year |
venue |
title |
pages |
2015 | asiacrypt | A Framework for Identity-Based Encryption with Almost Tight Security | online |
2015 | asiacrypt | Type 2 Structure-Preserving Signature Schemes Revisited | online |
2015 | asiacrypt | Refinements of the k-tree Algorithm for the Generalized Birthday Problem | online |
2015 | asiacrypt | QA-NIZK Arguments in Asymmetric Groups: New Tools and New Constructions | online |
2015 | asiacrypt | New Circular Security Counterexamples from Decision Linear and Learning with Errors | online |
2015 | asiacrypt | Security of Full-State Keyed Sponge and Duplex: Applications to Authenticated Encryption | online |
2015 | asiacrypt | Reverse-Engineering of the Cryptanalytic Attack Used in the Flame Super-Malware | online |
2015 | asiacrypt | Multi-party Key Exchange for Unbounded Parties from Indistinguishability Obfuscation | online |
2015 | asiacrypt | Multilinear and Aggregate Pseudorandom Functions: New Constructions and Improved Security | online |
2015 | asiacrypt | Implementing Candidate Graded Encoding Schemes from Ideal Lattices | online |
2015 | asiacrypt | Advances in Cryptology - ASIACRYPT 2015 - 21st International Conference on the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, November 29 - December 3, 2015, Proceedings, Part I | |
2015 | asiacrypt | A Synthetic Indifferentiability Analysis of Interleaved Double-Key Even-Mansour Ciphers | online |
2015 | asiacrypt | New Realizations of Somewhere Statistically Binding Hashing and Positional Accumulators | online |
2015 | asiacrypt | Optimally Secure Block Ciphers from Ideal Primitives | online |
2015 | asiacrypt | Selective Opening Security for Receivers | online |
2015 | asiacrypt | On Cut-and-Choose Oblivious Transfer and Its Variants | online |
2015 | asiacrypt | Secure Computation from Millionaire | online |
2015 | asiacrypt | Conversions Among Several Classes of Predicate Encryption and Applications to ABE with Various Compactness Tradeoffs | online |
2015 | asiacrypt | An Inverse-Free Single-Keyed Tweakable Enciphering Scheme | online |
2015 | asiacrypt | Public Verifiability in the Covert Model (Almost) for Free | online |
2015 | asiacrypt | On the Optimality of Non-Linear Computations of Length-Preserving Encryption Schemes | online |
2015 | asiacrypt | A Unified Approach to MPC with Preprocessing Using OT | online |
2015 | asiacrypt | Idealizing Identity-Based Encryption | online |
2015 | asiacrypt | Oblivious Network RAM and Leveraging Parallelism to Achieve Obliviousness | online |
2015 | asiacrypt | Property Preserving Symmetric Encryption Revisited | online |
2015 | asiacrypt | The Moral Character of Cryptographic Work | online |
2015 | asiacrypt | Structure-Preserving Cryptography | online |
2015 | asiacrypt | Computer-aided cryptography: status and perspectives | online |
2015 | asiacrypt | Fourℚ: Four-Dimensional Decompositions on a ℚ-curve over the Mersenne Prime | 214-235 |
2015 | asiacrypt | Solving Linear Equations Modulo Unknown Divisors: Revisited | online |
2015 | asiacrypt | A Unified Metric for Quantifying Information Leakage of Cryptographic Devices Under Power Analysis Attacks | online |
2015 | asiacrypt | Analysis of SHA-512/224 and SHA-512/256 | online |
2015 | asiacrypt | Generic Security of NMAC and HMAC with Input Whitening | online |
2015 | asiacrypt | Compactly Hiding Linear Spans - Tightly Secure Constant-Size Simulation-Sound QA-NIZK Proofs and Applications | online |
2015 | asiacrypt | Limits of Extractability Assumptions with Distributional Auxiliary Input | online |
2015 | asiacrypt | Midori: A Block Cipher for Low Energy | online |
2015 | asiacrypt | Improved Security Proofs in Lattice-Based Cryptography: Using the Rényi Divergence Rather Than the Statistical Distance | online |
2015 | asiacrypt | Dual-System Simulation-Soundness with Applications to UC-PAKE and More | online |
2015 | asiacrypt | A Provably Secure Group Signature Scheme from Code-Based Assumptions | online |
2015 | asiacrypt | Secret Sharing and Statistical Zero Knowledge | online |
2015 | asiacrypt | Efficient Fully Structure-Preserving Signatures for Large Messages | online |
2015 | asiacrypt | An Asymptotically Optimal Method for Converting Bit Encryption to Multi-Bit Encryption | online |
2015 | asiacrypt | Computing Individual Discrete Logarithms Faster in GF(p n ) with the NFS-DL Algorithm | online |
2015 | asiacrypt | Card-Based Cryptographic Protocols Using a Minimal Number of Cards | online |
2015 | asiacrypt | Beyond-Birthday-Bound Security for Tweakable Even-Mansour Ciphers with Linear Tweak and Key Mixing | online |
2015 | asiacrypt | On the Impact of Known-Key Attacks on Hash Functions | online |
2015 | asiacrypt | Pure Differential Privacy for Rectangle Queries via Private Partitions | online |
2015 | asiacrypt | Another Tradeoff Attack on Sprout-Like Stream Ciphers | online |
2015 | asiacrypt | Key-Recovery Attacks on ASASA | online |
2015 | asiacrypt | How to Sequentialize Independent Parallel Attacks? - Biased Distributions Have a Phase Transition | online |
2015 | asiacrypt | Optimized Interpolation Attacks on LowMC | online |
2015 | asiacrypt | Function-Hiding Inner Product Encryption | online |
2015 | asiacrypt | The Tower Number Field Sieve | online |
2015 | asiacrypt | Garbling Scheme for Formulas with Constant Size of Garbled Gates | online |
2015 | asiacrypt | Design Principles for HFEv- Based Multivariate Signature Schemes | online |
2015 | asiacrypt | Composable and Modular Anonymous Credentials: Definitions and Practical Constructions | online |
2015 | asiacrypt | Tradeoff Cryptanalysis of Memory-Hard Functions | online |
2015 | asiacrypt | ASCA, SASCA and DPA with Enumeration: Which One Beats the Other and When? | online |
2015 | asiacrypt | Riding on Asymmetry: Efficient ABE for Branching Programs | online |
2015 | asiacrypt | On Black-Box Complexity of Universally Composable Security in the CRS Model | online |
2015 | asiacrypt | Three-Party ORAM for Secure Computation | online |
2015 | asiacrypt | Adaptively Secure Puncturable Pseudorandom Functions in the Standard Model | online |
2015 | asiacrypt | Counting Keys in Parallel After a Side Channel Attack | online |
2015 | asiacrypt | Advances in Cryptology - ASIACRYPT 2015 - 21st International Conference on the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, November 29 - December 3, 2015, Proceedings, Part II | |
2015 | asiacrypt | Collision Attacks Against CAESAR Candidates - Forgery and Key-Recovery Against AEZ and Marble | online |
2015 | asiacrypt | Multiple Discrete Logarithm Problems with Auxiliary Inputs | online |
2015 | asiacrypt | Multi-input Functional Encryption for Unbounded Arity Functions | online |
2015 | asiacrypt | How Secure is AES Under Leakage | online |
2015 | asiacrypt | Heuristic Tool for Linear Cryptanalysis with Applications to CAESAR Candidates | online |
2015 | ches | Less is More - Dimensionality Reduction from a Theoretical Perspective | online |
2015 | ches | Accelerating Homomorphic Evaluation on Reconfigurable Hardware | online |
2015 | ches | Evaluation and Improvement of Generic-Emulating DPA Attacks | online |
2015 | ches | Modular Hardware Architecture for Somewhat Homomorphic Function Evaluation | online |
2015 | ches | A Masked Ring-LWE Implementation | online |
2015 | ches | Exclusive Exponent Blinding May Not Suffice to Prevent Timing Attacks on RSA | online |
2015 | ches | Blind Source Separation from Single Measurements Using Singular Spectrum Analysis | online |
2015 | ches | Stealing Keys from PCs Using a Radio: Cheap Electromagnetic Attacks on Windowed Exponentiation | online |
2015 | ches | Robust Profiling for DPA-Style Attacks | online |
2015 | ches | SoC It to EM: ElectroMagnetic Side-Channel Attacks on a Complex System-on-Chip | online |
2015 | ches | End-To-End Design of a PUF-Based Privacy Preserving Authentication Protocol | online |
2015 | ches | Transient-Steady Effect Attack on Block Ciphers | online |
2015 | ches | DPA, Bitslicing and Masking at 1 GHz | online |
2015 | ches | Lightweight Coprocessor for Koblitz Curves: 283-Bit ECC Including Scalar Conversion with only 4300 Gates | online |
2015 | ches | Accelerating LTV Based Homomorphic Encryption in Reconfigurable Hardware | online |
2015 | ches | Improved Cryptanalysis of the DECT Standard Cipher | online |
2015 | ches | The Gap Between Promise and Reality: On the Insecurity of XOR Arbiter PUFs | online |
2015 | ches | Highly Efficient GF(28) Inversion Circuit Based on Redundant GF Arithmetic and Its Application to AES Design | online |
2015 | ches | NaCl's Crypto_box in Hardware | 81-101 |
2015 | ches | Assessment of Hiding the Higher-Order Leakages in Hardware - What Are the Achievements Versus Overheads? | online |
2015 | ches | Predictive Models for Min-entropy Estimation | online |
2015 | ches | Improved Test Pattern Generation for Hardware Trojan Detection Using Genetic Algorithm and Boolean Satisfiability | online |
2015 | ches | Leakage Assessment Methodology - A Clear Roadmap for Side-Channel Evaluations | online |
2015 | ches | Multi-variate High-Order Attacks of Shuffled Tables Recomputation | online |
2015 | ches | Single Base Modular Multiplication for Efficient Hardware RNS Implementations of ECC | online |
2015 | ches | Improved Side-Channel Analysis of Finite-Field Multiplication | online |
2015 | ches | Finding the AES Bits in the Haystack: Reverse Engineering and SCA Using Voltage Contrast | online |
2015 | ches | Efficient Ring-LWE Encryption on 8-Bit AVR Processors | online |
2015 | ches | Who Watches the Watchmen?: Utilizing Performance Monitors for Compromising Keys of RSA on Intel Platforms | online |
2015 | ches | A Physical Approach for Stochastic Modeling of TERO-Based TRNG | online |
2015 | ches | Practical Key Recovery for Discrete-Logarithm Based Authentication Schemes from Random Nonce Bits | online |
2015 | ches | Secure Key Generation from Biased PUFs | online |
2015 | ches | Cryptographic Hardware and Embedded Systems - CHES 2015 - 17th International Workshop, Saint-Malo, France, September 13-16, 2015, Proceedings | |
2015 | ches | The Simeck Family of Lightweight Block Ciphers | online |
2015 | ches | TriviA: A Fast and Secure Authenticated Encryption Scheme | online |
2015 | ches | Secure protocols in a hostile world | |
2015 | crypto | The state of cryptographic multilinear maps | |
2015 | crypto | Cryptography, Security, and Public Safety: A Policy Perspective | |
2015 | crypto | Observations on the SIMON Block Cipher Family | online |
2015 | crypto | Statistical Concurrent Non-malleable Zero-Knowledge from One-Way Functions | online |
2015 | crypto | Bilinear Entropy Expansion from the Decisional Linear Assumption | online |
2015 | crypto | Quantum Homomorphic Encryption for Circuits of Low T-gate Complexity | online |
2015 | crypto | The Exact PRF Security of Truncation: Tight Bounds for Keyed Sponges and Truncated CBC | online |
2015 | crypto | A Simpler Variant of Universally Composable Security for Standard Multiparty Computation | online |
2015 | crypto | Data Is a Stream: Security of Stream-Based Channels | online |
2015 | crypto | New Multilinear Maps Over the Integers | online |
2015 | crypto | Actively Secure OT Extension with Optimal Overhead | online |
2015 | crypto | Practical Free-Start Collision Attacks on 76-step SHA-1 | online |
2015 | crypto | Last Fall Degree, HFE, and Weil Descent Attacks on ECDLP | online |
2015 | crypto | Consolidating Masking Schemes | online |
2015 | crypto | Links Among Impossible Differential, Integral and Zero Correlation Linear Cryptanalysis | online |
2015 | crypto | Short Group Signatures via Structure-Preserving Signatures: Standard Model Security from Simple Assumptions | online |
2015 | crypto | Constant-Round Concurrent Zero-Knowledge from Indistinguishability Obfuscation | online |
2015 | crypto | Zeroizing Without Low-Level Zeroes: New MMAP Attacks and their Limitations | online |
2015 | crypto | Efficient Constant Round Multi-party Computation Combining BMR and SPDZ | online |
2015 | crypto | Structure-Preserving Signatures from Standard Assumptions, Revisited | online |
2015 | crypto | The Iterated Random Permutation Problem with Applications to Cascade Encryption | online |
2015 | crypto | Distributions Attaining Secret Key at a Rate of the Conditional Mutual Information | online |
2015 | crypto | Implicit Zero-Knowledge Arguments and Applications to the Malicious Setting | online |
2015 | crypto | Cryptography with One-Way Communication | online |
2015 | crypto | Advances in Cryptology - CRYPTO 2015 - 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part II | |
2015 | crypto | Concurrent Secure Computation with Optimal Query Complexity | online |
2015 | crypto | Round-Optimal Black-Box Two-Party Computation | online |
2015 | crypto | Efficient Zero-Knowledge Proofs of Non-algebraic Statements with Sublinear Amortized Cost | online |
2015 | crypto | Privacy with Imperfect Randomness | online |
2015 | crypto | Multi-prover Commitments Against Non-signaling Attacks | online |
2015 | crypto | Cryptanalysis of Full Sprout | online |
2015 | crypto | Known-Key Distinguisher on Full PRESENT | online |
2015 | crypto | Bloom Filters in Adversarial Environments | online |
2015 | crypto | Communication Complexity of Conditional Disclosure of Secrets and Attribute-Based Encryption | online |
2015 | crypto | Sieving for Shortest Vectors in Lattices Using Angular Locality-Sensitive Hashing | online |
2015 | crypto | Online Authenticated-Encryption and its Nonce-Reuse Misuse-Resistance | online |
2015 | crypto | Proofs of Space | online |
2015 | crypto | Secure Computation with Minimal Interaction, Revisited | online |
2015 | crypto | An Improved BKW Algorithm for LWE with Applications to Cryptography and Lattices | online |
2015 | crypto | Explicit Non-malleable Codes Against Bit-Wise Tampering and Permutations | online |
2015 | crypto | Efficient Pseudorandom Functions via On-the-Fly Adaptation | online |
2015 | crypto | Programmable Hash Functions Go Private: Constructions and Applications to (Homomorphic) Signatures with Shorter Public Keys | online |
2015 | crypto | Efficient Multi-party Computation: From Passive to Active Security via Secure SIMD Circuits | online |
2015 | crypto | Decaf: Eliminating Cofactors Through Point Compression | online |
2015 | crypto | New Attacks on Feistel Structures with Improved Memory Complexities | online |
2015 | crypto | Fast Correlation Attacks over Extension Fields, Large-Unit Linear Approximation and Cryptanalysis of SNOW 2.0 | online |
2015 | crypto | On Reverse-Engineering S-Boxes with Hidden Design Criteria or Structure | online |
2015 | crypto | An Algebraic Framework for Pseudorandom Functions and Applications to Related-Key Security | online |
2015 | crypto | Constant-Round MPC with Fairness and Guarantee of Output Delivery | online |
2015 | crypto | Coded-BKW: Solving LWE Using Lattice Codes | online |
2015 | crypto | (Almost) Optimal Constructions of UOWHFs from 1-to-1, Regular One-Way Functions and Beyond | online |
2015 | crypto | Cryptanalysis of the Co-ACD Assumption | online |
2015 | crypto | Capacity and Data Complexity in Multidimensional Linear Attack | online |
2015 | crypto | Multi-key Security: The Even-Mansour Construction Revisited | online |
2015 | crypto | Multi-identity and Multi-key Leveled FHE from Learning with Errors | online |
2015 | crypto | Advances in Cryptology - CRYPTO 2015 - 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part I | |
2015 | crypto | A Punctured Programming Approach to Adaptively Secure Functional Encryption | online |
2015 | crypto | Algebraic Decomposition for Probing Security | online |
2015 | crypto | Integral Cryptanalysis on Full MISTY1 | online |
2015 | crypto | Provably Weak Instances of Ring-LWE | online |
2015 | crypto | From Selective to Adaptive Security in Functional Encryption | online |
2015 | crypto | Large-Scale Secure Computation: Multi-party Computation for (Parallel) RAM Programs | online |
2015 | crypto | PoW-Based Distributed Cryptography with No Trusted Setup | online |
2015 | crypto | Concurrent Secure Computation via Non-Black Box Simulation | online |
2015 | crypto | Practical Round-Optimal Blind Signatures in the Standard Model | online |
2015 | crypto | Key-Recovery Attack on the ASASA Cryptosystem with Expanding S-Boxes | online |
2015 | crypto | Relational Hash: Probabilistic Hash for Verifying Relations, Secure Against Forgery and More | online |
2015 | crypto | Impossibility of Black-Box Simulation Against Leakage Attacks | online |
2015 | crypto | Parallel Hashing via List Recoverability | online |
2015 | crypto | Reproducible Circularly-Secure Bit Encryption: Applications and Realizations | online |
2015 | crypto | Incoercible Multi-party Computation and Universally Composable Receipt-Free Voting | online |
2015 | crypto | Tweaking Even-Mansour Ciphers | online |
2015 | crypto | Higher-Order Differential Meet-in-the-middle Preimage Attacks on SHA-1 and BLAKE | online |
2015 | crypto | A Quasipolynomial Reduction for Generalized Selective Decryption on Trees | online |
2015 | crypto | Indistinguishability Obfuscation from Compact Functional Encryption | online |
2015 | crypto | Predicate Encryption for Circuits from LWE | online |
2015 | crypto | Arguments of Proximity - [Extended Abstract] | online |
2015 | crypto | Secure Computation from Leaky Correlated Randomness | online |
2015 | eprint | New Proof Techniques for DLIN-Based Adaptively Secure Attribute-Based Encryption and Their Application | online |
2015 | eprint | Implicit Zero-Knowledge Arguments and Applications to the Malicious Setting | online |
2015 | eprint | Zero-Knowledge Interactive Proof Systems for New Lattice Problems | online |
2015 | eprint | On the security margin of MAC striping | online |
2015 | eprint | Improved (Pseudo) Preimage Attacks on Reduced-Round GOST and Grøstl-256 and Studies on Several Truncation Patterns for AES-like Compression Functions (Full Version) | online |
2015 | eprint | Fast, uniform, and compact scalar multiplication for elliptic curves and genus 2 Jacobians with applications to signature schemes | online |
2015 | eprint | On the Equivalence of Obfuscation and Multilinear Maps | online |
2015 | eprint | Generalised tally-based decoders for traitor tracing and group testing | online |
2015 | eprint | A More Cautious Approach to Security Against Mass Surveillance | online |
2015 | eprint | More Efficient Oblivious Transfer Extensions with Security for Malicious Adversaries | online |
2015 | eprint | Democoin: A Publicly Verifiable and Jointly Serviced Cryptocurrency | online |
2015 | eprint | Optimally Secure Block Ciphers from Ideal Primitives | online |
2015 | eprint | Quantum Cryptanalysis of NTRU | online |
2015 | eprint | On weak and strong 2k-bent Boolean functions | online |
2015 | eprint | An Authentication Code over Galois Rings with Optimal Impersonation and Substitution Probabilities | online |
2015 | eprint | Fast and Secure Linear Regression and Biometric Authentication with Security Update | online |
2015 | eprint | Adaptive Proofs of Knowledge in the Random Oracle Model | online |
2015 | eprint | Recovering Short Generators of Principal Ideals in Cyclotomic Rings | online |
2015 | eprint | Secure Computation of MIPS Machine Code | online |
2015 | eprint | One-key Double-Sum MAC with Beyond-Birthday Security | online |
2015 | eprint | Privacy-preserving Attribute Based Searchable Encryption | online |
2015 | eprint | Strongly Secure Authenticated Key Exchange from Ideal Lattices | online |
2015 | eprint | Reconfigurable Cryptography: A flexible approach to long-term security | online |
2015 | eprint | Inception Makes Non-malleable Codes Stronger | online |
2015 | eprint | Key Recovery Attack against an NTRU-type Somewhat Homomorphic Encryption Scheme | online |
2015 | eprint | Weave ElGamal Encryption for Secure Outsourcing Algebraic Computations over Zp | online |
2015 | eprint | TESLA: Tightly-Secure Efficient Signatures from Standard Lattices | online |
2015 | eprint | Integrity-Aware Parallelizable Cipher Feedback Mode for Real-time Cryptography | online |
2015 | eprint | Improved All-Subkeys Recovery Attacks on FOX, KATAN and SHACAL-2 Block Ciphers | online |
2015 | eprint | Privacy in the Genomic Era | online |
2015 | eprint | Non-Repudiable Provable Data Possession in Cloud Storage | online |
2015 | eprint | HLDCA-WSN: Homomorphic Lightweight Data Confidentiality Algorithm for Wireless Sensor Network | online |
2015 | eprint | PAC Learning of Arbiter PUFs | online |
2015 | eprint | End-to-end Design of a PUF-based Privacy Preserving Authentication Protocol | online |
2015 | eprint | New Circular Security Counterexamples from Decision Linear and Learning with Errors | online |
2015 | eprint | Higher Order Differential Analysis of NORX | online |
2015 | eprint | A Secure Oblivious Transfer Protocol from Indistinguishing Obfuscation | online |
2015 | eprint | Self-bilinear Map on Unknown Order Groups from Indistinguishability Obfuscation and Its Applications | online |
2015 | eprint | A New Model for Error-Tolerant Side-Channel Cube Attacks | online |
2015 | eprint | On the Implementation of Unified Arithmetic on Binary Huff Curves | online |
2015 | eprint | Related-Key Rectangle Attack on Round-reduced Khudra Block Cipher | online |
2015 | eprint | Optimally Efficient Multi-Party Fair Exchange and Fair Secure Multi-Party Computation | online |
2015 | eprint | Ideal Multilinear Maps Based on Ideal Lattices | online |
2015 | eprint | Bitwise Linear Mappings with Good Cryptographic Properties and Efficient Implementation | online |
2015 | eprint | Fully-Dynamic Verifiable Zero-Knowledge Order Queries for Network Data | online |
2015 | eprint | Cryptanalysis of the multilinear map on the ideal lattices | online |
2015 | eprint | Efficient k-out-of-n oblivious transfer protocol | online |
2015 | eprint | Hawk: The Blockchain Model of Cryptography and Privacy-Preserving Smart Contracts | online |
2015 | eprint | Online-Offline Homomorphic Signatures for Polynomial Functions | online |
2015 | eprint | BeleniosRF: A Strongly Receipt-Free Electronic Voting Scheme | online |
2015 | eprint | Localised Multisecret Sharing | online |
2015 | eprint | Improving Key Recovery to 784 and 799 rounds of Trivium using Optimized Cube Attacks | online |
2015 | eprint | Exhausting Demirci-Selçuk Meet-in-the-Middle Attacks against Reduced-Round AES | online |
2015 | eprint | An analysis of the C class of bent functions | online |
2015 | eprint | The Sum Can Be Weaker Than Each Part | online |
2015 | eprint | On the concrete hardness of Learning with Errors | online |
2015 | eprint | Design and Analysis of Information-Theoretically Secure Authentication Codes with Non-Uniformly Random Keys | online |
2015 | eprint | On Black-Box Complexity of Universally Composable Security in the CRS model | online |
2015 | eprint | Authenticated Key Exchange over Bitcoin | online |
2015 | eprint | Construction of Arithmetic Secret Sharing Schemes by Using Torsion Limits | online |
2015 | eprint | Continuous Non-Malleable Key Derivation and Its Application to Related-Key Security | online |
2015 | eprint | Systematic Reverse Engineering of Cache Slice Selection in Intel Processors | online |
2015 | eprint | Sanctum: Minimal RISC Extensions for Isolated Execution | online |
2015 | eprint | The Carnac protocol - or how to read the contents of a sealed envelope | online |
2015 | eprint | Efficient Arithmetic on ARM-NEON and Its Application for High-Speed RSA Implementation | online |
2015 | eprint | Bad directions in cryptographic hash functions | online |
2015 | eprint | Function-Hiding Inner Product Encryption | online |
2015 | eprint | Polynomial time reduction from approximate shortest vector problem to the principle ideal porblem for lattices in cyclotomic rings | online |
2015 | eprint | Collision Attack on 4-branch, Type-2 GFN based Hash Functions using Sliced Biclique Cryptanalysis Technique | online |
2015 | eprint | How to Enumerate Your Keys Accurately and Efficiently After a Side Channel Attack | online |
2015 | eprint | Size-Hiding in Private Set Intersection: what can be done and how to do it without random oracles | online |
2015 | eprint | Eclipse Attacks on Bitcoin's Peer-to-Peer Network | online |
2015 | eprint | BlindBox: Deep Packet Inspection over Encrypted Traffic | online |
2015 | eprint | High Precision Fault Injections on the Instruction Cache of ARMv7-M Architectures | online |
2015 | eprint | New Observation on Division Property | online |
2015 | eprint | Relaxing Full-Codebook Security: A Refined Analysis of Key-Length Extension Schemes | online |
2015 | eprint | From Statistical Zero Knowledge to Secret Sharing | online |
2015 | eprint | Shadow-Bitcoin: Scalable Simulation via Direct Execution of Multi-threaded Applications | online |
2015 | eprint | Leakage-Flexible CCA-secure Public-Key Encryption: Simple Construction and Free of Pairing | online |
2015 | eprint | Structural Evaluation by Generalized Integral Property | online |
2015 | eprint | XPX: Generalized Tweakable Even-Mansour with Improved Security Guarantees | online |
2015 | eprint | A Provably Secure Short Signature Scheme from Coding Theory | online |
2015 | eprint | Cryptanalysis of a modern rotor machine in a multicast setting | online |
2015 | eprint | Classical Cryptographic Protocols in a Quantum World | online |
2015 | eprint | Some New Results on Binary Polynomial Multiplication | online |
2015 | eprint | General Circuit Realizing Compact Revocable Attribute-Based Encryption from Multilinear Maps | online |
2015 | eprint | Performance Analysis of Some Password Hashing Schemes | online |
2015 | eprint | Improved Top-Down Techniques in Differential Cryptanalysis | online |
2015 | eprint | A More Explicit Formula for Linear Probabilities of Modular Addition Modulo a Power of Two | online |
2015 | eprint | Reconciling User Privacy and Implicit Authentication for Mobile Devices | online |
2015 | eprint | Leakage-Resilient Cryptography with Key Derived from Sensitive Data | online |
2015 | eprint | Seriously, get off my cloud! Cross-VM RSA Key Recovery in a Public Cloud | online |
2015 | eprint | Practical Attacks on the Round-reduced PRINCE | online |
2015 | eprint | Leakage-Resilient Symmetric Encryption via Re-keying | online |
2015 | eprint | Exploring the Resilience of Some Lightweight Ciphers Against Pro led Single Trace Attacks | online |
2015 | eprint | Confidential Benchmarking based on Multiparty Computation | online |
2015 | eprint | Automated Dynamic Cube Attack on Block Ciphers: Cryptanalysis of SIMON and KATAN | online |
2015 | eprint | A Group-theory Method to The Cycle Structures of Feedback Shift Registers | online |
2015 | eprint | TinyLEGO: An Interactive Garbling Scheme for Maliciously Secure Two-party Computation | online |
2015 | eprint | Method to Protect Passwords in Databases for Web Applications | online |
2015 | eprint | PAGES+, PAGES-, and PAGES- - Three Families of Block Ciphers | online |
2015 | eprint | Differential Computation Analysis: Hiding your White-Box Designs is Not Enough | online |
2015 | eprint | Ed448-Goldilocks, a new elliptic curve | online |
2015 | eprint | Privacy and Access Control for Outsourced Personal Records | online |
2015 | eprint | Are you The One to Share? Secret Transfer with Access Structure | online |
2015 | eprint | Tampering with the Delivery of Blocks and Transactions in Bitcoin | online |
2015 | eprint | Rig: A simple, secure and flexible design for Password Hashing | online |
2015 | eprint | Same Value Analysis on Edwards Curves | online |
2015 | eprint | A masked ring-LWE implementation | online |
2015 | eprint | Zero-Knowledge Accumulators and Set Operations | online |
2015 | eprint | Non-Interactive Zero-Knowledge Proofs of Non-Membership | online |
2015 | eprint | Provably weak instances of Ring-LWE | online |
2015 | eprint | New multilinear maps from ideal lattices | online |
2015 | eprint | Privacy-preserving Frequent Itemset Mining for Sparse and Dense Data | online |
2015 | eprint | New Attacks on Feistel Structures with Improved Memory Complexities | online |
2015 | eprint | Indistinguishability Obfuscation: from Approximate to Exact | online |
2015 | eprint | Revisiting Security Claims of XLS and COPA | online |
2015 | eprint | Cryptanalysis of the Quadratic Zero-Testing of GGH | online |
2015 | eprint | Authentication Key Recovery in Galois/Counter Mode (GCM) | online |
2015 | eprint | Pairing Based Mutual Healing in Wireless Sensor Networks | online |
2015 | eprint | Efficient Fully Structure-Preserving Signatures for Large Messages | online |
2015 | eprint | Database Outsourcing with Hierarchical Authenticated Data Structures | online |
2015 | eprint | Impossibility of VBB Obfuscation with Ideal Constant-Degree Graded Encodings | online |
2015 | eprint | Selective Opening Security for Receivers | online |
2015 | eprint | Constructing and Understanding Chosen Ciphertext Security via Puncturable Key Encapsulation Mechanisms | online |
2015 | eprint | Linearization of Multi-valued Nonlinear Feedback Shift Registers | online |
2015 | eprint | Mind the Gap: Modular Machine-checked Proofs of One-Round Key Exchange Protocols | online |
2015 | eprint | Quadratic Time, Linear Space Algorithms for Gram-Schmidt Orthogonalization and Gaussian Sampling in Structured Lattices | online |
2015 | eprint | Information-theoretic Local Non-malleable Codes and their Applications | online |
2015 | eprint | Related-Key Attack on Full-Round PICARO | online |
2015 | eprint | Affine Equivalence and its Application to Tightening Threshold Implementations | online |
2015 | eprint | Transformation-Based Outsourcing of Linear Equation Systems over Real Numbers | online |
2015 | eprint | Inverting the Final exponentiation of Tate pairings on ordinary elliptic curves using faults | online |
2015 | eprint | Towards the Generation of a Dynamic Key-Dependent S-Box to Enhance Security | online |
2015 | eprint | Polynomial time reduction from 3SAT to solving low first fall degree multivariable cubic equations system | online |
2015 | eprint | The Multiplicative Complexity of Boolean Functions on Four and Five Variables | online |
2015 | eprint | Dynamic Searchable Symmetric Encryption with Minimal Leakage and Efficient Updates on Commodity Hardware | online |
2015 | eprint | Related-key Impossible Differential Analysis of Full Khudra | online |
2015 | eprint | Predictive Models for Min-Entropy Estimation | online |
2015 | eprint | A Challenge Obfuscation Method for Thwarting Model Building Attacks on PUFs | online |
2015 | eprint | Multilinear Maps Using Random Matrix | online |
2015 | eprint | How Secure and Quick is QUIC? Provable Security and Performance Analyses | online |
2015 | eprint | Mapping the Intel Last-Level Cache | online |
2015 | eprint | AN ENHANCED BIOMETRIC BASED REMOTE USER AUTHENTICATION SCHEME USING SMART CARD | online |
2015 | eprint | A Decade of Lattice Cryptography | online |
2015 | eprint | Cryptanalysis of Gu's ideal multilinear map | online |
2015 | eprint | Tight Parallel Repetition Theorems for Public-Coin Arguments using KL-divergence | online |
2015 | eprint | Adaptive key recovery attacks on NTRU-based somewhat homomorphic encryption schemes | online |
2015 | eprint | Optimal Computational Split-state Non-malleable Codes | online |
2015 | eprint | Foundations of Reconfigurable PUFs (Full Version) | online |
2015 | eprint | Freestart collision on full SHA-1 | online |
2015 | eprint | A Stateless Cryptographically-Secure Physical Unclonable Function | online |
2015 | eprint | Scalar Blinding on Elliptic Curves based on Primes with Special Structure | online |
2015 | eprint | Building Lossy Trapdoor Functions from Lossy Encryption | online |
2015 | eprint | Speeding-up lattice sieving without increasing the memory, using sub-quadratic nearest neighbor search | online |
2015 | eprint | Accelerating Somewhat Homomorphic Evaluation using FPGAs | online |
2015 | eprint | Keccak | online |
2015 | eprint | FURISC: FHE Encrypted URISC Design | online |
2015 | eprint | Certificate-Based Encryption Resilient to Key Leakage | online |
2015 | eprint | Succinct Randomized Encodings and their Applications | online |
2015 | eprint | Computing Individual Discrete Logarithms Faster in GF(pn) | online |
2015 | eprint | got HW crypto? On the (in)security of a Self-Encrypting Drive series | online |
2015 | eprint | SOME REMARKS ON THE LOGARITHMIC SIGNATURES OF FINITE ABELIAN GROUPS | online |
2015 | eprint | Key Recovery for LWE in Polynomial Time | online |
2015 | eprint | Dynamic Key-Aggregate Cryptosystem on Elliptic Curves for Online Data Sharing | online |
2015 | eprint | Achieving Differential Privacy with Bias-Control Limited Source | online |
2015 | eprint | Fibonacci Ring Oscillators as True Random Number Generators - A Security Risk | online |
2015 | eprint | Analysis of a key exchange protocol based on tropical matrix algebra | online |
2015 | eprint | Oblivious Polynomial Evaluation and Secure Set-Intersection from Algebraic PRFs | online |
2015 | eprint | On Power Splitting Games in Distributed Computation: The Case of Bitcoin Pooled Mining | online |
2015 | eprint | Hardness Estimation of LWE via Band Pruning | online |
2015 | eprint | Cryptanalysis of Round-Reduced LED | online |
2015 | eprint | Is There an Oblivious RAM Lower Bound? | online |
2015 | eprint | Sanitizable Signcryption: Sanitization over Encrypted Data (Full Version) | online |
2015 | eprint | VARIANTS OF DIFFERENTIAL AND LINEAR CRYPTANALYSIS | online |
2015 | eprint | Secure Binary Field Multiplication | online |
2015 | eprint | Survey on Cryptographic Obfuscation | online |
2015 | eprint | Point Decomposition Problem in Binary Elliptic Curves | online |
2015 | eprint | Lower Bounds on Assumptions behind Indistinguishability Obfuscation | online |
2015 | eprint | Publicly Verifiable Software Watermarking | online |
2015 | eprint | DAA-TZ: An Efficient DAA Scheme for Mobile Devices using ARM TrustZone | online |
2015 | eprint | Security of Symmetric Encryption in the Presence of Ciphertext Fragmentation | online |
2015 | eprint | Post-Quantum Secure Onion Routing (Future Anonymity in Today's Budget) | online |
2015 | eprint | Cryptanalysis of A Privacy-Preserving Smart Metering Scheme Using Linkable Anonymous Credential | online |
2015 | eprint | Characterising and Comparing the Energy Consumption of Side Channel Attack Countermeasures and Lightweight Cryptography on Embedded Devices | online |
2015 | eprint | The Fallacy of Composition of Oblivious RAM and Searchable Encryption | online |
2015 | eprint | Security of Full-State Keyed and Duplex Sponge: Applications to Authenticated Encryption | online |
2015 | eprint | Double-Speed Barrett Moduli | online |
2015 | eprint | Obfuscating Circuits via Composite-Order Graded Encoding | online |
2015 | eprint | DPA, Bitslicing and Masking at 1 GHz | online |
2015 | eprint | Diversity and Transparency for ECC | online |
2015 | eprint | On the Hardness of Proving CCA-security of Signed ElGamal | online |
2015 | eprint | A comprehensive analysis of game-based ballot privacy definitions | online |
2015 | eprint | Twisted Hessian curves | online |
2015 | eprint | Automated Analysis and Synthesis of Authenticated Encryption Schemes | online |
2015 | eprint | Secure Key Generation from Biased PUFs | online |
2015 | eprint | Card-based Cryptographic Protocols Using a Minimal Number of Cards | online |
2015 | eprint | DA-Encrypt: Homomorphic Encryption via Non-Archimedean Diophantine Approximation - Preliminary Report | online |
2015 | eprint | Functional Encryption: Decentralised and Delegatable | online |
2015 | eprint | Non-committing encryption from Φ-hiding | online |
2015 | eprint | The Pythia PRF Service | online |
2015 | eprint | Revisiting LEGOs: Optimizations, Analysis, and their Limit | online |
2015 | eprint | Combined Side-Channel and Fault Analysis Attack on Protected Grain Family of Stream Ciphers | online |
2015 | eprint | Block-wise Non-Malleable Codes | online |
2015 | eprint | On Constructions of a Sort of MDS Block Diffusion Matrices for Block Ciphers and Hash Functions | online |
2015 | eprint | Concurrent Secure Computation with Optimal Query Complexity | online |
2015 | eprint | Oblivious Substring Search with Updates | online |
2015 | eprint | Hierarchical Functional Encryption | online |
2015 | eprint | A One-time Stegosystem and Applications to Efficient Covert Communication | online |
2015 | eprint | Fast and Tradeoff-Resilient Memory-Hard Functions for Cryptocurrencies and Password Hashing | online |
2015 | eprint | Key Recovery from State Information of Sprout: Application to Cryptanalysis and Fault Attack | online |
2015 | eprint | Secure Key Exchange Protocol based on Virtual Proof of Reality | online |
2015 | eprint | On the Security of Fresh Re-keying to Counteract Side-Channel and Fault Attacks | online |
2015 | eprint | Secure Sketch Metamorphosis: Tight Unified Bounds | online |
2015 | eprint | Alternative cubics' rules with an algebraic appeal | online |
2015 | eprint | Netcoin - A Traceable P2P Electronic Cash System | online |
2015 | eprint | On the Provable Security of the Iterated Even-Mansour Cipher against Related-Key and Chosen-Key Attacks | online |
2015 | eprint | Step by Step Towards Creating a Safe Smart Contract: Lessons and Insights from a Cryptocurrency Lab | online |
2015 | eprint | Practical Fully Homomorphic Encryption without Noise Reduction | online |
2015 | eprint | Updates on Sorting of Fully Homomorphic Encrypted Data | online |
2015 | eprint | Semantic Security and Indistinguishability in the Quantum World | online |
2015 | eprint | A Hybrid Gaussian Sampler for Lattices over Rings | online |
2015 | eprint | Financial Cryptography: Algorithmic Mechanisms for a Hedonic Game | online |
2015 | eprint | GCM Security Bounds Reconsidered | online |
2015 | eprint | Broadcast from Minicast Secure Against General Adversaries | online |
2015 | eprint | Gambling, Computational Information and Encryption Security | online |
2015 | eprint | A Practical Chosen Message Power Analysis Method on the Feistel-SP ciphers with Applications to CLEFIA and Camellia | online |
2015 | eprint | Fine-grained sharing of encrypted sensor data over cloud storage with key aggregation | online |
2015 | eprint | On the Impact of Known-Key Attacks on Hash Functions | online |
2015 | eprint | Cryptanalysis of Reduced-Round Whirlwind (Full Version) | online |
2015 | eprint | Bit Security of the Hyperelliptic Curves Diffie-Hellman Problem | online |
2015 | eprint | A note on the security of Higher-Order Threshold Implementations | online |
2015 | eprint | A New Distinguisher on Grain v1 for 106 rounds | online |
2015 | eprint | On the (im)possibility of receiving security beyond 2l using an l-bit PRNG: the case of Wang et. al. protocol | online |
2015 | eprint | Cryptanalysis of an Improved One-Way Hash Chain Self-Healing Group Key Distribution Scheme | online |
2015 | eprint | A Matrix Decomposition Method for Optimal Normal Basis Multiplication | online |
2015 | eprint | Secure Multi-party Computation: How to Solve the Problem between Security Intelligence & Business Intelligence | online |
2015 | eprint | Compact Implementations of LEA Block Cipher for Low-End Microprocessors | online |
2015 | eprint | Constructing Mixed-integer Programming Models whose Feasible Region is Exactly the Set of All Valid Differential Characteristics of SIMON | online |
2015 | eprint | Secure Multi-party Graph Computation | online |
2015 | eprint | Two Round MPC from LWE via Multi-Key FHE | online |
2015 | eprint | Spacemint: A Cryptocurrency Based on Proofs of Space | online |
2015 | eprint | On Solving Lpn using BKW and Variants | online |
2015 | eprint | Efficient Searchable Symmetric Encryption for Storing Multiple Source Data on Cloud | online |
2015 | eprint | Oblivion: Mitigating Privacy Leaks by Controlling the Discoverability of Online Information | online |
2015 | eprint | Secure Set-based Policy Checking and Its Application to Password Registration | online |
2015 | eprint | Rigorous Upper Bounds on Data Complexities of Block Cipher Cryptanalysis | online |
2015 | eprint | Improved OR Composition of Sigma-Protocols | online |
2015 | eprint | An Algebraic Framework for Pseudorandom Functions and Applications to Related-Key Security | online |
2015 | eprint | FIDES: Lightweight Authenticated Cipher with Side-Channel Resistance for Constrained Hardware | online |
2015 | eprint | On Reverse-Engineering S-Boxes with Hidden Design Criteria or Structure | online |
2015 | eprint | Practical Round-Optimal Blind Signatures in the Standard Model | online |
2015 | eprint | On Non-Black-Box Simulation and the Impossibility of Approximate Obfuscation | online |
2015 | eprint | Low Space Complexity CRT-based Bit-Parallel GF(2n) Polynomial Basis Multipliers for Irreducible Trinomials | online |
2015 | eprint | Multi-User Oblivious RAM Secure Against Malicious Servers | online |
2015 | eprint | The Norwegian Internet Voting Protocol: A new Instantiation | online |
2015 | eprint | Practical Homomorphic MACs for Arithmetic Circuits | online |
2015 | eprint | The Ultimate Transposition Cipher (UTC) | online |
2015 | eprint | A High Reliability PUF Using Hot Carrier Injection Based Response Reinforcement | online |
2015 | eprint | Simpler Efficient Group Signatures from Lattices | online |
2015 | eprint | Reducing Multilinear Map Levels in Constrained PRFs and ABE | online |
2015 | eprint | Non-Abelian Analogs of Lattice Rounding | online |
2015 | eprint | Communication-Optimal Proactive Secret Sharing for Dynamic Groups | online |
2015 | eprint | Complete addition formulas for prime order elliptic curves | online |
2015 | eprint | New Multilinear Maps over the Integers | online |
2015 | eprint | Salsa20 Cryptanalysis: New Moves and Revisiting Old Styles | online |
2015 | eprint | Maturity and Performance of Programmable Secure Computation | online |
2015 | eprint | Secure Multi-Party Shuffling | online |
2015 | eprint | Privately Evaluating Decision Trees and Random Forests | online |
2015 | eprint | Fault Tolerant Infective Countermeasure for AES | online |
2015 | eprint | 10-Round Feistel is Indifferentiable from an Ideal Cipher | online |
2015 | eprint | Cryptanalysis of GGH Map | online |
2015 | eprint | Individualizing Electrical Circuits of Cryptographic Devices as a Means to Hinder Tampering Attacks | online |
2015 | eprint | Use of SIMD-Based Data Parallelism to Speed up Sieving in Integer-Factoring Algorithms | online |
2015 | eprint | Single-Cycle Implementations of Block Ciphers | online |
2015 | eprint | Novel algorithms and hardware architectures for Montgomery Multiplication over GF(p) | online |
2015 | eprint | Analysis of the Kupyna-256 Hash Function | online |
2015 | eprint | The leaking battery: A privacy analysis of the HTML5 Battery Status API | online |
2015 | eprint | Cryptanalysis of HMAC/NMAC-Whirlpool | online |
2015 | eprint | Key-Recovery Attack on the ASASA Cryptosystem with Expanding S-boxes | online |
2015 | eprint | Unique Signature with Short Output from CDH Assumption | online |
2015 | eprint | Authenticated Network Time Synchronization | online |
2015 | eprint | A Meet-in-the-Middle Attack on Reduced-Round Kalyna-b/2b | online |
2015 | eprint | Incremental Program Obfuscation | online |
2015 | eprint | Lattice Based Cryptography for Beginners | online |
2015 | eprint | On the Complexity of Additively Homomorphic UC Commitments | online |
2015 | eprint | Quantifying Location Privacy Leakage from Transaction Prices | online |
2015 | eprint | Tracing Attacks on U-Prove with Revocation Mechanism | online |
2015 | eprint | Bounds on surmising remixed keys | online |
2015 | eprint | BitCryptor: Bit-Serialized Compact Crypto Engine on Reconfigurable Hardware | online |
2015 | eprint | A flaw in a theorem about Schnorr signatures | online |
2015 | eprint | The Index j in RC4 is not Pseudo-random due to Non-existence of Finney Cycle | online |
2015 | eprint | Actively Secure OT Extension with Optimal Overhead | online |
2015 | eprint | Lightweight Coprocessor for Koblitz Curves: 283-bit ECC Including Scalar Conversion with only 4300 Gates | online |
2015 | eprint | Faster software for fast endomorphisms | online |
2015 | eprint | On Linkability and Malleability in Self-blindable Credentials | online |
2015 | eprint | Dual System Encryption via Predicate Encodings | online |
2015 | eprint | Essentially Optimal Robust Secret Sharing with Maximal Corruptions | online |
2015 | eprint | On the (Fast) Algebraic Immunity of Boolean Power Functions | online |
2015 | eprint | Preprocessing-Based Verification of Multiparty Protocols with Honest Majority | online |
2015 | eprint | Stubborn Mining: Generalizing Selfish Mining and Combining with an Eclipse Attack | online |
2015 | eprint | A new framework for keystream generators against Correlation, Linear and Distinguishing Attacks | online |
2015 | eprint | On the Correlation Intractability of Obfuscated Pseudorandom Functions | online |
2015 | eprint | From Private Simultaneous Messages to Zero-Information Arthur-Merlin Protocols and Back | online |
2015 | eprint | A New Partial Key Exposure Attack on Multi-power RSA | online |
2015 | eprint | What Security can we Achieve in 4-Rounds? | online |
2015 | eprint | Generic Efficient Dynamic Proofs of Retrievability | online |
2015 | eprint | Inner Product Masking Revisited | online |
2015 | eprint | M-MAP: Multi-Factor Memory Authentication for Secure Embedded Processors | online |
2015 | eprint | Tagged One-Time Signatures: Tight Security and Optimal Tag Size | online |
2015 | eprint | The Uniform Distribution of Sequences Generated by Iteration of Polynomials | online |
2015 | eprint | Provisions: Privacy-preserving proofs of solvency for Bitcoin exchanges | online |
2015 | eprint | STRIBOB / WHIRLBOB Security Analysis Addendum | online |
2015 | eprint | Tweak-Length Extension for Tweakable Blockciphers | online |
2015 | eprint | Counter-in-Tweak: Authenticated Encryption Modes for Tweakable Block Ciphers | online |
2015 | eprint | ILTRU: An NTRU-Like Public Key Cryptosystem Over Ideal Lattices | online |
2015 | eprint | Toward Secure Implementation of McEliece Decryption | online |
2015 | eprint | Attribute-Based Versions of Schnorr and ElGamal | online |
2015 | eprint | Password Hashing Competition - Survey and Benchmark | online |
2015 | eprint | New algorithm for the discrete logarithm problem on elliptic curves | online |
2015 | eprint | Group Signature with Deniability: How to Disavow a Signature | online |
2015 | eprint | Round-Optimal Black-Box Two-Party Computation | online |
2015 | eprint | Homomorphic Computation of Edit Distance | online |
2015 | eprint | A Comment on Gu Map-1 | online |
2015 | eprint | SIMON and SPECK: Block Ciphers for the Internet of Things | online |
2015 | eprint | Cryptanalysis of the Authenticated Encryption Algorithm COFFE | online |
2015 | eprint | Authentication Using Side-Channel Information | online |
2015 | eprint | Security Analysis of PRINCE | online |
2015 | eprint | Speed Records for Ideal Lattice-Based Cryptography on AVR | online |
2015 | eprint | Efficient Zero-Knowledge Proofs of Non-Algebraic Statements with Sublinear Amortized Cost | online |
2015 | eprint | Tighter Reductions for Forward-Secure Signature Schemes | online |
2015 | eprint | Security of Linear Secret-Sharing Schemes against Mass Surveillance | online |
2015 | eprint | Suit up! Made-to-Measure Hardware Implementations of Ascon | online |
2015 | eprint | Secrecy and independence for election schemes | online |
2015 | eprint | Structural Weaknesses in the Open Smart Grid Protocol | online |
2015 | eprint | Smart Security Management in Secure Devices | online |
2015 | eprint | How Fair is Your Protocol? A Utility-based Approach to Protocol Optimality | online |
2015 | eprint | All or Nothing at All | online |
2015 | eprint | The Number of Boolean Functions with Multiplicative Complexity 2 | online |
2015 | eprint | On the Security of an Efficient Group Key Agreement Scheme for MANETs | online |
2015 | eprint | Black-Box Garbled RAM | online |
2015 | eprint | A Generic Construction for Verifiable Attribute-based Keyword Search Schemes | online |
2015 | eprint | Query-Complexity Amplification for Random Oracles | online |
2015 | eprint | How to Compress Homomorphic Ciphertexts | online |
2015 | eprint | Upending Stock Market Structure Using Secure Multi-Party Computation | online |
2015 | eprint | Cryptanalysis of a fair anonymity for the tor network | online |
2015 | eprint | On Constructing One-Way Permutations from Indistinguishability Obfuscation | online |
2015 | eprint | Constant Size Ring Signature Without Random Oracle | online |
2015 | eprint | Practical Free-Start Collision Attacks on 76-step SHA-1 | online |
2015 | eprint | Tweakable Blockciphers with Asymptotically Optimal Security | online |
2015 | eprint | Matrix Computational Assumptions in Multilinear Groups | online |
2015 | eprint | Two-Server Password-Authenticated Secret Sharing UC-Secure Against Transient Corruptions | online |
2015 | eprint | Analysis of Keyless Massive MIMO-based Cryptosystem Security | online |
2015 | eprint | Efficiency Evaluation of Cryptographic Protocols for Boardroom Voting | online |
2015 | eprint | Analysis of Impossible, Integral and Zero-Correlation Attacks on Type-II Generalized Feistel Networks using the Matrix Method | online |
2015 | eprint | From Single-Input to Multi-Input Functional Encryption in the Private-Key Setting | online |
2015 | eprint | Guidelines for Using the CryptDB System Securely | online |
2015 | eprint | Comparison Between Irreducible and Separable Goppa Code in McEliece Cryptosystem | online |
2015 | eprint | Improved Attacks on Reduced-Round Camellia-128/192/256 | online |
2015 | eprint | SpecTre: A Tiny Side-Channel Resistant Speck Core for FPGAs | online |
2015 | eprint | The self-blindable U-Prove scheme by Hanzlik and Kluczniak is forgeable | online |
2015 | eprint | A Hybrid Approach for Proving Noninterference of Java Programs | online |
2015 | eprint | Masking vs. Multiparty Computation: How Large is the Gap for AES? | online |
2015 | eprint | CARIBE: Adapting Traditional IBE for the Modern Key-Covetous Appetite | online |
2015 | eprint | Richer Efficiency/Security Trade-offs in 2PC | online |
2015 | eprint | New Techniques for SPHFs and Efficient One-Round PAKE Protocols | online |
2015 | eprint | Statistical Properties of Multiplication mod 2n | online |
2015 | eprint | Generic Security of NMAC and HMAC with Input Whitening | online |
2015 | eprint | Security Evaluation on Simeck against Zero Correlation Linear Cryptanalysis | online |
2015 | eprint | Short Structure-Preserving Signatures | online |
2015 | eprint | Hybrid WBC: Secure and efficient encryption schemes using the White-Box Cryptography | online |
2015 | eprint | A quantum-safe circuit-extension handshake for Tor | online |
2015 | eprint | Masking Large Keys in Hardware: A Masked Implementation of McEliece | online |
2015 | eprint | Chosen IV Cryptanalysis on Reduced Round ChaCha and Salsa | online |
2015 | eprint | Characterization of MDS mappings | online |
2015 | eprint | Attacking the Network Time Protocol | online |
2015 | eprint | Extended Nested Dual System Groups, Revisited | online |
2015 | eprint | Randomizing Scalar Multiplication Using Exact Covering Systems of Congruences | online |
2015 | eprint | Fully Structure-Preserving Signatures and Shrinking Commitments | online |
2015 | eprint | Mass-surveillance without the State: Strongly Undetectable Algorithm-Substitution Attacks | online |
2015 | eprint | A Novel Cyberspace-Oriented Access Control Model | online |
2015 | eprint | Randomizing the Montgomery Powering Ladder | online |
2015 | eprint | Multilinear Maps Using Ideal Lattices without Encodings of Zero | online |
2015 | eprint | VLSI Implementation of Double-Base Scalar Multiplication on a Twisted Edwards Curve with an Efficiently Computable Endomorphism | online |
2015 | eprint | Improving GGH Public Key Scheme Using Low Density Lattice Codes | online |
2015 | eprint | Indifferentiability of Confusion-Diffusion Networks | online |
2015 | eprint | Secret Shared Random Access Machine | online |
2015 | eprint | Influence of Electrical Circuits of ECC Designs on Shape of Electromagnetic Traces measured on FPGA | online |
2015 | eprint | A look at the PGP ecosystem through the key server data | online |
2015 | eprint | Nearly Optimal Robust Secret Sharing | online |
2015 | eprint | Towards Secure Distance Bounding | online |
2015 | eprint | Protecting against Multidimensional Linear and Truncated Differential Cryptanalysis by Decorrelation | online |
2015 | eprint | On the Security of the COPA and Marble Authenticated Encryption Algorithms against (Almost) Universal Forgery Attack | online |
2015 | eprint | TMSUI: A Trust Management Scheme of USB Storage Devices for Industrial Control Systems | online |
2015 | eprint | sHMQV: An Efficient Key Exchange Protocol for Power-limited Devices | online |
2015 | eprint | The Conjoined Microprocessor | online |
2015 | eprint | Applying Cryptographic Acceleration Techniques to Error Correction | online |
2015 | eprint | Fully Homomorphic Encryption with Composite Number Modulus | online |
2015 | eprint | The Secret Structure of the S-Box of Streebog, Kuznechik and Stribob | online |
2015 | eprint | More on Impossibility of Virtual Black-Box Obfuscation in Idealized Models | online |
2015 | eprint | Towards Understanding the Known-Key Security of Block Ciphers | online |
2015 | eprint | Complementing Feistel Ciphers | online |
2015 | eprint | Precomputation Methods for Faster and Greener Post-Quantum Cryptography on Emerging Embedded Platforms | online |
2015 | eprint | Microcash: Efficient Off-Line Small Payments | online |
2015 | eprint | Fast Garbling of Circuits Under Standard Assumptions | online |
2015 | eprint | Lyra2: Password Hashing Scheme with improved security against time-memory trade-offs | online |
2015 | eprint | A New Encryption Standard of Ukraine: The Kalyna Block Cipher | online |
2015 | eprint | Revisiting Turning Online Cipher Off | online |
2015 | eprint | Analysis of an RFID Authentication Protocol in Accordance with EPC Standards | online |
2015 | eprint | The Random Oracle Model: A Twenty-Year Retrospective | online |
2015 | eprint | Finding State Collisions in the Authenticated Encryption Stream Cipher ACORN | online |
2015 | eprint | Reproducible Circularly-Secure Bit Encryption: Applications and Realizations | online |
2015 | eprint | Key-Recovery Attacks on ASASA | online |
2015 | eprint | Generalizing Efficient Multiparty Computation | online |
2015 | eprint | Generic Key Recovery Attack on Feistel Scheme | online |
2015 | eprint | Tweaking Even-Mansour Ciphers | online |
2015 | eprint | Cryptographic Assumptions: A Position Paper | online |
2015 | eprint | Cryptography from Post-Quantum Assumptions | online |
2015 | eprint | A Related-Key Chosen-IV Distinguishing Attack on Full Sprout Stream Cipher | online |
2015 | eprint | On Public Key Encryption from Noisy Codewords | online |
2015 | eprint | Cryptanalysis of Three Certificate-Based Authenticated Key Agreement Protocols and a Secure Construction | online |
2015 | eprint | Extended Tower Number Field Sieve: A New Complexity for Medium Prime Case | online |
2015 | eprint | Interdiction in Practice - Hardware Trojan Against a High-Security USB Flash Drive | online |
2015 | eprint | Arithmetic Walsh Transform of Boolean Functions with Linear Structures | online |
2015 | eprint | On the Amortized Complexity of Zero-knowledge Protocols | online |
2015 | eprint | Differential Privacy in distribution and instance-based noise mechanisms | online |
2015 | eprint | Amortizing Garbled Circuits | online |
2015 | eprint | A Generic Approach to Invariant Subspace Attacks: Cryptanalysis of Robin, iSCREAM and Zorro | online |
2015 | eprint | A Compiler of Two-Party Protocols for Composable and Game-Theoretic Security, and Its Application to Oblivious Transfer | online |
2015 | eprint | On the Hardness of Learning with Rounding over Small Modulus | online |
2015 | eprint | Computational Soundness of Uniformity Properties for Multi-party Computation based on LSSS | online |
2015 | eprint | Offline Witness Encryption | online |
2015 | eprint | Tighter, faster, simpler side-channel security evaluations beyond computing power | online |
2015 | eprint | Efficient Hardware Design for Computing Pairings Using Few FPGA In-built DSPs | online |
2015 | eprint | Conversions among Several Classes of Predicate Encryption and Their Applications | online |
2015 | eprint | RoadRunneR: A Small And Fast Bitslice Block Cipher For Low Cost 8-bit Processors | online |
2015 | eprint | Limits on the Power of Indistinguishability Obfuscation and Functional Encryption | online |
2015 | eprint | cuHE: A Homomorphic Encryption Accelerator Library | online |
2015 | eprint | CamlCrush: A PKCS\#11 Filtering Proxy | online |
2015 | eprint | Fast and Secure Three-party Computation: The Garbled Circuit Approach | online |
2015 | eprint | Meet in the Middle Attacks on Reduced Round Kuznyechik | online |
2015 | eprint | Generalization of Statistical Criteria for Sboxes | online |
2015 | eprint | Simple Chosen-Ciphertext Security from Low-Noise LPN | online |
2015 | eprint | Non-invasive Spoofing Attacks for Anti-lock Braking Systems | online |
2015 | eprint | Message-Locked Encryption for Lock-Dependent Messages | online |
2015 | eprint | Using Tweaks To Design Fault Resistant Ciphers | online |
2015 | eprint | Re-encryption, functional re-encryption, and multi-hop re-encryption: A framework for achieving obfuscation-based security and instantiations from lattices | online |
2015 | eprint | Efficient and Secure Delegation of Group Exponentiation to a Single Server | online |
2015 | eprint | Last fall degree, HFE, and Weil descent attacks on ECDLP | online |
2015 | eprint | On the Power of Hierarchical Identity-Based Encryption | online |
2015 | eprint | Linear Overhead Robust MPC with Honest Majority Using Preprocessing | online |
2015 | eprint | Optimizing MAKWA on GPU and CPU | online |
2015 | eprint | Implementation of the SCREAM Tweakable Block Cipher in MSP430 Assembly Language | online |
2015 | eprint | Efficient Statically-Secure Large-Universe Multi-Authority Attribute-Based Encryption | online |
2015 | eprint | Quasi-Adaptive NIZK for Linear Subspaces Revisited | online |
2015 | eprint | Feistel Networks: Indifferentiability at 8 Rounds | online |
2015 | eprint | Group Signatures Without q-Assumptions | online |
2015 | eprint | Tornado Attack on RC4 with Applications to WEP & WPA | online |
2015 | eprint | Evaluation and Cryptanalysis of the Pandaka Lightweight Cipher | online |
2015 | eprint | High Performance Lattice-based CCA-secure Encryption | online |
2015 | eprint | Remotely Managed Logic Built-In Self-Test for Secure M2M Communications | online |
2015 | eprint | Delegating RAM Computations | online |
2015 | eprint | FROPUF: How to Extract More Entropy from Two Ring Oscillators in FPGA-Based PUFs | online |
2015 | eprint | Higher-Order Differential Meet-in-The-Middle Preimage Attacks on SHA-1 and BLAKE | online |
2015 | eprint | Consolidating masking schemes | online |
2015 | eprint | Multi-Prover Commitments Against Non-Signaling Attacks | online |
2015 | eprint | Accountable Authority Ciphertext-Policy Attribute-Based Encryption with White-Box Traceability and Public Auditing in the Cloud | online |
2015 | eprint | On the Impossibility of Tight Cryptographic Reductions | online |
2015 | eprint | Dismantling real-world ECC with Horizontal and Vertical Template Attacks | online |
2015 | eprint | Related-Key Forgeries for Prøst-OTR | online |
2015 | eprint | Perfect Structure on the Edge of Chaos | online |
2015 | eprint | The Multivariate Hidden Number Problem | online |
2015 | eprint | On Lightweight Stream Ciphers with Shorter Internal States | online |
2015 | eprint | Optimal software-implemented Itoh-Tsujii inversion for GF(2m) | online |
2015 | eprint | Attribute-Based Signcryption : Signer Privacy, Strong Unforgeability and IND-CCA2 Security in Adaptive-Predicates Attack | online |
2015 | eprint | A Linear Attack on a Key Exchange Protocol Using Extensions of Matrix Semigroups | online |
2015 | eprint | MI-T-HFE, a New Multivariate Signature Scheme | online |
2015 | eprint | Rational Sumchecks | online |
2015 | eprint | Advanced Differential Cryptanalysis of Reduced-Round SIMON64/128 Using Large-Round Statistical Distinguishers | online |
2015 | eprint | Public Verifiability in the Covert Model (Almost) for Free | online |
2015 | eprint | A random zoo: sloth, unicorn, and trx | online |
2015 | eprint | Fast and Memory-Efficient Key Recovery in Side-Channel Attacks | online |
2015 | eprint | On the discrete logarithm problem in finite fields of fixed characteristic | online |
2015 | eprint | CLKS: Certificateless Keyword Search on Encrypted Data | online |
2015 | eprint | Differential Analysis and Meet-in-the-Middle Attack against Round-Reduced TWINE | online |
2015 | eprint | Fully Homomorphic Encryption without bootstrapping | online |
2015 | eprint | Secure Dating with Four or Fewer Cards | online |
2015 | eprint | On the Optimality of Non-Linear Computations of Length-Preserving Encryption Schemes | online |
2015 | eprint | Scalable Divisible E-cash | online |
2015 | eprint | Distinguishing a truncated random permutation from a random function | online |
2015 | eprint | Computational Aspects of Correlation Power Analysis | online |
2015 | eprint | Safe-Errors on SPA Protected implementations with the Atomicity Technique | online |
2015 | eprint | Accelerating SWHE based PIRs using GPUs | online |
2015 | eprint | Rogue Decryption Failures: Reconciling AE Robustness Notions | online |
2015 | eprint | New Complexity Trade-Offs for the (Multiple) Number Field Sieve Algorithm in Non-Prime Fields | online |
2015 | eprint | Multilinear Pseudorandom Functions | online |
2015 | eprint | Time-release Protocol from Bitcoin and Witness Encryption for SAT | online |
2015 | eprint | Short Schnorr signatures require a hash function with more than just random-prefix resistance | online |
2015 | eprint | Cryptanalysis of GGH15 Multilinear Maps | online |
2015 | eprint | Improved Linear Trails for the Block Cipher Simon | online |
2015 | eprint | Parallel (probable) lock-free HashSieve: a practical sieving algorithm for the SVP | online |
2015 | eprint | Success through confidence: Evaluating the effectiveness of a side-channel attack | online |
2015 | eprint | Computing information on domain parameters from public keys selected uniformly at random | online |
2015 | eprint | Powers of Subfield Polynomials and Algebraic Attacks on Word-Based Stream Ciphers | online |
2015 | eprint | Dual EC: A Standardized Back Door | online |
2015 | eprint | A Framework for Identity-Based Encryption with Almost Tight Security | online |
2015 | eprint | The Simplest Protocol for Oblivious Transfer | online |
2015 | eprint | More PS and H-like bent functions | online |
2015 | eprint | Constructing Efficient PAKE Protocols from Identity-Based KEM/DEM | online |
2015 | eprint | Encryption Switching Protocols | online |
2015 | eprint | PICO: An Ultra lightweight and Low power encryption design for pervasive computing | online |
2015 | eprint | Demystifying incentives in the consensus computer | online |
2015 | eprint | Improving the Big Mac Attack on Elliptic Curve Cryptography | online |
2015 | eprint | On near prime-order elliptic curves with small embedding degrees | online |
2015 | eprint | Efficient Asynchronous Accumulators for Distributed PKI | online |
2015 | eprint | A New Standard of Ukraine: The Kupyna Hash Function | online |
2015 | eprint | Links among Impossible Differential, Integral and Zero Correlation Linear Cryptanalysis | online |
2015 | eprint | Encryption Performance Improvements of the Paillier Cryptosystem | online |
2015 | eprint | Beyond-Birthday-Bound Security for Tweakable Even-Mansour Ciphers with Linear Tweak and Key Mixing | online |
2015 | eprint | MQ Challenge: Hardness Evaluation of Solving Multivariate Quadratic Problems | online |
2015 | eprint | A Note on the Indifferentiability of the 10-Round Feistel Construction | online |
2015 | eprint | New classes of public key cryptosystem K(XVI)SE(1)PKC constructed based on Reed-Solomon code over extension field of m=8 and K(XVI)SE(2)PKC, based on binary cyclic code | online |
2015 | eprint | An Efficient Multi-Message Multi-Receiver Signcryption Scheme with Forward Secrecy on Elliptic Curves | online |
2015 | eprint | Making Existential-Unforgeable Signatures Strongly Unforgeable in the Quantum Random-Oracle Model | online |
2015 | eprint | Factoring RSA moduli with weak prime factors | online |
2015 | eprint | Condensed Unpredictability | online |
2015 | eprint | Experimental Study of DIGIPASS GO3 and the Security of Authentication | online |
2015 | eprint | Revisiting Sum of CBC-MACs and Extending NI2-MAC to Achieve Beyond-Birthday Security | online |
2015 | eprint | Multi-Client Non-Interactive Verifiable Computation | online |
2015 | eprint | Message Transmission with Reverse Firewalls - Secure Communication on Corrupted Machines | online |
2015 | eprint | Constant-Round MPC with Fairness and Guarantee of Output Delivery | online |
2015 | eprint | Commitment and Oblivious Transfer in the Bounded Storage Model with Errors | online |
2015 | eprint | Complexity of ECDLP under the First Fall Degree Assumption | online |
2015 | eprint | Strong Security of the Strongly Multiplicative Ramp Secret Sharing based on Algebraic Curves | online |
2015 | eprint | A Note on Scalar Multiplication Using Division Polynomials | online |
2015 | eprint | Threshold FlipThem: When the winner does not need to take all | online |
2015 | eprint | Weak Ideal Functionalities for Designing Random Oracles with Applications to Fugue | online |
2015 | eprint | Practical Compact E-Cash with Arbitrary Wallet Size | online |
2015 | eprint | A New Authenticated Encryption Technique for Handling Long Ciphertexts in Memory Constrained Devices | online |
2015 | eprint | Impossible Differential Cryptanalysis of Reduced Round SIMON | online |
2015 | eprint | Short Group Signatures via Structure-Preserving Signatures: Standard Model Security from Simple Assumptions | online |
2015 | eprint | Analysis of VAES3 (FF2) | online |
2015 | eprint | A Simple Scheme, for Strengthening Product-sum Type PKC | online |
2015 | eprint | Verifiably Encrypted Signatures with Short Keys based on the Decisional Linear Problem and Obfuscation for Encrypted VES | online |
2015 | eprint | Characterization of Secure Multiparty Computation Without Broadcast | online |
2015 | eprint | Multi-user Schnorr security, revisited | online |
2015 | eprint | Leakage Assessment Methodology - a clear roadmap for side-channel evaluations | online |
2015 | eprint | How to Incentivize Data-Driven Collaboration Among Competing Parties | online |
2015 | eprint | Functional Encryption for Turing Machines | online |
2015 | eprint | Centrally Banked Cryptocurrencies | online |
2015 | eprint | Detecting Mobile Application Spoofing Attacks by Leveraging User Visual Similarity Perception | online |
2015 | eprint | A Unified Approach to MPC with Preprocessing using OT | online |
2015 | eprint | A Simple Method for Obtaining Relations Among Factor Basis Elements for Special Hyperelliptic Curves | online |
2015 | eprint | Improvements on Efficient Dynamic Provable Data Possession scheme with Public Verifiability and Data Privacy | online |
2015 | eprint | Differential Security Evaluation of Simeck with Dynamic Key-guessing Techniques | online |
2015 | eprint | A Cryptographic Analysis of the TLS 1.3 Handshake Protocol Candidates | online |
2015 | eprint | Faster point scalar multiplication on NIST elliptic curves over GF(p) using (twisted) Edwards curves over GF(p³) | online |
2015 | eprint | GliFreD: Glitch-Free Duplication - Towards Power-Equalized Circuits on FPGAs | online |
2015 | eprint | Weakening the Isolation Assumption of Tamper-proof Hardware Tokens | online |
2015 | eprint | GRECS: Graph Encryption for Approximate Shortest Distance Queries | online |
2015 | eprint | Order-Revealing Encryption and the Hardness of Private Learning | online |
2015 | eprint | On the Difficulty of Securing Web Applications using CryptDB | online |
2015 | eprint | Gaussian Sampling Precision and Information Leakage in Lattice Cryptography | online |
2015 | eprint | ARMed SPHINCS - Computing a 41KB signature in 16KB of RAM | online |
2015 | eprint | Stealing Keys from PCs using a Radio: Cheap Electromagnetic Attacks on Windowed Exponentiation | online |
2015 | eprint | From Improved Leakage Detection to the Detection of Points of Interests in Leakage Traces | online |
2015 | eprint | Achieving Side-Channel Protection with Dynamic Logic Reconfiguration on Modern FPGAs | online |
2015 | eprint | Round-Optimal Token-Based Secure Computation | online |
2015 | eprint | New Results on Identity-based Encryption from Quadratic Residuosity | online |
2015 | eprint | Security Against Related Randomness Attacks via Reconstructive Extractors | online |
2015 | eprint | Multilinear Maps from Obfuscation | online |
2015 | eprint | Phasing: Private Set Intersection using Permutation-based Hashing | online |
2015 | eprint | Modular Inversion Hidden Number Problem - Correction and Improvements | online |
2015 | eprint | Ed3363 (HighFive) - An alternative Elliptic Curve | online |
2015 | eprint | A Note on the Unsoundness of vnTinyRAM's SNARK | online |
2015 | eprint | Idealizing Identity-Based Encryption | online |
2015 | eprint | On the Existence and Constructions of Vectorial Boolean Bent Functions | online |
2015 | eprint | Sandy2x: New Curve25519 Speed Records | online |
2015 | eprint | A Generic Countermeasure Against Fault Injection Attacks on Asymmetric Cryptography | online |
2015 | eprint | The Simeck Family of Lightweight Block Ciphers | online |
2015 | eprint | Universally Composable Firewall Architectures using Trusted Hardware | online |
2015 | eprint | Feasibility and Infeasibility of Adaptively Secure Fully Homomorphic Encryption | online |
2015 | eprint | Performance and Security Improvements for Tor: A Survey | online |
2015 | eprint | Differential Fault Intensity Analysis | online |
2015 | eprint | Homomorphic Signature Schemes - A survey | online |
2015 | eprint | Cryptanalysis of Full Sprout | online |
2015 | eprint | The Oblivious Machine - or: How to Put the C into MPC | online |
2015 | eprint | Low Depth Circuits for Efficient Homomorphic Sorting | online |
2015 | eprint | A classification of elliptic curves with respect to the GHS attack in odd characteristic | online |
2015 | eprint | How to Build Time-Lock Encryption | online |
2015 | eprint | Secure Execution Architecture based on PUF-driven Instruction Level Code Encryption | online |
2015 | eprint | Identity-Set-based Broadcast Encryption supporting "Cut-or-Select" with Short Ciphertext | online |
2015 | eprint | Hybrid Publicly Verifiable Computation | online |
2015 | eprint | Robust Authenticated Encryption and the Limits of Symmetric Cryptography | online |
2015 | eprint | A general framework for building noise-free homomorphic cryptosystems | online |
2015 | eprint | Private Processing of Outsourced Network Functions: Feasibility and Constructions | online |
2015 | eprint | Balloon: A Forward-Secure Append-Only Persistent Authenticated Data Structure | online |
2015 | eprint | Fully Homomorphic Encryption from Ring-LWE:Identity-Based,Arbitrary Cyclotomic,Tighter Parameters | online |
2015 | eprint | Efficient Hardware Implementations of the Warbler Pseudorandom Number Generator | online |
2015 | eprint | Adaptively Secure Computation with Partial Erasures | online |
2015 | eprint | Zeroizing Without Low-Level Zeroes: New MMAP Attacks and Their Limitations | online |
2015 | eprint | On the Systematic Constructions of Rotation Symmetric Bent Functions with Any Possible Algebraic Degrees | online |
2015 | eprint | Standard Security Does Imply Security Against Selective Opening for Markov Distributions | online |
2015 | eprint | SCA Resistance Analysis of MAC-PHOTON | online |
2015 | eprint | A 270 Attack on the Full MISTY1 | online |
2015 | eprint | Highly Efficient GF(28) Inversion Circuit Based on Redundant GF Arithmetic and Its Application to AES Design | online |
2015 | eprint | Research Perspectives and Challenges for Bitcoin and Cryptocurrencies | online |
2015 | eprint | Continuous After-the-fact Leakage-Resilient eCK-secure Key Exchange | online |
2015 | eprint | Predictable Arguments of Knowledge | online |
2015 | eprint | Privacy-preserving Context-aware Recommender Systems: Analysis and New Solutions | online |
2015 | eprint | Cryptanalysis of the LSH and SHA-V Hash Functions | online |
2015 | eprint | ANONIZE: A Large-Scale Anonymous Survey System | online |
2015 | eprint | Improved Linear Hull Attack on Round-Reduced Simon with Dynamic Key-guessing Techniques | online |
2015 | eprint | An Efficient Many-Core Architecture for Elliptic Curve Cryptography Security Assessment | online |
2015 | eprint | Ciphertext-only attack on d*d Hill in O(d13d) | online |
2015 | eprint | Efficient (ideal) lattice sieving using cross-polytope LSH | online |
2015 | eprint | On the Security of Extended Generalized Feistel Networks | online |
2015 | eprint | Known-key Distinguisher on Full PRESENT | online |
2015 | eprint | Multi-Variate High-Order Attacks of Shuffled Tables Recomputation | online |
2015 | eprint | An Unconditionally Hiding and Long-Term Binding Post-Quantum Commitment Scheme | online |
2015 | eprint | Trinocchio: Privacy-Friendly Outsourcing by Distributed Verifiable Computation | online |
2015 | eprint | New Links Between Differential and Linear Cryptanalysis | online |
2015 | eprint | Key Homomorphic PRFs and Their Applications | online |
2015 | eprint | PUDA - Privacy and Unforgeability for Data Aggregation | online |
2015 | eprint | Making Masking Security Proofs Concrete Or How to Evaluate the Security of any Leaking Device | online |
2015 | eprint | Joint Data and Key Distribution of the Linear Cryptanalysis Test Statistic and Its Impact to Data Complexity Estimates of Multiple/Multidimensional Linear and Truncated Differential Attacks | online |
2015 | eprint | Statistical Concurrent Non-malleable Zero-knowledge from One-way Functions | online |
2015 | eprint | Fast Oblivious AES\\A dedicated application of the MiniMac protocol | online |
2015 | eprint | Efficient Constant Round Multi-Party Computation Combining BMR and SPDZ | online |
2015 | eprint | Computation-Trace Indistinguishability Obfuscation and its Applications | online |
2015 | eprint | High-speed Curve25519 on 8-bit, 16-bit, and 32-bit microcontrollers | online |
2015 | eprint | How to Vote Privately Using Bitcoin | online |
2015 | eprint | The Complexity of Computing the Optimal Composition of Differential Privacy | online |
2015 | eprint | Improved Cryptanalysis of AES-like Permutations | online |
2015 | eprint | Complementary Dual Codes for Counter-measures to Side-Channel Attacks | online |
2015 | eprint | Comprehensive Efficient Implementations of ECC on C54xx Family of Low-cost Digital Signal Processors | online |
2015 | eprint | Graded Encoding, Variations on a Scheme | online |
2015 | eprint | Disk Encryption: Do We Need to Preserve Length? | online |
2015 | eprint | Masks will Fall Off - Higher-Order Optimal Distinguishers | online |
2015 | eprint | Compositional Verification of Higher-Order Masking: Application to a Verifying Masking Compiler | online |
2015 | eprint | A lightweight-friendly modifcation of GOST block cipher | online |
2015 | eprint | Cryptographically Secure CRC for Lightweight Message Authentication | online |
2015 | eprint | Equivalent Key Recovery Attacks against HMAC and NMAC with Whirlpool Reduced to 7 Rounds | online |
2015 | eprint | On Generic Constructions of Circularly-Secure, Leakage-Resilient Public-Key Encryption Schemes | online |
2015 | eprint | Scalable and private media consumption with Popcorn | online |
2015 | eprint | MMBcloud-tree: Authenticated Index for Verifiable Cloud Service Selection | online |
2015 | eprint | Towards Key-Length Extension with Optimal Security: Cascade Encryption and Xor-cascade Encryption | online |
2015 | eprint | SEMA and MESD Leakage of TinyECC 2.0 on a LOTUS Sensor Node | online |
2015 | eprint | Comparison of cube attacks over different vector spaces | online |
2015 | eprint | Barriers to Black-Box Constructions of Traitor Tracing Systems | online |
2015 | eprint | Power Analysis Attacks against IEEE 802.15.4 Nodes | online |
2015 | eprint | Re-encryption Verifiability: How to Detect Malicious Activities of a Proxy in Proxy Re-encryption | online |
2015 | eprint | Multilinear Maps over the Integers Using Modulus Switching | online |
2015 | eprint | The Emperor's New Password Creation Policies | online |
2015 | eprint | Reviving the Idea of Incremental Cryptography for the Zettabyte era Use case: Incremental Hash Functions Based on SHA-3 | online |
2015 | eprint | Another Look at Normal Approximations in Cryptanalysis | online |
2015 | eprint | Reliable Information Extraction for Single Trace Attacks | online |
2015 | eprint | Time-Lock Puzzles from Randomized Encodings | online |
2015 | eprint | Espresso: A Stream Cipher for 5G Wireless Communication Systems | online |
2015 | eprint | Fast Fourier Orthogonalization | online |
2015 | eprint | Robust Profiling for DPA-Style Attacks | online |
2015 | eprint | Private Genome Analysis through Homomorphic Encryption | online |
2015 | eprint | Reconfigurable LUT: Boon or Bane for Secure Applications | online |
2015 | eprint | New attacks on RSA with Moduli N=prq | online |
2015 | eprint | Twist Insecurity | online |
2015 | eprint | Regulating the Pace of von Neumann Correctors | online |
2015 | eprint | Unconditionally Secure Computation with Reduced Interaction | online |
2015 | eprint | Integral Cryptanalysis on Full MISTY1 | online |
2015 | eprint | Structure-Preserving Signatures from Standard Assumptions, Revisited | online |
2015 | eprint | Expiration and Revocation of Keys for Attribute-based Signatures | online |
2015 | eprint | Better Algorithms for LWE and LWR | online |
2015 | eprint | MGR HASH FUNCTION | online |
2015 | eprint | Fully Secure Functional Encryption for Inner Products, from Standard Assumptions | online |
2015 | eprint | On the Resistance of Prime-variable Rotation Symmetric Boolean Functions against Fast Algebraic Attacks | online |
2015 | eprint | Analyzing Permutations for AES-like Ciphers: Understanding ShiftRows | online |
2015 | eprint | Side-Channel Protection by Randomizing Look-Up Tables on Reconfigurable Hardware - Pitfalls of Memory Primitives | online |
2015 | eprint | Optimized Interpolation Attacks on LowMC | online |
2015 | eprint | A comprehensive and lightweight security architecture to secure the IoT throughout the lifecycle of a device based on HIMMO | online |
2015 | eprint | On the Power of Pair Encodings: Frameworks for Predicate Cryptographic Primitives | online |
2015 | eprint | Functional Encryption from (Small) Hardwae Tokens | online |
2015 | eprint | Four Neighbourhood Cellular Automata as Better Cryptographic Primitives | online |
2015 | eprint | Bloom Filters in Adversarial Environments | online |
2015 | eprint | Improving Modular Inversion in RNS using the Plus-Minus Method | online |
2015 | eprint | Security Intelligence for Broadcast : Threat Analytics | online |
2015 | eprint | How to Bootstrap Anonymous Communication | online |
2015 | eprint | McBits: fast constant-time code-based cryptography | online |
2015 | eprint | Traceability Improvements of a New RFID Protocol Based On EPC C1G2 | online |
2015 | eprint | On Basing Private Information Retrieval on NP-Hardness | online |
2015 | eprint | Observations on the SIMON block cipher family | online |
2015 | eprint | Attacks on Search RLWE | online |
2015 | eprint | Study of a Parity Check Based Fault-Detection Countermeasure for the AES Key Schedule | online |
2015 | eprint | End-to-End Verifiable Elections in the Standard Model∗ | online |
2015 | eprint | Non-Malleable Encryption: Simpler, Shorter, Stronger | online |
2015 | eprint | Subversion-Resilient Signature Schemes | online |
2015 | eprint | The Iterated Random Permutation Problem with Applications to Cascade Encryption | online |
2015 | eprint | Communication Complexity of Conditional Disclosure of Secrets and Attribute-Based Encryption | online |
2015 | eprint | Short Accountable Ring Signatures Based on DDH | online |
2015 | eprint | Searching and Sorting of Fully Homomorphic Encrypted Data on Cloud | online |
2015 | eprint | Self-bilinear Map from One Way Encoding System and Indistinguishability Obfuscation | online |
2015 | eprint | Bucket ORAM: Single Online Roundtrip, Constant Bandwidth Oblivious RAM | online |
2015 | eprint | Backtracking-Assisted Multiplication | online |
2015 | eprint | GMU Hardware API for Authenticated Ciphers | online |
2015 | eprint | Subgroup security in pairing-based cryptography | online |
2015 | eprint | FourQ: four-dimensional decompositions on a Q-curve over the Mersenne prime | online |
2015 | eprint | On Concurrently Secure Computation in the Multiple Ideal Query Model | online |
2015 | eprint | The Cryptographic Hardness of Random Local Functions - Survey | online |
2015 | eprint | A Note on Lower Bounds for Non-interactive Message Authentication Using Weak Keys | online |
2015 | eprint | Patterson-Wiedemann type functions on 21 variables with Nonlinearity greater than Bent Concatenation bound | online |
2015 | eprint | An Alternative Approach to Non-black-box Simulation in Fully Concurrent Setting | online |
2015 | eprint | Analyzing Constructions for key-alternating Pseudorandom Functions with Applications to Stream Cipher Operation Modes | online |
2015 | eprint | Oblivious Network RAM | online |
2015 | eprint | Revisiting Prime Power RSA | online |
2015 | eprint | Some Cryptanalytic Results on Zipper Hash and Concatenated Hash | online |
2015 | eprint | Optimally Secure Tweakable Blockciphers | online |
2015 | eprint | Improved (Hierarchical) Inner-Product Encryption from Lattices | online |
2015 | eprint | Interactive Message-Locked Encryption and Secure Deduplication | online |
2015 | eprint | Indistinguishability Obfuscation with Constant Size Overhead | online |
2015 | eprint | From Related-Key Distinguishers to Related-Key-Recovery on Even-Mansour Constructions | online |
2015 | eprint | On Bitcoin as a public randomness source | online |
2015 | eprint | W-SPS: Designing a Wide-Area Secure Positioning System | online |
2015 | eprint | Solving LWE via List Decoding | online |
2015 | eprint | Secure Deduplication of Encrypted Data without Additional Independent Servers | online |
2015 | eprint | Cryptanalysis of the Round-Reduced Kupyna Hash Function | online |
2015 | eprint | A study of Pair Encodings: Predicate Encryption in prime order groups | online |
2015 | eprint | Stretching Groth-Sahai: NIZK Proofs of Partial Satisfiability | online |
2015 | eprint | A Transform for NIZK Almost as Efficient and General as the Fiat-Shamir Transform Without Programmable Random Oracles | online |
2015 | eprint | Non-Interactive Secure Computation Based on Cut-and-Choose | online |
2015 | eprint | Low Noise LPN: KDM Secure Public Key Encryption and Sample Amplification | online |
2015 | eprint | Multilinear and Aggregate Pseudorandom Functions: New Constructions and Improved Security | online |
2015 | eprint | Cryptanalysis for Secure and Efficient Smart-Card-Based Remote User Authentication Scheme for Multi-server Environment | online |
2015 | eprint | Watermarking Cryptographic Programs Against Arbitrary Removal Strategies | online |
2015 | eprint | Extraction of intrinsic structure for Hardware Trojan detection | online |
2015 | eprint | Higher-Order Side Channel Security and Mask Refreshing | online |
2015 | eprint | An Efficient CP-ABE with Constant Size Secret Keys using ECC for Lightweight Devices | online |
2015 | eprint | Results on polynomial interpolation with mixed modular operations and unknown moduli | online |
2015 | eprint | Fast Revocation of Attribute-Based Credentials for Both Users and Verifiers | online |
2015 | eprint | Non-Malleable Condensers for Arbitrary Min-Entropy, and Almost Optimal Protocols for Privacy Amplification | online |
2015 | eprint | Exploring Energy Efficiency of Lightweight Block Ciphers | online |
2015 | eprint | A New Classification of 4-bit Optimal S-boxes and its Application to PRESENT, RECTANGLE and SPONGENT | online |
2015 | eprint | Faster ECC over F2571 (feat. PMULL) | online |
2015 | eprint | Strongly-Optimal Structure Preserving Signatures from Type II Pairings: Synthesis and Lower Bounds | online |
2015 | eprint | Improved Side-Channel Analysis of Finite-Field Multiplication | online |
2015 | eprint | Nearly Optimal Verifiable Data Streaming (Full Version) | online |
2015 | eprint | Memory-saving computation of the pairing fi nal exponentiation on BN curves | online |
2015 | eprint | Random Digit Representation of Integers | online |
2015 | eprint | On the Diffusion Property of Iterated Functions | online |
2015 | eprint | Identity-based encryption with (almost) tight security in the multi-instance, multi-ciphertext setting | online |
2015 | eprint | Sponge based CCA2 secure asymmetric encryption for arbitrary length message | online |
2015 | eprint | On the Security of a Self-healing Group Key Distribution Scheme | online |
2015 | eprint | Key-Homomorphic Constrained Pseudorandom Functions | online |
2015 | eprint | Exploiting Transformations of the Galois Configuration to Improve Guess-and-Determine Attacks on NFSRs | online |
2015 | eprint | Computational Election Verifiability: Definitions and an Analysis of Helios and JCJ | online |
2015 | eprint | Indistinguishability Obfuscation from Compact Functional Encryption | online |
2015 | eprint | Functional Signcryption: Notion, Construction, and Applications | online |
2015 | eprint | Side-Channel Analysis of MAC-Keccak Hardware Implementations | online |
2015 | eprint | PAGES - A Family of Block Ciiphers | online |
2015 | eprint | Block Cipher Speed and Energy Efficiency Records on the MSP430: System Design Trade-Offs for 16-bit Embedded Applications | online |
2015 | eprint | Constant Communication Oblivious RAM | online |
2015 | eprint | Fully Homomorphic Encryption on Octonion Ring | online |
2015 | eprint | EdDSA for more curves | online |
2015 | eprint | TWORAM: Round-Optimal Oblivious RAM with Applications to Searchable Encryption | online |
2015 | eprint | An Efficient Scheme to Reduce Side-Channel Leakage of MAC-Keccak for Smart Card | online |
2015 | eprint | Factoring as a Service | online |
2015 | eprint | Bi-Deniable Inner Product Encryption from LWE | online |
2015 | eprint | Cryptanalysis of Ascon | online |
2015 | eprint | Stability and Linearization of Multi-valued Nonlinear Feedback Shift Registers | online |
2015 | eprint | Cryptanalysis Of Dynamic ID Based Remote User Authentication Scheme With Key Agreement | online |
2015 | eprint | A Practical Key Exchange for the Internet using Lattice Cryptography | online |
2015 | eprint | Criterion of Maximal Period of a Trinomial over Nontrivial Galois Ring of odd Characteristic | online |
2015 | eprint | Output-Compressing Randomized Encodings and Applications | online |
2015 | eprint | Construction of Lightweight S-Boxes using Feistel and MISTY structures (Full Version) | online |
2015 | eprint | Trivial Nonce-Misusing Attack on Pure OMD | online |
2015 | eprint | Cryptanalysis of the New Multilinear Map over the Integers | online |
2015 | eprint | A General Framework for Redactable Signatures and New Constructions | online |
2015 | eprint | Oblivious Parallel RAM: Improved Efficiency and Generic Constructions | online |
2015 | eprint | Vulnerabilities of "McEliece in the World of Escher" | online |
2015 | eprint | Circuits Resilient to Additive Attacks with Applications to Secure Computation | online |
2015 | eprint | An Optimization of Gu Map-1 | online |
2015 | eprint | Efficient, Pairing-Free, One Round Attribute-Based Authenticated Key Exchange | online |
2015 | eprint | On Generating Coset Representatives of PGL2(Fq) in PGL2(Fq2) | online |
2015 | eprint | Fair and Robust Multi-Party Computation using a Global Transaction Ledger | online |
2015 | eprint | Identity-Based Revocation from Subset Difference Methods under Simple Assumptions | online |
2015 | eprint | Short Randomizable Signatures | online |
2015 | eprint | On the Disadvantages of Pairing-based Cryptography | online |
2015 | eprint | Efficient Key Authentication Service for Secure End-to-end Communications | online |
2015 | eprint | Probabilistic Signature Based Framework for Differential Fault Analysis of Stream Ciphers | online |
2015 | eprint | What Information is Leaked under Concurrent Composition? | online |
2015 | eprint | Rich Queries on Encrypted Data: Beyond Exact Matches | online |
2015 | eprint | Blazing Fast 2PC in the Offline/Online Setting with Security for Malicious Adversaries | online |
2015 | eprint | Analysis and Enhancement of Desynchronization Attack on an Ultralightweight RFID Authentication Protocol | online |
2015 | eprint | Feasibility and Completeness of Cryptographic Tasks in the Quantum World | online |
2015 | eprint | Light-hHB: A New Version of hHB with Improved Session Key Exchange | online |
2015 | eprint | Feasibility and Infeasibility of Secure Computation with Malicious PUFs | online |
2015 | eprint | Fair Distributed Computation of Reactive Functions | online |
2015 | eprint | Security Analysis of Re-Encryption RPC Mix Nets | online |
2015 | eprint | Cluster Computing in Zero Knowledge | online |
2015 | eprint | HETest: A Homomorphic Encryption Testing Framework | online |
2015 | eprint | Some results on Sprout | online |
2015 | eprint | Near Collision Side Channel Attacks | online |
2015 | eprint | Dickson Polynomials that are Involutions | online |
2015 | eprint | A Simple Proof of a Distinguishing Bound of Iterated Uniform Random Permutation | online |
2015 | eprint | On the behaviors of affine equivalent Sboxes regarding differential and linear attacks | online |
2015 | eprint | Lifting the Security of NI-MAC Beyond Birthday Bound | online |
2015 | eprint | Aggregatable Pseudorandom Functions and Connections to Learning | online |
2015 | eprint | Homomorphic evaluation requires depth | online |
2015 | eprint | Traceable CP-ABE on Prime Order Groups: Fully Secure and Fully Collusion-resistant Blackbox Traceable | online |
2015 | eprint | Design, Evaluation and Optimization of Physical Unclonable Functions based on Transient Effect Ring Oscillators | online |
2015 | eprint | Feistel Networks: Indifferentiability at 10 Rounds | online |
2015 | eprint | Security Analysis of Niu et al. Authentication and Ownership Management Protocol | online |
2015 | eprint | Ciphertext-Policy Attribute-Based Broadcast Encryption with Small Keys | online |
2015 | eprint | Bitcoin and Beyond: A Technical Survey on Decentralized Digital Currencies | online |
2015 | eprint | Generic Conversions from CPA to CCA secure Functional Encryption | online |
2015 | eprint | Noise-free Symmetric Fully Homomorphic Encryption based on noncommutative rings | online |
2015 | eprint | Zero-knowledge Argument for Polynomial Evaluation with Application to Blacklists | online |
2015 | eprint | On Necessary Padding with IO | online |
2015 | eprint | Cryptanalysis of Yasuda, Takagi and Sakurai's Signature Scheme Using Invariant Subspaces | online |
2015 | eprint | Applications of Key Recovery Cube-attack-like | online |
2015 | eprint | Financial Cryptography: Discriminatory Pricing Mechanism | online |
2015 | eprint | Private Ciphertext-Policy Attribute-based Encryption Schemes With Constant-Size Ciphertext Supporting CNF Access Policy | online |
2015 | eprint | More Rounds, Less Security? | online |
2015 | eprint | Simple Functional Encryption Schemes for Inner Products | online |
2015 | eprint | Rethinking Privacy for Extended Sanitizable Signatures and a Black-Box Construction of Strongly Private Schemes | online |
2015 | eprint | Improving Local Collisions: New Attacks on Reduced SHA-256 | online |
2015 | eprint | Collateral damage of Facebook Apps: an enhanced privacy scoring model | online |
2015 | eprint | Cryptanalysis of the New CLT Multilinear Maps | online |
2015 | eprint | Relate-Key Almost Universal Hash Functions: Definitions, Constructions and Applications | online |
2015 | eprint | Multi-Key Security: The Even-Mansour Construction Revisited | online |
2015 | eprint | How to Securely Prolong the Computational Bindingness of Pedersen Commitments | online |
2015 | eprint | Indistinguishability Obfuscation from Functional Encryption | online |
2015 | eprint | How to Construct UC-Secure Searchable Symmetric Encryption Scheme | online |
2015 | eprint | Rotational Cryptanalysis of ARX Revisited | online |
2015 | eprint | Computationally binding quantum commitments | online |
2015 | eprint | Predicate Encryption for Circuits from LWE | online |
2015 | eprint | Reliable Message Transmission under Partial Knowledge | online |
2015 | eprint | Making the Best of a Leaky Situation: Zero-Knowledge PCPs from Leakage-Resilient Circuits | online |
2015 | eprint | High Performance Multi-Party Computation for Binary Circuits Based on Oblivious Transfer | online |
2015 | eprint | Differential and Linear Cryptanalysis of ARX with Partitioning - Application to FEAL and Chaskey | online |
2015 | eprint | On the Power of Public-key Functional Encryption with Function Privacy | online |
2015 | eprint | Universally Verifiable Multiparty Computation from Threshold Homomorphic Cryptosystems | online |
2015 | eprint | Leakage-Resilient Cryptography over Large Finite Fields: Theory and Practice | online |
2015 | eprint | Insynd: Privacy-Preserving Secure One-Way Messaging Using Balloons | online |
2015 | eprint | More Efficient Secure Outsourcing Methods for Bilinear Maps | online |
2015 | eprint | TriviA: A Fast and Secure Authenticated Encryption Scheme | online |
2015 | eprint | Decaf: Eliminating cofactors through point compression | online |
2015 | eprint | Algebraic partitioning: Fully compact and (almost) tightly secure cryptography | online |
2015 | eprint | Investigating SRAM PUFs in large CPUs and GPUs | online |
2015 | eprint | Speed-Security Tradeoffs in Blockchain Protocols | online |
2015 | eprint | Secure and Efficient Initialization and Authentication Protocols for SHIELD | online |
2015 | eprint | Non-malleability under Selective Opening Attacks: Implication and Separation | online |
2015 | eprint | Two Operands of Multipliers in Side-Channel Attack | online |
2015 | eprint | Cliptography: Clipping the Power of Kleptographic Attacks | online |
2015 | eprint | Guaranteeing Correctness in Privacy-Friendly Outsourcing by Certificate Validation | online |
2015 | eprint | Asymmetric proof-of-work based on the Generalized Birthday problem | online |
2015 | eprint | Fault Analysis of Kuznyechik | online |
2015 | eprint | A Riddle Wrapped in an Enigma | online |
2015 | eprint | Cold Boot Attacks in the Discrete Logarithm Setting | online |
2015 | eprint | Point-Function Obfuscation: A Framework and Generic Constructions | online |
2015 | eprint | Improved Dual System ABE in Prime-Order Groups via Predicate Encodings | online |
2015 | eprint | A Brief Comparison of Simon and Simeck | online |
2015 | eprint | The Tower Number Field Sieve | online |
2015 | eprint | A note on constructions of bent functions from involutions | online |
2015 | eprint | A SAT-based Public Key Cryptography Scheme | online |
2015 | eprint | Efficiently Obfuscating Re-Encryption Program under DDH Assumption | online |
2015 | eprint | Secure Physical Computation using Disposable Circuits | online |
2015 | eprint | Cryptanalysis Of An Authenticated Image Encryption Scheme Based On Chaotic Maps And Memory Cellular Automata | online |
2015 | eprint | Online Authenticated-Encryption and its Nonce-Reuse Misuse-Resistance | online |
2015 | eprint | Efficient Ring-LWE Encryption on 8-bit AVR Processors | online |
2015 | eprint | Choosing Parameters for NTRUEncrypt | online |
2015 | eprint | A Hardware-based Countermeasure to Reduce Side-Channel Leakage - Design, Implementation, and Evaluation | online |
2015 | eprint | A Privacy Preserving Improvement for SRTA in Telecare Medicine Information System | online |
2015 | eprint | Linear (hull) Cryptanalysis of Round-reduced Versions of KATAN | online |
2015 | eprint | Anonymous Traitor Tracing: How to Embed Arbitrary Information in a Key | online |
2015 | eprint | Improved Higher-Order Differential Attacks on MISTY1 | online |
2015 | eprint | New Techniques for Electronic Voting | online |
2015 | eprint | Cryptanalysis of a (Somewhat) Additively Homomorphic Encryption Scheme Used in PIR | online |
2015 | eprint | Recent progress on the elliptic curve discrete logarithm problem | online |
2015 | eprint | Generic Construction of UC-Secure Oblivious Transfer | online |
2015 | eprint | Internal Differential Boomerangs: Practical Analysis of the Round-Reduced Keccak-f Permutation | online |
2015 | eprint | Universal Computational Extractors and the Superfluous Padding Assumption for Indistinguishability Obfuscation | online |
2015 | eprint | Déjà Q: Encore! Un Petit IBE | online |
2015 | eprint | Factor Base Discrete Logarithms in Kummer Extensions | online |
2015 | eprint | Multi-Client Verifiable Computation with Stronger Security Guarantees | online |
2015 | eprint | Timing and Lattice Attacks on a Remote ECDSA OpenSSL Server: How Practical Are They Really? | online |
2015 | eprint | Decomposition attack on SASASASAS | online |
2015 | eprint | Equivoe-T: Transposition Equivocation Cryptography | online |
2015 | eprint | Cryptanalysis of Provably Secure Certi cateless Short Signature Scheme | online |
2015 | eprint | One Time Programs with Limited Memory | online |
2015 | eprint | The Fairy-Ring Dance: Password Authenticated Key Exchange in a Group | online |
2015 | eprint | One-Round Key Exchange with Strong Security: An Efficient and Generic Construction in the Standard Model | online |
2015 | eprint | Turning Online Ciphers Off | online |
2015 | eprint | Ring-LWE Cryptography for the Number Theorist | online |
2015 | eprint | Cut Down the Tree to Achieve Constant Complexity in Divisible E-Cash | online |
2015 | eprint | Efficient Key Extraction from the Primary Side of a Switched-Mode Power Supply | online |
2015 | eprint | Key-recovery attacks against the MAC algorithm Chaskey | online |
2015 | eprint | Secure Multi-Party Computation with Identifiable Abort | online |
2015 | eprint | An Improved BKW Algorithm for LWE with Applications to Cryptography and Lattices | online |
2015 | eprint | Who watches the watchmen? : Utilizing Performance Monitors for Compromising keys of RSA on Intel Platforms | online |
2015 | eprint | Generalizing Homomorphic MACs for Arithmetic Circuits | online |
2015 | eprint | Authenticated Encryption without Tag Expansion (or, How to Accelerate AERO) | online |
2015 | eprint | Cryptanalysis of a Markov Chain Based User Authentication Scheme | online |
2015 | eprint | Triathlon of Lightweight Block Ciphers for the Internet of Things | online |
2015 | eprint | Naturally Rehearsing Passwords | online |
2015 | eprint | Generating S-Box Multivariate Quadratic Equation Systems And Estimating Algebraic Attack Resistance Aided By SageMath | online |
2015 | eprint | Quantum homomorphic encryption for circuits of low T-gate complexity | online |
2015 | eprint | Nonuniform Indistinguishability and Unpredictability Hardcore Lemmas: New Proofs and Applications to Pseudoentropy | online |
2015 | eprint | Standard Security Does Not Imply Indistinguishability Under Selective Opening | online |
2015 | eprint | Multi-keyword Similarity Search Over Encrypted Cloud Data | online |
2015 | eprint | Forgery Attacks on round-reduced ICEPOLE-128 | online |
2015 | eprint | Surreptitiously Weakening Cryptographic Systems | online |
2015 | eprint | Improved Meet-in-the-Middle Distinguisher on Feistel Schemes | online |
2015 | eprint | Type-Based Verification of Electronic Voting Protocols | online |
2015 | eprint | Binary Field Multiplication on ARMv8 | online |
2015 | eprint | The OPTLS Protocol and TLS 1.3 | online |
2015 | eprint | Notes on Two Fully Homomorphic Encryption Schemes Without Bootstrapping | online |
2015 | eprint | On the Communication Complexity of Secure Computation | online |
2015 | eprint | Tight Bounds for Keyed Sponges and Truncated CBC | online |
2015 | eprint | Cryptanalysis and Improvement of Identity-based Proxy Multi-signature scheme | online |
2015 | eprint | Using State Space Encoding To Counter Biased Fault Attacks on AES Countermeasures | online |
2015 | eprint | Contention in Cryptoland: Obfuscation, Leakage and UCE | online |
2015 | eprint | Analyzing the Efficiency of Biased-Fault Based Attacks | online |
2015 | eprint | Adaptive-ID Secure Revocable Identity-Based Encryption from Lattices via Subset Difference Method | online |
2015 | eprint | Verifiable Random Functions from Standard Assumptions | online |
2015 | eprint | Efficient Format Preserving Encrypted Databases | online |
2015 | eprint | Oblivious Transfer from weakly Random Self-Reducible Public-Key Cryptosystem | online |
2015 | eprint | A revocable anonymity in Tor | online |
2015 | eprint | Linear Distinguishers in the Key-less Setting: Application to PRESENT | online |
2015 | eprint | Efficient Fully Homomorphic Encryption with Circularly Secure Key Switching Process | online |
2015 | eprint | Accelerating Homomorphic Evaluation on Reconfigurable Hardware | online |
2015 | eprint | Private Proximity Testing on Steroids: An NTRU-based Protocol | online |
2015 | eprint | How to detect unauthorised usage of a key | online |
2015 | eprint | One-Sided Device-Independent QKD and Position-based Cryptography from Monogamy Games | online |
2015 | eprint | Simulation-based Selective Opening CCA Security for PKE from Key Encapsulation Mechanisms | online |
2015 | eprint | Extended Functionality in Verifiable Searchable Encryption | online |
2015 | eprint | Fully Succinct Garbled RAM | online |
2015 | eprint | Lightweight MDS Involution Matrices | online |
2015 | eprint | Statistical and Algebraic Properties of DES | online |
2015 | eprint | Stream Cipher Operation Modes with Improved Security against Generic Collision Attacks | online |
2015 | eprint | Revisiting Atomic Patterns for Scalar Multiplications on Elliptic Curves | online |
2015 | eprint | Cryptanalysis of Feistel Networks with Secret Round Functions | online |
2015 | eprint | Harder, Better, Faster, Stronger - Elliptic Curve Discrete Logarithm Computations on FPGAs | online |
2015 | eprint | Automating Fast and Secure Translations from Type-I to Type-III Pairing Schemes | online |
2015 | eprint | Security Evaluation and Enhancement of Bistable Ring PUFs | online |
2015 | eprint | Revisiting Cryptographic Accumulators, Additional Properties and Relations to other Primitives | online |
2015 | eprint | Private Computation on Encrypted Genomic Data | online |
2015 | eprint | Efficient Delegation of Zero-Knowledge Proofs of Knowledge in a Pairing-Friendly Setting | online |
2015 | eprint | Fully Secure Unbounded Revocable Attribute-Based Encryption in Prime Order Bilinear Groups via Subset Difference Method | online |
2015 | eprint | New Distinguishers for Reduced Round Trivium and Trivia-SC using Cube Testers | online |
2015 | eprint | Compactly Hiding Linear Spans: Tightly Secure Constant-Size Simulation-Sound QA-NIZK Proofs and Applications | online |
2015 | eprint | Evaluating the Duplication of Dual-Rail Precharge Logics on FPGAs | online |
2015 | eprint | SCLPV: Secure Certificateless Public Verification for Cloud Storage in Cyber-physical-social System | online |
2015 | eprint | Leakage-Resilient Identification Schemes from Zero-Knowledge Proofs of Storage | online |
2015 | eprint | On Limitations of the Fiat - Shamir Transformation | online |
2015 | eprint | Parallel Implementation of Number Theoretic Transform | online |
2015 | eprint | Black-Box Parallel Garbled RAM | online |
2015 | eprint | Breaking the Rabin-Williams digital signature system implementation in the Crypto++ library | online |
2015 | eprint | Modern Cryptography Through the Lens of Secret Sharing | online |
2015 | eprint | Meet-in-the-Middle Attacks and Structural Analysis of Round-Reduced PRINCE | online |
2015 | eprint | Practical Divisible E-Cash | online |
2015 | eprint | Factoring N=pr qs for Large r and s | online |
2015 | eprint | GCM-SIV: Full Nonce Misuse-Resistant Authenticated Encryption at Under One Cycle per Byte | online |
2015 | eprint | The Energy Budget for Wireless Security: Extended Version | online |
2015 | eprint | Very-efficient simulatable flipping of many coins into a well | online |
2015 | eprint | Improved Linear Cryptanalysis of reduced-round SIMON-32 and SIMON-48 | online |
2015 | eprint | De Bruijn Sequences from Nonlinear Feedback Shift Registers | online |
2015 | eprint | Security of the AES with a Secret S-box | online |
2015 | eprint | Towards Easy Leakage Certification | online |
2015 | eprint | Augmented Secure Channels and the Goal of the TLS 1.3 Record Layer | online |
2015 | eprint | Unifying Leakage Classes: Simulatable Leakage and Pseudoentropy | online |
2015 | eprint | On Obfuscation with Random Oracles | online |
2015 | eprint | Unbounded Hierarchical Identity-Based Encryption with Efficient Revocation | online |
2015 | eprint | Links Between Truncated Differential and Multidimensional Linear Properties of Block Ciphers and Underlying Attack Complexities | online |
2015 | eprint | Decomposing the ASASA Block Cipher Construction | online |
2015 | eprint | Broadcasting Intermediate Blocks as a Defense Mechanism Against Selfish-Mine in Bitcoin | online |
2015 | eprint | Silent Simon: A Threshold Implementation under 100 Slices | online |
2015 | eprint | Onion ORAM: A Constant Bandwidth and Constant Client Storage ORAM (without FHE or SWHE) | online |
2015 | eprint | Fault Cryptanalysis of CHES 2014 Symmetric Infective Countermeasure | online |
2015 | eprint | Faster sieving for shortest lattice vectors using spherical locality-sensitive hashing | online |
2015 | eprint | Arithmetic Addition over Boolean Masking - Towards First- and Second-Order Resistance in Hardware | online |
2015 | eprint | Dual System Encryption Framework in Prime-Order Groups | online |
2015 | eprint | On the Regularity of Lossy RSA: Improved Bounds and Applications to Padding-Based Encryption | online |
2015 | eprint | How much randomness can be extracted from memoryless Shannon entropy sources? | online |
2015 | eprint | Assessment of Hiding the Higher-Order Leakages in Hardware - what are the achievements versus overheads? | online |
2015 | eprint | Exploiting the Order of Multiplier Operands: A Low Cost Approach for HCCA Resistance | online |
2015 | eprint | Foundations of Reactive Garbling Schemes | online |
2015 | eprint | Buying AES Design Resistance with Speed and Energy | online |
2015 | eprint | State-recovery analysis of Spritz | online |
2015 | eprint | Mergeable Functional Encryption | online |
2015 | eprint | Problems, solutions and experience of the first international student's Olympiad in cryptography | online |
2015 | eprint | Composable & Modular Anonymous Credentials: Definitions and Practical Constructions | online |
2015 | eprint | Constrained Key-Homomorphic PRFs from Standard Lattice Assumptions Or: How to Secretly Embed a Circuit in Your PRF | online |
2015 | eprint | Efficient Unlinkable Sanitizable Signatures from Signatures with Rerandomizable Keys | online |
2015 | eprint | When Organized Crime Applies Academic Results - A Forensic Analysis of an In-Card Listening Device | online |
2015 | eprint | KDM-Security via Homomorphic Smooth Projective Hashing | online |
2015 | eprint | Biclique cryptanalysis of MIBS-80 and PRESENT-80 | online |
2015 | eprint | Group Signatures from Lattices: Simpler, Tighter, Shorter, Ring-based | online |
2015 | eprint | Side-Channel Security Analysis of Ultra-Low-Power FRAM-based MCUs | online |
2015 | eprint | The Chain Rule for HILL Pseudoentropy, Revisited | online |
2015 | eprint | Programmable Hash Functions go Private: Constructions and Applications to (Homomorphic) Signatures with Shorter Public Keys | online |
2015 | eprint | iDASH Secure Genome Analysis Competition Using ObliVM | online |
2015 | eprint | Which Ring Based Somewhat Homomorphic Encryption Scheme is Best? | online |
2015 | eprint | SECOND COORDINATE SEQUENCE OF MP-LRS OVER NONTRIVIAL GALOIS RING OF ODD CHARACTERISTIC | online |
2015 | eprint | Leaked-State-Forgery Attack Against The Authenticated Encryption Algorithm ALE | online |
2015 | eprint | On Generalized First Fall Degree Assumptions | online |
2015 | eprint | Secure two-party computation in applied pi-calculus: models and verification | online |
2015 | eprint | On the Effectiveness of the Remanence Decay Side-Channel to Clone Memory-based PUFs | online |
2015 | eprint | A Complete and Linear Physical Characterization Methodology for the Arbiter PUF Family | online |
2015 | eprint | Secure Random Linear Code Based Public Key Encryption Scheme RLCE | online |
2015 | eprint | Real time detection of cache-based side-channel attacks using Hardware Performance Counters | online |
2015 | eprint | Practical Cryptanalysis of Full Sprout with TMD Tradeoff Attacks | online |
2015 | eprint | QA-NIZK Arguments in Asymmetric Groups: New Tools and New Constructions | online |
2015 | eprint | Duality in ABE: Converting Attribute Based Encryption for Dual Predicate and Dual Policy via Computational Encodings | online |
2015 | eprint | Improved security proofs in lattice-based cryptography: using the Rényi divergence rather than the statistical distance | online |
2015 | eprint | Efficient MDS Diffusion Layers Through Decomposition of Matrices | online |
2015 | eprint | Computing Elliptic Curve Discrete Logarithms with Improved Baby-step Giant-step Algorithm | online |
2015 | eprint | A Physical Approach for Stochastic Modeling of TERO-based TRNG | online |
2015 | eprint | Verified Proofs of Higher-Order Masking | online |
2015 | eprint | Linear Cryptanalysis of Reduced-Round SIMECK Variants | online |
2015 | eprint | Modelling ciphersuite and version negotiation in the TLS protocol | online |
2015 | eprint | Sequential Secret Sharing as a New Hierarchical Access Structure | online |
2015 | eprint | XLS is not a Strong Pseudorandom Permutation | online |
2015 | eprint | Post-Zeroizing Obfuscation: The case of Evasive Circuits | online |
2015 | eprint | Bent and Semi-bent Functions via Linear Translators | online |
2015 | eprint | Cracking-Resistant Password Vaults using Natural Language Encoders | online |
2015 | eprint | The Design Space of Lightweight Cryptography | online |
2015 | eprint | Bit Coincidence Mining Algorithm | online |
2015 | eprint | Nearly Sparse Linear Algebra | online |
2015 | eprint | Algorithmic Information Theory for Obfuscation Security | online |
2015 | eprint | A Note on the Lindell-Waisbard Private Web Search Scheme | online |
2015 | eprint | An Efficient Multiple PKG Compatible Identity Based Key Agreement for Vehicular Networks | online |
2015 | eprint | Differential-Linear Cryptanalysis of ICEPOLE | online |
2015 | eprint | Provable Virus Detection: Using the Uncertainty Principle to Protect Against Malware | online |
2015 | eprint | PRAMOD: A Privacy-Preserving Framework for Supporting Efficient and Secure Database-as-a-Service | online |
2015 | eprint | Tradeoff Cryptanalysis of Memory-Hard Functions | online |
2015 | eprint | Compositions of linear functions and applications to hashing | online |
2015 | eprint | A Unified Security Analysis of Two-phase Key Exchange Protocols in TPM 2.0 | online |
2015 | eprint | Modular Hardware Architecture for Somewhat Homomorphic Function Evaluation | online |
2015 | eprint | SoC it to EM: electromagnetic side-channel attacks on a complex system-on-chip | online |
2015 | eprint | Privacy-Preserving Content-Based Image Retrieval in the Cloud (Extended Version) | online |
2015 | eprint | Boosting OMD for Almost Free Authentication of Associated Data | online |
2015 | eprint | Efficient Server-Aided Secure Two-Party Function Evaluation with Applications to Genomic Computation | online |
2015 | eprint | An Improvment of the Elliptic Net Algorithm | online |
2015 | eprint | PLayPUF: Programmable Logically Erasable PUFs for Forward and Backward Secure Key Management | online |
2015 | eprint | An Efficient ID-Based Message Recoverable Privacy-Preserving Auditing Scheme | online |
2015 | eprint | Security Analysis of Cryptosystems Using Short Generators over Ideal Lattices | online |
2015 | eprint | Secure Association for the Internet of Things | online |
2015 | eprint | Linearly Homomorphic Encryption from DDH | online |
2015 | eprint | Achieving Compactness Generically: Indistinguishability Obfuscation from Non-Compact Functional Encryption | online |
2015 | eprint | Multilinear Map via Scale-Invariant FHE: Enhancing Security and Efficiency | online |
2015 | eprint | Smaller Keys for Code-Based Cryptography: QC-MDPC McEliece Implementations on Embedded Devices | online |
2015 | eprint | Efficient ephemeral elliptic curve cryptographic keys | online |
2015 | eprint | Adaptively Secure Coin-Flipping, Revisited | online |
2015 | eprint | Combining Differential Privacy and Secure Multiparty Computation | online |
2015 | eprint | ASCA, SASCA and DPA with Enumeration: Which One Beats the Other and When? | online |
2015 | eprint | Almost-tight Identity Based Encryption against Selective Opening Attack | online |
2015 | eprint | A Synthetic Indifferentiability Analysis of Interleaved Double-Key Even-Mansour Ciphers | online |
2015 | eprint | Dumb Crypto in Smart Grids: Practical Cryptanalysis of the Open Smart Grid Protocol | online |
2015 | eprint | Towards Secure Cryptographic Software Implementation Against Side-Channel Power Analysis Attacks | online |
2015 | eprint | A Hybrid Approach for the Secure Transmission of H.264/AVC Video Streams | online |
2015 | eprint | Arithmetic Cryptography | online |
2015 | eprint | Identity-Based Encryption Secure Against Selective Opening Chosen-Ciphertext Attack | online |
2015 | eprint | Higher-order cryptanalysis of LowMC | online |
2015 | eprint | Enhancing Trust in Reconfigurable Based Hardware Systems with Tags and Monitors | online |
2015 | eprint | New Realizations of Somewhere Statistically Binding Hashing and Positional Accumulators | online |
2015 | eprint | A Provably Secure Group Signature Scheme from Code-Based Assumptions | online |
2015 | eprint | Towards Provably-Secure Remote Memory Attestation | online |
2015 | eprint | Robust and One-Pass Parallel Computation of Correlation-Based Attacks at Arbitrary Order | online |
2015 | eprint | Improved Masking for Tweakable Blockciphers with Applications to Authenticated Encryption | online |
2015 | eurocrypt | A Privacy Research Roadmap for a National Privacy Research Strategy | |
2015 | eurocrypt | Practical Applications of Homomorphic Encryption | |
2015 | eurocrypt | Threshold Implementations | |
2015 | eurocrypt | Function Secret Sharing | online |
2015 | eurocrypt | Noisy Leakage Revisited | online |
2015 | eurocrypt | Two Halves Make a Whole - Reducing Data Transfer in Garbled Circuits Using Half Gates | online |
2015 | eurocrypt | Verified Proofs of Higher-Order Masking | online |
2015 | eurocrypt | Linear Secret Sharing Schemes from Error Correcting Codes and Universal Hash Functions | online |
2015 | eurocrypt | On the Provable Security of the Iterated Even-Mansour Cipher Against Related-Key and Chosen-Key Attacks | online |
2015 | eurocrypt | A Formal Treatment of Backdoored Pseudorandom Generators | online |
2015 | eurocrypt | Authenticated Key Exchange from Ideal Lattices | online |
2015 | eurocrypt | Cryptanalysis of the Multilinear Map over the Integers | online |
2015 | eurocrypt | Twisted Polynomials and Forgery Attacks on GCM | online |
2015 | eurocrypt | Fully Homomophic Encryption over the Integers Revisited | online |
2015 | eurocrypt | How to Efficiently Evaluate RAM Programs with Malicious Security | online |
2015 | eurocrypt | Making Masking Security Proofs Concrete - Or How to Evaluate the Security of Any Leaking Device | online |
2015 | eurocrypt | Cryptanalysis of SP Networks with Partial Non-Linear Layers | online |
2015 | eurocrypt | One-Out-of-Many Proofs: Or How to Leak a Secret and Spend a Coin | online |
2015 | eurocrypt | FHEW: Bootstrapping Homomorphic Encryption in Less Than a Second | online |
2015 | eurocrypt | Ciphers for MPC and FHE | 430-454 |
2015 | eurocrypt | KDM-CCA Security from RKA Secure Authenticated Encryption | online |
2015 | eurocrypt | (Batch) Fully Homomorphic Encryption over Integers for Non-Binary Message Spaces | online |
2015 | eurocrypt | Executable Proofs, Input-Size Hiding Secure Computation and a New Ideal World | online |
2015 | eurocrypt | More Efficient Oblivious Transfer Extensions with Security for Malicious Adversaries | online |
2015 | eurocrypt | Universal Signature Aggregators | 3-34 |
2015 | eurocrypt | Cryptographic Reverse Firewalls | online |
2015 | eurocrypt | Advances in Cryptology - EUROCRYPT 2015 - 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part II | |
2015 | eurocrypt | Cube Attacks and Cube-Attack-Like Cryptanalysis on the Round-Reduced Keccak Sponge Function | online |
2015 | eurocrypt | A Provable-Security Analysis of Intel's Secure Key RNG | online |
2015 | eurocrypt | Hosting Services on an Untrusted Cloud | online |
2015 | eurocrypt | Cluster Computing in Zero Knowledge | online |
2015 | eurocrypt | Generic Hardness of the Multiple Discrete Logarithm Problem | online |
2015 | eurocrypt | The Sum Can Be Weaker Than Each Part | online |
2015 | eurocrypt | Privacy-Free Garbled Circuits with Applications to Efficient Zero-Knowledge | online |
2015 | eurocrypt | Mind the Gap: Modular Machine-Checked Proofs of One-Round Key Exchange Protocols | online |
2015 | eurocrypt | Privacy Amplification in the Isolated Qubits Model | online |
2015 | eurocrypt | Disjunctions for Hash Proof Systems: New Constructions and Applications | online |
2015 | eurocrypt | Fully Structure-Preserving Signatures and Shrinking Commitments | online |
2015 | eurocrypt | Quasi-Adaptive NIZK for Linear Subspaces Revisited | online |
2015 | eurocrypt | Semantically Secure Order-Revealing Encryption: Multi-input Functional Encryption Without Obfuscation | online |
2015 | eurocrypt | Resisting Randomness Subversion: Fast Deterministic and Hedged Public-Key Encryption in the Standard Model | online |
2015 | eurocrypt | The Bitcoin Backbone Protocol: Analysis and Applications | online |
2015 | eurocrypt | The Multiple Number Field Sieve with Conjugation and Generalized Joux-Lercier Methods | online |
2015 | eurocrypt | SPHINCS: Practical Stateless Hash-Based Signatures | online |
2015 | eurocrypt | Better Algorithms for LWE and LWR | online |
2015 | eurocrypt | End-to-End Verifiable Elections in the Standard Model | online |
2015 | eurocrypt | On the Behaviors of Affine Equivalent Sboxes Regarding Differential and Linear Attacks | online |
2015 | eurocrypt | Advances in Cryptology - EUROCRYPT 2015 - 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part I | |
2015 | eurocrypt | Non-Interactive Zero-Knowledge Proofs in the Quantum Random Oracle Model | online |
2015 | eurocrypt | Improving NFS for the Discrete Logarithm Problem in Non-prime Finite Fields | 129-155 |
2015 | eurocrypt | Structural Evaluation by Generalized Integral Property | online |
2015 | eurocrypt | On Computing Nearest Neighbors with Applications to Decoding of Binary Linear Codes | online |
2015 | eurocrypt | Quadratic Time, Linear Space Algorithms for Gram-Schmidt Orthogonalization and Gaussian Sampling in Structured Lattices | online |
2015 | eurocrypt | Cryptographic Agents: Towards a Unified Theory of Computing on Encrypted Data | online |
2015 | eurocrypt | Robust Authenticated-Encryption AEZ and the Problem That It Solves | 15-44 |
2015 | eurocrypt | Inner Product Masking Revisited | online |
2015 | eurocrypt | Bootstrapping for HElib | online |
2015 | eurocrypt | A Generic Approach to Invariant Subspace Attacks: Cryptanalysis of Robin, iSCREAM and Zorro | online |
2015 | eurocrypt | Leakage-Resilient Circuits Revisited - Optimal Number of Computing Components Without Leak-Free Hardware | online |
2015 | eurocrypt | How to Obfuscate Programs Directly | online |
2015 | eurocrypt | Cryptanalytic Time-Memory-Data Tradeoffs for FX-Constructions with Applications to PRINCE and PRIDE | online |
2015 | eurocrypt | Improved Dual System ABE in Prime-Order Groups via Predicate Encodings | online |
2015 | fse | Optimally Secure Tweakable Blockciphers | online |
2015 | fse | A New Classification of 4-bit Optimal S-boxes and Its Application to PRESENT, RECTANGLE and SPONGENT | online |
2015 | fse | Practical Cryptanalysis of the Open Smart Grid Protocol | online |
2015 | fse | A More Cautious Approach to Security Against Mass Surveillance | online |
2015 | fse | On Lightweight Stream Ciphers with Shorter Internal States | online |
2015 | fse | Differential Analysis and Meet-in-the-Middle Attack Against Round-Reduced TWINE | online |
2015 | fse | New Linear Correlations Related to State Information of RC4 PRGA Using IV in WPA | online |
2015 | fse | Meet-in-the-Middle Attacks and Structural Analysis of Round-Reduced PRINCE | online |
2015 | fse | Security of the AES with a Secret S-Box | online |
2015 | fse | Related-Key Forgeries for Prøst-OTR | online |
2015 | fse | The Related-Key Security of Iterated Even-Mansour Ciphers | online |
2015 | fse | Rotational Cryptanalysis of ARX Revisited | online |
2015 | fse | Linear Distinguishers in the Key-less Setting: Application to PRESENT | online |
2015 | fse | Differential-Linear Cryptanalysis of ICEPOLE | online |
2015 | fse | Simpler and More Efficient Rank Estimation for Side-Channel Security Assessment | online |
2015 | fse | Analysis of Impossible, Integral and Zero-Correlation Attacks on Type-II Generalized Feistel Networks Using the Matrix Method | online |
2015 | fse | Security of Keyed Sponge Constructions Using a Modular Proof Approach | online |
2015 | fse | Lightweight MDS Involution Matrices | online |
2015 | fse | Boosting OMD for Almost Free Authentication of Associated Data | online |
2015 | fse | Relaxing Full-Codebook Security: A Refined Analysis of Key-Length Extension Schemes | online |
2015 | fse | GCM Security Bounds Reconsidered | online |
2015 | fse | Protecting Against Multidimensional Linear and Truncated Differential Cryptanalysis by Decorrelation | online |
2015 | fse | Fast Software Encryption - 22nd International Workshop, FSE 2015, Istanbul, Turkey, March 8-11, 2015, Revised Selected Papers | |
2015 | fse | Comb to Pipeline: Fast Software Encryption Revisited | online |
2015 | fse | Conversion from Arithmetic to Boolean Masking with Logarithmic Complexity | online |
2015 | fse | Cryptanalysis of JAMBU | online |
2015 | fse | Meet-in-the-Middle Technique for Truncated Differential and Its Applications to CLEFIA and Camellia | online |
2015 | fse | Improved Higher-Order Differential Attacks on MISTY1 | online |
2015 | fse | Internal Differential Boomerangs: Practical Analysis of the Round-Reduced Keccak- f f Permutation | online |
2015 | fse | Challenges in Lightweight Crypto Standardization | |
2015 | fse | Conflicting roles: the NSA and cryptography | |
2015 | jofc | GNUC: A New Universal Composability Framework | 423-508 |
2015 | jofc | Reflection Cryptanalysis of PRINCE-Like Ciphers | 718-744 |
2015 | jofc | A Unified Approach to Deterministic Encryption: New Constructions and a Connection to Computational Entropy | 671-717 |
2015 | jofc | Protocols for Multiparty Coin Toss with a Dishonest Majority | 551-600 |
2015 | jofc | From Non-adaptive to Adaptive Pseudorandom Functions | 297-311 |
2015 | jofc | Subtleties in the Definition of IND-CCA: When and How Should Challenge Decryption Be Disallowed? | 29-48 |
2015 | jofc | Provable Unlinkability Against Traffic Analysis with Low Message Overhead | 623-640 |
2015 | jofc | Collision Attack on Grindahl | 879-898 |
2015 | jofc | Tight Security for Signature Schemes Without Random Oracles | 641-670 |
2015 | jofc | Cryptanalysis of SHA-0 and Reduced SHA-1 | 110-160 |
2015 | jofc | Using Fully Homomorphic Hybrid Encryption to Minimize Non-interative Zero-Knowledge Proofs | 820-843 |
2015 | jofc | Computing on Authenticated Data | 351-395 |
2015 | jofc | On Weak Keys and Forgery Attacks Against Polynomial-Based MAC Schemes | 769-795 |
2015 | jofc | Almost-Everywhere Secure Computation with Edge Corruptions | 745-768 |
2015 | jofc | On the Complexity of Constructing Pseudorandom Functions (Especially when They Don't Exist) | 509-532 |
2015 | jofc | Polynomial-Time Solutions of Computational Problems in Noncommutative-Algebraic Cryptography | 601-622 |
2015 | jofc | Improved Single-Key Attacks on 8-Round AES-192 and AES-256 | 397-422 |
2015 | jofc | Confined Guessing: New Signatures From Standard Assumptions | 176-208 |
2015 | jofc | Efficient Asynchronous Verifiable Secret Sharing and Multiparty Computation | 49-109 |
2015 | jofc | New Attacks on IDEA with at Least 6 Rounds | 209-239 |
2015 | jofc | Slidex Attacks on the Even-Mansour Encryption Scheme | 1-28 |
2015 | jofc | The Rebound Attack and Subspace Distinguishers: Application to Whirlpool | 257-296 |
2015 | jofc | How to Achieve Perfect Simulation and a Complete Problem for Non-interactive Perfect Zero-Knowledge | 533-550 |
2015 | jofc | An Efficient Protocol for Secure Two-Party Computation in the Presence of Malicious Adversaries | 312-350 |
2015 | jofc | Quantum Private Information Retrieval has Linear Communication Complexity | 161-175 |
2015 | jofc | Spreading Alerts Quietly and the Subgroup Escape Problem | 796-819 |
2015 | jofc | Efficient Recursive Diffusion Layers for Block Ciphers and Hash Functions | 240-256 |
2015 | jofc | New Proofs for NMAC and HMAC: Security without Collision Resistance | 844-878 |
2015 | pkc | A Polynomial-Time Attack on the BBCRS Scheme | online |
2015 | pkc | Additively Homomorphic UC Commitments with Optimal Amortized Overhead | online |
2015 | pkc | One-Round Key Exchange with Strong Security: An Efficient and Generic Construction in the Standard Model | online |
2015 | pkc | Simulation-Based Selective Opening CCA Security for PKE from Key Encapsulation Mechanisms | online |
2015 | pkc | Adaptive Proofs of Knowledge in the Random Oracle Model | online |
2015 | pkc | Continuous Non-malleable Key Derivation and Its Application to Related-Key Security | online |
2015 | pkc | Divisible E-Cash Made Practical | online |
2015 | pkc | On the Selective Opening Security of Practical Public-Key Encryption Schemes | online |
2015 | pkc | Collision of Random Walks and a Refined Analysis of Attacks on the Discrete Logarithm Problem | online |
2015 | pkc | How Secure is Deterministic Encryption? | online |
2015 | pkc | Secure Efficient History-Hiding Append-Only Signatures in the Standard Model | online |
2015 | pkc | Bootstrapping BGV Ciphertexts with a Wider Choice of p and q | online |
2015 | pkc | Algebraic Cryptanalysis of a Quantum Money Scheme The Noise-Free Case | online |
2015 | pkc | Interactive Message-Locked Encryption and Secure Deduplication | online |
2015 | pkc | Strongly-Optimal Structure Preserving Signatures from Type II Pairings: Synthesis and Lower Bounds | online |
2015 | pkc | Simple Functional Encryption Schemes for Inner Products | online |
2015 | pkc | Faster ECC over \mathbb F_2^521-1 | online |
2015 | pkc | Digital Signatures from Strong RSA without Prime Generation | online |
2015 | pkc | On the Practical Security of Inner Product Functional Encryption | online |
2015 | pkc | Simple Lattice Trapdoor Sampling from a Broad Class of Distributions | online |
2015 | pkc | A Profitable Sub-prime Loan: Obtaining the Advantages of Composite Order in Prime-Order Bilinear Groups | online |
2015 | pkc | Public-Key Encryption Indistinguishable Under Plaintext-Checkable Attacks | online |
2015 | pkc | Anonymous Transferable E-Cash | online |
2015 | pkc | Adaptive Witness Encryption and Asymmetric Password-Based Cryptography | online |
2015 | pkc | A Tamper and Leakage Resilient von Neumann Architecture | online |
2015 | pkc | Short Signatures with Short Public Keys from Homomorphic Trapdoor Functions | online |
2015 | pkc | Making Sigma-Protocols Non-interactive Without Random Oracles | online |
2015 | pkc | Identity-Based Encryption with (Almost) Tight Security in the Multi-instance, Multi-ciphertext Setting | online |
2015 | pkc | Tightly-Secure Signatures from Chameleon Hash Functions | online |
2015 | pkc | Group Signatures from Lattices: Simpler, Tighter, Shorter, Ring-Based | online |
2015 | pkc | A Polynomial-Time Key-Recovery Attack on MQQ Cryptosystems | online |
2015 | pkc | Predicate Encryption for Multi-dimensional Range Queries from Lattices | online |
2015 | pkc | Simpler Efficient Group Signatures from Lattices | online |
2015 | pkc | Two-Server Password-Authenticated Secret Sharing UC-Secure Against Transient Corruptions | online |
2015 | pkc | Public-Key Cryptography - PKC 2015 - 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 - April 1, 2015, Proceedings | |
2015 | pkc | Low Noise LPN: KDM Secure Public Key Encryption and Sample Amplification | online |
2015 | pkc | Packing Messages and Optimizing Bootstrapping in GSW-FHE | online |
2015 | pkc | Recent Advances in Algorithms for Computing Discrete Logarithms | |
2015 | pkc | New Advances in Obfuscation and its Applications | |
2015 | tcc | Tightly-Secure Authenticated Key Exchange | online |
2015 | tcc | Leakage-Resilient Non-malleable Codes | online |
2015 | tcc | Non-committing Encryption from Φ-hiding | online |
2015 | tcc | Random-Oracle Uninstantiability from Indistinguishability Obfuscation | online |
2015 | tcc | Function-Private Functional Encryption in the Private-Key Setting | online |
2015 | tcc | Obfuscation-Based Non-black-box Simulation and Four Message Concurrent Zero Knowledge for NP | online |
2015 | tcc | A Little Honesty Goes a Long Way - The Two-Tier Model for Secure Multiparty Computation | online |
2015 | tcc | Two-Round Adaptively Secure MPC from Indistinguishability Obfuscation | online |
2015 | tcc | Public Verification of Private Effort | online |
2015 | tcc | Separations in Circular Security for Arbitrary Length Key Cycles | online |
2015 | tcc | Outlier Privacy | online |
2015 | tcc | General Statistically Secure Computation with Bounded-Resettable Hardware Tokens | online |
2015 | tcc | The Power of Negations in Cryptography | online |
2015 | tcc | Block Ciphers: From Practice back to Theory | |
2015 | tcc | Wyner's Wire-Tap Channel, Forty Years Later | |
2015 | tcc | An Alternative Approach to Non-black-box Simulation in Fully Concurrent Setting | online |
2015 | tcc | From Single-Bit to Multi-bit Public-Key Encryption via Non-malleable Codes | online |
2015 | tcc | Aggregate Pseudorandom Functions and Connections to Learning | 61-89 |
2015 | tcc | Locally Decodable and Updatable Non-malleable Codes and Their Applications | online |
2015 | tcc | Secure Physical Computation Using Disposable Circuits | online |
2015 | tcc | On the Regularity of Lossy RSA - Improved Bounds and Applications to Padding-Based Encryption | online |
2015 | tcc | On Basing Size-Verifiable One-Way Functions on NP-Hardness | online |
2015 | tcc | Constructing and Understanding Chosen Ciphertext Security via Puncturable Key Encapsulation Mechanisms | online |
2015 | tcc | Oblivious Polynomial Evaluation and Secure Set-Intersection from Algebraic PRFs | online |
2015 | tcc | Obfuscating Circuits via Composite-Order Graded Encoding | online |
2015 | tcc | ZAPs and Non-Interactive Witness Indistinguishability from Indistinguishability Obfuscation | online |
2015 | tcc | Richer Efficiency/Security Trade-offs in 2PC | online |
2015 | tcc | From Weak to Strong Zero-Knowledge and Applications | online |
2015 | tcc | Stretching Groth-Sahai: NIZK Proofs of Partial Satisfiability | online |
2015 | tcc | Key-Homomorphic Constrained Pseudorandom Functions | online |
2015 | tcc | Resettably Sound Zero-Knowledge Arguments from OWFs - The (Semi) Black-Box Way | online |
2015 | tcc | Complete Characterization of Fairness in Secure Two-Party Computation of Boolean Functions | online |
2015 | tcc | On Obfuscation with Random Oracles | online |
2015 | tcc | Theory of Cryptography - 12th Theory of Cryptography Conference, TCC 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part II | |
2015 | tcc | Topology-Hiding Computation | online |
2015 | tcc | Adaptively Secure Two-Party Computation from Indistinguishability Obfuscation | 557-585 |
2015 | tcc | Functional Encryption for Randomized Functionalities in the Private-Key Setting from Minimal Assumptions | online |
2015 | tcc | Tamper Detection and Continuous Non-malleable Codes | online |
2015 | tcc | Verifiable Random Functions from Weaker Assumptions | online |
2015 | tcc | An Efficient Transform from Sigma Protocols to NIZK with a CRS and Non-programmable Random Oracle | online |
2015 | tcc | Obfuscation of Probabilistic Circuits and Applications | online |
2015 | tcc | Optimal Algebraic Manipulation Detection Codes in the Constant-Error Model | online |
2015 | tcc | Public-Coin Differing-Inputs Obfuscation and Its Applications | online |
2015 | tcc | A Rate-Optimizing Compiler for Non-malleable Codes Against Bit-Wise Tampering and Permutations | online |
2015 | tcc | Constrained Key-Homomorphic PRFs from Standard Lattice Assumptions - Or: How to Secretly Embed a Circuit in Your PRF | 1-30 |
2015 | tcc | Graph-Induced Multilinear Maps from Lattices | online |
2015 | tcc | Tight Parallel Repetition Theorems for Public-Coin Arguments Using KL-Divergence | online |
2015 | tcc | Round-Efficient Concurrently Composable Secure Computation via a Robust Extraction Lemma | online |
2015 | tcc | The Randomized Iterate, Revisited - Almost Linear Seed Length PRGs from a Broader Class of One-Way Functions | online |
2015 | tcc | Non-malleable Condensers for Arbitrary Min-entropy, and Almost Optimal Protocols for Privacy Amplification | online |
2015 | tcc | Theory of Cryptography - 12th Theory of Cryptography Conference, TCC 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part I | |
2015 | tcc | Adaptively Secure, Universally Composable, Multiparty Computation in Constant Rounds | online |
2015 | tcc | Functional Encryption for Randomized Functionalities | online |
2015 | tcc | Multi-Client Verifiable Computation with Stronger Security Guarantees | online |
2015 | tcc | Primary-Secondary-Resolver Membership Proof Systems | online |
2015 | tcc | On the Indifferentiability of Key-Alternating Feistel Ciphers with No Key Derivation | online |