![](https://dblp.uni-trier.de./img/logo.320x120.png)
![search dblp search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
default search action
IACR Cryptology ePrint Archive, Volume 2015
Volume 2015, 2015
- Oscar Reparaz:
A note on the security of Higher-Order Threshold Implementations. 1 - Baodong Qin, Shengli Liu, Tsz Hon Yuen, Robert H. Deng, Kefei Chen:
Continuous Non-Malleable Key Derivation and Its Application to Related-Key Security. 3 - Carmit Hazay:
Oblivious Polynomial Evaluation and Secure Set-Intersection from Algebraic PRFs. 4 - Srinivas Devadas, Marten van Dijk, Christopher W. Fletcher, Ling Ren:
Onion ORAM: A Constant Bandwidth and Constant Client Storage ORAM (without FHE or SWHE). 5 - Jan Camenisch, Robert R. Enderlein, Gregory Neven:
Two-Server Password-Authenticated Secret Sharing UC-Secure Against Transient Corruptions. 6 - Tobias Pulls, Roel Peeters:
Balloon: A Forward-Secure Append-Only Persistent Authenticated Data Structure. 7 - Satrajit Ghosh, Aniket Kate:
Post-Quantum Secure Onion Routing (Future Anonymity in Today's Budget). 8 - Donghoon Chang, Arpan Jati, Sweta Mishra, Somitra Kumar Sanadhya:
Rig: A simple, secure and flexible design for Password Hashing. 9 - Shengli Liu, Kenneth G. Paterson:
Simulation-based Selective Opening CCA Security for PKE from Key Encapsulation Mechanisms. 10 - Benjamin Buhrow, Paul Riemer, Mike Shea, Barry K. Gilbert, Erik S. Daniel:
Block Cipher Speed and Energy Efficiency Records on the MSP430: System Design Trade-Offs for 16-bit Embedded Applications. 11 - Tancrède Lepoint, Mehdi Tibouchi:
Cryptanalysis of a (Somewhat) Additively Homomorphic Encryption Scheme Used in PIR. 12 - Nico Döttling:
Low Noise LPN: KDM Secure Public Key Encryption and Sample Amplification. 13 - San Ling, Khoa Nguyen, Huaxiong Wang:
Group Signatures from Lattices: Simpler, Tighter, Shorter, Ring-based. 14 - Florian Bergsma, Tibor Jager, Jörg Schwenk:
One-Round Key Exchange with Strong Security: An Efficient and Generic Construction in the Standard Model. 15 - Yannis Rouselakis, Brent Waters:
Efficient Statically-Secure Large-Universe Multi-Authority Attribute-Based Encryption. 16 - Michel Abdalla, Florian Bourse, Angelo De Caro, David Pointcheval:
Simple Functional Encryption Schemes for Inner Products. 17 - Jintai Ding, Alexei Miasnikov, Alexander Ushakov:
A Linear Attack on a Key Exchange Protocol Using Extensions of Matrix Semigroups. 18 - Gilles Barthe, Edvard Fagerholm, Dario Fiore, Andre Scedrov, Benedikt Schmidt, Mehdi Tibouchi:
Strongly-Optimal Structure Preserving Signatures from Type II Pairings: Synthesis and Lower Bounds. 19 - Phong Q. Nguyen, Jiang Zhang, Zhenfeng Zhang:
Simpler Efficient Group Signatures from Lattices. 20 - Xin Li:
Non-Malleable Condensers for Arbitrary Min-Entropy, and Almost Optimal Protocols for Privacy Amplification. 21 - Bo Yang, Dengguo Feng, Yu Qin, Yingjun Zhang, Weijin Wang:
TMSUI: A Trust Management Scheme of USB Storage Devices for Industrial Control Systems. 22 - Chunsheng Gu:
Multilinear Maps Using Ideal Lattices without Encodings of Zero. 23 - Evgeni Begelfor, Stephen D. Miller, Ramarathnam Venkatesan:
Non-Abelian Analogs of Lattice Rounding. 24 - Benny Applebaum, Zvika Brakerski:
Obfuscating Circuits via Composite-Order Graded Encoding. 25 - Adam D. Smith, Ye Zhang:
On the Regularity of Lossy RSA: Improved Bounds and Applications to Padding-Based Encryption. 27 - Jeremy Maitin-Shepard:
Optimal software-implemented Itoh-Tsujii inversion for GF(2m). 28 - Sergey Gorbunov, Vinod Vaikuntanathan, Hoeteck Wee:
Predicate Encryption for Circuits from LWE. 29 - Christoph Dobraunig, Maria Eichlseder, Florian Mendel, Martin Schläffer:
Cryptanalysis of Ascon. 30 - Kai-Min Chung, Rafael Pass:
Tight Parallel Repetition Theorems for Public-Coin Arguments using KL-divergence. 31 - Zvika Brakerski, Vinod Vaikuntanathan:
Constrained Key-Homomorphic PRFs from Standard Lattice Assumptions Or: How to Secretly Embed a Circuit in Your PRF. 32 - Christoph Dobraunig, Maria Eichlseder, Stefan Mangard, Florian Mendel:
On the Security of Fresh Re-keying to Counteract Side-Channel and Fault Attacks. 33 - Hannes Groß, Erich Wenger, Christoph Dobraunig, Christoph Ehrenhöfer:
Suit up! Made-to-Measure Hardware Implementations of Ascon. 34 - Elena Dubrova, Mats Näslund, Göran Selander, Fredrik Lindqvist:
Cryptographically Secure CRC for Lightweight Message Authentication. 35 - Billy Bob Brumley:
Faster software for fast endomorphisms. 36 - Da-Zhi Sun, Zahra Ahmadian, Yue-Jiao Wang, Mahmoud Salmasizadeh, Mohammad Reza Aref:
Analysis and Enhancement of Desynchronization Attack on an Ultralightweight RFID Authentication Protocol. 37 - Aloni Cohen, Shafi Goldwasser, Vinod Vaikuntanathan:
Aggregatable Pseudorandom Functions and Connections to Learning. 38 - Véronique Cortier, Fabienne Eigner, Steve Kremer, Matteo Maffei, Cyrille Wiedling:
Type-Based Verification of Electronic Voting Protocols. 39 - Zahra Ahmadian, Shahram Rasoolzadeh, Mahmoud Salmasizadeh, Mohammad Reza Aref:
Automated Dynamic Cube Attack on Block Ciphers: Cryptanalysis of SIMON and KATAN. 40 - Artur Mariano, Thijs Laarhoven, Christian H. Bischof:
Parallel (probable) lock-free HashSieve: a practical sieving algorithm for the SVP. 41 - Rachid El Bansarkhani, Johannes Buchmann:
High Performance Lattice-based CCA-secure Encryption. 42 - Ai Ishida, Keita Emura, Goichiro Hanaoka, Yusuke Sakai, Keisuke Tanaka:
Group Signature with Deniability: How to Disavow a Signature. 43 - Binanda Sengupta, Abhijit Das:
Use of SIMD-Based Data Parallelism to Speed up Sieving in Integer-Factoring Algorithms. 44 - Valentina Banciu, Elisabeth Oswald, Carolyn Whitnall:
Reliable Information Extraction for Single Trace Attacks. 45 - Martin R. Albrecht, Rachel Player, Sam Scott:
On the concrete hardness of Learning with Errors. 46 - Guilhem Castagnos, Fabien Laguillaumie:
Linearly Homomorphic Encryption from DDH. 47 - Ran Canetti, Yael Tauman Kalai, Omer Paneth:
On Obfuscation with Random Oracles. 48 - Sonia Bogos, Florian Tramèr
, Serge Vaudenay:
On Solving Lpn using BKW and Variants. 49 - Carla Ràfols:
Stretching Groth-Sahai: NIZK Proofs of Partial Satisfiability. 50 - Li Lin, Wenling Wu:
Improved Meet-in-the-Middle Distinguisher on Feistel Schemes. 51 - Mihir Bellare, Sriram Keelveedhi:
Interactive Message-Locked Encryption and Secure Deduplication. 52 - Peter Gazi, Krzysztof Pietrzak, Stefano Tessaro:
Tight Bounds for Keyed Sponges and Truncated CBC. 53 - Brett Hemenway, Rafail Ostrovsky, Alon Rosen:
Non-committing encryption from Φ-hiding. 54 - Vladimir Kolesnikov, Payman Mohassel, Ben Riva, Mike Rosulek:
Richer Efficiency/Security Trade-offs in 2PC. 55 - Alexandre Duc, Florian Tramèr
, Serge Vaudenay:
Better Algorithms for LWE and LWR. 56 - Bertram Poettering, Dale L. Sibborn:
Cold Boot Attacks in the Discrete Logarithm Setting. 57 - Berry Schoenmakers, Meilof Veeningen:
Universally Verifiable Multiparty Computation from Threshold Homomorphic Cryptosystems. 58 - Alexandra Boldyreva, Jean Paul Degabriele, Kenneth G. Paterson, Martijn Stam:
Security of Symmetric Encryption in the Presence of Ciphertext Fragmentation. 59 - Gilles Barthe, Sonia Belaïd, François Dupressoir, Pierre-Alain Fouque, Benjamin Grégoire, Pierre-Yves Strub:
Verified Proofs of Higher-Order Masking. 60 - Gilad Asharov, Yehuda Lindell, Thomas Schneider, Michael Zohner:
More Efficient Oblivious Transfer Extensions with Security for Malicious Adversaries. 61 - Yuval Yarom, Gefei Li, Damith Chinthana Ranasinghe:
Evaluation and Cryptanalysis of the Pandaka Lightweight Cipher. 62 - Ryad Benadjila, Thomas Calderon, Marion Daubignard:
CamlCrush: A PKCS\#11 Filtering Proxy. 63 - Handan Kilinç, Alptekin Küpçü:
Optimally Efficient Multi-Party Fair Exchange and Fair Secure Multi-Party Computation. 64 - Andrey Dmukh, Denis Dygin, Grigory B. Marshalko:
A lightweight-friendly modifcation of GOST block cipher. 65 - Tobias Schneider, Amir Moradi, Tim Güneysu:
Arithmetic Addition over Boolean Masking - Towards First- and Second-Order Resistance in Hardware. 66 - Susumu Kiyoshima:
An Alternative Approach to Non-black-box Simulation in Fully Concurrent Setting. 67 - Gregor Leander, Brice Minaud, Sondre Rønjom:
A Generic Approach to Invariant Subspace Attacks: Cryptanalysis of Robin, iSCREAM and Zorro. 68 - Benoit Cogliati, Yannick Seurin:
On the Provable Security of the Iterated Even-Mansour Cipher against Related-Key and Chosen-Key Attacks. 69 - Gaëtan Leurent, Lei Wang:
The Sum Can Be Weaker Than Each Part. 70 - Jean-Sébastien Coron, Jean-Charles Faugère, Guénaël Renault, Rina Zeitoun:
Factoring N=pr qs for Large r and s. 71 - Olivier Blazy, Céline Chevalier, Damien Vergnaud:
Non-Interactive Zero-Knowledge Proofs of Non-Membership. 72 - Dana Dachman-Soled, Chang Liu, Charalampos Papamanthou, Elaine Shi, Uzi Vishkin:
Oblivious Network RAM. 73 - Gilles Barthe, Juan Manuel Crespo, Yassine Lakhnech, Benedikt Schmidt:
Mind the Gap: Modular Machine-checked Proofs of One-Round Key Exchange Protocols. 74 - Jian Guo, Yu Sasaki, Lei Wang, Meiqin Wang, Long Wen:
Equivalent Key Recovery Attacks against HMAC and NMAC with Whirlpool Reduced to 7 Rounds. 75 - Masayuki Abe, Markulf Kohlweiss, Miyako Ohkubo, Mehdi Tibouchi:
Fully Structure-Preserving Signatures and Shrinking Commitments. 76 - Yuwei Xu, Chuankun Wu:
On the Existence and Constructions of Vectorial Boolean Bent Functions. 77 - Chun-Xiang Gu, Dan Xin, Yonghui Zheng, Yuanji Kang:
Fully Homomorphic Encryption from Ring-LWE:Identity-Based,Arbitrary Cyclotomic,Tighter Parameters. 78 - Jiqiang Lu:
On the Security of the COPA and Marble Authenticated Encryption Algorithms against (Almost) Universal Forgery Attack. 79 - Feng Hao, Xun Yi, Liqun Chen, Siamak Fayyaz Shahandashti:
The Fairy-Ring Dance: Password Authenticated Key Exchange in a Group. 80 - Yan Huang, Jonathan Katz, Vladimir Kolesnikov, Ranjit Kumaresan, Alex J. Malozemoff:
Amortizing Garbled Circuits. 81 - Ihsan Haluk Akin, Berk Sunar:
On the Difficulty of Securing Web Applications using CryptDB. 82 - Massimo Chenal, Qiang Tang
:
Key Recovery Attack against an NTRU-type Somewhat Homomorphic Encryption Scheme. 83 - Zhengjun Cao, Lihua Liu:
On the Disadvantages of Pairing-based Cryptography. 84 - Anne Canteaut, Joëlle Roué:
On the behaviors of affine equivalent Sboxes regarding differential and linear attacks. 85 - Patrick Märtens:
Practical Compact E-Cash with Arbitrary Wallet Size. 86 - David Derler, Christian Hanser, Daniel Slamanig:
Revisiting Cryptographic Accumulators, Additional Properties and Relations to other Primitives. 87 - Klaus Kursawe, Christiane Peters:
Structural Weaknesses in the Open Smart Grid Protocol. 88 - Thomas Eisenbarth, Aaron Meyerowitz, Rainer Steinwandt:
On the security margin of MAC striping. 89 - Yosuke Todo:
Structural Evaluation by Generalized Integral Property. 90 - Christoph Dobraunig, Maria Eichlseder, Florian Mendel:
Related-Key Forgeries for Prøst-OTR. 91 - Grasha Jacob, A. Murugan, Irine Viola:
Towards the Generation of a Dynamic Key-Dependent S-Box to Enhance Security. 92 - Murat Cenk, M. Anwar Hasan:
Some New Results on Binary Polynomial Multiplication. 94 - Dmitry Khovratovich, Ivica Nikolic, Josef Pieprzyk, Przemyslaw Sokolowski, Ron Steinfeld:
Rotational Cryptanalysis of ARX Revisited. 95 - Riham AlTawy, Amr M. Youssef:
Meet in the Middle Attacks on Reduced Round Kuznyechik. 96 - Bruce Schneier, Matthew Fredrikson, Tadayoshi Kohno, Thomas Ristenpart:
Surreptitiously Weakening Cryptographic Systems. 97 - Shantian Cheng, Juanyang Zhang:
Adaptive-ID Secure Revocable Identity-Based Encryption from Lattices via Subset Difference Method. 98 - Dirk Achenbach, Jörn Müller-Quade, Jochen Rill:
Universally Composable Firewall Architectures using Trusted Hardware. 99 - Christian Wittke, Zoya Dyka, Peter Langendörfer:
Influence of Electrical Circuits of ECC Designs on Shape of Electromagnetic Traces measured on FPGA. 100 - Nicky Mouha, Atul Luykx:
Multi-Key Security: The Even-Mansour Construction Revisited. 101 - Shay Gueron, Yehuda Lindell:
GCM-SIV: Full Nonce Misuse-Resistant Authenticated Encryption at Under One Cycle per Byte. 102 - Vincenzo Iovino, Karol Zebrowski:
Mergeable Functional Encryption. 103 - Rafael Dowsley, Jörn Müller-Quade, Tobias Nilges:
Weakening the Isolation Assumption of Tamper-proof Hardware Tokens. 104 - Josep Balasch, Sebastian Faust, Benedikt Gierlichs:
Inner Product Masking Revisited. 105 - Yara Elias, Kristin E. Lauter, Ekin Ozman, Katherine E. Stange:
Provably weak instances of Ring-LWE. 106 - Attila Altay Yavuz, Jorge Guajardo:
Dynamic Searchable Symmetric Encryption with Minimal Leakage and Efficient Updates on Commodity Hardware. 107 - Lucjan Hanzlik, Przemyslaw Kubiak, Miroslaw Kutylowski:
Tracing Attacks on U-Prove with Revocation Mechanism. 108 - Shijun Zhao, Qianying Zhang:
sHMQV: An Efficient Key Exchange Protocol for Power-limited Devices. 110 - Steven D. Galbraith, Barak Shani:
The Multivariate Hidden Number Problem. 111 - Satsuya Ohata, Yutaka Kawai, Takahiro Matsuda, Goichiro Hanaoka, Kanta Matsuura:
Re-encryption Verifiability: How to Detect Malicious Activities of a Proxy in Proxy Re-encryption. 112 - Anne Canteaut, Sergiu Carpov, Caroline Fontaine, Tancrède Lepoint, María Naya-Plasencia, Pascal Paillier, Renaud Sirdey:
How to Compress Homomorphic Ciphertexts. 113 - Shai Halevi, William Eric Hall, Charanjit S. Jutla, Arnab Roy:
Weak Ideal Functionalities for Designing Random Oracles with Applications to Fugue. 114 - Muhammad Yasir Malik:
Comprehensive Efficient Implementations of ECC on C54xx Family of Low-cost Digital Signal Processors. 115 - Riadh Brinci, Walid Khmiri, Mefteh Mbarek, Abdellatif Ben Rabaa, Ammar Bouallègue:
Efficient Hardware Design for Computing Pairings Using Few FPGA In-built DSPs. 116 - Maciej Skorski
:
Nonuniform Indistinguishability and Unpredictability Hardcore Lemmas: New Proofs and Applications to Pseudoentropy. 117 - Takahiro Matsuda, Goichiro Hanaoka:
Constructing and Understanding Chosen Ciphertext Security via Puncturable Key Encapsulation Mechanisms. 118 - Alexandre Duc, Sebastian Faust, François-Xavier Standaert:
Making Masking Security Proofs Concrete Or How to Evaluate the Security of any Leaking Device. 119 - Debapriya Basu Roy, Shivam Bhasin, Sylvain Guilley, Jean-Luc Danger, Debdeep Mukhopadhyay:
Reconfigurable LUT: Boon or Bane for Secure Applications. 120 - Travis Mayberry, Erik-Oliver Blass, Guevara Noubir:
Multi-User Oblivious RAM Secure Against Malicious Servers. 121 - Siwei Sun, Lei Hu, Meiqin Wang, Peng Wang, Kexin Qiao, Xiaoshuang Ma, Danping Shi, Ling Song, Kai Fu:
Constructing Mixed-integer Programming Models whose Feasible Region is Exactly the Set of All Valid Differential Characteristics of SIMON. 122 - Dennis Hofheinz, Jessica Koch, Christoph Striecks
:
Identity-based encryption with (almost) tight security in the multi-instance, multi-ciphertext setting. 123 - Alexander Wild, Amir Moradi, Tim Güneysu:
GliFreD: Glitch-Free Duplication - Towards Power-Equalized Circuits on FPGAs. 124 - Aloni Cohen, Justin Holmgren
:
Multilinear Pseudorandom Functions. 125 - Nir Bitansky, Omer Paneth, Daniel Wichs:
Perfect Structure on the Edge of Chaos. 126 - Ricardo Dahab, Steven D. Galbraith, Eduardo Morais:
Adaptive key recovery attacks on NTRU-based somewhat homomorphic encryption schemes. 127 - Takashi Yamakawa, Shota Yamada, Goichiro Hanaoka, Noboru Kunihiro:
Self-bilinear Map on Unknown Order Groups from Indistinguishability Obfuscation and Its Applications. 128 - Nishanth Chandran, Vipul Goyal, Pratyay Mukherjee, Omkant Pandey, Jalaj Upadhyay:
Block-wise Non-Malleable Codes. 129 - Sune K. Jakobsen, Claudio Orlandi:
How to Bootstrap Anonymous Communication. 130 - Frederik Armknecht, Vasily Mikhalev:
On Lightweight Stream Ciphers with Shorter Internal States. 131 - Jung Hee Cheon, Miran Kim, Kristin E. Lauter:
Homomorphic Computation of Edit Distance. 132 - Kristin E. Lauter, Adriana López-Alt, Michael Naehrig:
Private Computation on Encrypted Genomic Data. 133 - Pierre Karpman:
From Related-Key Distinguishers to Related-Key-Recovery on Even-Mansour Constructions. 134 - Bernardo David, Ryo Nishimaki, Samuel Ranellucci, Alain Tapp:
Generalizing Efficient Multiparty Computation. 135 - Marcos A. Simplício Jr., Leonardo C. Almeida, Ewerton R. Andrade, Paulo C. F. dos Santos, Paulo S. L. M. Barreto:
Lyra2: Password Hashing Scheme with improved security against time-memory trade-offs. 136 - Mikhail Strizhov, Indrajit Ray:
Multi-keyword Similarity Search Over Encrypted Cloud Data. 137 - Vikram Singh:
A Practical Key Exchange for the Internet using Lattice Cryptography. 138 - Donghoon Chang, Arpan Jati, Sweta Mishra, Somitra Kumar Sanadhya:
Performance Analysis of Some Password Hashing Schemes. 139 - Neal Koblitz, Alfred Menezes:
The Random Oracle Model: A Twenty-Year Retrospective. 140 - Céline Blondeau, Marine Minier:
Analysis of Impossible, Integral and Zero-Correlation Attacks on Type-II Generalized Feistel Networks using the Matrix Method. 141 - S. Dov Gordon, Jonathan Katz, Feng-Hao Liu, Elaine Shi, Hong-Sheng Zhou:
Multi-Client Verifiable Computation with Stronger Security Guarantees. 142 - Erich Wenger, Paul Wolfger:
Harder, Better, Faster, Stronger - Elliptic Curve Discrete Logarithm Computations on FPGAs. 143 - Tyge Tiessen, Lars R. Knudsen, Stefan Kölbl, Martin M. Lauridsen:
Security of the AES with a Secret S-box. 144 - Stefan Kölbl, Gregor Leander, Tyge Tiessen:
Observations on the SIMON block cipher family. 145 - Itai Dinur, Orr Dunkelman, Nathan Keller, Adi Shamir:
New Attacks on Feistel Structures with Improved Memory Complexities. 146 - Lionel Rivière, Zakaria Najm, Pablo Rauzy, Jean-Luc Danger, Julien Bringer, Laurent Sauvage:
High Precision Fault Injections on the Instruction Cache of ARMv7-M Architectures. 147 - Yossef Oren, Ahmad-Reza Sadeghi, Christian Wachsmann:
On the Effectiveness of the Remanence Decay Side-Channel to Clone Memory-based PUFs. 148 - Jian Guo, Yu Sasaki, Lei Wang, Shuang Wu:
Cryptanalysis of HMAC/NMAC-Whirlpool. 149 - Tobias Pulls, Roel Peeters:
Insynd: Privacy-Preserving Secure One-Way Messaging Using Balloons. 150 - Daniel J. Bernstein, Andreas Hülsing, Tanja Lange, Ruben Niederhagen:
Bad directions in cryptographic hash functions. 151 - Ronan Lashermes, Jacques J. A. Fournier, Louis Goubin:
Inverting the Final exponentiation of Tate pairings on ordinary elliptic curves using faults. 152 - Kai-Min Chung, Jonathan Katz, Hong-Sheng Zhou:
Functional Encryption from (Small) Hardwae Tokens. 153 - Daniel Genkin, Yuval Ishai, Manoj Prabhakaran, Amit Sahai, Eran Tromer:
Circuits Resilient to Additive Attacks with Applications to Secure Computation. 154 - Loi Luu, Ratul Saha, Inian Parameshwaran, Prateek Saxena, Aquinas Hobor:
On Power Splitting Games in Distributed Computation: The Case of Bitcoin Pooled Mining. 155 - Brett Hemenway, Rafail Ostrovsky:
Building Lossy Trapdoor Functions from Lossy Encryption. 156 - Nuttapong Attrapadung, Shota Yamada:
Duality in ABE: Converting Attribute Based Encryption for Dual Predicate and Dual Policy via Computational Encodings. 157 - Zvika Brakerski, Ilan Komargodski, Gil Segev:
From Single-Input to Multi-Input Functional Encryption in the Private-Key Setting. 158 - Shengbao Wu, Hongjun Wu, Tao Huang, Mingsheng Wang, Wenling Wu:
Leaked-State-Forgery Attack Against The Authenticated Encryption Algorithm ALE. 159 - Tao Huang, Ivan Tjuawinata, Hongjun Wu:
Differential-Linear Cryptanalysis of ICEPOLE. 160 - Valentina Banciu, Elisabeth Oswald, Carolyn Whitnall:
Exploring the Resilience of Some Lightweight Ciphers Against Pro led Single Trace Attacks. 161 - Jean-Sébastien Coron, Tancrède Lepoint, Mehdi Tibouchi:
New Multilinear Maps over the Integers. 162 - Nir Bitansky, Vinod Vaikuntanathan:
Indistinguishability Obfuscation from Functional Encryption. 163 - Priyanka Bose, Dipanjan Das, C. Pandu Rangan:
Constant Size Ring Signature Without Random Oracle. 164 - Benny Applebaum:
The Cryptographic Hardness of Random Local Functions - Survey. 165 - Jeremiah Blocki, Manuel Blum, Anupam Datta:
Naturally Rehearsing Passwords. 166 - Saikrishna Badrinarayanan, Eric Miles, Amit Sahai, Mark Zhandry:
Post-Zeroizing Obfuscation: The case of Evasive Circuits. 167 - Claude Carlet:
More PS and H-like bent functions. 168 - Daniel R. L. Brown:
Short Schnorr signatures require a hash function with more than just random-prefix resistance. 169 - Daniel Genkin, Lev Pachmanov, Itamar Pipman, Eran Tromer:
Stealing Keys from PCs using a Radio: Cheap Electromagnetic Attacks on Windowed Exponentiation. 170 - Benjamin Dowling, Douglas Stebila, Greg Zaverucha
:
Authenticated Network Time Synchronization. 171 - Aria Shahverdi, Mostafa Taha, Thomas Eisenbarth:
Silent Simon: A Threshold Implementation under 100 Slices. 172 - Prabhanjan Ananth, Abhishek Jain
:
Indistinguishability Obfuscation from Compact Functional Encryption. 173 - Chenyang Tu, Neng Gao, Zeyi Liu, Lei Wang, Zongbin Liu, Bingke Ma:
A Practical Chosen Message Power Analysis Method on the Feistel-SP ciphers with Applications to CLEFIA and Camellia. 174 - Tomer Ashur, Bart Mennink:
Trivial Nonce-Misusing Attack on Pure OMD. 175 - Kim Laine, Kristin E. Lauter:
Key Recovery for LWE in Polynomial Time. 176 - B. R. Purushothama, Nishat Koti:
On the Security of an Efficient Group Key Agreement Scheme for MANETs. 177 - Pablo Azar, Shafi Goldwasser, Sunoo Park:
How to Incentivize Data-Driven Collaboration Among Competing Parties. 178 - Palash Sarkar, Shashank Singh:
A Simple Method for Obtaining Relations Among Factor Basis Elements for Special Hyperelliptic Curves. 179 - Abhishek Banerjee, Georg Fuchsbauer, Chris Peikert, Krzysztof Pietrzak, Sophie Stevens:
Key-Homomorphic Constrained Pseudorandom Functions. 180 - Bing Sun, Zhiqiang Liu, Vincent Rijmen, Ruilin Li, Lei Cheng, Qingju Wang, Hoda Alkhzaimi, Chao Li:
Links among Impossible Differential, Integral and Zero Correlation Linear Cryptanalysis. 181 - Rodolphe Lampe, Yannick Seurin:
Tweakable Blockciphers with Asymptotically Optimal Security. 182 - Céline Blondeau, Kaisa Nyberg:
New Links Between Differential and Linear Cryptanalysis. 183 - Céline Blondeau, Kaisa Nyberg:
Links Between Truncated Differential and Multidimensional Linear Properties of Block Ciphers and Underlying Attack Complexities. 184 - Elena Dubrova, Mats Näslund, Gunnar Carlsson, John Fornehed, Ben J. M. Smeets:
Remotely Managed Logic Built-In Self-Test for Secure M2M Communications. 185 - Sourav Das, Subhamoy Maitra, Willi Meier:
Higher Order Differential Analysis of NORX. 186 - Juan A. Garay, Jonathan Katz, Björn Tackmann, Vassilis Zikas:
How Fair is Your Protocol? A Utility-based Approach to Protocol Optimality. 187 - Fabrice Benhamouda, Olivier Blazy, Céline Chevalier, David Pointcheval, Damien Vergnaud:
New Techniques for SPHFs and Efficient One-Round PAKE Protocols. 188 - Viet Tung Hoang, Reza Reyhanitabar, Phillip Rogaway, Damian Vizár:
Online Authenticated-Encryption and its Nonce-Reuse Misuse-Resistance. 189 - Seung Geol Choi, Jonathan Katz, Ranjit Kumaresan, Carlos Cid:
Multi-Client Non-Interactive Verifiable Computation. 190 - Xiao Shaun Wang, Chang Liu, Kartik Nayak, Yan Huang, Elaine Shi:
iDASH Secure Genome Analysis Competition Using ObliVM. 191 - Sylvain Duquesne, Loubna Ghammam:
Memory-saving computation of the pairing fi nal exponentiation on BN curves. 192 - Karim Bigou, Arnaud Tisserand:
Improving Modular Inversion in RNS using the Plus-Minus Method. 193 - Dario Catalano, Dario Fiore:
Practical Homomorphic MACs for Arithmetic Circuits. 194 - Stephanie Bayer, Jens Groth:
Zero-knowledge Argument for Polynomial Evaluation with Application to Blacklists. 195 - Michel Abdalla, Fabrice Benhamouda, David Pointcheval:
Tighter Reductions for Forward-Secure Signature Schemes. 196 - N. Nalla Anandakumar:
SCA Resistance Analysis of MAC-PHOTON. 197 - Pascal Sasdrich, Oliver Mischke, Amir Moradi, Tim Güneysu:
Side-Channel Protection by Randomizing Look-Up Tables on Reconfigurable Hardware - Pitfalls of Memory Primitives. 198 - Amir Moradi, Gesine Hinterwälder:
Side-Channel Security Analysis of Ultra-Low-Power FRAM-based MCUs. 199 - Alexander Wild, Amir Moradi, Tim Güneysu:
Evaluating the Duplication of Dual-Rail Precharge Logics on FPGAs. 200 - Akbar Mahmoodi Rishakani, Seyed Mojtaba Dehnavi, M. R. Mirzaee Shamsabad, Hamidreza Maimani, Einollah Pasha:
Statistical Properties of Multiplication mod 2n. 201 - Shafi Goldwasser, Yael Tauman Kalai, Sunoo Park:
Adaptively Secure Coin-Flipping, Revisited. 202 - Pascal Sasdrich, Amir Moradi, Oliver Mischke, Tim Güneysu:
Achieving Side-Channel Protection with Dynamic Logic Reconfiguration on Modern FPGAs. 203 - Michel Abdalla, Sonia Belaïd, Pierre-Alain Fouque:
Leakage-Resilient Symmetric Encryption via Re-keying. 204 - Jooyoung Lee:
Towards Key-Length Extension with Optimal Security: Cascade Encryption and Xor-cascade Encryption. 205 - Bren Cavallo, Giovanni Di Crescenzo, Delaram Kahrobaei, Vladimir Shpilrain:
Efficient and Secure Delegation of Group Exponentiation to a Single Server. 206 - Tobias Schneider, Amir Moradi:
Leakage Assessment Methodology - a clear roadmap for side-channel evaluations. 207 - Ioana Boureanu, Aikaterini Mitrokotsa, Serge Vaudenay:
Towards Secure Distance Bounding. 208 - Daniel Dinu, Yann Le Corre, Dmitry Khovratovich, Léo Perrin, Johann Großschädl, Alex Biryukov:
Triathlon of Lightweight Block Ciphers for the Internet of Things. 209 - Chenglu Jin, Marten van Dijk:
Secure and Efficient Initialization and Authentication Protocols for SHIELD. 210 - Thijs Laarhoven, Benne de Weger:
Faster sieving for shortest lattice vectors using spherical locality-sensitive hashing. 211 - Christof Beierle, Philipp Jovanovic, Martin M. Lauridsen, Gregor Leander, Christian Rechberger:
Analyzing Permutations for AES-like Ciphers: Understanding ShiftRows. 212 - Javier Herranz:
Attribute-Based Versions of Schnorr and ElGamal. 213 - Yuichi Niwa, Keisuke Ohashi, Kazuhiko Minematsu, Tetsu Iwata:
GCM Security Bounds Reconsidered. 214 - Amadou Moctar Kane:
A revocable anonymity in Tor. 215 - Eike Kiltz, Hoeteck Wee:
Quasi-Adaptive NIZK for Linear Subspaces Revisited. 216 - Subhamoy Maitra, Goutam Paul, Willi Meier:
Salsa20 Cryptanalysis: New Moves and Revisiting Old Styles. 217 - Qinglong Wang:
Efficient k-out-of-n oblivious transfer protocol. 218 - Prakruti C, Sashank Dara, V. N. Muralidhara:
Efficient Format Preserving Encrypted Databases. 219 - Dan Boneh, Kevin Lewi, Hart William Montgomery, Ananth Raghunathan:
Key Homomorphic PRFs and Their Applications. 220 - Daniel J. Bernstein, Tanja Lange, Christine van Vredendaal:
Tighter, faster, simpler side-channel security evaluations beyond computing power. 221 - Elena Andreeva, Andrey Bogdanov, Bart Mennink:
Towards Understanding the Known-Key Security of Block Ciphers. 222 - Anubhab Baksi, Subhamoy Maitra, Santanu Sarkar:
New Distinguishers for Reduced Round Trivium and Trivia-SC using Cube Testers. 223 - Matteo Maffei, Giulio Malavolta, Manuel Reinert, Dominique Schröder:
Privacy and Access Control for Outsourced Personal Records. 224 - Ben Fisch, Daniel Freund, Moni Naor:
Secure Physical Computation using Disposable Circuits. 226 - Alex Biryukov, Dmitry Khovratovich:
Tradeoff Cryptanalysis of Memory-Hard Functions. 227 - Konrad Durnoga, Tomasz Kazana, Michal Zajac, Maciej Zdanowicz:
Leakage-Resilient Cryptography with Key Derived from Sensitive Data. 228 - Reza Hooshmand, Taraneh Eghlidos, Mohammad Reza Aref:
Improving GGH Public Key Scheme Using Low Density Lattice Codes. 229 - Der-Yeuan Yu, Aanjhan Ranganathan, Ramya Jayaram Masti, Claudio Soriente, Srdjan Capkun:
W-SPS: Designing a Wide-Area Secure Positioning System. 230 - Yonglin Hao:
A Related-Key Chosen-IV Distinguishing Attack on Full Sprout Stream Cipher. 231 - Virginie Lallemand, María Naya-Plasencia:
Cryptanalysis of Full Sprout. 232 - Ben Smyth, Steven Frink, Michael R. Clarkson:
Computational Election Verifiability: Definitions and an Analysis of Helios and JCJ. 233 - Megha Agrawal, Donghoon Chang, Mohona Ghosh, Somitra Kumar Sanadhya:
Collision Attack on 4-branch, Type-2 GFN based Hash Functions using Sliced Biclique Cryptanalysis Technique. 234 - Mashael AlSabah, Ian Goldberg:
Performance and Security Improvements for Tor: A Survey. 235 - Subhamoy Maitra, Santanu Sarkar, Anubhab Baksi, Pramit Dey:
Key Recovery from State Information of Sprout: Application to Cryptanalysis and Fault Attack. 236 - Wouter Lueks, Gergely Alpár, Jaap-Henk Hoepman, Pim Vullers:
Fast Revocation of Attribute-Based Credentials for Both Users and Verifiers. 237 - Konrad Durnoga, Stefan Dziembowski, Tomasz Kazana, Michal Zajac:
One Time Programs with Limited Memory. 238 - Patrick Derbez
, Léo Perrin:
Meet-in-the-Middle Attacks and Structural Analysis of Round-Reduced PRINCE. 239 - Alex Biryukov, Patrick Derbez
, Léo Perrin:
Differential Analysis and Meet-in-the-Middle Attack against Round-Reduced TWINE. 240 - Elena Dubrova, Martin Hell:
Espresso: A Stream Cipher for 5G Wireless Communication Systems. 241 - Benoît Libert, Thomas Peters, Marc Joye, Moti Yung:
Compactly Hiding Linear Spans: Tightly Secure Constant-Size Simulation-Sound QA-NIZK Proofs and Applications. 242 - Aris Pagourtzis, Giorgos Panagiotakos, Dimitris Sakavalas:
Reliable Message Transmission under Partial Knowledge. 243 - Jérémy Jean, Ivica Nikolic:
Internal Differential Boomerangs: Practical Analysis of the Round-Reduced Keccak-f Permutation. 244 - Pawel Morawiecki:
Practical Attacks on the Round-reduced PRINCE. 245 - Fabrice Benhamouda, Geoffroy Couteau, David Pointcheval, Hoeteck Wee:
Implicit Zero-Knowledge Arguments and Applications to the Malicious Setting. 246 - Paulo S. L. M. Barreto, Craig Costello, Rafael Misoczki, Michael Naehrig, C. C. F. Pereira Geovandro, Gustavo H. M. Zanon:
Subgroup security in pairing-based cryptography. 247 - Ryo Nishimaki, Keita Xagawa:
Verifiably Encrypted Signatures with Short Keys based on the Decisional Linear Problem and Obfuscation for Encrypted VES. 248 - Keita Xagawa:
Improved (Hierarchical) Inner-Product Encryption from Lattices. 249 - Junji Shikata:
Design and Analysis of Information-Theoretically Secure Authentication Codes with Non-Uniformly Random Keys. 250 - Kaoru Kurosawa, Yasuhiro Ohtaki:
How to Construct UC-Secure Searchable Symmetric Encryption Scheme. 251 - Haiyan Wang, Jianghua Zhong, Dongdai Lin:
Linearization of Multi-valued Nonlinear Feedback Shift Registers. 252 - Haiyan Wang, Dongdai Lin:
Stability and Linearization of Multi-valued Nonlinear Feedback Shift Registers. 253 - Pouyan Sepehrdad, Petr Susil, Serge Vaudenay, Martin Vuagnoux:
Tornado Attack on RC4 with Applications to WEP & WPA. 254 - David Bernhard, Véronique Cortier, David Galindo, Olivier Pereira, Bogdan Warinschi:
A comprehensive analysis of game-based ballot privacy definitions. 255 - Yang Lu, Quanling Zhang, Jiguo Li:
Cryptanalysis of Three Certificate-Based Authenticated Key Agreement Protocols and a Secure Construction. 256 - Vadim Lyubashevsky, Thomas Prest:
Quadratic Time, Linear Space Algorithms for Gram-Schmidt Orthogonalization and Gaussian Sampling in Structured Lattices. 257 - Siang Meng Sim, Khoongming Khoo, Frédérique E. Oggier, Thomas Peyrin:
Lightweight MDS Involution Matrices. 258 - Patrick Derbez
, Pierre-Alain Fouque:
Exhausting Demirci-Selçuk Meet-in-the-Middle Attacks against Reduced-Round AES. 259 - Paul Bottinelli, Joppe W. Bos:
Computational Aspects of Correlation Power Analysis. 260 - Joseph Bonneau, Andrew Miller, Jeremy Clark, Arvind Narayanan, Joshua A. Kroll, Edward W. Felten:
Research Perspectives and Challenges for Bitcoin and Cryptocurrencies. 261 - Hanno Böck:
A look at the PGP ecosystem through the key server data. 262 - Ethan Heilman, Alison Kendler, Aviv Zohar, Sharon Goldberg:
Eclipse Attacks on Bitcoin's Peer-to-Peer Network. 263 - Justine Sherry, Chang Lan, Raluca Ada Popa, Sylvia Ratnasamy:
BlindBox: Deep Packet Inspection over Encrypted Traffic. 264 - George Hatzivasilis, Ioannis Papaefstathiou, Charalampos Manifavas:
Password Hashing Competition - Survey and Benchmark. 265 - Xianrui Meng, Seny Kamara, Kobbi Nissim, George Kollios
:
GRECS: Graph Encryption for Approximate Shortest Distance Queries. 266 - Tung Chou, Claudio Orlandi:
The Simplest Protocol for Oblivious Transfer. 267 - Itai Dinur, Orr Dunkelman, Masha Gutman, Adi Shamir:
Improved Top-Down Techniques in Differential Cryptanalysis. 268 - Chunsheng Gu:
Ideal Multilinear Maps Based on Ideal Lattices. 269 - Markus Dichtl:
Fibonacci Ring Oscillators as True Random Number Generators - A Security Risk. 270 - Mariya Georgieva, Frédéric de Portzamparc:
Toward Secure Implementation of McEliece Decryption. 271 - Baodong Qin, Shengli Liu:
Leakage-Flexible CCA-secure Public-Key Encryption: Simple Construction and Free of Pairing. 272 - Hoeteck Wee:
Dual System Encryption via Predicate Encodings. 273 - Gizem S. Çetin, Yarkin Doröz, Berk Sunar, Erkay Savas:
Low Depth Circuits for Efficient Homomorphic Sorting. 274 - Takanori Yasuda, Xavier Dahan, Yun-Ju Huang, Tsuyoshi Takagi, Kouichi Sakurai:
MQ Challenge: Hardness Evaluation of Solving Multivariate Quadratic Problems. 275 - Binglong Chen, Chang-An Zhao:
An Improvment of the Elliptic Net Algorithm. 276 - Marco Tomamichel, Serge Fehr, Jedrzej Kaniewski, Stephanie Wehner:
One-Sided Device-Independent QKD and Position-based Cryptography from Monogamy Games. 277 - Sébastien Canard, David Pointcheval, Olivier Sanders:
Efficient Delegation of Zero-Knowledge Proofs of Knowledge in a Pairing-Friendly Setting. 278 - Jérémy Jean, María Naya-Plasencia, Thomas Peyrin:
Improved Cryptanalysis of AES-like Permutations. 279 - Jonathan Katz, Aishwarya Thiruvengadam, Hong-Sheng Zhou:
Feasibility and Infeasibility of Adaptively Secure Fully Homomorphic Encryption. 280 - Vinod Vaikuntanathan, Prashant Nalini Vasudevan:
From Statistical Zero Knowledge to Secret Sharing. 281 - Arash Afshar, Payman Mohassel, Benny Pinkas, Ben Riva:
Non-Interactive Secure Computation Based on Cut-and-Choose. 282 - Esha Ghosh, Michael T. Goodrich, Olga Ohrimenko, Roberto Tamassia:
Fully-Dynamic Verifiable Zero-Knowledge Order Queries for Network Data. 283 - Binglong Chen, Chuangqiang Hu, Chang-An Zhao:
A Note on Scalar Multiplication Using Division Polynomials. 284 - Tomer Ashur:
Improved Linear Trails for the Block Cipher Simon. 285 - Zhan Chen, Ning Wang, Xiaoyun Wang:
Impossible Differential Cryptanalysis of Reduced Round SIMON. 286 - John M. Schanck, William Whyte, Zhenfei Zhang:
A quantum-safe circuit-extension handshake for Tor. 287 - Aydin Aysu, Patrick Schaumont
:
Precomputation Methods for Faster and Greener Post-Quantum Cryptography on Emerging Embedded Platforms. 288 - Muhammed F. Esgin, Orhun Kara:
Practical Cryptanalysis of Full Sprout with TMD Tradeoff Attacks. 289 - Joseph A. Akinyele, Christina Garman, Susan Hohenberger:
Automating Fast and Secure Translations from Type-I to Type-III Pairing Schemes. 290 - Takeshi Sugawara
, Daisuke Suzuki, Minoru Saeki:
Two Operands of Multipliers in Side-Channel Attack. 291 - Shlomi Dolev, Yin Li:
Secret Shared Random Access Machine. 292 - Pratish Datta, Ratna Dutta, Sourav Mukhopadhyay:
Fully Secure Unbounded Revocable Attribute-Based Encryption in Prime Order Bilinear Groups via Subset Difference Method. 293 - Erdinç Öztürk, Yarkin Doröz, Berk Sunar, Erkay Savas:
Accelerating Somewhat Homomorphic Evaluation using FPGAs. 294 - Ralf Küsters, Tomasz Truderung:
Security Analysis of Re-Encryption RPC Mix Nets. 295 - Emil Lerner:
The Uniform Distribution of Sequences Generated by Iteration of Polynomials. 296 - Junzuo Lai, Robert H. Deng, Shengli Liu, Jian Weng, Yunlei Zhao:
Identity-Based Encryption Secure Against Selective Opening Chosen-Ciphertext Attack. 297 - Yongge Wang:
Secure Random Linear Code Based Public Key Encryption Scheme RLCE. 298 - Zhengjun Cao, Lihua Liu:
A Note on the Lindell-Waisbard Private Web Search Scheme. 299 - Sébastien Canard, David Pointcheval, Olivier Sanders, Jacques Traoré:
Scalable Divisible E-cash. 300 - Yupu Hu, Huiwen Jia:
Cryptanalysis of GGH Map. 301 - Reza Reyhanitabar, Serge Vaudenay, Damian Vizár:
Boosting OMD for Almost Free Authentication of Associated Data. 302 - Nicky Mouha:
The Design Space of Lightweight Cryptography. 303 - Joshua Baron, Karim El Defrawy, Joshua Lampkins, Rafail Ostrovsky:
Communication-Optimal Proactive Secret Sharing for Dynamic Groups. 304 - Jonas Schneider, Dominique Schröder:
Foundations of Reconfigurable PUFs (Full Version). 305 - Morris Dworkin, Ray A. Perlner:
Analysis of VAES3 (FF2). 306 - Sanjam Garg
, Steve Lu, Rafail Ostrovsky:
Black-Box Garbled RAM. 307 - Patrick McCorry, Siamak Fayyaz Shahandashti, Dylan Clarke, Feng Hao:
Authenticated Key Exchange over Bitcoin. 308 - Tore Kasper Frederiksen, Thomas P. Jakobsen, Jesper Buus Nielsen, Roberto Trifiletti:
TinyLEGO: An Interactive Garbling Scheme for Maliciously Secure Two-party Computation. 309 - Igor A. Semaev:
New algorithm for the discrete logarithm problem on elliptic curves. 310 - Masayuki Abe, Bernardo David, Markulf Kohlweiss, Ryo Nishimaki, Miyako Ohkubo:
Tagged One-Time Signatures: Tight Security and Optimal Tag Size. 311 - Pierre-Alain Fouque, Thomas Vannet:
Improving Key Recovery to 784 and 799 rounds of Trivium using Optimized Cube Attacks. 312 - Ronald Cramer, Léo Ducas, Chris Peikert, Oded Regev:
Recovering Short Generators of Principal Ideals in Cyclotomic Rings. 313 - Qihong Yu, Jiguo Li, Yichen Zhang, Wei Wu, Xinyi Huang, Yang Xiang:
Certificate-Based Encryption Resilient to Key Leakage. 314 - Grégory Demay, Peter Gazi, Ueli Maurer, Björn Tackmann:
Query-Complexity Amplification for Random Oracles. 315 - Zhengan Huang, Shengli Liu, Xianping Mao, Kefei Chen:
Non-malleability under Selective Opening Attacks: Implication and Separation. 316 - Marcin Andrychowicz, Daniel Masny, Edoardo Persichetti:
Leakage-Resilient Cryptography over Large Finite Fields: Theory and Practice. 317 - Patrick Märtens:
Practical Divisible E-Cash. 318 - Koray Karabina:
Point Decomposition Problem in Binary Elliptic Curves. 319 - James Alderman, Christian Janson, Carlos Cid, Jason Crampton:
Hybrid Publicly Verifiable Computation. 320 - (Withdrawn) Size-Hiding in Private Set Intersection: what can be done and how to do it without random oracles. 321
- Peeter Laud, Alisa Pankova:
Transformation-Based Outsourcing of Linear Equation Systems over Real Numbers. 322 - (Withdrawn) Efficient, Pairing-Free, One Round Attribute-Based Authenticated Key Exchange. 323
- Divesh Aggarwal, Alexander Golovnev:
A Note on Lower Bounds for Non-interactive Message Authentication Using Weak Keys. 324 - Yuval Ishai, Rafail Ostrovsky, Vassilis Zikas:
Secure Multi-Party Computation with Identifiable Abort. 325 - Saeideh Kabirirad, Hamideh Hajiabadi:
Cryptanalysis Of An Authenticated Image Encryption Scheme Based On Chaotic Maps And Memory Cellular Automata. 326 - Subhadeep Banik:
Some results on Sprout. 327 - Xiaopeng Yang, Wenping Ma:
Strongly Secure Authenticated Key Exchange from Ideal Lattices. 328 - Dieter Schmidt:
PAGES - A Family of Block Ciiphers. 329 - Tarun Kumar Bansal, Donghoon Chang, Somitra Kumar Sanadhya:
Sponge based CCA2 secure asymmetric encryption for arbitrary length message. 330 - Megha Agrawal, Donghoon Chang, Somitra Kumar Sanadhya:
A New Authenticated Encryption Technique for Handling Long Ciphertexts in Memory Constrained Devices. 331 - Sumit Chakraborty:
Security Intelligence for Broadcast : Threat Analytics. 332 - Johannes Krupp
, Dominique Schröder, Mark Simkin, Dario Fiore, Giuseppe Ateniese, Stefan Nürnberger:
Nearly Optimal Verifiable Data Streaming (Full Version). 333 - Ran Canetti, Yilei Chen, Leonid Reyzin:
On the Correlation Intractability of Obfuscated Pseudorandom Functions. 334 - Janaka Alawatugoda, Colin Boyd, Douglas Stebila:
Continuous After-the-fact Leakage-Resilient eCK-secure Key Exchange. 335 - Benny Applebaum, Jonathan Avron, Christina Brzuska:
Arithmetic Cryptography. 336 - Sujoy Sinha Roy, Kimmo Järvinen, Frederik Vercauteren, Vassil S. Dimitrov, Ingrid Verbauwhede:
Modular Hardware Architecture for Somewhat Homomorphic Function Evaluation. 337 - Amadou Moctar Kane:
Cryptanalysis of a fair anonymity for the tor network. 338 - Berry Schoenmakers, Meilof Veeningen:
Guaranteeing Correctness in Privacy-Friendly Outsourcing by Certificate Validation. 339 - Santanu Sarkar:
A New Distinguisher on Grain v1 for 106 rounds. 340 - Gilad Asharov, Gil Segev:
Limits on the Power of Indistinguishability Obfuscation and Functional Encryption. 341 - Yan Zhu, Xin Wang, Di Ma, Ruiqi Guo:
Identity-Set-based Broadcast Encryption supporting "Cut-or-Select" with Short Ciphertext. 342 - Michael Düll, Björn Haase, Gesine Hinterwälder, Michael Hutter, Christof Paar, Ana Helena Sánchez, Peter Schwabe:
High-speed Curve25519 on 8-bit, 16-bit, and 32-bit microcontrollers. 343 - Ryo Nishimaki, Daniel Wichs:
Watermarking Cryptographic Programs Against Arbitrary Removal Strategies. 344 - Pratyay Mukherjee, Daniel Wichs:
Two Round MPC from LWE via Multi-Key FHE. 345 - Aggelos Kiayias, Thomas Zacharias, Bingsheng Zhang:
End-to-End Verifiable Elections in the Standard Model∗. 346 - Riham AlTawy, Onur Duman, Amr M. Youssef:
Fault Analysis of Kuznyechik. 347 - Andreas Gornik, Amir Moradi, Jürgen Oehm, Christof Paar:
A Hardware-based Countermeasure to Reduce Side-Channel Leakage - Design, Implementation, and Evaluation. 348 - Chang Liu, Liehuang Zhu, Jinjun Chen:
Efficient Searchable Symmetric Encryption for Storing Multiple Source Data on Cloud. 349 - Florian Mendel, Tomislav Nad, Martin Schläffer:
Improving Local Collisions: New Attacks on Reduced SHA-256. 350 - Mohammad Etemad, Alptekin Küpçü:
Database Outsourcing with Hierarchical Authenticated Data Structures. 351 - Pavel Raykov:
Broadcast from Minicast Secure Against General Adversaries. 352 - Paz Morillo, Carla Ràfols, Jorge L. Villar:
Matrix Computational Assumptions in Multilinear Groups. 353 - Jacek Samotyja, Kerstin Lemke-Rust, Markus Ullmann:
SEMA and MESD Leakage of TinyECC 2.0 on a LOTUS Sensor Node. 354 - Tommaso Gagliardoni, Andreas Hülsing, Christian Schaffner:
Semantic Security and Indistinguishability in the Quantum World. 355 - Nir Bitansky, Sanjam Garg
, Huijia Lin, Rafael Pass, Sidharth Telang:
Succinct Randomized Encodings and their Applications. 356 - Ming Li, Yupeng Jiang, Dongdai Lin:
A Group-theory Method to The Cycle Structures of Feedback Shift Registers. 357 - Yun-Ju Huang, Christophe Petit, Naoyuki Shinohara, Tsuyoshi Takagi:
On Generalized First Fall Degree Assumptions. 358 - Jean-Sébastien Coron, Emmanuel Prouff, Matthieu Rivain, Thomas Roche:
Higher-Order Side Channel Security and Mask Refreshing. 359 - Yanqing Yao, Zhoujun Li
:
Achieving Differential Privacy with Bias-Control Limited Source. 360 - Dominique Unruh:
Computationally binding quantum commitments. 361 - Claude Crépeau, Raza Ali Kazmi:
Oblivious Transfer from weakly Random Self-Reducible Public-Key Cryptosystem. 362 - Bart Mennink:
Optimally Secure Tweakable Blockciphers. 363 - Qiang Tang
, Jun Wang:
Privacy-preserving Context-aware Recommender Systems: Analysis and New Solutions. 364 - Masoumeh Safkhani, Nasour Bagheri, Mehdi Hosseinzadeh, Mojtaba Eslamnezhad Namin, Samad Rostampour:
On the (im)possibility of receiving security beyond 2l using an l-bit PRNG: the case of Wang et. al. protocol. 365 - Arjen K. Lenstra, Benjamin Wesolowski:
A random zoo: sloth, unicorn, and trx. 366 - Achiya Bar-On:
Improved Higher-Order Differential Attacks on MISTY1. 367 - Evgeny Sidorov:
Breaking the Rabin-Williams digital signature system implementation in the Crypto++ library. 368 - Nir Bitansky, Omer Paneth:
On Non-Black-Box Simulation and the Impossibility of Approximate Obfuscation. 369 - Sumit Chakraborty:
Financial Cryptography: Discriminatory Pricing Mechanism. 370 - S. Dov Gordon, Feng-Hao Liu, Elaine Shi:
Constant-Round MPC with Fairness and Guarantee of Output Delivery. 371 - Jérémy Jean, Ivica Nikolic, Thomas Peyrin, Lei Wang, Shuang Wu:
Security Analysis of PRINCE. 372 - Aloni Cohen, Justin Holmgren
, Vinod Vaikuntanathan:
Publicly Verifiable Software Watermarking. 373 - Christoph Bader, Tibor Jager, Yong Li, Sven Schäge:
On the Impossibility of Tight Cryptographic Reductions. 374 - Daniel R. L. Brown:
Bounds on surmising remixed keys. 375 - Raza Ali Kazmi:
Cryptography from Post-Quantum Assumptions. 376 - Alessandro Chiesa, Eran Tromer, Madars Virza:
Cluster Computing in Zero Knowledge. 377 - Fatemeh Ganji, Shahin Tajik, Jean-Pierre Seifert:
PAC Learning of Arbiter PUFs. 378 - Jingwei Li, Anna Cinzia Squicciarini, Dan Lin, Smitha Sundareswaran, Chunfu Jia:
MMBcloud-tree: Authenticated Index for Verifiable Cloud Service Selection. 379 - Céline Blondeau, Aslí Bay, Serge Vaudenay:
Protecting against Multidimensional Linear and Truncated Differential Cryptanalysis by Decorrelation. 380 - Sumit Chakraborty:
Financial Cryptography: Algorithmic Mechanisms for a Hedonic Game. 381 - Thomas Pöppelmann, Tobias Oder, Tim Güneysu:
Speed Records for Ideal Lattice-Based Cryptography on AVR. 382 - Rafael Pass, Abhi Shelat:
Impossibility of VBB Obfuscation with Ideal Constant-Degree Graded Encodings. 383 - Maciej Skorski
, Alexander Golovnev, Krzysztof Pietrzak:
Condensed Unpredictability. 384 - Serge Fehr, Jonathan Katz, Fang Song, Hong-Sheng Zhou, Vassilis Zikas:
Feasibility and Completeness of Cryptographic Tasks in the Quantum World. 385 - David J. Wu, Tony Feng, Michael Naehrig, Kristin E. Lauter:
Privately Evaluating Decision Trees and Random Forests. 386 - Scott Contini:
Method to Protect Passwords in Databases for Web Applications. 387 - Ran Canetti, Justin Holmgren
:
Fully Succinct Garbled RAM. 388 - Guido Bertoni, Joan Daemen, Michaël Peeters, Gilles Van Assche:
Keccak. 389 - Nuttapong Attrapadung:
Dual System Encryption Framework in Prime-Order Groups. 390 - Deepesh Data, Manoj Prabhakaran, Vinod M. Prabhakaran:
On the Communication Complexity of Secure Computation. 391 - Christoph Dobraunig, Maria Eichlseder, Florian Mendel:
Forgery Attacks on round-reduced ICEPOLE-128. 392 - Mohammad Hossein Faghihi Sereshgi, Mohammad Dakhilalian, Mohsen Shakiba:
Biclique cryptanalysis of MIBS-80 and PRESENT-80. 393 - Christian Badertscher, Christian Matt, Ueli Maurer, Phillip Rogaway, Björn Tackmann:
Augmented Secure Channels and the Goal of the TLS 1.3 Record Layer. 394 - Nils Fleischhacker, Johannes Krupp
, Giulio Malavolta, Jonas Schneider, Dominique Schröder, Mark Simkin:
Efficient Unlinkable Sanitizable Signatures from Signatures with Rerandomizable Keys. 395 - Dario Catalano, Dario Fiore, Rosario Gennaro, Luca Nizzardo:
Generalizing Homomorphic MACs for Arithmetic Circuits. 396 - Peter Gazi, Jooyoung Lee, Yannick Seurin, John P. Steinberger, Stefano Tessaro:
Relaxing Full-Codebook Security: A Refined Analysis of Key-Length Extension Schemes. 397 - Abderrahmane Nitaj, Tajjeeddine Rachidi:
Factoring RSA moduli with weak prime factors. 398 - Abderrahmane Nitaj, Tajjeeddine Rachidi:
New attacks on RSA with Moduli N=prq. 399 - Stephen R. Tate, Roopa Vishwanathan:
Expiration and Revocation of Keys for Attribute-based Signatures. 400 - Eike Kiltz, Daniel Masny, Krzysztof Pietrzak:
Simple Chosen-Ciphertext Security from Low-Noise LPN. 401 - Adrian Thillard, Emmanuel Prouff, Thomas Roche:
Success through confidence: Evaluating the effectiveness of a side-channel attack. 402 - Mehrdad Nojoumian, Douglas R. Stinson:
Sequential Secret Sharing as a New Hierarchical Access Structure. 403 - Esha Ghosh, Olga Ohrimenko, Dimitrios Papadopoulos, Roberto Tamassia, Nikos Triandopoulos:
Zero-Knowledge Accumulators and Set Operations. 404 - Dana Dachman-Soled, Nils Fleischhacker, Jonathan Katz, Anna Lysyanskaya, Dominique Schröder:
Feasibility and Infeasibility of Secure Computation with Malicious PUFs. 405 - Yu-Chi Chen, Sherman S. M. Chow, Kai-Min Chung, Russell W. F. Lai, Wei-Kai Lin, Hong-Sheng Zhou:
Computation-Trace Indistinguishability Obfuscation and its Applications. 406 - Christoph Dobraunig, Maria Eichlseder, Florian Mendel:
Higher-order cryptanalysis of LowMC. 407 - Franck Rondepierre:
Revisiting Atomic Patterns for Scalar Multiplications on Elliptic Curves. 408 - Jie Chen, Romain Gay, Hoeteck Wee:
Improved Dual System ABE in Prime-Order Groups via Predicate Encodings. 409 - Zhe Liu, Hwajeong Seo, Sujoy Sinha Roy, Johann Großschädl, Howon Kim, Ingrid Verbauwhede:
Efficient Ring-LWE Encryption on 8-bit AVR Processors. 410 - Pei Luo, Yunsi Fei, Xin Fang, A. Adam Ding, David R. Kaeli, Miriam Leeser:
Side-Channel Analysis of MAC-Keccak Hardware Implementations. 411 - Máté Horváth:
Survey on Cryptographic Obfuscation. 412 - Shashank Agrawal, Melissa Chase:
A study of Pair Encodings: Predicate Encryption in prime order groups. 413 - Mridul Nandi:
On the Optimality of Non-Linear Computations of Length-Preserving Encryption Schemes. 414 - Markku-Juhani O. Saarinen:
STRIBOB / WHIRLBOB Security Analysis Addendum. 415 - Mayank Varia, Sophia Yakoubov, Yang Yang:
HETest: A Homomorphic Encryption Testing Framework. 416 - Mark Bun, Mark Zhandry:
Order-Revealing Encryption and the Hardness of Private Learning. 417 - Itai Dinur, Yunwen Liu, Willi Meier, Qingju Wang:
Optimized Interpolation Attacks on LowMC. 418 - Yasser Shoukry, Paul D. Martin, Paulo Tabuada, Mani B. Srivastava:
Non-invasive Spoofing Attacks for Anti-lock Braking Systems. 419 - Vipul Goyal, Divya Gupta, Abhishek Jain
:
What Information is Leaked under Concurrent Composition? 420 - Zhe Liu, Husen Wang, Johann Großschädl, Zhi Hu, Ingrid Verbauwhede:
VLSI Implementation of Double-Base Scalar Multiplication on a Twisted Edwards Curve with an Efficiently Computable Endomorphism. 421 - Marina Blanton
, Fattaneh Bayatbabolghani:
Efficient Server-Aided Secure Two-Party Function Evaluation with Applications to Genomic Computation. 422 - Santosh Ghosh, Amit Kumar, Amitabh Das, Ingrid Verbauwhede:
On the Implementation of Unified Arithmetic on Binary Huff Curves. 423 - Begül Bilgin
, Andrey Bogdanov, Miroslav Knezevic, Florian Mendel, Qingju Wang:
FIDES: Lightweight Authenticated Cipher with Side-Channel Resistance for Constrained Hardware. 424 - Stefan Heyse, Ingo von Maurich, Tim Güneysu:
Smaller Keys for Code-Based Cryptography: QC-MDPC McEliece Implementations on Embedded Devices. 425 - Alex Biryukov, Ivica Nikolic:
Complementing Feistel Ciphers. 426 - Mudit Bhargava, Ken Mai:
A High Reliability PUF Using Hot Carrier Injection Based Response Reinforcement. 427 - Philipp Jovanovic, Samuel Neves:
Dumb Crypto in Smart Grids: Practical Cryptanalysis of the Open Smart Grid Protocol. 428 - Ivica Nikolic, Lei Wang, Shuang Wu:
Cryptanalysis of Round-Reduced LED. 429 - Alex Biryukov, Daniel Dinu, Dmitry Khovratovich:
Fast and Tradeoff-Resilient Memory-Hard Functions for Cryptocurrencies and Password Hashing. 430 - Shota Yamada, Nuttapong Attrapadung, Goichiro Hanaoka:
Conversions among Several Classes of Predicate Encryption and Their Applications. 431 - (Withdrawn) Non-Repudiable Provable Data Possession in Cloud Storage. 432
- Wentao Zhang, Zhenzhen Bao, Vincent Rijmen, Meicheng Liu:
A New Classification of 4-bit Optimal S-boxes and its Application to PRESENT, RECTANGLE and SPONGENT. 433 - Pascale Charpin, Sihem Mesnager, Sumanta Sarkar:
Dickson Polynomials that are Involutions. 434 - Yusong Du, Baodian Wei, Fangguo Zhang, Huang Zhang:
On the (Fast) Algebraic Immunity of Boolean Power Functions. 435 - Yusong Du, Baodian Wei, Fangguo Zhang, Huang Zhang:
On the Resistance of Prime-variable Rotation Symmetric Boolean Functions against Fast Algebraic Attacks. 436 - Bryan Parno:
A Note on the Unsoundness of vnTinyRAM's SNARK. 437 - Ralf Küsters, Tomasz Truderung, Bernhard Beckert, Daniel Bruns, Michael Kirsten, Martin Mohr:
A Hybrid Approach for Proving Noninterference of Java Programs. 438 - Vipul Goyal, Abhishek Jain
:
On Concurrently Secure Computation in the Multiple Ideal Query Model. 439 - Martín Abadi, Dan Boneh, Ilya Mironov, Ananth Raghunathan, Gil Segev:
Message-Locked Encryption for Lock-Dependent Messages. 440 - Devu Manikantan Shila, Vivek Venugopalan, Cameron D. Patterson:
Enhancing Trust in Reconfigurable Based Hardware Systems with Tags and Monitors. 441 - Zoya Dyka, Thomas Basmer, Christian Wittke, Peter Langendörfer:
Individualizing Electrical Circuits of Cryptographic Devices as a Means to Hinder Tampering Attacks. 442 - Xiaolin Xu, Ulrich Rührmair, Daniel E. Holcomb, Wayne P. Burleson:
Security Evaluation and Enhancement of Bistable Ring PUFs. 443 - Mridul Nandi:
Revisiting Security Claims of XLS and COPA. 444 - Mridul Nandi:
XLS is not a Strong Pseudorandom Permutation. 445 - Ronald Cramer, Ivan Damgård, Marcel Keller:
On the Amortized Complexity of Zero-knowledge Protocols. 446 - Zhenqi Li, Bin Zhang, Junfeng Fan, Ingrid Verbauwhede:
A New Model for Error-Tolerant Side-Channel Cube Attacks. 447 - Yupu Hu, Huiwen Jia:
A Comment on Gu Map-1. 448 - Ruoxin Zhao, Rui Zhang, Yongqiang Li, Baofeng Wu:
On Constructions of a Sort of MDS Block Diffusion Matrices for Block Ciphers and Hash Functions. 449 - Carmit Hazay, Yehuda Lindell, Arpita Patra:
Adaptively Secure Computation with Partial Erasures. 450 - Sihong Su, Xiaohu Tang:
On the Systematic Constructions of Rotation Symmetric Bent Functions with Any Possible Algebraic Degrees. 451 - Nicolas Bruneau, Sylvain Guilley, Annelie Heuser, Olivier Rioul:
Masks will Fall Off - Higher-Order Optimal Distinguishers. 452 - Yupu Hu, Huiwen Jia:
An Optimization of Gu Map-1. 453 - Oscar García Morchon, Ronald Rietman, Sahil Sharma, Ludo Tolhuizen, Jose Luis Torre-Arce:
A comprehensive and lightweight security architecture to secure the IoT throughout the lifecycle of a device based on HIMMO. 454 - Jian Liu, N. Asokan, Benny Pinkas:
Secure Deduplication of Encrypted Data without Additional Independent Servers. 455 - Iraklis Symeonidis, Filipe Beato, Pagona Tsormpatzoudi, Bart Preneel:
Collateral damage of Facebook Apps: an enhanced privacy scoring model. 456 - Mridul Nandi, Tapas Pandit:
Generic Conversions from CPA to CCA secure Functional Encryption. 457 - Sheena Sathyan, Ramaswamy Swarnammal Shaji:
A Hybrid Approach for the Secure Transmission of H.264/AVC Video Streams. 458 - Bing Sun, Xin Hai, Wenyu Zhang, Lei Cheng, Zhichao Yang:
New Observation on Division Property. 459 - Kevin Delmolino, Mitchell Arnett, Ahmed E. Kosba, Andrew Miller, Elaine Shi:
Step by Step Towards Creating a Safe Smart Contract: Lessons and Insights from a Cryptocurrency Lab. 460 - Jung Hee Cheon, Changmin Lee:
Cryptanalysis of the multilinear map on the ideal lattices. 461 - Wei Dai, Yarkin Doröz, Berk Sunar:
Accelerating SWHE based PIRs using GPUs. 462 - (Withdrawn) Multilinear Maps Using Random Matrix. 463
- Florian Tschorsch, Björn Scheuermann:
Bitcoin and Beyond: A Technical Survey on Decentralized Digital Currencies. 464 - Hwajeong Seo, Zhe Liu, Johann Großschädl, Howon Kim:
Efficient Arithmetic on ARM-NEON and Its Application for High-Speed RSA Implementation. 465 - Tanping Zhou, Xiaoyuan Yang, Wei Zhang, Liqiang Wu:
Efficient Fully Homomorphic Encryption with Circularly Secure Key Switching Process. 466 - Marcel Keller:
The Oblivious Machine - or: How to Put the C into MPC. 467 - Dongxi Liu:
Practical Fully Homomorphic Encryption without Noise Reduction. 468 - Andrew Miller, Rob Jansen:
Shadow-Bitcoin: Scalable Simulation via Direct Execution of Multi-threaded Applications. 469 - Vincenzo Iovino, Qiang Tang
, Karol Zebrowski:
On the Power of Public-key Functional Encryption with Function Privacy. 470 - Yansong Gao, Damith Chinthana Ranasinghe, Gefei Li, Said F. Al-Sarawi, Omid Kavehei, Derek Abbott:
A Challenge Obfuscation Method for Thwarting Model Building Attacks on PUFs. 471 - Sai Sheshank Burra, Enrique Larraia, Jesper Buus Nielsen, Peter Sebastian Nordholt, Claudio Orlandi, Emmanuela Orsini, Peter Scholl, Nigel P. Smart:
High Performance Multi-Party Computation for Binary Circuits Based on Oblivious Transfer. 472 - Mehak Khurana, Meena Kumari:
VARIANTS OF DIFFERENTIAL AND LINEAR CRYPTANALYSIS. 473 - Masahiro Yagisawa:
Fully Homomorphic Encryption without bootstrapping. 474 - Eleonora Guerrini, Laurent Imbert, Théo Winterhalter:
Randomizing Scalar Multiplication Using Exact Covering Systems of Congruences. 475 - Bart Mennink:
XPX: Generalized Tweakable Even-Mansour with Improved Security Guarantees. 476 - John Preuß Mattsson:
Authentication Key Recovery in Galois/Counter Mode (GCM). 477 - (Withdrawn) How to Build Time-Lock Encryption. 478
- Martianus Frederic Ezerman, Hyung Tae Lee, San Ling, Khoa Nguyen, Huaxiong Wang:
A Provably Secure Group Signature Scheme from Code-Based Assumptions. 479 - Berry Schoenmakers, Meilof Veeningen, Niels de Vreede:
Trinocchio: Privacy-Friendly Outsourcing by Distributed Verifiable Computation. 480 - Theodosis Mourouzis, Guangyan Song, Nicolas T. Courtois, Michalis Christofi:
Advanced Differential Cryptanalysis of Reduced-Round SIMON64/128 Using Large-Round Statistical Distinguishers. 481 - Jia Liu, Saqib A. Kakvi, Bogdan Warinschi:
Extractable Witness Encryption and Timed-Release Encryption from Bitcoin. 482 - Shi Bai, Adeline Langlois, Tancrède Lepoint, Damien Stehlé, Ron Steinfeld:
Improved security proofs in lattice-based cryptography: using the Rényi divergence rather than the statistical distance. 483 - Jian Guo, Jérémy Jean, Nicky Mouha, Ivica Nikolic:
More Rounds, Less Security? 484 - Elena Andreeva, Guy Barwell, Dan Page, Martijn Stam:
Turning Online Ciphers Off. 485 - Jiangshan Yu, Mark Ryan, Cas Cremers:
How to detect unauthorised usage of a key. 486 - Mihir Bellare, Igors Stepanovs, Stefano Tessaro:
Contention in Cryptoland: Obfuscation, Leakage and UCE. 487 - Carmit Hazay, Muthuramakrishnan Venkitasubramaniam:
On Black-Box Complexity of Universally Composable Security in the CRS model. 488 - Trinabh Gupta, Natacha Crooks, Srinath T. V. Setty, Lorenzo Alvisi, Michael Walfish:
Scalable and private media consumption with Popcorn. 489 - Sonam Devgan Kaul, Amit K. Awasthi:
Cryptanalysis Of Dynamic ID Based Remote User Authentication Scheme With Key Agreement. 490 - Nishanth Chandran, Melissa Chase, Feng-Hao Liu, Ryo Nishimaki, Keita Xagawa:
Re-encryption, functional re-encryption, and multi-hop re-encryption: A framework for achieving obfuscation-based security and instantiations from lattices. 491 - Vincent Grosso, François-Xavier Standaert, Sebastian Faust:
Masking vs. Multiparty Computation: How Large is the Gap for AES? 492 - Sikhar Patranabis, Abhishek Chakraborty, Debdeep Mukhopadhyay:
Fault Tolerant Infective Countermeasure for AES. 493 - (Withdrawn) Cryptanalysis of the LSH and SHA-V Hash Functions. 494
- Sondre Rønjom:
Powers of Subfield Polynomials and Algebraic Attacks on Word-Based Stream Ciphers. 495 - Arthur Gervais, Hubert Ritzdorf, Mario Lucic, Srdjan Capkun:
Quantifying Location Privacy Leakage from Transaction Prices. 496 - Zhangxiang Hu, Payman Mohassel, Mike Rosulek:
Efficient Zero-Knowledge Proofs of Non-Algebraic Statements with Sublinear Amortized Cost. 497 - Jiajun Zhang, Haining Fan:
Low Space Complexity CRT-based Bit-Parallel GF(2n) Polynomial Basis Multipliers for Irreducible Trinomials. 498 - Dennis Hofheinz:
Algebraic partitioning: Fully compact and (almost) tightly secure cryptography. 499 - Alberto Battistello, Christophe Giraud:
Fault Cryptanalysis of CHES 2014 Symmetric Infective Countermeasure. 500 - Serge Fehr, Max Fillinger:
Multi-Prover Commitments Against Non-Signaling Attacks. 501 - George Danezis, Sarah Meiklejohn:
Centrally Banked Cryptocurrencies. 502 - Kristian Gjøsteen, Anders Smedstuen Lund:
The Norwegian Internet Voting Protocol: A new Instantiation. 503 - Brice Minaud, Yannick Seurin:
The Iterated Random Permutation Problem with Applications to Cascade Encryption. 504 - Razvan Barbulescu, Pierrick Gaudry, Thorsten Kleinjung:
The Tower Number Field Sieve. 505 - Gilles Barthe, Sonia Belaïd, François Dupressoir, Pierre-Alain Fouque, Benjamin Grégoire:
Compositional Verification of Higher-Order Masking: Application to a Verifying Masking Compiler. 506 - Itai Dinur, Orr Dunkelman, Thorsten Kranz, Gregor Leander:
Decomposing the ASASA Block Cipher Construction. 507 - Santanu Sarkar, Prakash Dey, Avishek Adhikari, Subhamoy Maitra:
Probabilistic Signature Based Framework for Differential Fault Analysis of Stream Ciphers. 508 - Daniel R. L. Brown:
A flaw in a theorem about Schnorr signatures. 509 - Gideon Samid:
Equivoe-T: Transposition Equivocation Cryptography. 510 - Baris Ege, Thomas Eisenbarth, Lejla Batina:
Near Collision Side Channel Attacks. 511 - Sami Saab, Andrew Leiserson, Michael Tunstall:
Efficient Key Extraction from the Primary Side of a Switched-Mode Power Supply. 512 - Aurore Guillevic:
Computing Individual Discrete Logarithms Faster in GF(pn). 513 - Nir Bitansky, Shafi Goldwasser, Abhishek Jain
, Omer Paneth, Vinod Vaikuntanathan, Brent Waters:
Time-Lock Puzzles from Randomized Encodings. 514 - Thomas Espitau, Pierre-Alain Fouque, Pierre Karpman:
Higher-Order Differential Meet-in-The-Middle Preimage Attacks on SHA-1 and BLAKE. 515 - Brice Minaud, Patrick Derbez
, Pierre-Alain Fouque, Pierre Karpman:
Key-Recovery Attacks on ASASA. 516 - Giuseppe Ateniese, Bernardo Magri, Daniele Venturi:
Subversion-Resilient Signature Schemes. 517 - Ren Zhang:
Broadcasting Intermediate Blocks as a Defense Mechanism Against Selfish-Mine in Bitcoin. 518 - Yongge Wang:
Notes on Two Fully Homomorphic Encryption Schemes Without Bootstrapping. 519 - Suvradip Chakraborty, Srinivasan Raghuraman, C. Pandu Rangan:
Efficient, Pairing-Free, One Round Attribute-Based Authenticated Key Exchange. 520 - Sergey Gorbunov, Silvio Micali:
Democoin: A Publicly Verifiable and Jointly Serviced Cryptocurrency. 521 - Anja Becker, Nicolas Gama, Antoine Joux:
Speeding-up lattice sieving without increasing the memory, using sub-quadratic nearest neighbor search. 522 - Yehuda Lindell, Benny Pinkas, Nigel P. Smart, Avishay Yanai:
Efficient Constant Round Multi-Party Computation Combining BMR and SPDZ. 523 - Yansong Gao:
Secure Key Exchange Protocol based on Virtual Proof of Reality. 524 - David Pointcheval, Olivier Sanders:
Short Randomizable Signatures. 525 - Takanori Isobe, Kyoji Shibutani:
Generic Key Recovery Attack on Feistel Scheme. 526 - Carolyn Whitnall, Elisabeth Oswald:
Robust Profiling for DPA-Style Attacks. 527 - Sunoo Park, Krzysztof Pietrzak, Albert Kwon, Joël Alwen, Georg Fuchsbauer, Peter Gazi:
Spacemint: A Cryptocurrency Based on Proofs of Space. 528 - Colin O'Flynn, Zhizhang Chen:
Power Analysis Attacks against IEEE 802.15.4 Nodes. 529 - Pierre Karpman, Thomas Peyrin, Marc Stevens:
Practical Free-Start Collision Attacks on 76-step SHA-1. 530 - Mohammad Hajiabadi, Bruce M. Kapron:
Reproducible Circularly-Secure Bit Encryption: Applications and Realizations. 531 - Xiaoshuang Ma, Kexin Qiao:
Related-Key Rectangle Attack on Round-reduced Khudra Block Cipher. 533 - Sergey Agievich, Anastasiya Gorodilova, Nikolay Kolomeec, Svetla Nikova, Bart Preneel, Vincent Rijmen, George Shushuev, Natalia N. Tokareva, Valeriya Vitkup:
Problems, solutions and experience of the first international student's Olympiad in cryptography. 534 - Vincent Grosso, François-Xavier Standaert:
ASCA, SASCA and DPA with Enumeration: Which One Beats the Other and When? 535 - François Durvaux, François-Xavier Standaert:
From Improved Leakage Detection to the Detection of Points of Interests in Leakage Traces. 536 - François Durvaux, François-Xavier Standaert:
Towards Easy Leakage Certification. 537 - Sarita Agrawal, Jay Patel, Manik Lal Das:
Pairing Based Mutual Healing in Wireless Sensor Networks. 538 - Benoit Cogliati, Rodolphe Lampe, Yannick Seurin:
Tweaking Even-Mansour Ciphers. 539 - (Withdrawn) PICO: An Ultra lightweight and Low power encryption design for pervasive computing. 540
- Bart Mennink, Reza Reyhanitabar, Damian Vizár:
Security of Full-State Keyed and Duplex Sponge: Applications to Authenticated Encryption. 541 - Sonia Belaïd, Jean-Sébastien Coron, Pierre-Alain Fouque, Benoît Gérard, Jean-Gabriel Kammerer, Emmanuel Prouff:
Improved Side-Channel Analysis of Finite-Field Multiplication. 542 - Moni Naor, Eylon Yogev:
Bloom Filters in Adversarial Environments. 543 - Daniel R. L. Brown:
Alternative cubics' rules with an algebraic appeal. 544 - Qinglong Zhang, Zongbin Liu, Cunqing Ma, Changting Li, Jiwu Jing:
FROPUF: How to Extract More Entropy from Two Ring Oscillators in FPGA-Based PUFs. 545 - Marcel Keller, Emmanuela Orsini, Peter Scholl:
Actively Secure OT Extension with Optimal Overhead. 546 - Xiao Wang, S. Dov Gordon, Allen McIntosh, Jonathan Katz:
Secure Computation of MIPS Machine Code. 547 - Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz:
Message Transmission with Reverse Firewalls - Secure Communication on Corrupted Machines. 548 - Amir Hassani Karbasi, Reza Ebrahimi Atani:
ILTRU: An NTRU-Like Public Key Cryptosystem Over Ideal Lattices. 549 - Charanjit S. Jutla:
Upending Stock Market Structure Using Secure Multi-Party Computation. 550 - Anne Broadbent, Stacey Jeffery:
Quantum homomorphic encryption for circuits of low T-gate complexity. 551 - Paul Kirchner, Pierre-Alain Fouque:
An Improved BKW Algorithm for LWE with Applications to Cryptography and Lattices. 552 - Rafail Ostrovsky, Silas Richelson, Alessandra Scafuro:
Round-Optimal Black-Box Two-Party Computation. 553 - Michel Abdalla, Fabrice Benhamouda, Alain Passelègue:
An Algebraic Framework for Pseudorandom Functions and Applications to Related-Key Security. 554 - Tapas Pandit, Sumit Kumar Pandey, Rana Barua:
Attribute-Based Signcryption : Signer Privacy, Strong Unforgeability and IND-CCA2 Security in Adaptive-Predicates Attack. 555 - Sujoy Sinha Roy, Kimmo Järvinen, Ingrid Verbauwhede:
Lightweight Coprocessor for Koblitz Curves: 283-bit ECC Including Scalar Conversion with only 4300 Gates. 556 - Takanori Isobe, Kyoji Shibutani:
Improved All-Subkeys Recovery Attacks on FOX, KATAN and SHACAL-2 Block Ciphers. 557 - Oksana Kulyk, Stephan Neumann, Jurlind Budurushi, Melanie Volkamer, Rolf Haenni, Reto E. Koenig, Philémon von Bergen:
Efficiency Evaluation of Cryptographic Protocols for Boardroom Voting. 558 - Ran Canetti, Vipul Goyal, Abhishek Jain
:
Concurrent Secure Computation with Optimal Query Complexity. 559 - Olivier Blazy, Céline Chevalier:
Generic Construction of UC-Secure Oblivious Transfer. 560 - Jake Longo, Elke De Mulder, Daniel Page, Michael Tunstall:
SoC it to EM: electromagnetic side-channel attacks on a complex system-on-chip. 561 - Iraklis Leontiadis, Kaoutar Elkhiyaoui, Melek Önen, Refik Molva:
PUDA - Privacy and Unforgeability for Data Aggregation. 562 - Muhammad Naveed, Erman Ayday, Ellen Wright Clayton, Jacques Fellay, Carl A. Gunter, Jean-Pierre Hubaux, Bradley A. Malin, XiaoFeng Wang:
Privacy in the Genomic Era. 563 - Victor Costan, Ilia A. Lebedev, Srinivas Devadas:
Sanctum: Minimal RISC Extensions for Isolated Execution. 564 - Craig Costello, Patrick Longa:
FourQ: four-dimensional decompositions on a Q-curve over the Mersenne prime. 565 - Nuttapong Attrapadung, Goichiro Hanaoka, Shota Yamada:
A Framework for Identity-Based Encryption with Almost Tight Security. 566 - Henri Gilbert, Jérôme Plût, Joana Treger:
Key-Recovery Attack on the ASASA Cryptosystem with Expanding S-boxes. 567 - Bingke Ma, Bao Li, Ronglin Hao, Xiaoqian Li:
Cryptanalysis of Reduced-Round Whirlwind (Full Version). 568 - Bingke Ma, Bao Li, Ronglin Hao, Xiaoqian Li:
Improved (Pseudo) Preimage Attacks on Reduced-Round GOST and Grøstl-256 and Studies on Several Truncation Patterns for AES-like Compression Functions (Full Version). 569 - Tarik Moataz, Travis Mayberry, Erik-Oliver Blass:
Constant Communication Oblivious RAM. 570 - Tobias Schneider, Amir Moradi, Tim Güneysu:
Robust and One-Pass Parallel Computation of Correlation-Based Attacks at Arbitrary Order. 571 - Eli Ben-Sasson, Iddo Bentov, Ivan Damgård, Yuval Ishai, Noga Ron-Zewi:
On Public Key Encryption from Noisy Codewords. 572 - Ming-Deh A. Huang, Michiel Kosters, Sze Ling Yeo:
Last fall degree, HFE, and Weil descent attacks on ECDLP. 573 - Aggelos Kiayias, Hong-Sheng Zhou, Vassilis Zikas:
Fair and Robust Multi-Party Computation using a Global Transaction Ledger. 574 - Céline Blondeau, Thomas Peyrin, Lei Wang:
Known-key Distinguisher on Full PRESENT. 575 - Michael Scott, Brian Spector:
The Carnac protocol - or how to read the contents of a sealed envelope. 576 - Manfred Lochter, Andreas Wiemers:
Twist Insecurity. 577 - Arthur Gervais, Hubert Ritzdorf, Ghassan O. Karame, Srdjan Capkun:
Tampering with the Delivery of Blocks and Transactions in Bitcoin. 578 - Mridul Nandi:
A Simple Proof of a Distinguishing Bound of Iterated Uniform Random Permutation. 579 - Jan Camenisch, Maria Dubovitskaya, Kristiyan Haralambiev, Markulf Kohlweiss:
Composable & Modular Anonymous Credentials: Definitions and Practical Constructions. 580 - Christina Brzuska, Arno Mittelbach:
Universal Computational Extractors and the Superfluous Padding Assumption for Indistinguishability Obfuscation. 581 - Robert Lychev, Samuel Jero, Alexandra Boldyreva, Cristina Nita-Rotaru:
How Secure and Quick is QUIC? Provable Security and Performance Analyses. 582 - Roel Maes, Vincent van der Leest, Erik van der Sluis, Frans M. J. Willems:
Secure Key Generation from Biased PUFs. 583 - Denise Demirel, Jean Lancrenon:
How to Securely Prolong the Computational Bindingness of Pedersen Commitments. 584 - Ray Beaulieu, Douglas Shors, Jason Smith, Stefan Treatman-Clark, Bryan Weeks, Louis Wingers:
SIMON and SPECK: Block Ciphers for the Internet of Things. 585 - (Withdrawn) SCLPV: Secure Certificateless Public Verification for Cloud Storage in Cyber-physical-social System. 586
- Trupil Limbasiya, Nishant Doshi:
AN ENHANCED BIOMETRIC BASED REMOTE USER AUTHENTICATION SCHEME USING SMART CARD. 587 - Bimal Mandal, Pantelimon Stanica, Sugata Gangopadhyay, Enes Pasalic:
An analysis of the C class of bent functions. 588 - Anastasia-Maria Leventi-Peetz, J.-V. Peetz:
Generating S-Box Multivariate Quadratic Equation Systems And Estimating Algebraic Attack Resistance Aided By SageMath. 589 - Avik Chakraborti, Anupam Chattopadhyay, Muhammad Hassan, Mridul Nandi:
TriviA: A Fast and Secure Authenticated Encryption Scheme. 590 - Maciej Skorski
:
How much randomness can be extracted from memoryless Shannon entropy sources? 591 - Milivoj Simeonovski, Fabian Bendun, Muhammad Rizwan Asghar, Michael Backes, Ninja Marnau, Peter Druschel:
Oblivion: Mitigating Privacy Leaks by Controlling the Discoverability of Online Information. 592 - Patrick Haddad, Viktor Fischer, Florent Bernard, Jean Nicolai:
A Physical Approach for Stochastic Modeling of TERO-based TRNG. 593 - Debrup Chakraborty, Cuauhtemoc Mancillas-López, Palash Sarkar:
Disk Encryption: Do We Need to Preserve Length? 594 - (Withdrawn) Differential Fault Intensity Analysis. 595
- Jean-Sébastien Coron, Craig Gentry, Shai Halevi, Tancrède Lepoint, Hemanta K. Maji, Eric Miles, Mariana Raykova, Amit Sahai, Mehdi Tibouchi:
Zeroizing Without Low-Level Zeroes: New MMAP Attacks and Their Limitations. 596 - Amir Moradi, Alexander Wild:
Assessment of Hiding the Higher-Order Leakages in Hardware - what are the achievements versus overheads? 597 - Martin Pettai, Peeter Laud:
Combining Differential Privacy and Secure Multiparty Computation. 598 - Krzysztof Pietrzak, Maciej Skorski
:
The Chain Rule for HILL Pseudoentropy, Revisited. 599 - John Kelsey, Kerry A. McKay, Meltem Sönmez Turan:
Predictive Models for Min-Entropy Estimation. 600 - Mei Wang, Zheng Yuan, Xiao Feng:
A Secure Oblivious Transfer Protocol from Indistinguishing Obfuscation. 601 - Abhishek Chakraborty, Bodhisatwa Mazumdar, Debdeep Mukhopadhyay:
Combined Side-Channel and Fault Analysis Attack on Protected Grain Family of Stream Ciphers. 602 - Claude Carlet, Sylvain Guilley:
Complementary Dual Codes for Counter-measures to Side-Channel Attacks. 603 - Eike Kiltz, Jiaxin Pan, Hoeteck Wee:
Structure-Preserving Signatures from Standard Assumptions, Revisited. 604 - Steven D. Galbraith, Ping Wang, Fangguo Zhang:
Computing Elliptic Curve Discrete Logarithms with Improved Baby-step Giant-step Algorithm. 605 - Kyu Young Choi, Jihoon Cho, Jung Yeon Hwang, Taekyoung Kwon:
Constructing Efficient PAKE Protocols from Identity-Based KEM/DEM. 606 - Hitesh Tewari, Eamonn O. Nuallain:
Netcoin - A Traceable P2P Electronic Cash System. 607 - Benoît Libert, Damien Stehlé:
Fully Secure Functional Encryption for Inner Products, from Standard Assumptions. 608 - Igor A. Semaev:
Experimental Study of DIGIPASS GO3 and the Security of Authentication. 609 - Daniel J. Bernstein, Tung Chou, Peter Schwabe:
McBits: fast constant-time code-based cryptography. 610 - (Withdrawn) A Unified Security Analysis of Two-phase Key Exchange Protocols in TPM 2.0. 611
- Gangqiang Yang, Bo Zhu, Valentin Suder, Mark D. Aagaard, Guang Gong:
The Simeck Family of Lightweight Block Ciphers. 612 - Jianting Ning, Xiaolei Dong, Zhenfu Cao, Lifei Wei:
Accountable Authority Ciphertext-Policy Attribute-Based Encryption with White-Box Traceability and Public Auditing in the Cloud. 613 - Fangguo Zhang:
Bit Security of the Hyperelliptic Curves Diffie-Hellman Problem. 614 - Nasour Bagheri, Masoumeh Safkhani, Hoda Jannati:
Security Analysis of Niu et al. Authentication and Ownership Management Protocol. 615 - Lukasz Olejnik, Gunes Acar, Claude Castelluccia, Claudia Díaz:
The leaking battery: A privacy analysis of the HTML5 Battery Status API. 616 - Boris Skoric, Wouter de Groot:
Generalised tally-based decoders for traitor tracing and group testing. 617 - Juan Carlos Ku-Cauich, Guillermo Morales-Luna, Horacio Tapia-Recillas:
An Authentication Code over Galois Rings with Optimal Impersonation and Substitution Probabilities. 618 - Seher Tutdere, Osmanbey Uzunkol:
Construction of Arithmetic Secret Sharing Schemes by Using Torsion Limits. 619 - Susumu Kiyoshima:
Statistical Concurrent Non-malleable Zero-knowledge from One-way Functions. 620 - Sarani Bhattacharya, Debdeep Mukhopadhyay:
Who watches the watchmen? : Utilizing Performance Monitors for Compromising keys of RSA on Intel Platforms. 621 - Nicolas Méloni, M. Anwar Hasan:
Random Digit Representation of Integers. 622 - (Withdrawn) Design, Evaluation and Optimization of Physical Unclonable Functions based on Transient Effect Ring Oscillators. 623
- Viet Tung Hoang, Jonathan Katz, Alex J. Malozemoff:
Automated Analysis and Synthesis of Authenticated Encryption Schemes. 624 - Mike Hamburg:
Ed448-Goldilocks, a new elliptic curve. 625 - Georg Fuchsbauer, Christian Hanser, Daniel Slamanig:
Practical Round-Optimal Blind Signatures in the Standard Model. 626 - Justin Holmgren
:
On Necessary Padding with IO. 627 - Daniel Cabarcas, Denise Demirel, Florian Göpfert, Jean Lancrenon, Thomas Wunderer:
An Unconditionally Hiding and Long-Term Binding Post-Quantum Commitment Scheme. 628 - Véronique Cortier, Georg Fuchsbauer, David Galindo:
BeleniosRF: A Strongly Receipt-Free Electronic Voting Scheme. 629 - Ivan Damgård, Jesper Buus Nielsen:
Unconditionally Secure Computation with Reduced Interaction. 630 - Thomas Pöppelmann, Michael Naehrig, Andrew Putnam, Adrián Macías:
Accelerating Homomorphic Evaluation on Reconfigurable Hardware. 631 - Mohammad Mahmoody, Ameer Mohammed, Soheil Nematihaji:
More on Impossibility of Virtual Black-Box Obfuscation in Idealized Models. 632 - Mehmet Sabir Kiraz, Isa Sertkaya, Osmanbey Uzunkol:
An Efficient ID-Based Message Recoverable Privacy-Preserving Auditing Scheme. 633 - Benny Pinkas, Thomas Schneider, Gil Segev, Michael Zohner:
Phasing: Private Set Intersection using Permutation-based Hashing. 634 - Chris Pavlovski, Colin Boyd:
Microcash: Efficient Off-Line Small Payments. 635 - Matthias Krause:
Analyzing Constructions for key-alternating Pseudorandom Functions with Applications to Stream Cipher Operation Modes. 636 - Fenghua Li, Yanchao Wang, Rongna Xie, Jinbo Xiong, Fangfang Shan:
A Novel Cyberspace-Oriented Access Control Model. 637 - Marco Indaco, Fabio Lauri, Andrea Miele, Pascal Trotta:
An Efficient Many-Core Architecture for Elliptic Curve Cryptography Security Assessment. 638 - (Withdrawn) Polynomial time reduction from approximate shortest vector problem to the principle ideal porblem for lattices in cyclotomic rings. 639
- Luís T. A. N. Brandão:
Very-efficient simulatable flipping of many coins into a well. 640 - Jing Li, Licheng Wang:
Noise-free Symmetric Fully Homomorphic Encryption based on noncommutative rings. 641 - Muhammed F. Esgin, Mehmet S. Kiraz, Osmanbey Uzunkol:
A New Partial Key Exposure Attack on Multi-power RSA. 642 - Jonathan Bootle, Andrea Cerulli, Pyrros Chaidos, Essam Ghadafi, Jens Groth, Christophe Petit:
Short Accountable Ring Signatures Based on DDH. 643 - Adam Everspaugh, Rahul Chatterjee, Samuel Scott, Ari Juels, Thomas Ristenpart:
The Pythia PRF Service. 644 - (Withdrawn) Improvements on Efficient Dynamic Provable Data Possession scheme with Public Verifiability and Data Privacy. 645
- Alex Biryukov, Dmitry Khovratovich:
Decomposition attack on SASASASAS. 646 - Andrea Miele, Arjen K. Lenstra:
Efficient ephemeral elliptic curve cryptographic keys. 647 - David Bernhard, Marc Fischlin, Bogdan Warinschi:
Adaptive Proofs of Knowledge in the Random Oracle Model. 648 - David Bernhard, Marc Fischlin, Bogdan Warinschi:
On the Hardness of Proving CCA-security of Signed ElGamal. 649 - Roman Oliynykov, Ivan Gorbenko, Oleksandr Kazymyrov, Victor Ruzhentsev, Oleksandr Kuznetsov, Yurii Gorbenko, Oleksandr Dyrda, Viktor Dolgov, Andrii Pushkaryov, Ruslan Mordvinov, Dmytro Kaidalov:
A New Encryption Standard of Ukraine: The Kalyna Block Cipher. 650 - Stephan Kleber, Florian Unterstein, Matthias Matousek, Frank Kargl, Frank Slomka, Matthias Hiller:
Secure Execution Architecture based on PUF-driven Instruction Level Code Encryption. 651 - Benjamin Dowling, Douglas Stebila:
Modelling ciphersuite and version negotiation in the TLS protocol. 652 - (Withdrawn) Homomorphic Signature Schemes - A survey. 653
- Bo Yang, Kang Yang, Yu Qin, Zhenfeng Zhang, Dengguo Feng:
DAA-TZ: An Efficient DAA Scheme for Mobile Devices using ARM TrustZone. 654 - Nizamud Din, Arif Iqbal Umar, Abdul Waheed, Noor Ul Amin:
An Efficient Multi-Message Multi-Receiver Signcryption Scheme with Forward Secrecy on Elliptic Curves. 655 - Ruhul Amin, G. P. Biswas:
Cryptanalysis of a Markov Chain Based User Authentication Scheme. 656 - Duc-Phong Le, Chik How Tan, Michael Tunstall:
Randomizing the Montgomery Powering Ladder. 657 - Pieter Maene, Ingrid Verbauwhede:
Single-Cycle Implementations of Block Ciphers. 658 - Jean-Pierre Flori, Jérôme Plût, Jean-René Reinhard, Martin Ekerå:
Diversity and Transparency for ECC. 659 - (Withdrawn) A Hybrid Gaussian Sampler for Lattices over Rings. 660
- Shane Kepley, David Russo, Rainer Steinwandt:
Cryptanalysis of a modern rotor machine in a multicast setting. 661 - Ryutaroh Matsumoto:
Strong Security of the Strongly Multiplicative Ramp Secret Sharing based on Algebraic Curves. 662 - Nahid Farhady Ghalaty, Bilgiday Yuce, Patrick Schaumont
:
Analyzing the Efficiency of Biased-Fault Based Attacks. 663 - Mahnush Movahedi, Jared Saia, Mahdi Zamani:
Secure Multi-Party Shuffling. 664 - Romain Gay, Iordanis Kerenidis, Hoeteck Wee:
Communication Complexity of Conditional Disclosure of Secrets and Attribute-Based Encryption. 665 - Huaifeng Chen, Xiaoyun Wang:
Improved Linear Hull Attack on Round-Reduced Simon with Dynamic Key-guessing Techniques. 666 - Ming Li, Dongdai Lin:
De Bruijn Sequences from Nonlinear Feedback Shift Registers. 667 - Ekawat Homsirikamol, William Diehl, Ahmed Ferozpuri, Farnoud Farahmand, Malik Umar Sharif, Kris Gaj:
GMU Hardware API for Authenticated Ciphers. 669 - Bruno Robisson, Michel Agoyan, Patrick Soquet, Sébastien Le Henaff, Franck Wajsbürt, Pirouz Bazargan-Sabet, Guillaume Phan:
Smart Security Management in Secure Devices. 670 - Peeter Laud, Alisa Pankova:
Privacy-preserving Frequent Itemset Mining for Sparse and Dense Data. 671 - Allison Bishop, Abhishek Jain
, Lucas Kowalczyk:
Function-Hiding Inner Product Encryption. 672 - Mike Hamburg:
Decaf: Eliminating cofactors through point compression. 673 - Peeter Laud, Alisa Pankova:
Preprocessing-Based Verification of Multiparty Protocols with Honest Majority. 674 - Ahmed E. Kosba, Andrew Miller, Elaine Shi, Zikai Wen, Charalampos Papamanthou:
Hawk: The Blockchain Model of Cryptography and Privacy-Preserving Smart Contracts. 675 - Scott R. Fluhrer:
Quantum Cryptanalysis of NTRU. 676 - Daniel J. Bernstein, Simon Josefsson, Tanja Lange, Peter Schwabe, Bo-Yin Yang:
EdDSA for more curves. 677 - Thomas Pornin:
Optimizing MAKWA on GPU and CPU. 678 - Subhabrata Samajder, Palash Sarkar:
Another Look at Normal Approximations in Cryptanalysis. 679 - Yevgeniy Dodis, Tianren Liu, Martijn Stam, John P. Steinberger:
Indifferentiability of Confusion-Diffusion Networks. 680 - Susan Hohenberger, Steven A. Myers, Rafael Pass, Abhi Shelat:
ANONIZE: A Large-Scale Anonymous Survey System. 681 - Yosuke Todo:
Integral Cryptanalysis on Full MISTY1. 682 - Irene Giacomelli, Ruxandra F. Olimid, Samuel Ranellucci:
Security of Linear Secret-Sharing Schemes against Mass Surveillance. 683 - Aggelos Kiayias, Yona Raekow, Alexander Russell, Narasimha K. Shashidhar:
A One-time Stegosystem and Applications to Efficient Covert Communication. 684 - Robert Granger, Thorsten Kleinjung, Jens Zumbrägel:
On the discrete logarithm problem in finite fields of fixed characteristic. 685 - Azeem Irshad, Muhammad Sher, Shahzad Ashraf, Ch. Muhammad Shahzad Faisal, Mahmood Ul Hassan:
Cryptanalysis for Secure and Efficient Smart-Card-Based Remote User Authentication Scheme for Multi-server Environment. 686 - Sean Hallgren, Adam D. Smith, Fang Song:
Classical Cryptographic Protocols in a Quantum World. 687 - Hwajeong Seo, Zhe Liu, Yasuyuki Nogami, Jongseok Choi, Howon Kim:
Binary Field Multiplication on ARMv8. 688 - Daniel P. Martin, Jonathan F. O'Connell, Elisabeth Oswald, Martijn Stam:
How to Enumerate Your Keys Accurately and Efficiently After a Side Channel Attack. 689 - Gorka Irazoqui Apecechea, Thomas Eisenbarth, Berk Sunar:
Systematic Reverse Engineering of Cache Slice Selection in Intel Processors. 690 - Cong Chen, Mehmet Sinan Inci, Mostafa Taha, Thomas Eisenbarth:
SpecTre: A Tiny Side-Channel Resistant Speck Core for FPGAs. 691 - Yoshinori Aono, Takuya Hayashi, Le Trieu Phong, Lihua Wang:
Fast and Secure Linear Regression and Biometric Authentication with Security Update. 692 - Jesper Buus Nielsen, Samuel Ranellucci:
Foundations of Reactive Garbling Schemes. 693 - Tore Kasper Frederiksen, Thomas P. Jakobsen, Jesper Buus Nielsen, Roberto Trifiletti:
On the Complexity of Additively Homomorphic UC Commitments. 694 - Alexander Russell, Qiang Tang, Moti Yung, Hong-Sheng Zhou:
Cliptography: Clipping the Power of Kleptographic Attacks. 695 - Miguel Morales-Sandoval, Arturo Diaz-Perez:
Novel algorithms and hardware architectures for Montgomery Multiplication over GF(p). 696 - Yandong Zheng, Hua Guo:
On the Security of a Self-healing Group Key Distribution Scheme. 697 - Subhamoy Maitra:
Chosen IV Cryptanalysis on Reduced Round ChaCha and Salsa. 698 - Ayantika Chatterjee, Indranil Sengupta:
FURISC: FHE Encrypted URISC Design. 699 - Jimmy Jose, Dipanwita Roy Chowdhury:
Four Neighbourhood Cellular Automata as Better Cryptographic Primitives. 700 - Sébastien Canard, Baptiste Olivier:
Differential Privacy in distribution and instance-based noise mechanisms. 701 - Loi Luu, Jason Teutsch, Raghav Kulkarni, Prateek Saxena:
Demystifying incentives in the consensus computer. 702 - Mihir Bellare, Igors Stepanovs:
Point-Function Obfuscation: A Framework and Generic Constructions. 703 - Nir Bitansky, Vinod Vaikuntanathan:
Indistinguishability Obfuscation: from Approximate to Exact. 704 - Ashish Choudhury, Emmanuela Orsini, Arpita Patra, Nigel P. Smart:
Linear Overhead Robust MPC with Honest Majority Using Preprocessing. 705 - Stefan Kölbl, Arnab Roy:
A Brief Comparison of Simon and Simeck. 706 - Siamak Fayyaz Shahandashti, Reihaneh Safavi-Naini, Nashad Ahmed Safa:
Reconciling User Privacy and Implicit Authentication for Mobile Devices. 707 - Jeffrey Hoffstein, Jill Pipher, John M. Schanck, Joseph H. Silverman, William Whyte, Zhenfei Zhang:
Choosing Parameters for NTRUEncrypt. 708 - Luka Malisa, Kari Kostiainen, Srdjan Capkun:
Detecting Mobile Application Spoofing Attacks by Leveraging User Visual Similarity Perception. 709 - Bernardo Ferreira, João Rodrigues, João Leitão, Henrique João L. Domingos:
Privacy-Preserving Content-Based Image Retrieval in the Cloud (Extended Version). 710 - Anne Canteaut, Sébastien Duval, Gaëtan Leurent:
Construction of Lightweight S-Boxes using Feistel and MISTY structures (Full Version). 711 - David Bernhard, Bogdan Warinschi:
On Limitations of the Fiat - Shamir Transformation. 712 - (Withdrawn) Light-hHB: A New Version of hHB with Improved Session Key Exchange. 713
- Masao Kasahara:
New classes of public key cryptosystem K(XVI)SE(1)PKC constructed based on Reed-Solomon code over extension field of m=8 and K(XVI)SE(2)PKC, based on binary cyclic code. 714 - Allison Bishop, Susan Hohenberger, Brent Waters:
New Circular Security Counterexamples from Decision Linear and Learning with Errors. 715 - Nasour Bagheri:
Linear Cryptanalysis of Reduced-Round SIMECK Variants. 716 - Pei Luo, Liwei Zhang, Yunsi Fei, A. Adam Ding:
Towards Secure Cryptographic Software Implementation Against Side-Channel Power Analysis Attacks. 717 - Leonid Reyzin, Sophia Yakoubov:
Efficient Asynchronous Accumulators for Distributed PKI. 718 - Oscar Reparaz, Begül Bilgin
, Svetla Nikova, Benedikt Gierlichs, Ingrid Verbauwhede:
Consolidating masking schemes. 719 - Huijia Lin, Rafael Pass, Karn Seth, Sidharth Telang:
Output-Compressing Randomized Encodings and Applications. 720 - Hoeteck Wee:
KDM-Security via Homomorphic Smooth Projective Hashing. 721 - Tarik Moataz, Erik-Oliver Blass:
Oblivious Substring Search with Updates. 722 - Alex Biryukov, Gaëtan Leurent, Léo Perrin:
Cryptanalysis of Feistel Networks with Secret Round Functions. 723 - Oscar Reparaz, Sujoy Sinha Roy, Frederik Vercauteren, Ingrid Verbauwhede:
A masked ring-LWE implementation. 724 - Eric R. Verheul, Sietse Ringers, Jaap-Henk Hoepman:
The self-blindable U-Prove scheme by Hanzlik and Kluczniak is forgeable. 725 - Vladimir Shpilrain, Bianca Sosnovski:
Compositions of linear functions and applications to hashing. 726 - Josep Balasch, Benedikt Gierlichs, Oscar Reparaz, Ingrid Verbauwhede:
DPA, Bitslicing and Masking at 1 GHz. 727 - Richard J. Lipton, Rafail Ostrovsky, Vassilis Zikas:
Provable Virus Detection: Using the Uncertainty Principle to Protect Against Malware. 728 - Alexandra Boldyreva, Taesoo Kim, Richard J. Lipton, Bogdan Warinschi:
Towards Provably-Secure Remote Memory Attestation. 729 - Prabhanjan Ananth, Abhishek Jain
, Amit Sahai:
Achieving Compactness Generically: Indistinguishability Obfuscation from Non-Compact Functional Encryption. 730 - Rodrigo Abarzúa, Santi Martínez, Valeria Mendoza:
Same Value Analysis on Edwards Curves. 731 - Hwajeong Seo, Zhe Liu, Jongseok Choi, Taehwan Park, Howon Kim:
Compact Implementations of LEA Block Cipher for Low-End Microprocessors. 732 - Masahiro Yagisawa:
Fully Homomorphic Encryption on Octonion Ring. 733 - (Withdrawn) On the Security of Extended Generalized Feistel Networks. 734
- Ilan Komargodski, Mark Zhandry:
Modern Cryptography Through the Lens of Secret Sharing. 735 - (Withdrawn) Solving LWE via List Decoding. 736
- Chunsheng Gu:
New multilinear maps from ideal lattices. 737 - Kazuhiko Minematsu:
Authenticated Encryption without Tag Expansion (or, How to Accelerate AERO). 738 - (Withdrawn) Fine-grained sharing of encrypted sensor data over cloud storage with key aggregation. 739
- Antonio Faonio
, Jesper Buus Nielsen, Daniele Venturi:
Predictable Arguments of Knowledge. 740 - Mohammad Hajiabadi, Bruce M. Kapron, S. Venkatesh:
On Generic Constructions of Circularly-Secure, Leakage-Resilient Public-Key Encryption Schemes. 741 - Can Kizilkale, Ömer Egecioglu, Çetin Kaya Koç:
A Matrix Decomposition Method for Optimal Normal Basis Multiplication. 742 - Benoît Libert, Thomas Peters, Moti Yung:
Short Group Signatures via Structure-Preserving Signatures: Standard Model Security from Simple Assumptions. 743 - Ege Gulcan, Aydin Aysu, Patrick Schaumont
:
BitCryptor: Bit-Serialized Compact Crypto Engine on Reconfigurable Hardware. 744 - Hwajeong Seo, Zhe Liu, Yasuyuki Nogami, Jongseok Choi, Howon Kim:
Faster ECC over F2571 (feat. PMULL). 745 - Achiya Bar-On:
A 270 Attack on the Full MISTY1. 746 - Huang Zhang, Fangguo Zhang, Baodian Wei, Yusong Du:
Self-bilinear Map from One Way Encoding System and Indistinguishability Obfuscation. 747 - Jean Paul Degabriele, Pooya Farshim, Bertram Poettering:
A More Cautious Approach to Security Against Mass Surveillance. 748 - Pascal Sasdrich, Amir Moradi, Tim Güneysu:
Affine Equivalence and its Application to Tightening Threshold Implementations. 749 - Ryo Nishimaki, Daniel Wichs, Mark Zhandry:
Anonymous Traitor Tracing: How to Embed Arbitrary Information in a Key. 750 - Shay Gueron, Yehuda Lindell, Ariel Nof, Benny Pinkas:
Fast Garbling of Circuits Under Standard Assumptions. 751 - Gilad Asharov, Gil Segev:
On Constructing One-Way Permutations from Indistinguishability Obfuscation. 752 - Joppe W. Bos, Charles Hubain, Wil Michiels, Philippe Teuwen:
Differential Computation Analysis: Hiding your White-Box Designs is Not Enough. 753 - Anne Canteaut, Virginie Lallemand, María Naya-Plasencia:
Related-Key Attack on Full-Round PICARO. 754 - Erdem Alkim, Nina Bindel, Johannes Buchmann, Özgür Dagdelen:
TESLA: Tightly-Secure Efficient Signatures from Standard Lattices. 755 - Yandong Zheng, Hua Guo:
Cryptanalysis of an Improved One-Way Hash Chain Self-Healing Group Key Distribution Scheme. 756 - Matthias Hamann, Matthias Krause:
Stream Cipher Operation Modes with Improved Security against Generic Collision Attacks. 757 - Yara Elias, Kristin E. Lauter, Ekin Ozman, Katherine E. Stange:
Ring-LWE Cryptography for the Number Theorist. 758 - Alice Pellet-Mary, Damien Stehlé:
Cryptanalysis of Gu's ideal multilinear map. 759 - Pol Van Aubel, Daniel J. Bernstein, Ruben Niederhagen:
Investigating SRAM PUFs in large CPUs and GPUs. 760 - William Diehl:
Implementation of the SCREAM Tweakable Block Cipher in MSP430 Assembly Language. 761 - Riham AlTawy, Ahmed Abdelkhalek, Amr M. Youssef:
A Meet-in-the-Middle Attack on Reduced-Round Kalyna-b/2b. 762 - Rei Ueno, Naofumi Homma, Yukihiro Sugawara, Yasuyuki Nogami, Takafumi Aoki:
Highly Efficient GF(28) Inversion Circuit Based on Redundant GF Arithmetic and Its Application to AES Design. 763 - Jincheng Zhuang, Qi Cheng:
On Generating Coset Representatives of PGL2(Fq) in PGL2(Fq2). 764 - Victoria Fehr, Marc Fischlin:
Sanitizable Signcryption: Sanitization over Encrypted Data (Full Version). 765 - Peng Wang, Yuling Li, Liting Zhang, Kaiyan Zheng:
Relate-Key Almost Universal Hash Functions: Definitions, Constructions and Applications. 766 - Daniel J. Bernstein, Tanja Lange, Ruben Niederhagen:
Dual EC: A Standardized Back Door. 767 - Pawel Swierczynski, Marc Fyrbiak, Philipp Koppe, Amir Moradi, Christof Paar:
Interdiction in Practice - Hardware Trojan Against a High-Security USB Flash Drive. 768 - Andrej Bogdanov, Siyao Guo, Daniel Masny, Silas Richelson, Alon Rosen:
On the Hardness of Learning with Rounding over Small Modulus. 769 - Michele Ciampi, Giuseppe Persiano, Luisa Siniscalchi, Ivan Visconti:
A Transform for NIZK Almost as Efficient and General as the Fiat-Shamir Transform Without Programmable Random Oracles. 770 - Sebastian E. Schmittner:
A SAT-based Public Key Cryptography Scheme. 771 - Sandro Coretti, Yevgeniy Dodis, Björn Tackmann, Daniele Venturi:
Non-Malleable Encryption: Simpler, Shorter, Stronger. 772 - Shoni Gilboa, Shay Gueron:
Distinguishing a truncated random permutation from a random function. 773 - Santanu Sarkar:
Revisiting Prime Power RSA. 774 - Prabhanjan Ananth, Amit Sahai:
Functional Encryption for Turing Machines. 776 - (Withdrawn) Arithmetic Walsh Transform of Boolean Functions with Linear Structures. 777
- (Withdrawn) Modular Inversion Hidden Number Problem - Correction and Improvements. 778
- Masao Kasahara:
A Simple Scheme, for Strengthening Product-sum Type PKC. 779 - Martin R. Albrecht, Pooya Farshim, Dennis Hofheinz, Enrique Larraia, Kenneth G. Paterson:
Multilinear Maps from Obfuscation. 780 - Daniel J. Bernstein, Chitchanok Chuengsatiansup, David Kohel, Tanja Lange:
Twisted Hessian curves. 781 - Sergiu Bursuc:
Secure two-party computation in applied pi-calculus: models and verification. 782 - Ivan Tjuawinata, Tao Huang, Hongjun Wu:
Cryptanalysis of the Authenticated Encryption Algorithm COFFE. 783 - David S. Leslie, Chris Sherfield, Nigel P. Smart:
Threshold FlipThem: When the winner does not need to take all. 784 - Rémi Géraud, Diana Maimut, David Naccache:
Double-Speed Barrett Moduli. 785 - Jean-Michel Cioranesco, Roman Korkikian, David Naccache, Rodrigo Portella do Canto:
Buying AES Design Resistance with Speed and Energy. 786 - Houda Ferradi, Rémi Géraud, Diana Maimut, David Naccache, Hang Zhou:
Backtracking-Assisted Multiplication. 787 - Rahul Chatterjee, Joseph Bonneau, Ari Juels, Thomas Ristenpart:
Cracking-Resistant Password Vaults using Natural Language Encoders. 788 - Gangqiang Yang, Mark D. Aagaard, Guang Gong:
Efficient Hardware Implementations of the Warbler Pseudorandom Number Generator. 789 - Pantelimon Stanica:
On weak and strong 2k-bent Boolean functions. 790 - Omer Paneth, Amit Sahai:
On the Equivalence of Obfuscation and Multilinear Maps. 791 - Dennis Hofheinz, Vanishree Rao, Daniel Wichs:
Standard Security Does Not Imply Indistinguishability Under Selective Opening. 792 - Rabih Mohsen, Alexandre Miranda Pinto:
Algorithmic Information Theory for Obfuscation Security. 793 - Pierre-Alain Fouque, Sylvain Guilley, Cédric Murdica, David Naccache:
Safe-Errors on SPA Protected implementations with the Atomicity Technique. 794 - Andrey Bogdanov, Ilya Kizhvatov, Kamran Manzoor, Elmar Tischhauser, Marc Witteman:
Fast and Memory-Efficient Key Recovery in Side-Channel Attacks. 795 - Kartik Nayak, Srijan Kumar, Andrew Miller, Elaine Shi:
Stubborn Mining: Generalizing Selfish Mining and Combining with an Eclipse Attack. 796 - Carmit Hazay, Muthuramakrishnan Venkitasubramaniam:
What Security can we Achieve in 4-Rounds? 797 - (Withdrawn) A Stateless Cryptographically-Secure Physical Unclonable Function. 798
- Hwajeong Seo, Chien-Ning Chen, Zhe Liu, Yasuyuki Nogami, Taehwan Park, Jongseok Choi, Howon Kim:
Secure Binary Field Multiplication. 799 - (Withdrawn) Hybrid WBC: Secure and efficient encryption schemes using the White-Box Cryptography. 800
- Scott R. Fluhrer:
Scalar Blinding on Elliptic Curves based on Primes with Special Structure. 801 - Shahram Khazaei, Siavash Ahmadi:
Ciphertext-only attack on d*d Hill in O(d13d). 802 - Stian Fauskanger, Igor A. Semaev:
Statistical and Algebraic Properties of DES. 803 - Sumit Chakraborty:
Secure Multi-party Computation: How to Solve the Problem between Security Intelligence & Business Intelligence. 804 - Tsutomu Iijima, Fumiyuki Momose, Jinhui Chao:
A classification of elliptic curves with respect to the GHS attack in odd characteristic. 805 - Sikhar Patranabis, Abhishek Chakraborty, Debdeep Mukhopadhyay, P. P. Chakrabarti:
Using State Space Encoding To Counter Biased Fault Attacks on AES Countermeasures. 806 - Juan A. Garay, Björn Tackmann, Vassilis Zikas:
Fair Distributed Computation of Reactive Functions. 807 - Mihir Bellare, Joseph Jaeger, Daniel Kane:
Mass-surveillance without the State: Strongly Undetectable Algorithm-Substitution Attacks. 808 - Alan Szepieniec, Bart Preneel:
New Techniques for Electronic Voting. 809 - Michele Ciampi, Giuseppe Persiano, Alessandra Scafuro, Luisa Siniscalchi, Ivan Visconti:
Improved OR Composition of Sigma-Protocols. 810 - Chrysanthi Mavromati:
Key-recovery attacks against the MAC algorithm Chaskey. 811 - Alex Biryukov, Léo Perrin, Aleksei Udovenko:
The Secret Structure of the S-Box of Streebog, Kuznechik and Stribob. 812 - Ritam Bhaumik, Mridul Nandi:
Revisiting Turning Online Cipher Off. 813 - Qingji Zheng, Xiangxue Li, Aytac Azgin:
CLKS: Certificateless Keyword Search on Encrypted Data. 814 - Mohammad Mahmoody, Ameer Mohammed:
On the Power of Hierarchical Identity-Based Encryption. 815 - Valery I. Korzhik, Guillermo Morales-Luna, Sergei Tikhonov, Victor Yakovlev:
Analysis of Keyless Massive MIMO-based Cryptosystem Security. 816 - Varsha Bhat, Harsimran Singh, S. R. S. Iyengar:
Secure Multi-party Graph Computation. 817 - Wei Dai, Berk Sunar:
cuHE: A Homomorphic Encryption Accelerator Library. 818 - Jean-Luc Danger, Sylvain Guilley, Philippe Hoogvorst, Cédric Murdica, David Naccache:
Improving the Big Mac Attack on Elliptic Curve Cryptography. 819 - Junqing Gong, Jie Chen, Xiaolei Dong, Zhenfu Cao, Shaohua Tang:
Extended Nested Dual System Groups, Revisited. 820 - Gérald Gavin:
A general framework for building noise-free homomorphic cryptosystems. 821 - Akshayaram Srinivasan, C. Pandu Rangan:
Efficiently Obfuscating Re-Encryption Program under DDH Assumption. 822 - Anja Becker, Thijs Laarhoven:
Efficient (ideal) lattice sieving using cross-polytope LSH. 823 - Jens Groth:
Efficient Fully Structure-Preserving Signatures for Large Messages. 824 - Ding Wang, Ping Wang:
The Emperor's New Password Creation Policies. 825 - Dario Catalano, Dario Fiore, Luca Nizzardo:
Programmable Hash Functions go Private: Constructions and Applications to (Homomorphic) Signatures with Shorter Public Keys. 826 - Geumsook Ryu, Kwangsu Lee, Seunghwan Park, Dong Hoon Lee:
Unbounded Hierarchical Identity-Based Encryption with Efficient Revocation. 827 - Ralph Ankele, Stefan Kölbl, Christian Rechberger:
State-recovery analysis of Spritz. 828 - Nishanth Chandran, Srinivasan Raghuraman, Dhinakaran Vinayagamurthy:
Reducing Multilinear Map Levels in Constrained PRFs and ABE. 829 - Shiuan-Tzuo Shen, Amir Rezapour, Wen-Guey Tzeng:
Unique Signature with Short Output from CDH Assumption. 830 - Syed Kamran Haider, Masab Ahmad, Farrukh Hijaz, Astha Patni, Ethan Johnson, Matthew Seita, Omer Khan, Marten van Dijk:
M-MAP: Multi-Factor Memory Authentication for Secure Embedded Processors. 831 - David McCann, Kerstin Eder, Elisabeth Oswald:
Characterising and Comparing the Energy Consumption of Side Channel Attack Countermeasures and Lightweight Cryptography on Embedded Devices. 832 - Mohammad Etemad, Alptekin Küpçü:
Efficient Key Authentication Service for Secure End-to-end Communications. 833 - (Withdrawn) Authentication Using Side-Channel Information. 834
- Duc-Phong Le, Nadia El Mrabet, Chik How Tan:
On near prime-order elliptic curves with small embedding degrees. 835 - Benjamin Wesolowski, Pascal Junod:
Ciphertext-Policy Attribute-Based Broadcast Encryption with Small Keys. 836 - Nicolas Bruneau, Sylvain Guilley, Zakaria Najm, Yannick Teglia:
Multi-Variate High-Order Attacks of Shuffled Tables Recomputation. 837 - Hamza Abusalah, Georg Fuchsbauer, Krzysztof Pietrzak:
Offline Witness Encryption. 838 - David Wong:
Timing and Lattice Attacks on a Remote ECDSA OpenSSL Server: How Practical Are They Really? 839 - Qianqian Yang, Lei Hu, Siwei Sun, Ling Song:
Related-key Impossible Differential Analysis of Full Khudra. 840 - Vanga Odelu, Ashok Kumar Das, Adrijit Goswami:
An Efficient CP-ABE with Constant Size Secret Keys using ECC for Lightweight Devices. 841 - Jaap-Henk Hoepman, Wouter Lueks, Sietse Ringers:
On Linkability and Malleability in Self-blindable Credentials. 842 - David Derler, Daniel Slamanig:
Rethinking Privacy for Extended Sanitizable Signatures and a Black-Box Construction of Strongly Private Schemes. 843 - Jeffrey Hoffstein, Jill Pipher, John M. Schanck, Joseph H. Silverman, William Whyte, Zhenfei Zhang:
DA-Encrypt: Homomorphic Encryption via Non-Archimedean Diophantine Approximation - Preliminary Report. 844 - Zvika Brakerski, Craig Gentry, Shai Halevi, Tancrède Lepoint, Amit Sahai, Mehdi Tibouchi:
Cryptanalysis of the Quadratic Zero-Testing of GGH. 845 - Ran Cohen, Iftach Haitner, Eran Omri, Lior Rotem:
Characterization of Secure Multiparty Computation Without Broadcast. 846 - Subhadeep Banik, Andrey Bogdanov, Francesco Regazzoni:
Exploring Energy Efficiency of Lightweight Block Ciphers. 847 - Meltem Sönmez Turan, René Peralta:
The Multiplicative Complexity of Boolean Functions on Four and Five Variables. 848 - Houda Ferradi, Rémi Géraud, Diana Maimut, David Naccache, Amaury de Wargny:
Regulating the Pace of von Neumann Correctors. 849 - Zhen Liu, Duncan S. Wong:
Traceable CP-ABE on Prime Order Groups: Fully Secure and Fully Collusion-resistant Blackbox Traceable. 850 - Benoit Cogliati, Yannick Seurin:
Beyond-Birthday-Bound Security for Tweakable Even-Mansour Ciphers with Linear Tweak and Key Mixing. 851 - Matvei Kotov, Alexander Ushakov:
Analysis of a key exchange protocol based on tropical matrix algebra. 852 - Felix Heuer, Eike Kiltz, Krzysztof Pietrzak:
Standard Security Does Imply Security Against Selective Opening for Markov Distributions. 853 - Jeroen Delvaux, Dawu Gu, Ingrid Verbauwhede, Matthias Hiller, Meng-Day (Mandel) Yu:
Secure Sketch Metamorphosis: Tight Unified Bounds. 854 - (Withdrawn) A new framework for keystream generators against Correlation, Linear and Distinguishing Attacks. 855
- Khushboo Bussi, Dhananjoy Dey, Prasanna Raghaw Mishra, Bal Kishan Dass:
MGR HASH FUNCTION. 856 - Benjamin Fuller, Ariel Hamlin:
Unifying Leakage Classes: Simulatable Leakage and Pseudoentropy. 857 - Olivier Blazy, Saqib A. Kakvi:
Group Signatures Without q-Assumptions. 858 - Dianyan Xiao, Jincheng Zhuang, Qi Cheng:
Factor Base Discrete Logarithms in Kummer Extensions. 859 - Carmit Hazay, Arpita Patra, Bogdan Warinschi:
Selective Opening Security for Receivers. 860 - Chun Guo, Dongdai Lin:
A Synthetic Indifferentiability Analysis of Interleaved Double-Key Even-Mansour Ciphers. 861 - Dennis Hofheinz, Christian Matt, Ueli Maurer:
Idealizing Identity-Based Encryption. 862 - Elette Boyle, Moni Naor:
Is There an Oblivious RAM Lower Bound? 863 - Christine Jost, Ha Lam, Alexander Maximov, Ben J. M. Smeets:
Encryption Performance Improvements of the Paillier Cryptosystem. 864 - Alexander Koch, Stefan Walzer
, Kevin Härtel:
Card-based Cryptographic Protocols Using a Minimal Number of Cards. 865 - Shai Halevi:
Graded Encoding, Variations on a Scheme. 866 - Michel Abdalla, Fabrice Benhamouda, Alain Passelègue:
Multilinear and Aggregate Pseudorandom Functions: New Constructions and Improved Security. 867 - Stefano Tessaro:
Optimally Secure Block Ciphers from Ideal Primitives. 868 - Tatsuaki Okamoto, Krzysztof Pietrzak, Brent Waters, Daniel Wichs:
New Realizations of Somewhere Statistically Binding Hashing and Positional Accumulators. 869 - Mohammad Hajiabadi, Bruce M. Kapron:
Gambling, Computational Information and Encryption Security. 870 - Shahin Tajik, Enrico Dietz, Sven Frohmann, Helmar Dittrich, Dmitry Nedospasov, Clemens Helfmeier, Jean-Pierre Seifert, Christian Boit, Heinz-Wilhelm Hübers:
A Complete and Linear Physical Characterization Methodology for the Arbiter PUF Family. 871 - Seyed Salman Sajjadi GhaemMaghami, Afrooz Haghbin, Mahtab Mirmohseni:
Traceability Improvements of a New RFID Protocol Based On EPC C1G2. 872 - Jian Liu, Sihem Mesnager, Lusheng Chen:
On the Diffusion Property of Iterated Functions. 873 - Yuanxi Dai, John P. Steinberger:
Feistel Networks: Indifferentiability at 10 Rounds. 874 - Nese Koçak, Sihem Mesnager, Ferruh Özbudak:
Bent and Semi-bent Functions via Linear Translators. 875 - Dana Dachman-Soled, Jonathan Katz, Aishwarya Thiruvengadam:
10-Round Feistel is Indifferentiable from an Ideal Cipher. 876 - Christophe Clavier, Julien Francq, Antoine Wurcker:
Study of a Parity Check Based Fault-Detection Countermeasure for the AES Key Schedule. 877 - Edward Eaton, Fang Song:
Making Existential-Unforgeable Signatures Strongly Unforgeable in the Quantum Random-Oracle Model. 878 - Martin Ekerå:
Computing information on domain parameters from public keys selected uniformly at random. 879 - Mohammad Etemad, Alptekin Küpçü:
Generic Efficient Dynamic Proofs of Retrievability. 880 - Peter Gazi, Krzysztof Pietrzak, Stefano Tessaro:
Generic Security of NMAC and HMAC with Input Whitening. 881 - Pablo Rauzy, Martin Moreau, Sylvain Guilley, Zakaria Najm:
A Generic Countermeasure Against Fault Injection Attacks on Asymmetric Cryptography. 882 - (Withdrawn) Revisiting Sum of CBC-MACs and Extending NI2-MAC to Achieve Beyond-Birthday Security. 883
- Pratish Datta, Ratna Dutta, Sourav Mukhopadhyay:
General Circuit Realizing Compact Revocable Attribute-Based Encryption from Multilinear Maps. 884 - Roman Oliynykov, Ivan Gorbenko, Oleksandr Kazymyrov, Victor Ruzhentsev, Oleksandr Kuznetsov, Yurii Gorbenko, Artem Boiko, Oleksandr Dyrda, Viktor Dolgov, Andrii Pushkaryov:
A New Standard of Ukraine: The Kupyna Hash Function. 885 - Rémi Géraud, Diana-Stefania Maimut, David Naccache, Rodrigo Portella do Canto, Emil Simion:
Applying Cryptographic Acceleration Techniques to Error Correction. 886 - Carmit Hazay, Antigoni Polychroniadou, Muthuramakrishnan Venkitasubramaniam:
Round-Optimal Token-Based Secure Computation. 887 - Kazuhiko Minematsu, Tetsu Iwata:
Tweak-Length Extension for Tweakable Blockciphers. 888 - Anamaria Costache, Nigel P. Smart:
Which Ring Based Somewhat Homomorphic Encryption Scheme is Best? 889 - Wenbin Zhang, Chik How Tan:
MI-T-HFE, a New Multivariate Signature Scheme. 890 - Sébastien Canard, Viet Cuong Trinh:
Private Ciphertext-Policy Attribute-based Encryption Schemes With Constant-Size Ciphertext Supporting CNF Access Policy. 891 - Kenneth G. Paterson, Jacob C. N. Schuldt, Dale L. Sibborn, Hoeteck Wee:
Security Against Related Randomness Attacks via Reconstructive Extractors. 892 - Christian Badertscher, Christian Matt, Ueli Maurer, Phillip Rogaway, Björn Tackmann:
Robust Authenticated Encryption and the Limits of Symmetric Cryptography. 893 - Richard Winter, Ana Salagean, Raphael C.-W. Phan:
Comparison of cube attacks over different vector spaces. 894 - Guy Barwell, Dan Page, Martijn Stam:
Rogue Decryption Failures: Reconciling AE Robustness Notions. 895 - Xiaoyang Dong, Leibo Li, Keting Jia, Xiaoyun Wang:
Improved Attacks on Reduced-Round Camellia-128/192/256. 896 - Prosanta Gope:
Integrity-Aware Parallelizable Cipher Feedback Mode for Real-time Cryptography. 897 - Mehmet Sinan Inci, Berk Gülmezoglu, Gorka Irazoqui Apecechea, Thomas Eisenbarth, Berk Sunar:
Seriously, get off my cloud! Cross-VM RSA Key Recovery in a Public Cloud. 898 - Payal Chaudhari, Manik Lal Das:
Privacy-preserving Attribute Based Searchable Encryption. 899 - Ferucio Laurentiu Tiplea, Emil Simion:
New Results on Identity-based Encryption from Quadratic Residuosity. 900 - Tore Kasper Frederiksen, Marcel Keller, Emmanuela Orsini, Peter Scholl:
A Unified Approach to MPC with Preprocessing using OT. 901 - Kexin Qiao, Lei Hu, Siwei Sun:
Differential Security Evaluation of Simeck with Dynamic Key-guessing Techniques. 902 - Yannick Seurin:
A Note on the Indifferentiability of the 10-Round Feistel Construction. 903 - Junqing Gong, Xiaolei Dong, Zhenfu Cao, Jie Chen:
Almost-tight Identity Based Encryption against Selective Opening Attack. 904 - Yuval Yarom, Qian Ge, Fangfei Liu, Ruby B. Lee, Gernot Heiser:
Mapping the Intel Last-Level Cache. 905 - Adnan Baysal, Suhap Sahin:
RoadRunneR: A Small And Fast Bitslice Block Cipher For Low Cost 8-bit Processors. 906 - Shafi Goldwasser, Yael Tauman Kalai:
Cryptographic Assumptions: A Position Paper. 907 - Martin M. Lauridsen, Christian Rechberger:
Linear Distinguishers in the Key-less Setting: Application to PRESENT. 908 - Bart Mennink, Bart Preneel:
On the Impact of Known-Key Attacks on Hash Functions. 909 - Alonso González, Alejandro Hevia, Carla Ràfols:
QA-NIZK Arguments in Asymmetric Groups: New Tools and New Constructions. 910 - Kai Zhang, Jie Guan, Bin Hu, Dongdai Lin:
Security Evaluation on Simeck against Zero Correlation Linear Cryptanalysis. 911 - Maxime Lecomte, Jacques Fournier, Philippe Maurine:
Extraction of intrinsic structure for Hardware Trojan detection. 912 - Pratish Datta, Ratna Dutta, Sourav Mukhopadhyay:
Functional Signcryption: Notion, Construction, and Applications. 913 - Benjamin Dowling, Marc Fischlin, Felix Günther, Douglas Stebila:
A Cryptographic Analysis of the TLS 1.3 Handshake Protocol Candidates. 914 - Mohammad Hassan Ameri, Maryam Rajabzadeh Asaar, Javad Mohajeri, Mahmoud Salmasizadeh:
A Generic Construction for Verifiable Attribute-based Keyword Search Schemes. 915 - Subhabrata Samajder, Palash Sarkar:
Rigorous Upper Bounds on Data Complexities of Block Cipher Cryptanalysis. 916 - Constantinos Patsakis, Panayiotis Kotzanikolaou, Mélanie Bouroche:
Private Proximity Testing on Steroids: An NTRU-based Protocol. 917 - Md. Iftekhar Salam, Kenneth Koon-Ho Wong, Harry Bartlett, Leonie Simpson, Ed Dawson, Josef Pieprzyk:
Finding State Collisions in the Authenticated Encryption Stream Cipher ACORN. 918 - (Withdrawn) PRAMOD: A Privacy-Preserving Framework for Supporting Efficient and Secure Database-as-a-Service. 919
- Giuseppe Ateniese, Antonio Faonio
, Seny Kamara:
Leakage-Resilient Identification Schemes from Zero-Knowledge Proofs of Storage. 920 - Kwangsu Lee, Jong Hwan Park:
Identity-Based Revocation from Subset Difference Methods under Simple Assumptions. 921 - Thalia M. Laing, Keith M. Martin, Maura B. Paterson, Douglas R. Stinson:
Localised Multisecret Sharing. 922 - Sikhar Patranabis, Yash Shrivastava, Debdeep Mukhopadhyay:
Dynamic Key-Aggregate Cryptosystem on Elliptic Curves for Online Data Sharing. 923 - Cong Chen, Thomas Eisenbarth, Ingo von Maurich, Rainer Steinwandt:
Masking Large Keys in Hardware: A Masked Implementation of McEliece. 924 - Poulami Das, Debapriya Basu Roy, Debdeep Mukhopadhyay:
Exploiting the Order of Multiplier Operands: A Low Cost Approach for HCCA Resistance. 925 - Vadim N. Tsypyschev, Julia S. Vinogradova:
Criterion of Maximal Period of a Trinomial over Nontrivial Galois Ring of odd Characteristic. 926 - Sky Faber, Stanislaw Jarecki, Hugo Krawczyk, Quan Nguyen, Marcel-Catalin Rosu, Michael Steiner:
Rich Queries on Encrypted Data: Beyond Exact Matches. 927 - Hassan Noura, Damien Couroussé:
HLDCA-WSN: Homomorphic Lightweight Data Confidentiality Algorithm for Wireless Sensor Network. 928 - Yongjun Zhao, Sherman S. M. Chow:
Are you The One to Share? Secret Transfer with Access Structure. 929 - Antoine Joux, Cécile Pierrot:
Nearly Sparse Linear Algebra. 930 - Payman Mohassel, Mike Rosulek, Ye Zhang:
Fast and Secure Three-party Computation: The Garbled Circuit Approach. 931 - Sikhar Patranabis, Debapriya Basu Roy, Debdeep Mukhopadhyay:
Using Tweaks To Design Fault Resistant Ciphers. 932 - Jayaprakash Kar:
Cryptanalysis of Provably Secure Certi cateless Short Signature Scheme. 933 - Jung Hee Cheon, Changmin Lee, Hansol Ryu:
Cryptanalysis of the New CLT Multilinear Maps. 934 - Céline Blondeau, Kaisa Nyberg:
Joint Data and Key Distribution of the Linear Cryptanalysis Test Statistic and Its Impact to Data Complexity Estimates of Multiple/Multidimensional Linear and Truncated Differential Attacks. 935 - (Withdrawn) A Privacy Preserving Improvement for SRTA in Telecare Medicine Information System. 936
- Aydin Aysu, Ege Gulcan, Daisuke Moriyama, Patrick Schaumont
, Moti Yung:
End-to-end Design of a PUF-based Privacy Preserving Authentication Protocol. 937 - Dong Pyo Chi, Jeong Woon Choi, Jeong San Kim, Taewan Kim:
Lattice Based Cryptography for Beginners. 938 - Chris Peikert:
A Decade of Lattice Cryptography. 939 - Almog Benin, Sivan Toledo, Eran Tromer:
Secure Association for the Internet of Things. 940 - Brice Minaud, Pierre-Alain Fouque:
Cryptanalysis of the New Multilinear Map over the Integers. 941 - Ben Smyth:
Secrecy and independence for election schemes. 942 - Tung Chou:
Sandy2x: New Curve25519 Speed Records. 943 - Palash Sarkar, Shashank Singh:
New Complexity Trade-Offs for the (Multiple) Number Field Sieve Algorithm in Non-Prime Fields. 944 - Changyu Dong, Franziskus Kiefer:
Secure Set-based Policy Checking and Its Application to Password Registration. 945 - Alex Biryukov, Dmitry Khovratovich:
Asymmetric proof-of-work based on the Generalized Birthday problem. 946 - Yi-Ruei Chen, Shiuan-Tzuo Shen, Wen-Guey Tzeng:
Weave ElGamal Encryption for Secure Outsourcing Algebraic Computations over Zp. 947 - Maryam Rajabzadeh Asaar, Mahmoud Salmasizadeh, Mohammad Reza Aref:
A Provably Secure Short Signature Scheme from Coding Theory. 948 - Luca Melis, Hassan Jameel Asghar, Emiliano De Cristofaro, Mohamed Ali Kâafar:
Private Processing of Outsourced Network Functions: Feasibility and Constructions. 949 - Shota Goto, Junji Shikata:
A Compiler of Two-Party Protocols for Composable and Game-Theoretic Security, and Its Application to Oblivious Transfer. 950 - Mahdi Cheraghchi:
Nearly Optimal Robust Secret Sharing. 951 - Rafael Dowsley, Felipe Lacerda, Anderson C. A. Nascimento:
Commitment and Oblivious Transfer in the Bounded Storage Model with Errors. 952 - Markku-Juhani O. Saarinen:
Gaussian Sampling Precision and Information Leakage in Lattice Cryptography. 953 - Kaoutar Elkhiyaoui, Melek Önen, Refik Molva:
Online-Offline Homomorphic Signatures for Polynomial Functions. 954 - Mridul Nandi, Tapas Pandit:
On the Power of Pair Encodings: Frameworks for Predicate Cryptographic Primitives. 955 - Christoph Dobraunig, Maria Eichlseder, Florian Mendel:
Analysis of the Kupyna-256 Hash Function. 956 - Yael Tauman Kalai, Omer Paneth:
Delegating RAM Computations. 957 - (Withdrawn) One-key Double-Sum MAC with Beyond-Birthday Security. 958
- Jian Zou, Le Dong:
Cryptanalysis of the Round-Reduced Kupyna Hash Function. 959 - Öznur Arabaci, Mehmet Sabir Kiraz, Isa Sertkaya, Osmanbey Uzunkol:
More Efficient Secure Outsourcing Methods for Bilinear Maps. 960 - Essam Ghadafi:
Short Structure-Preserving Signatures. 961 - Thuong T. Dang, Tri T. Ton, Van H. Dang, Thuc Dinh Nguyen:
SOME REMARKS ON THE LOGARITHMIC SIGNATURES OF FINITE ABELIAN GROUPS. 962 - Houda Ferradi, Rémi Géraud, David Naccache, Assia Tria:
When Organized Crime Applies Academic Results - A Forensic Analysis of an In-Card Listening Device. 963 - Danping Shi, Lei Hu, Siwei Sun, Ling Song:
Linear (hull) Cryptanalysis of Round-reduced Versions of KATAN. 964 - Miran Kim, Kristin E. Lauter:
Private Genome Analysis through Homomorphic Encryption. 965 - Dustin Moody, Ray A. Perlner:
Vulnerabilities of "McEliece in the World of Escher". 966 - Marc Stevens, Pierre Karpman, Thomas Peyrin:
Freestart collision on full SHA-1. 967 - Gaëtan Leurent:
Differential and Linear Cryptanalysis of ARX with Partitioning - Application to FEAL and Chaskey. 968 - Claude Crépeau, Raza Ali Kazmi:
Zero-Knowledge Interactive Proof Systems for New Lattice Problems. 969 - (Withdrawn) Multilinear Maps over the Integers Using Modulus Switching. 970
- Hao Chen, Kristin E. Lauter, Katherine E. Stange:
Attacks on Search RLWE. 971 - David Pointcheval, Olivier Sanders, Jacques Traoré:
Cut Down the Tree to Achieve Constant Complexity in Divisible E-Cash. 972 - Ashwin Jha, Mridul Nandi:
Some Cryptanalytic Results on Zipper Hash and Concatenated Hash. 973 - Ehsan Aerabi, A. Elhadi Amirouche, Houda Ferradi, Rémi Géraud, David Naccache, Jean Vuillemin:
The Conjoined Microprocessor. 974 - James Alderman, Christian Janson, Keith M. Martin, Sarah Louise Renwick:
Extended Functionality in Verifiable Searchable Encryption. 975 - Alex Biryukov, Léo Perrin:
On Reverse-Engineering S-Boxes with Hidden Design Criteria or Structure. 976 - Michal Wronski:
Faster point scalar multiplication on NIST elliptic curves over GF(p) using (twisted) Edwards curves over GF(p³). 977 - Hugo Krawczyk, Hoeteck Wee:
The OPTLS Protocol and TLS 1.3. 978 - Raluca Ada Popa, Nickolai Zeldovich, Hari Balakrishnan:
Guidelines for Using the CryptDB System Securely. 979 - Behzad Abdolmaleki, Hamidreza Bakhshi, Karim Baghery, Mohammad Reza Aref:
Analysis of an RFID Authentication Protocol in Accordance with EPC Standards. 980 - Ayantika Chatterjee, Indranil Sengupta:
Searching and Sorting of Fully Homomorphic Encrypted Data on Cloud. 981 - Sihem Mesnager:
A note on constructions of bent functions from involutions. 982 - Ping Ngai Chung, Craig Costello, Benjamin Smith:
Fast, uniform, and compact scalar multiplication for elliptic curves and genus 2 Jacobians with applications to signature schemes. 983 - Koh-ichi Nagao:
Complexity of ECDLP under the First Fall Degree Assumption. 984 - Koh-ichi Nagao:
Polynomial time reduction from 3SAT to solving low first fall degree multivariable cubic equations system. 985 - Koh-ichi Nagao:
Bit Coincidence Mining Algorithm. 986 - Yehuda Lindell, Ben Riva:
Blazing Fast 2PC in the Offline/Online Setting with Security for Malicious Adversaries. 987 - Mohamed Ahmed Abdelraheem, Javad Alizadeh, Hoda Alkhzaimi, Mohammad Reza Aref, Nasour Bagheri, Praveen Gauravaram:
Improved Linear Cryptanalysis of reduced-round SIMON-32 and SIMON-48. 988 - Ivan Damgård, Rasmus Winther Zakarias:
Fast Oblivious AES\\A dedicated application of the MiniMac protocol. 989 - Geoffroy Couteau, Thomas Peters, David Pointcheval:
Encryption Switching Protocols. 990 - Mike Scott:
Ed3363 (HighFive) - An alternative Elliptic Curve. 991 - Jinsu Kim, Sungwook Kim, Jae Hong Seo:
Multilinear Map via Scale-Invariant FHE: Enhancing Security and Efficiency. 992 - Daniel Apon, Xiong Fan, Feng-Hao Liu:
Bi-Deniable Inner Product Encryption from LWE. 993 - (Withdrawn) An Efficient Scheme to Reduce Side-Channel Leakage of MAC-Keccak for Smart Card. 994
- Nitesh Emmadi, Praveen Gauravaram, Harika Narumanchi, Habeeb Syed:
Updates on Sorting of Fully Homomorphic Encrypted Data. 995 - Daniel J. Bernstein:
Multi-user Schnorr security, revisited. 996 - Sanjam Garg
, Omkant Pandey:
Incremental Program Obfuscation. 997 - Paolo D'Arco, Navid Nasr Esfahani, Douglas R. Stinson:
All or Nothing at All. 998 - Robert Granger, Philipp Jovanovic, Bart Mennink, Samuel Neves:
Improved Masking for Tweakable Blockciphers with Applications to Authenticated Encryption. 999 - Luke Valenta, Shaanan Cohney, Alex Liao, Joshua Fried, Satya Bodduluri, Nadia Heninger:
Factoring as a Service. 1000 - Margaux Dugardin, Louiza Papachristodoulou, Zakaria Najm, Lejla Batina, Jean-Luc Danger, Sylvain Guilley, Jean-Christophe Courrège, Carine Therond:
Dismantling real-world ECC with Horizontal and Vertical Template Attacks. 1001 - Gunnar Alendal, Christian Kison, modg:
got HW crypto? On the (in)security of a Self-Encrypting Drive series. 1002 - Oscar García Morchon, Ronald Rietman, Igor E. Shparlinski, Ludo Tolhuizen:
Results on polynomial interpolation with mixed modular operations and unknown moduli. 1003 - Shinya Okumura, Shingo Sugiyama, Masaya Yasuda, Tsuyoshi Takagi:
Security Analysis of Cryptosystems Using Short Generators over Ideal Lattices. 1004 - Wenbin Zhang, Chik How Tan:
Cryptanalysis of Yasuda, Takagi and Sakurai's Signature Scheme Using Invariant Subspaces. 1005 - Ivan Damgård, Kasper Damgård, Kurt Nielsen, Peter Sebastian Nordholt, Tomas Toft:
Confidential Benchmarking based on Multiparty Computation. 1006 - Zhichao Zhao, T.-H. Hubert Chan:
How to Vote Privately Using Bitcoin. 1007 - Gaby G. Dagher, Benedikt Bünz, Joseph Bonneau, Jeremy Clark, Dan Boneh:
Provisions: Privacy-preserving proofs of solvency for Bitcoin exchanges. 1008 - Pawel Morawiecki, Josef Pieprzyk, Michal Straus, Marian Srebrny:
Applications of Key Recovery Cube-attack-like. 1009 - Sanjam Garg
, Payman Mohassel, Charalampos Papamanthou:
TWORAM: Round-Optimal Oblivious RAM with Applications to Searchable Encryption. 1010 - Zvika Brakerski, Gil Segev:
Hierarchical Functional Encryption. 1011 - Harish Karthikeyan, Suvradip Chakraborty, Kunwar Singh, C. Pandu Rangan:
An Efficient Multiple PKG Compatible Identity Based Key Agreement for Vehicular Networks. 1012 - Divesh Aggarwal, Tomasz Kazana, Maciej Obremski:
Inception Makes Non-malleable Codes Stronger. 1013 - Léo Ducas, Thomas Prest:
Fast Fourier Orthogonalization. 1014 - Joseph Bonneau, Jeremy Clark, Steven Goldfeder:
On Bitcoin as a public randomness source. 1015 - Avijit Dutta, Goutam Paul:
Lifting the Security of NI-MAC Beyond Birthday Bound. 1016 - Nishanth Chandran, Vipul Goyal, Aayush Jain, Amit Sahai:
Functional Encryption: Decentralised and Delegatable. 1017 - Neal Koblitz, Alfred Menezes:
A Riddle Wrapped in an Enigma. 1018 - Aggelos Kiayias, Giorgos Panagiotakos:
Speed-Security Tradeoffs in Blockchain Protocols. 1019 - Aanchal Malhotra, Isaac E. Cohen, Erik Brakke, Sharon Goldberg:
Attacking the Network Time Protocol. 1020 - Katsuyuki Takashima:
New Proof Techniques for DLIN-Based Adaptively Secure Attribute-Based Encryption and Their Application. 1021 - Steven D. Galbraith, Pierrick Gaudry:
Recent progress on the elliptic curve discrete logarithm problem. 1022 - Prabhanjan Ananth, Abhishek Jain
, Amit Sahai:
Indistinguishability Obfuscation with Constant Size Overhead. 1023 - (Withdrawn) Parallel Implementation of Number Theoretic Transform. 1024
- Dieter Schmidt:
PAGES+, PAGES-, and PAGES- - Three Families of Block Ciphers. 1025 - Yoshinori Aono, Le Trieu Phong, Lihua Wang:
Hardness Estimation of LWE via Band Pruning. 1026 - Taechan Kim:
Extended Tower Number Field Sieve: A New Complexity for Medium Prime Case. 1027 - Hristina Mihajloska, Danilo Gligoroski, Simona Samardjiska:
Reviving the Idea of Incremental Cryptography for the Zettabyte era Use case: Incremental Hash Functions Based on SHA-3. 1028 - Dave Singelée, Stefaan Seys, Lejla Batina, Ingrid Verbauwhede:
The Energy Budget for Wireless Security: Extended Version. 1029 - Vadim N. Tsypyschev:
SECOND COORDINATE SEQUENCE OF MP-LRS OVER NONTRIVIAL GALOIS RING OF ODD CHARACTERISTIC. 1030 - Antonio Marcedone, Zikai Wen, Elaine Shi:
Secure Dating with Four or Fewer Cards. 1031 - Allison Bishop, Valerio Pastro, Rajmohan Rajaraman, Daniel Wichs:
Essentially Optimal Robust Secret Sharing with Maximal Corruptions. 1032 - Gideon Samid:
The Ultimate Transposition Cipher (UTC). 1033 - Marco Chiappetta, Erkay Savas, Cemal Yilmaz:
Real time detection of cache-based side-channel attacks using Hardware Performance Counters. 1034 - Britta Hale, Christopher Carr, Danilo Gligoroski:
CARIBE: Adapting Traditional IBE for the Modern Key-Covetous Appetite. 1035 - Selçuk Kavut, Subhamoy Maitra:
Patterson-Wiedemann type functions on 21 variables with Nonlinearity greater than Bent Concatenation bound. 1036 - Jean-Sébastien Coron:
Cryptanalysis of GGH15 Multilinear Maps. 1037 - Yan Huang, Ruiyu Zhu:
Revisiting LEGOs: Optimizations, Analysis, and their Limit. 1038 - David W. Archer, Dan Bogdanov, Benny Pinkas, Pille Pullonen:
Maturity and Performance of Programmable Secure Computation. 1039 - Masahiro Yagisawa:
Fully Homomorphic Encryption with Composite Number Modulus. 1040 - Magnus Gausdal Find, Daniel Smith-Tone, Meltem Sönmez Turan:
The Number of Boolean Functions with Multiplicative Complexity 2. 1041 - Andreas Hülsing, Joost Rijneveld, Peter Schwabe:
ARMed SPHINCS - Computing a 41KB signature in 16KB of RAM. 1042 - Subhamoy Maitra:
The Index j in RC4 is not Pseudo-random due to Non-existence of Finney Cycle. 1043 - Andrej Bogdanov, Chin Ho Lee:
Homomorphic evaluation requires depth. 1044 - Gefei Li, Yuval Yarom, Damith Chinthana Ranasinghe:
Exploiting Transformations of the Galois Configuration to Improve Guess-and-Determine Attacks on NFSRs. 1045 - Benny Applebaum, Pavel Raykov:
From Private Simultaneous Messages to Zero-Information Arthur-Merlin Protocols and Back. 1046 - Julia Hesse, Dennis Hofheinz, Andy Rupp
:
Reconfigurable Cryptography: A flexible approach to long-term security. 1047 - Dennis Hofheinz, Tibor Jager:
Verifiable Random Functions from Standard Assumptions. 1048 - Thomas Peyrin, Yannick Seurin:
Counter-in-Tweak: Authenticated Encryption Modes for Tweakable Block Ciphers. 1049 - Thuraya M. Qaradaghi, Newroz N. Abdulrazaq:
Comparison Between Irreducible and Separable Goppa Code in McEliece Cryptosystem. 1050 - Jayaprakash Kar:
Cryptanalysis and Improvement of Identity-based Proxy Multi-signature scheme. 1051 - Chenglu Jin, Xiaolin Xu, Wayne P. Burleson, Ulrich Rührmair, Marten van Dijk:
PLayPUF: Programmable Logically Erasable PUFs for Forward and Backward Secure Key Management. 1052 - Binyi Chen, Huijia Lin, Stefano Tessaro:
Oblivious Parallel RAM: Improved Efficiency and Generic Constructions. 1053 - Hui Zhao, Kouichi Sakurai:
Computational Soundness of Uniformity Properties for Multi-party Computation based on LSSS. 1054 - Yuval Ishai, Mor Weiss, Guang Yang:
Making the Best of a Leaky Situation: Zero-Knowledge PCPs from Leakage-Resilient Circuits. 1055 - Nishanth Chandran, Bhavana Kanukurthi, Srinivasan Raghuraman:
Information-theoretic Local Non-malleable Codes and their Applications. 1056 - Jack Murtagh, Salil P. Vadhan:
The Complexity of Computing the Optimal Composition of Differential Privacy. 1057 - Siyao Guo, Pavel Hubácek, Alon Rosen, Margarita Vald:
Rational Sumchecks. 1058 - David Derler, Henrich Christopher Pöhls, Kai Samelin, Daniel Slamanig:
A General Framework for Redactable Signatures and New Constructions. 1059 - Joost Renes, Craig Costello, Lejla Batina:
Complete addition formulas for prime order elliptic curves. 1060 - Tianren Liu, Vinod Vaikuntanathan:
On Basing Private Information Retrieval on NP-Hardness. 1061 - Mohammad Mahmoody, Ameer Mohammed, Soheil Nematihaji, Rafael Pass, Abhi Shelat:
Lower Bounds on Assumptions behind Indistinguishability Obfuscation. 1062 - Divesh Aggarwal, Shashank Agrawal, Divya Gupta, Hemanta K. Maji, Omkant Pandey, Manoj Prabhakaran:
Optimal Computational Split-state Non-malleable Codes. 1063 - Hoeteck Wee:
Déjà Q: Encore! Un Petit IBE. 1064 - Christopher W. Fletcher, Muhammad Naveed, Ling Ren, Elaine Shi, Emil Stefanov:
Bucket ORAM: Single Online Roundtrip, Constant Bandwidth Oblivious RAM. 1065 - Haipeng Qu, Peng Shang, Xi Jun Lin, Lin Sun:
Cryptanalysis of A Privacy-Preserving Smart Metering Scheme Using Linkable Anonymous Credential. 1066 - Vladimir Kolesnikov, Alex J. Malozemoff:
Public Verifiability in the Covert Model (Almost) for Free. 1067 - Steve Lu, Rafail Ostrovsky:
Black-Box Parallel Garbled RAM. 1068 - Yuanxi Dai, John P. Steinberger:
Feistel Networks: Indifferentiability at 8 Rounds. 1069 - Bo Tang, Jiapeng Zhang:
Barriers to Black-Box Constructions of Traitor Tracing Systems. 1070 - Arpita Maitra, Goutam Paul, Asim K. Pal:
Fairness in Secure Two-Party Computation with Rational Players. 1071 - (Withdrawn) Quantum One-Time Memories from Stateless Hardware. 1072
- David Derler, Daniel Slamanig:
Practical Witness Encryption for Algebraic Languages And How to Reply an Unknown Whistleblower. 1073 - Ran Canetti, Yilei Chen, Justin Holmgren
, Mariana Raykova:
Succinct Adaptive Garbled RAM. 1074 - Michele Mosca:
Cybersecurity in an era with quantum computers: will we be ready? 1075 - Razvan Barbulescu:
An appendix for a recent paper of Kim. 1076 - Dibyendu Roy, Sourav Mukhopadhyay:
Fault Analysis on the Stream Ciphers LILI-128 and Achterbahn. 1077 - Sanjam Garg
, Omkant Pandey, Akshayaram Srinivasan:
On the Exact Cryptographic Hardness of Finding a Nash Equilibrium. 1078 - Ming Li, Mingxing Wang, Dongdai Lin:
De Bruijn Sequences from Symmetric Shift Registers. 1079 - Pablo Freyre, Nelson Díaz, Oristela Cuellar:
Variations to the Cryptographics Algorithms AES and Twofish. 1080 - Reza Azarderakhsh, Zhe Liu, Hwajeong Seo, Howon Kim:
NEON PQCryto: Fast and Parallel Ring-LWE Encryption on ARM NEON Architecture. 1081 - Prabhanjan Ananth, Yu-Chi Chen, Kai-Min Chung, Huijia Lin, Wei-Kai Lin:
Delegating RAM Computations with Adaptive Soundness and Privacy. 1082 - Mostafa Taha, Thomas Eisenbarth:
Implementation Attacks on Post-Quantum Cryptographic Schemes. 1083 - Prabhanjan Ananth, Abhishek Jain
, Amit Sahai:
Patchable Obfuscation. 1084 - Pawel Morawiecki:
Malicious Keccak. 1085 - Julien Allibert, Benoit Feix, Georges Gagnerot, Ismael Kane, Hugues Thiebeauld, Tiana Razafindralambo:
Chicken or the Egg - Computational Data Attacks or Physical Attacks. 1086 - (Withdrawn) Efficient Signature Schemes from R-LWE. 1087
- Eiichiro Fujisaki, Keita Xagawa:
Note on the RKA security of Continuously Non-Malleable Key-Derivation Function from PKC 2015. 1088 - Ronald Cramer, Ivan Bjerre Damgård, Nico Döttling, Serge Fehr, Gabriele Spini:
Linear Secret Sharing Schemes from Error Correcting Codes and Universal Hash Functions. 1089 - Vipul Goyal, Dakshita Khurana, Ilya Mironov, Omkant Pandey, Amit Sahai:
Do Distributed Differentially-Private Protocols Require Oblivious Transfer? 1090 - (Withdrawn) Construction for de Bruijn Sequences with Large Orders. 1091
- Erdem Alkim, Léo Ducas, Thomas Pöppelmann, Peter Schwabe:
Post-quantum key exchange - a new hope. 1092 - Ahmed E. Kosba, Zhichao Zhao, Andrew Miller, Yi Qian, T.-H. Hubert Chan, Charalampos Papamanthou, Rafael Pass, Abhi Shelat, Elaine Shi:
How to Use SNARKs in Universally Composable Protocols. 1093 - Divesh Aggarwal, Kaave Hosseini, Shachar Lovett:
Affine-malleable Extractors, Spectrum Doubling, and Application to Privacy Amplification. 1094 - Vipul Goyal, Aayush Jain, Dakshita Khurana:
Witness Signatures and Non-Malleable Multi-Prover Zero-Knowledge Proofs. 1095 - Aloni Cohen, Justin Holmgren
, Ryo Nishimaki, Vinod Vaikuntanathan, Daniel Wichs:
Watermarking Cryptographic Capabilities. 1096 - Ivan Damgård, Jesper Buus Nielsen, Antigoni Polychroniadou:
On the Communication required for Unconditionally Secure Multiplication. 1097 - Shen Noether:
Ring SIgnature Confidential Transactions for Monero. 1098 - Stanislaw Jarecki, Hugo Krawczyk, Maliheh Shirvanian, Nitesh Saxena:
Device-Enhanced Password Protocols with Optimal Online-Offline Protection. 1099 - Anissa Sghaier, Loubna Ghammam, Zeghid Medien, Sylvain Duquesne, Mohsen Machhout:
Area-Efficient Hardware Implementation of the Optimal Ate Pairing over BN curves. 1100 - Jan Camenisch, Anja Lehmann, Gregory Neven, Kai Samelin:
Virtual Smart Cards: How to Sign with a Password and a Server. 1101 - Adi Ben-Zvi, Simon R. Blackburn, Boaz Tsaban:
A Practical Cryptanalysis of the Algebraic Eraser. 1102 - Sihem Mesnager:
Linear codes with few weights from weakly regular bent functions based on a generic construction. 1103 - Hugo Labrande:
Computing Jacobi's \theta in quasi-linear time. 1104 - Peter Y. A. Ryan, Peter B. Rønne, Vincenzo Iovino:
Selene: Voting with Transparent Verifiability and Coercion-Mitigation. 1105 - Daniel S. Roche, Daniel Apon, Seung Geol Choi, Arkady Yerukhimovich:
POPE: Partial Order-Preserving Encoding. 1106 - Vipul Goyal, Divya Gupta, Amit Sahai:
Concurrent Secure Computation via Non-Black Box Simulation. 1107 - Jun Wang, Qiang Tang
:
Recommender Systems and their Security Concerns. 1108 - Bahram Rashidi, Sayed Masoud Sayedi, Reza Rezaeian Farashahi:
Efficient and Low-complexity Hardware Architecture of Gaussian Normal Basis Multiplication over GF(2m) for Elliptic Curve Cryptosystems. 1109 - Hannes Groß, Marko Hölbl, Daniel Slamanig, Raphael Spreitzer:
Privacy-Aware Authentication in the Internet of Things. 1110 - (Withdrawn) Comparison of TERO-cell implementations and characterisation on SRAM FPGAs. 1111
- Prastudy Fauzi, Helger Lipmaa:
Efficient Culpably Sound NIZK Shuffle Argument without Random Oracles. 1112 - Vipul Goyal, Aayush Jain, Adam O'Neill:
Multi-Input Functional Encryption with Unbounded-Message Security. 1113 - Michal Wronski:
Faster arithmetic on elliptic curves using Fp2. Application to GLV-GLS and NIST elliptic curves over Fp isomorphic to twisted Hessian curves over fields extension. 1114 - Avishek Adhikari, Kirill Morozov, Satoshi Obana, Partha Sarathi Roy, Kouichi Sakurai, Rui Xu:
Efficient Threshold Secret Sharing Schemes Secure against Rushing Cheaters. 1115 - Tarik Moataz, Erik-Oliver Blass, Travis Mayberry:
Constant Communication ORAM without Encryption. 1116 - Antonio de la Piedra:
Efficient implementation of AND, OR and NOT operators for ABCs. 1117 - Zhenzhen Bao, Peng Luo, Dongdai Lin:
Bitsliced Implementations of the PRINCE, LED and RECTANGLE Block Ciphers on AVR 8-bit Microcontrollers. 1118 - Rosario Giustolisi, Vincenzo Iovino, Peter B. Rønne:
On the Possibility of Non-Interactive E-Voting in the Public-key Setting. 1119 - Vikram Singh, Arjun Chopra:
Even More Practical Key Exchanges for the Internet using Lattice Cryptography. 1120 - Stavros Kousidis, Andreas Wiemers:
On the First Fall Degree of Summation Polynomials. 1121 - (Withdrawn) Schnorr Signatures in the Multi-User Setting. 1122
- Daniele Micciancio, Michael Walter:
Practical, Predictable Lattice Basis Reduction. 1123 - Juan Carlos Ku-Cauich, Guillermo Morales-Luna:
A Linear Code and its Application into Secret Sharing. 1124 - Nathan Chenette, Kevin Lewi, Stephen A. Weis, David J. Wu:
Practical Order-Revealing Encryption with Limited Leakage. 1125 - Daniel S. Roche, Adam J. Aviv, Seung Geol Choi:
A Practical Oblivious Map Data Structure with Secure Deletion and History Independence. 1126 - Mikhail Anokhin:
Pseudo-Free Families of Finite Computational Elementary Abelian p-Groups. 1127 - Anja Becker, Léo Ducas, Nicolas Gama, Thijs Laarhoven:
New directions in nearest neighbor searching with applications to lattice sieving. 1128 - Martin R. Albrecht, Kenneth G. Paterson:
Lucky Microseconds: A Timing Attack on Amazon's s2n Implementation of TLS. 1129 - Nir Bitansky, Vinod Vaikuntanathan:
A Note on Perfect Correctness by Derandomization. 1130 - Ding Wang, Ping Wang:
On the Usability of Two-Factor Authentication. 1131 - Katsuyuki Takashima, Atsushi Takayasu:
Tighter Security for Efficient Lattice Cryptography via the Rényi Divergence of Optimized Orders. 1132 - Zhengjun Cao, Lihua Liu:
Comment on "Realization of a scalable Shor algorithm". 1133 - Eric Crockett, Chris Peikert:
Λ ∘ λ: A Functional Library for Lattice Cryptography. 1134 - Hiraku Morita, Jacob C. N. Schuldt, Takahiro Matsuda, Goichiro Hanaoka, Tetsu Iwata:
On the Security of the Schnorr Signature Scheme and DSA against Related-Key Attacks. 1135 - Saikrishna Badrinarayanan, Divya Gupta, Abhishek Jain
, Amit Sahai:
Multi-Input Functional Encryption for Unbounded Arity Functions. 1136 - Mengce Zheng, Honggang Hu:
A New Factoring Attack on Multi-Prime RSA with Small Prime Difference. 1137 - Elena Dubrova, Mats Näslund, Göran Selander, Fredrik Lindqvist:
Lightweight CRC-based Message Authentication. 1138 - Jian Liu, Sihem Mesnager, Lusheng Chen:
Secret Sharing Schemes with General Access Structures (Full version). 1139 - Pranjal Dutta:
Modular Inversion Hidden Number Problem- A Lattice Approach. 1140 - Thomas Allan, Billy Bob Brumley, Katrina Falkner, Joop van de Pol, Yuval Yarom:
Amplifying Side Channels Through Performance Degradation. 1141 - Subhadeep Banik, Andrey Bogdanov, Takanori Isobe, Kyoji Shibutani, Harunaga Hiwatari, Toru Akishita, Francesco Regazzoni:
Midori: A Block Cipher for Low Energy (Extended Version). 1142 - (Withdrawn) A Multi-Bit Fully Homomorphic Encryption with Shorter Public Key from LWE. 1143
- Olivier Blazy, Céline Chevalier, Damien Vergnaud:
Mitigating Server Breaches in Password-Based Authentication: Secure and Efficient Solutions. 1144 - Abderrahmane Nitaj, Tajjeeddine Rachidi:
Lattice Attacks on the DGHV Homomorphic Encryption Scheme. 1145 - Jesus Diaz, David Arroyo, Francisco de Borja Rodríguez:
libgroupsig: An extensible C library for group signatures. 1146 - (Withdrawn) Collusion Resistant Aggregation from Convertible Tags. 1147
- Ritam Bhaumik, Mridul Nandi:
An Inverse-free Single-Keyed Tweakable Enciphering Scheme. 1148 - Takahiro Matsuda, Goichiro Hanaoka:
An Asymptotically Optimal Method for Converting Bit Encryption to Multi-Bit Encryption. 1149 - Colin Boyd, Britta Hale, Stig Frode Mjølsnes, Douglas Stebila:
From Stateless to Stateful: Generic Authentication and Authenticated Encryption Constructions with Application to TLS. 1150 - Antonio Faonio
, Jesper Buus Nielsen:
Fully Leakage-Resilient Codes. 1151 - Qiang Tang
, Jun Wang:
Privacy-preserving Friendship-based Recommender Systems. 1152 - Samee Zahur, David Evans:
Obliv-C: A Language for Extensible Data-Oblivious Computation. 1153 - Jean-Philippe Aumasson, Philipp Jovanovic, Samuel Neves:
NORX8 and NORX16: Authenticated Encryption for Low-End Systems. 1154 - Gorka Irazoqui, Thomas Eisenbarth, Berk Sunar:
Cross Processor Cache Attacks. 1155 - (Withdrawn) An Identity Based Encryption Scheme Resilient to RAM Scraper Like Malware Attacks. 1156
- Mihir Bellare, Douglas Stebila:
Double-Authentication-Preventing Signatures from Trapdoor Identification. 1157 - Marie-Sarah Lacharité, Kenneth G. Paterson:
A note on the optimality of frequency analysis vs. ℓp-optimization. 1158 - Dan Bogdanov, Liina Kamm, Baldur Kubo, Reimo Rebane, Ville Sokk, Riivo Talviste:
Students and Taxes: a Privacy-Preserving Social Study Using Secure Computation. 1159 - Yasufumi Hashimoto:
Cryptanalysis of multi-HFE. 1160 - Jia Xu, Jianying Zhou, Liming Lu
:
Cyber and Physical Access Control in Legacy System Using Passwords. 1161 - Phillip Rogaway:
The Moral Character of Cryptographic Work. 1162 - Mehmet Özen, Mustafa Çoban, Ferhat Karakoç
:
A Guess-and-Determine Attack on Reduced-Round Khudra and Weak Keys of Full Cipher. 1163 - Pasquale Forte, Diego Romano, Giovanni Schmid:
Beyond Bitcoin - Part I: A critical look at blockchain-based systems. 1164 - Li Lin, Wenling Wu:
Meet-in-the-Middle Attacks on Reduced-Round Midori-64. 1165 - Aggelos Kiayias, Thomas Zacharias, Bingsheng Zhang:
Ceremonies for End-to-End Verifiable Elections. 1166 - Dan Boneh, Kevin Lewi, David J. Wu:
Constraining Pseudorandom Functions Privately. 1167 - (Withdrawn) SCP: A Computationally-Scalable Byzantine Consensus Protocol For Blockchains. 1168
- Marc Green, Thomas Eisenbarth:
Strength in Numbers: Threshold ECDSA to Protect Keys in the Cloud. 1169 - Takanori Yasuda, Xavier Dahan, Kouichi Sakurai:
Characterizing NTRU-Variants Using Group Ring and Evaluating their Lattice Security. 1170 - (Withdrawn) On the Security of a access polynomial based self-healing key management schemes in wireless sensor networks. 1171
- (Withdrawn) An Application Specific Instruction Set Processor (ASIP) for the Niederreiter Cryptosystem. 1172
- Shai Halevi, Yuval Ishai, Abhishek Jain
, Eyal Kushilevitz, Tal Rabin:
Secure Multiparty Computation with General Interaction Patterns. 1173 - Goutam Paul, Souvik Ray:
On Data Complexity of Distinguishing Attacks vs. Message Recovery Attacks on Stream Ciphers. 1174 - Bhanu Prakash Gopularam, Nalini N:
Improved Data Confidentiality of Audit Trail Data in Multi-Tenant Cloud. 1175 - Myungsun Kim, Hyung Tae Lee, San Ling, Huaxiong Wang:
On the Efficiency of FHE-based Private Queries. 1176 - Jakob Jakobsen, Claudio Orlandi:
On the CCA (in)security of MTProto. 1177 - Vipul Goyal, Omkant Pandey, Silas Richelson:
Textbook Non-Malleable Commitments. 1178 - Kenichiro Hayasaka, Kazumaro Aoki, Tetsutaro Kobayashi, Tsuyoshi Takagi:
A construction of 3-dimensional lattice sieve for number field sieve over F_{p^n}. 1179 - Ignat Korchagin, Eugene Pilyankevich:
Secure Comparator: a ZKP-Based Authentication System. 1180 - Zhiqiang Lin, Dingyi Pei, Dongdai Lin:
Construction of Transition Matrices for Binary FCSRs. 1181 - Nicky Mouha:
Chaskey: a MAC Algorithm for Microcontrollers - Status Update and Proposal of Chaskey-12 -. 1182 - Esha Ghosh, Olga Ohrimenko, Roberto Tamassia:
Authenticated Range \& Closest Point Queries in Zero-Knowledge. 1183 - Alan Szepieniec, Jintai Ding, Bart Preneel:
Extension Field Cancellation: a New Central Trapdoor for Multivariate Quadratic Systems. 1184 - Nico Döttling, Dominique Schröder:
Efficient Pseudorandom Functions via On-the-Fly Adaptation. 1185 - Khodakhast Bibak, Bruce M. Kapron, S. Venkatesh, Roberto Tauraso, László Tóth:
Restricted linear congruences. 1186 - Khodakhast Bibak, Bruce M. Kapron, S. Venkatesh, László Tóth:
On an almost-universal hash function family with applications to authentication and secrecy codes. 1187 - Pratish Datta, Ratna Dutta, Sourav Mukhopadhyay:
Compact Attribute-Based Encryption and Signcryption for General Circuits from Multilinear Maps. 1188 - Jian Guo, Jérémy Jean, Ivica Nikolic, Kexin Qiao, Yu Sasaki, Siang Meng Sim:
Invariant Subspace Attack Against Full Midori64. 1189 - Yuval Ishai, Eyal Kushilevitz, Steve Lu, Rafail Ostrovsky:
Private Large-Scale Databases with Distributed Searchable Symmetric Encryption. 1190 - Chester Rebeiro, Debdeep Mukhopadhyay:
A Formal Analysis of Prefetching in Profiled Cache-Timing Attacks on Block Ciphers. 1191 - Frederik Armknecht, Colin Boyd, Christopher Carr, Kristian Gjøsteen, Angela Jäschke, Christian A. Reuter, Martin Strand:
A Guide to Fully Homomorphic Encryption. 1192 - Thomas Fuhr, Gaëtan Leurent, Valentin Suder:
Collision Attacks against CAESAR Candidates - Forgery and Key-Recovery against AEZ and Marble. 1193 - Gizem S. Çetin, Wei Dai, Yarkin Doröz, Berk Sunar:
Homomorphic Autocomplete. 1194 - Gizem S. Çetin, Yarkin Doröz, Berk Sunar, William J. Martin:
An Investigation of Complex Operations with Word-Size Homomorphic Encryption. 1195 - Geoffroy Couteau, Thomas Peters, David Pointcheval:
Secure Distributed Computation on Private Inputs. 1196 - Yarkin Doröz, Berk Sunar, Gizem S. Çetin:
On-the-fly Homomorphic Batching/Unbatching. 1197 - Mihir Bellare, Anna Lysyanskaya:
Symmetric and Dual PRFs from Standard Assumptions: A Generic Validation of an HMAC Assumption. 1198 - Sergiu Carpov, Renaud Sirdey:
A compression method for homomorphic ciphertexts. 1199 - Christoph Dobraunig, Maria Eichlseder, Florian Mendel:
Heuristic Tool for Linear Cryptanalysis with Applications to CAESAR Candidates. 1200 - Zheng Yuan, Zhen Peng, Ming Mao:
A Star-based Independent Biclique Attack on Full Rounds SQUARE. 1201 - Kwangsu Lee, Dong Hoon Lee, Jong Hwan Park, Moti Yung:
CCA Security for Self-Updatable Encryption: Protecting Cloud Data When Clients Read/Write Ciphertexts. 1202 - Nikolay Kolomeec:
The graph of minimal distances of bent functions and its properties. 1203 - Elizabeth A. Quaglia, Ben Smyth:
Constructing secret, verifiable auction schemes from election schemes. 1204 - Angelo De Caro, Vincenzo Iovino, Adam O'Neill:
Deniable Functional Encryption. 1205 - Elad Carmon, Jean-Pierre Seifert, Avishai Wool:
Simple Photonic Emission Attack with Reduced Data Complexity. 1206 - Zhengjun Cao, Zhenfu Cao, Lihua Liu:
Comment on Demonstrations of Shor's Algorithm in the Past Decades. 1207 - Zheng Yuan, Zhen Peng, Haiwen Ou:
Two Kinds of Biclique Attacks on Lightweight Block Cipher PRINCE. 1208 - Alptekin Küpçü, Payman Mohassel:
Fast Optimistically Fair Cut-and-Choose 2PC. 1209 - Ehsan Ebrahimi Targhi, Dominique Unruh:
Quantum Security of the Fujisaki-Okamoto and OAEP Transforms. 1210 - Sven Heiberg, Arnis Parsovs, Jan Willemson
:
Log Analysis of Estonian Internet Voting 2013-2015. 1211 - Sylvain Duquesne, Nadia El Mrabet, Safia Haloui, Franck Rondepierre:
Choosing and generating parameters for low level pairing implementation on BN curves. 1212 - Anna Krasnova, Moritz Neikes, Peter Schwabe:
Footprint scheduling for Dining-Cryptographer networks. 1213 - Britta Hale, Tibor Jager, Sebastian Lauer, Jörg Schwenk:
Speeding: On Low-Latency Key Exchange. 1214 - A. Adam Ding, Cong Chen, Thomas Eisenbarth:
Simpler, Faster, and More Robust T-test Based Leakage Detection. 1215 - Hui Guo, Zhenfeng Zhang, Jing Xu:
Non-Transferable Proxy Re-Encryption. 1216 - Boris Ryabko:
Two-faced processes and existence of RNG with proven properties. 1217 - (Withdrawn) Area-Time Efficient Hardware Implementation of Elliptic Curve Cryptosystem. 1218
- Michel Abdalla, Sonia Belaïd, David Pointcheval, Sylvain Ruhault, Damien Vergnaud:
Robust Pseudo-Random Number Generators with Input Secure Against Side-Channel Attacks. 1219 - David Cash, Eike Kiltz, Stefano Tessaro:
Two-Round Man-in-the-Middle Security from LPN. 1220 - (Withdrawn) Unclonable encryption revisited (4 ˟ 2 = 8). 1221
- Gottfried Herold, Elena Kirshanova, Alexander May:
On the Asymptotic Complexity of Solving LWE. 1222 - Sebastian Faust, Daniel Masny, Daniele Venturi:
Chosen-Ciphertext Security from Subset Sum. 1223 - Mohamed Ahmed Abdelraheem, Peter Beelen, Andrey Bogdanov, Elmar Tischhauser:
Twisted Polynomials and Forgery Attacks on GCM. 1224 - Debapriya Basu Roy, Poulami Das, Debdeep Mukhopadhyay:
ECC on Your Fingertips: A Single Instruction Approach for Lightweight ECC Design in GF (p). 1225 - Oleg Mazonka, Nektarios Georgios Tsoutsos, Michail Maniatakos:
Cryptoleq: A Heterogeneous Abstract Machine for Encrypted and Unencrypted Computation. 1226 - Akshima, Donghoon Chang, Mohona Ghosh, Aarushi Goel, Somitra Kumar Sanadhya:
Single Key Recovery Attacks on 9-round Kalyna-128/256 and Kalyna-256/512. 1227 - Eric R. Verheul:
Privacy protection in electronic education based on polymorphic pseudonymization. 1228 - Jintai Ding, Momonari Kudo, Shinya Okumura, Tsuyoshi Takagi, Chengdong Tao:
Cryptanalysis of a public key cryptosystem based on Diophantine equations via weighted LLL reduction. 1229 - Foteini Baldimtsi, Aggelos Kiayias, Thomas Zacharias, Bingsheng Zhang:
Indistinguishable Proofs of Work or Knowledge. 1230 - Hassan Jameel Asghar, Mohamed Ali Kâafar:
When are Identification Protocols with Sparse Challenges Safe? The Case of the Coskun and Herley Attack. 1231 - Tanping Zhou, Longfei Liu, Xiaoyuan Yang, Yiliang Han:
Extend FHEW to General Case. 1232 - Samuel Neves, Mehdi Tibouchi:
Degenerate Curve Attacks. 1233 - Ruxandra F. Olimid, Anat Paskin-Cherniavsky:
On Cryptographic Anonimity and Unpredicatbility in Secret Sharing. 1234 - Susumu Kiyoshima:
Constant-round Leakage-resilient Zero-knowledge from Collision Resistance. 1235 - Liron David, Avishai Wool:
A Bounded-Space Near-Optimal Key Enumeration Algorithm for Multi-Dimensional Side-Channel Attacks. 1236 - Stanislav Smyshlyaev, Igor B. Oshkin, Evgeniy K. Alekseev, Liliya R. Ahmetzyanova:
On the Security of One Password Authenticated Key Exchange Protocol. 1237 - Ran Cohen:
Asynchronous Secure Multiparty Computation in Constant Time. 1238 - Yansong Gao, Damith Chinthana Ranasinghe, Said F. Al-Sarawi, Derek Abbott:
Secure Goods Supply Chain and Key Exchange with Virtual Proof of Reality. 1239 - (Withdrawn) Exploiting Unreliability of the PUF to Secure Remote Wireless Sensing. 1240
- José Bacelar Almeida, Manuel Barbosa, Gilles Barthe, François Dupressoir:
Verifiable side-channel security of cryptographic implementations: constant-time MEE-CBC. 1241 - Anne Broadbent, Christian Schaffner:
Quantum Cryptography Beyond Quantum Key Distribution. 1242 - Riad S. Wahby, Max Howald, Siddharth Garg, Abhi Shelat, Michael Walfish:
Verifiable ASICs. 1243 - George Shushuev:
On values of vectorial Boolean functions and related problems in APN functions. 1244 - Chunsheng Gu:
Variation of GGH15 Multilinear Maps. 1245 - Jan Camenisch, Manu Drijvers, Anja Lehmann:
Universally Composable Direct Anonymous Attestation. 1246 - Mike Scott:
Missing a trick: Karatsuba revisited. 1247 - Janaka Alawatugoda:
Generic Transformation of a CCA2-Secure Public-Key Encryption Scheme to an eCK-Secure Key Exchange Protocol in the Standard Model. 1248 - Thomas Baignères, Cécile Delerablée, Matthieu Finiasz, Louis Goubin, Tancrède Lepoint, Matthieu Rivain:
Trap Me If You Can - Million Dollar Curve. 1249 - Brett Hemenway, Zahra Jafargholi, Rafail Ostrovsky, Alessandra Scafuro, Daniel Wichs:
Adaptively Secure Garbled Circuits from One-Way Functions. 1250 - Zhengjun Cao, Zhenfu Cao:
Comment on Quantum Cryptography - Which is More Important, Signal Security, Information Security or Communication Reliability. 1251 - Sayandeep Saha, Rajat Subhra Chakraborty, Srinivasa Shashank Nuthakki, Anshul, Debdeep Mukhopadhyay:
Improved Test Pattern Generation for Hardware Trojan Detection using Genetic Algorithm and Boolean Satisfiability. 1252 - Yu Chen, Baodong Qin, Jiang Zhang, Yi Deng, Sherman S. M. Chow:
Non-Malleable Functions and Their Applications. 1253 - Yohei Watanabe, Junji Shikata:
Identity-based Hierarchical Key-insulated Encryption without Random Oracles. 1254 - Pratish Datta, Ratna Dutta, Sourav Mukhopadhyay:
Functional Encryption for Inner Product with Full Function Privacy. 1255 - Andreas Hülsing, Joost Rijneveld, Fang Song:
Mitigating Multi-Target Attacks in Hash-based Signatures. 1256 - (Withdrawn) Security Attack on CloudBI: Practical privacy-preserving outsourcing of biometric identification in the cloud. 1257
![](https://dblp.uni-trier.de./img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.