Year | Title | Venue |

2015 | New Proof Techniques for DLIN-Based Adaptively Secure Attribute-Based Encryption and Their Application | eprint |

2015 | Implicit Zero-Knowledge Arguments and Applications to the Malicious Setting | eprint |

2015 | Zero-Knowledge Interactive Proof Systems for New Lattice Problems | eprint |

2015 | On the security margin of MAC striping | eprint |

2015 | Improved (Pseudo) Preimage Attacks on Reduced-Round GOST and Grøstl-256 and Studies on Several Truncation Patterns for AES-like Compression Functions (Full Version) | eprint |

2015 | Fast, uniform, and compact scalar multiplication for elliptic curves and genus 2 Jacobians with applications to signature schemes | eprint |

2015 | On the Equivalence of Obfuscation and Multilinear Maps | eprint |

2015 | Generalised tally-based decoders for traitor tracing and group testing | eprint |

2015 | A More Cautious Approach to Security Against Mass Surveillance | eprint |

2015 | More Efficient Oblivious Transfer Extensions with Security for Malicious Adversaries | eprint |

2015 | Democoin: A Publicly Verifiable and Jointly Serviced Cryptocurrency | eprint |

2015 | Optimally Secure Block Ciphers from Ideal Primitives | eprint |

2015 | Quantum Cryptanalysis of NTRU | eprint |

2015 | On weak and strong 2^{k}-bent Boolean functions | eprint |

2015 | An Authentication Code over Galois Rings with Optimal Impersonation and Substitution Probabilities | eprint |

2015 | Fast and Secure Linear Regression and Biometric Authentication with Security Update | eprint |

2015 | Adaptive Proofs of Knowledge in the Random Oracle Model | eprint |

2015 | Recovering Short Generators of Principal Ideals in Cyclotomic Rings | eprint |

2015 | Secure Computation of MIPS Machine Code | eprint |

2015 | One-key Double-Sum MAC with Beyond-Birthday Security | eprint |

2015 | Privacy-preserving Attribute Based Searchable Encryption | eprint |

2015 | Strongly Secure Authenticated Key Exchange from Ideal Lattices | eprint |

2015 | Reconfigurable Cryptography: A flexible approach to long-term security | eprint |

2015 | Inception Makes Non-malleable Codes Stronger | eprint |

2015 | Key Recovery Attack against an NTRU-type Somewhat Homomorphic Encryption Scheme | eprint |

2015 | Weave ElGamal Encryption for Secure Outsourcing Algebraic Computations over Zp | eprint |

2015 | TESLA: Tightly-Secure Efficient Signatures from Standard Lattices | eprint |

2015 | Integrity-Aware Parallelizable Cipher Feedback Mode for Real-time Cryptography | eprint |

2015 | Improved All-Subkeys Recovery Attacks on FOX, KATAN and SHACAL-2 Block Ciphers | eprint |

2015 | Privacy in the Genomic Era | eprint |

2015 | Non-Repudiable Provable Data Possession in Cloud Storage | eprint |

2015 | HLDCA-WSN: Homomorphic Lightweight Data Confidentiality Algorithm for Wireless Sensor Network | eprint |

2015 | PAC Learning of Arbiter PUFs | eprint |

2015 | End-to-end Design of a PUF-based Privacy Preserving Authentication Protocol | eprint |

2015 | New Circular Security Counterexamples from Decision Linear and Learning with Errors | eprint |

2015 | Higher Order Differential Analysis of NORX | eprint |

2015 | A Secure Oblivious Transfer Protocol from Indistinguishing Obfuscation | eprint |

2015 | Self-bilinear Map on Unknown Order Groups from Indistinguishability Obfuscation and Its Applications | eprint |

2015 | A New Model for Error-Tolerant Side-Channel Cube Attacks | eprint |

2015 | On the Implementation of Unified Arithmetic on Binary Huff Curves | eprint |

2015 | Related-Key Rectangle Attack on Round-reduced *Khudra* Block Cipher | eprint |

2015 | Optimally Efficient Multi-Party Fair Exchange and Fair Secure Multi-Party Computation | eprint |

2015 | Ideal Multilinear Maps Based on Ideal Lattices | eprint |

2015 | Bitwise Linear Mappings with Good Cryptographic Properties and Efficient Implementation | eprint |

2015 | Fully-Dynamic Verifiable Zero-Knowledge Order Queries for Network Data | eprint |

2015 | Cryptanalysis of the multilinear map on the ideal lattices | eprint |

2015 | Efficient k-out-of-n oblivious transfer protocol | eprint |

2015 | Hawk: The Blockchain Model of Cryptography and Privacy-Preserving Smart Contracts | eprint |

2015 | Online-Offline Homomorphic Signatures for Polynomial Functions | eprint |

2015 | BeleniosRF: A Strongly Receipt-Free Electronic Voting Scheme | eprint |

2015 | Localised Multisecret Sharing | eprint |

2015 | Improving Key Recovery to 784 and 799 rounds of Trivium using Optimized Cube Attacks | eprint |

2015 | Exhausting Demirci-Selçuk Meet-in-the-Middle Attacks against Reduced-Round AES | eprint |

2015 | An analysis of the C class of bent functions | eprint |

2015 | The Sum Can Be Weaker Than Each Part | eprint |

2015 | On the concrete hardness of Learning with Errors | eprint |

2015 | Design and Analysis of Information-Theoretically Secure Authentication Codes with Non-Uniformly Random Keys | eprint |

2015 | On Black-Box Complexity of Universally Composable Security in the CRS model | eprint |

2015 | Authenticated Key Exchange over Bitcoin | eprint |

2015 | Construction of Arithmetic Secret Sharing Schemes by Using Torsion Limits | eprint |

2015 | Continuous Non-Malleable Key Derivation and Its Application to Related-Key Security | eprint |

2015 | Systematic Reverse Engineering of Cache Slice Selection in Intel Processors | eprint |

2015 | Sanctum: Minimal RISC Extensions for Isolated Execution | eprint |

2015 | The Carnac protocol - or how to read the contents of a sealed envelope | eprint |

2015 | Efficient Arithmetic on ARM-NEON and Its Application for High-Speed RSA Implementation | eprint |

2015 | Bad directions in cryptographic hash functions | eprint |

2015 | Function-Hiding Inner Product Encryption | eprint |

2015 | Polynomial time reduction from approximate shortest vector problem to the principle ideal porblem for lattices in cyclotomic rings | eprint |

2015 | Collision Attack on 4-branch, Type-2 GFN based Hash Functions using Sliced Biclique Cryptanalysis Technique | eprint |

2015 | How to Enumerate Your Keys Accurately and Efficiently After a Side Channel Attack | eprint |

2015 | Size-Hiding in Private Set Intersection: what can be done and how to do it without random oracles | eprint |

2015 | Eclipse Attacks on Bitcoin's Peer-to-Peer Network | eprint |

2015 | BlindBox: Deep Packet Inspection over Encrypted Traffic | eprint |

2015 | High Precision Fault Injections on the Instruction Cache of ARMv7-M Architectures | eprint |

2015 | New Observation on Division Property | eprint |

2015 | Relaxing Full-Codebook Security: A Refined Analysis of Key-Length Extension Schemes | eprint |

2015 | From Statistical Zero Knowledge to Secret Sharing | eprint |

2015 | Shadow-Bitcoin: Scalable Simulation via Direct Execution of Multi-threaded Applications | eprint |

2015 | Leakage-Flexible CCA-secure Public-Key Encryption: Simple Construction and Free of Pairing | eprint |

2015 | Structural Evaluation by Generalized Integral Property | eprint |

2015 | XPX: Generalized Tweakable Even-Mansour with Improved Security Guarantees | eprint |

2015 | A Provably Secure Short Signature Scheme from Coding Theory | eprint |

2015 | Cryptanalysis of a modern rotor machine in a multicast setting | eprint |

2015 | Classical Cryptographic Protocols in a Quantum World | eprint |

2015 | Some New Results on Binary Polynomial Multiplication | eprint |

2015 | General Circuit Realizing Compact Revocable Attribute-Based Encryption from Multilinear Maps | eprint |

2015 | Performance Analysis of Some Password Hashing Schemes | eprint |

2015 | Improved Top-Down Techniques in Differential Cryptanalysis | eprint |

2015 | A More Explicit Formula for Linear Probabilities of Modular Addition Modulo a Power of Two | eprint |

2015 | Reconciling User Privacy and Implicit Authentication for Mobile Devices | eprint |

2015 | Leakage-Resilient Cryptography with Key Derived from Sensitive Data | eprint |

2015 | Seriously, get off my cloud! Cross-VM RSA Key Recovery in a Public Cloud | eprint |

2015 | Practical Attacks on the Round-reduced PRINCE | eprint |

2015 | Leakage-Resilient Symmetric Encryption via Re-keying | eprint |

2015 | Exploring the Resilience of Some Lightweight Ciphers Against Pro led Single Trace Attacks | eprint |

2015 | Confidential Benchmarking based on Multiparty Computation | eprint |

2015 | Automated Dynamic Cube Attack on Block Ciphers: Cryptanalysis of SIMON and KATAN | eprint |

2015 | A Group-theory Method to The Cycle Structures of Feedback Shift Registers | eprint |

2015 | TinyLEGO: An Interactive Garbling Scheme for Maliciously Secure Two-party Computation | eprint |

2015 | Method to Protect Passwords in Databases for Web Applications | eprint |