secure Floating-Point Arithmetic and Private Satellite Collision Analysis. 850 - Ulrich Rührmair, Xiaolin Xu, Jan Sölter, Ahmed Mahmoud, Farinaz Koushanfar, Wayne P. Burleson:
Power and Timing Side Channels for PUFs and their Efficient Exploitation. 851 - Dongxia Bai, Hongbo Yu, Gaoli Wang, Xiaoyun Wang:
Improved Boomerang Attacks on Round-Reduced SM3 and BLAKE-256. 852 - Alex Biryukov, Vesselin Velichkov:
Automatic Search for Differential Trails in ARX Ciphers (Extended Version). 853 - Pratik Sarkar:
Multiple-Use Transferable E-Cash. 854 - Mete Akgün, M. Ufuk Çaglayan:
Weaknesses in a Recently Proposed RFID Authentication Protocol. 855 - Michel Abdalla, Pierre-Alain Fouque, Vadim Lyubashevsky, Mehdi Tibouchi:
Tightly-Secure Signatures From Lossy Identification Schemes. 856 - Daniel Genkin, Adi Shamir, Eran Tromer:
RSA Key Extraction via Low-Bandwidth Acoustic Cryptanalysis. 857 - Sherman S. M. Chow, Matthew K. Franklin, Haibin Zhang:
Practical Dual-Receiver Encryption - Soundness, Complete Non-Malleability, and Applications. 858 - Yanis Linge, Cécile Dumas, Sophie Lambert-Lacroix:
Using the Joint Distributions of a Cryptographic Function in Side Channel Analysis. 859 - Sanjam Garg, Craig Gentry, Shai Halevi, Daniel Wichs:
On the Implausibility of Differing-Inputs Obfuscation and Extractable Witness Encryption with Auxiliary Input. 860 - Muhammad Rizwan Asghar:
Privacy Preserving Enforcement of Sensitive Policies in Outsourced and Distributed Environments. 861 - Yael Tauman Kalai, Ran Raz, Ron Rothblum:
How to Delegate Computations: The Power of No-Signaling Proofs. 862 - Stephan Neumann, Melanie Volkamer:
Formal Treatment of Distributed Trust in Electronic Voting. 863 - Adam D. Smith, Ye Zhang:
Near-linear time, Leakage-resilient Key Evolution Schemes from Expander Graphs. 864 - Suvadeep Hajra, Debdeep Mukhopadhyay:
SNR to Success Rate: Reaching the Limit of Non-Profiling DPA. 865 - Sujoy Sinha Roy, Frederik Vercauteren, Nele Mentens, Donald Donglong Chen, Ingrid Verbauwhede:
Compact Hardware Implementation of Ring-LWE Cryptosystems. 866 - Wenling Wu, Shuang Wu, Lei Zhang, Jian Zou, Le Dong:
LHash: A Lightweight Hash Function (Full Version). 867 - Lear Bahack:
Theoretical Bitcoin Attacks with less than Half of the Computational Power (draft). 868 - Dimitar Jetchev, Krzysztof Pietrzak:
How to Fake Auxiliary Input. 869 - Chunming Tang, Yanfeng Qi:
A new class of hyper-bent functions and Kloosterman sums. 870 - Weiqiang Wen, Libin Wang, Jiaxin Pan:
A Unified Security Model of Authenticated Key Exchange with Specific Adversarial Capabilities. 871 - (Withdrawn) PRE+: Dual of Proxy Re-encryption and Its Application. 872
- Mihir Bellare, Stefano Tessaro:
Poly-Many Hardcore Bits for Any One-Way Function. 873 - Akinori Kawachi, Yoshio Okamoto, Keisuke Tanaka, Kenji Yasunaga:
General Constructions of Rational Secret Sharing with Expected Constant-Round Reconstruction. 874 - Michael Clear, Ciaran McGoldrick:
Policy-Based Non-interactive Outsourcing of Computation using multikey FHE and CP-ABE. 875 - Kenji Yasunaga:
Public-Key Encryption with Lazy Parties. 876 - Shaohua Tang, Jiahui Chen, Lingling Xu, Xiaoyu Li:
MQ Signature and Proxy Signature Schemes with Exact Security Based on UOV Signature. 877 - Shaohua Tang, Bo Lv, Guomin Chen, Zhiniang Peng:
Efficient Hardware Implementation of MQ Asymmetric Cipher PMI+ on FPGAs. 878 - Eli Ben-Sasson, Alessandro Chiesa, Eran Tromer, Madars Virza:
Succinct Non-Interactive Arguments for a von Neumann Architecture. 879 - Seunghwan Park, Kwangsu Lee, Dong Hoon Lee:
New Constructions of Revocable Identity-Based Encryption from Multilinear Maps. 880 - Yonatan Sompolinsky, Aviv Zohar:
Accelerating Bitcoin's Transaction Processing. Fast Money Grows on Trees, Not Chains. 881 - Zhe Liu, Johann Großschädl:
New Speed Records for Montgomery Modular Multiplication on 8-bit AVR Microcontrollers. 882
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.