Year | Title | Venue |

2014 | Four-Dimensional Gallant-Lambert-Vanstone Scalar Multiplication | jofc |

2014 | A Practical-Time Related-Key Attack on the KASUMI Cryptosystem Used in GSM and 3G Telephony | jofc |

2014 | A Characterization of Chameleon Hash Functions and New, Efficient Designs | jofc |

2014 | Using Symmetries in the Index Calculus for Elliptic Curves Discrete Logarithm | jofc |

2014 | (Non-)Random Sequences from (Non-)Random Permutations - Analysis of RC4 Stream Cipher | jofc |

2014 | A New Interactive Hashing Theorem | jofc |

2014 | Concurrent Zero Knowledge, Revisited | jofc |

2014 | On Best-Possible Obfuscation | jofc |

2014 | Improved Practical Attacks on Round-Reduced Keccak | jofc |

2014 | Erratum to: A Comparison of Cryptanalytic Tradeoff Algorithms | jofc |

2014 | Improved Cryptanalysis of AES-like Permutations | jofc |

2014 | Robust Multi-Property Combiners for Hash Functions | jofc |

2014 | Verifiable Random Functions: Relations to Identity-Based Key Encapsulation and New Constructions | jofc |

2014 | Security Models and Proof Strategies for Plaintext-Aware Encryption | jofc |

2014 | Rotational Rebound Attacks on Reduced Skein | jofc |

2014 | An Efficient State Recovery Attack on the X-FCSR Family of Stream Ciphers | jofc |

2014 | Cryptography in the Multi-string Model | jofc |

2014 | Computationally Secure Pattern Matching in the Presence of Malicious Adversaries | jofc |

2014 | A One-Time Stegosystem and Applications to Efficient Covert Communication | jofc |

2014 | Better Security for Deterministic Public-Key Encryption: The Auxiliary-Input Setting | jofc |

2014 | On Strong Simulation and Composable Point Obfuscation | jofc |

2014 | Authenticated Adversarial Routing | jofc |

2014 | On the Amortized Complexity of Zero-Knowledge Protocols | jofc |

2014 | Key-Dependent Message Security: Generic Amplification and Completeness | jofc |

2014 | How to Use Bitcoin to Design Fair Protocols | eprint |

2014 | A Comparison of the Homomorphic Encryption Schemes FV and YASHE | eprint |

2014 | Construction of New Families of MDS Diffusion Layers | eprint |

2014 | Towards Characterizing Complete Fairness in Secure Two-Party Computation | eprint |

2014 | On Virtual Grey Box Obfuscation for General Circuits | eprint |

2014 | Optimized Architecture for AES | eprint |

2014 | Anonymous Authentication with Shared Secrets | eprint |

2014 | Leakage-Resilient Signatures with Graceful Degradation | eprint |

2014 | Efficient Secure and Verifiable Outsourcing of Matrix Multiplications | eprint |

2014 | On Decomposition of an NFSR into a Cascade Connection of Two Smaller | eprint |

2014 | How Secure is Deterministic Encryption? | eprint |

2014 | Dishonest Majority Multi-Party Computation for Binary Circuits | eprint |

2014 | THE NEW HEURISTIC GUESS AND DETERMINE ATTACK ON SNOW 2.0 STREAM CIPHER | eprint |

2014 | Key-policy Attribute-based Encryption for Boolean Circuits from Bilinear Maps | eprint |

2014 | Efficient, Oblivious Data Structures for MPC | eprint |

2014 | Expressive and Secure Searchable Encryption in the Public Key Setting (Full Version) | eprint |

2014 | Calculating Cryptographic Degree of an S-Box | eprint |

2014 | On the Existence of Extractable One-Way Functions | eprint |

2014 | Faster Maliciously Secure Two-Party Computation Using the GPU | eprint |

2014 | Affine-evasive Sets Modulo a Prime | eprint |

2014 | Semi-Adaptive Attribute-Based Encryption and Improved Delegation for Boolean Formula | eprint |

2014 | Efficient Adaptively Secure IBBE from Standard Assumptions | eprint |

2014 | Fine Tuning the Function Field Sieve Algorithm for the Medium Prime Case | eprint |

2014 | The M3dcrypt Password Scheme | eprint |

2014 | FeW: A Lightweight Block Cipher | eprint |

2014 | Pipelineable On-Line Encryption | eprint |

2014 | Some Randomness Experiments on TRIVIUM | eprint |

2014 | Linear Sequential Circuit Approximation of Acterbahn Stream Cipher | eprint |

2014 | Practical and Secure Query Processing for Large-scale Encrypted Cloud Storage Systems | eprint |

2014 | Hyper-and-elliptic-curve cryptography | eprint |

2014 | Solving closest vector instances using an approximate shortest independent vectors oracle | eprint |

2014 | Differential Fault Analysis on the families of SIMON and SPECK ciphers | eprint |

2014 | Zero-Knowledge Password Policy Checks and Verifier-Based PAKE | eprint |

2014 | Crypto-analyses on "user efficient recoverable off-line e-cashs scheme with fast anonymity revoking" | eprint |

2014 | A novel PUF Scheme | eprint |

2014 | Forging Attacks on two Authenticated Encryptions COBRA and POET | eprint |

2014 | New candidates for multivariate trapdoor functions | eprint |

2014 | Fully Key-Homomorphic Encryption, Arithmetic Circuit ABE, and Compact Garbled Circuits | eprint |

2014 | Cryptography from Compression Functions: The UCE Bridge to the ROM | eprint |

2014 | High Parallel Complexity Graphs and Memory-Hard Functions | eprint |

2014 | Weak-Key Analysis of POET | eprint |

2014 | RECTANGLE: A Bit-slice Ultra-Lightweight Block Cipher Suitable for Multiple Platforms | eprint |

2014 | Relaxed Two-to-one Recoding Schemes | eprint |

2014 | Note of Multidimensional MITM Attack on 25-Round TWINE-128 | eprint |

2014 | Statistical Concurrent Non-Malleable Zero Knowledge | eprint |

2014 | Composable Authentication with Global PKI | eprint |

2014 | Bounded Fully Homomorphic Signature Schemes | eprint |

2014 | An Empirical Study and some Improvements of the MiniMac Protocol for Secure Computation | eprint |

2014 | Squaring Algorithms with Delayed Carry Method and Efficient Parallelization | eprint |

2014 | (Leveled) Fully Homomorphic Signatures from Lattices | eprint |

2014 | Lightweight Diffusion Layer from the $k^{th}$ root of the MDS Matrix | eprint |

2014 | What's the Gist? Privacy-Preserving Aggregation of User Profiles | eprint |

2014 | Related-Key Secure Pseudorandom Functions: The Case of Additive Attacks | eprint |

2014 | Differential Fault Analysis of MICKEY Family of Stream Ciphers | eprint |

2014 | How to Generate and use Universal Parameters | eprint |

2014 | Crypto-Multimedia | eprint |

2014 | Index calculus in the trace zero variety | eprint |

2014 | Low Probability Differentials and the Cryptanalysis of Full-Round CLEFIA-128 | eprint |

2014 | Human Assisted Randomness Generation Using Video Games | eprint |

2014 | Towards Symmetric Functional Encryption for Regular Languages with Predicate Privacy | eprint |

2014 | Optimal Algebraic Manipulation Detection Codes | eprint |

2014 | Certified Bitcoins | eprint |

2014 | A Tamper and Leakage Resilient Random Access Machine | eprint |

2014 | Improved Short Lattice Signatures in the Standard Model | eprint |

2014 | Adaptive Security of Constrained PRFs | eprint |

2014 | New Way to Construct Cryptographic Hash Function | eprint |

2014 | Halka: A Lightweight, Software Friendly Block Cipher Using Ultra-lightweight 8-bit S-box | eprint |

2014 | Coding Theoretic Construction of Quantum Ramp Secret Sharing | eprint |

2014 | Security Enhanced Anonymous Multi-Server Authenticated Key Agreement Scheme using Smart Card and Biometrics | eprint |

2014 | Making RSA-PSS Provably Secure Against Non-Random Faults | eprint |

2014 | How to Eat Your Entropy and Have it Too - Optimal Recovery Strategies for Compromised RNGs | eprint |

2014 | MuR-DPA: Top-down Levelled Multi-replica Merkle Hash Tree Based Secure Public Auditing for Dynamic Big Data Storage on Cloud | eprint |

2014 | Low Overhead Broadcast Encryption from Multilinear Maps | eprint |

2014 | From Single-Bit to Multi-Bit Public-Key Encryption via Non-Malleable Codes | eprint |

2014 | Weaknesses of Password Authentication Scheme Based on Geometric Hashing | eprint |

2014 | Almost Optimal Short Adaptive Non-Interactive Zero Knowledge | eprint |