


default search action
IACR Cryptology ePrint Archive, Volume 2016
Volume 2016, 2016
- Yalin Chen, Jue-Sam Chou, Hung-Shen Wu:
Improved on an efficient user authentication scheme for heterogeneous wireless sensor network tailored for the Internet of Things environment. 1 - Ali Can Atici, Cemal Yilmaz, Erkay Savas:
Remote Cache-Timing Attack without Learning Phase. 2 - Nicolas T. Courtois:
On Splitting a Point with Summation Polynomials in Binary Elliptic Curves. 3 - Arnold Neumaier:
Bounding basis reduction properties. 4 - John Jones:
A Columnar Transposition cipher in a contemporary setting. 5 - Huijia Lin, Rafael Pass, Karn Seth, Sidharth Telang:
Indistinguishability Obfuscation with Non-trivial Efficiency. 6 - Fabrice Benhamouda, Céline Chevalier, Adrian Thillard, Damien Vergnaud:
Easing Coppersmith Methods using Analytic Combinatorics: Applications to Public-Key Cryptography with Weak Pseudorandomness. 7 - David Chaum, Farid Javani, Aniket Kate, Anna Krasnova, Joeri de Ruiter, Alan T. Sherman:
cMix: Anonymization byHigh-Performance Scalable Mixing. 8 - Mahshid Delavar, Sattar Mirzakuchaki, Mohammad Hassan Ameri, Javad Mohajeri:
Puf-Based Solutions For Secure Communications In Advanced Metering Infrastructure (AMI). 9 - Albrecht Petzoldt, Jintai Ding, Lih-Chung Wang:
Eliminating Decryption Failures from the Simple Matrix Encryption Scheme. 10 - Michel Abdalla, Florian Bourse, Angelo De Caro, David Pointcheval:
Better Security for Functional Encryption for Inner Product Evaluations. 11 - Ariel Hamlin, Nabil Schear, Emily Shen, Mayank Varia, Sophia Yakoubov, Arkady Yerukhimovich:
Cryptography for Big Data Security. 12 - Rosario Gennaro, Steven Goldfeder, Arvind Narayanan:
Threshold-optimal DSA/ECDSA signatures and an application to Bitcoin wallet security. 13 - Manuel Barbosa, Bernardo Portela, Guillaume Scerri, Bogdan Warinschi:
Foundations of Hardware-Based Attested Computation and Application to SGX. 14 - Ehsan Ebrahimi Targhi, Gelo Noel Tabia, Dominique Unruh:
Quantum Collision-Resistance of Non-Uniformly Distributed Functions. 15 - Alexander Schaub, Rémi Bazin, Omar Hasan, Lionel Brunie:
A trustless privacy-preserving reputation system. 16 - Helger Lipmaa, Payman Mohassel, Seyed Saeed Sadeghian:
Valiant's Universal Circuit: Improvements, Implementation, and Applications. 17 - Afonso Arriaga, Manuel Barbosa, Pooya Farshim:
Private Functional Encryption: Indistinguishability-Based Definitions and Constructions from Obfuscation. 18 - Hyung Tae Lee, San Ling, Huaxiong Wang:
Analysis of Gong et al.'s CCA2-Secure Homomorphic Encryption. 19 - Yonglin Hao, Willi Meier:
Truncated Differential Based Known-Key Attacks on Round-Reduced Simon. 20 - Eli Ben-Sasson, Alessandro Chiesa, Ariel Gabizon, Madars Virza:
Quasi-Linear Size Zero Knowledge from Linear-Algebraic PCPs. 21 - Enes Pasalic, Amela Muratovic-Ribic, Samir Hodzic, Sugata Gangopadhyay:
On derivatives of polynomials over finite fields through integration. 22 - Yalin Chen, Jue-Sam Chou, I-Ching Liao:
Improved on an improved remote user authentication scheme with key agreement. 23 - Patrick McCorry, Siamak Fayyaz Shahandashti, Feng Hao:
Refund attacks on Bitcoin's Payment Protocol. 24 - Khoongming Khoo, Eugene Lee, Thomas Peyrin, Siang Meng Sim:
Human-readable Proof of the Related-Key Security of AES-128. 25 - Abhishek Chakraborty, Debdeep Mukhopadhyay:
A Practical Template Attack on MICKEY-128 2.0 Using PSO Generated IVs and LS-SVM. 26 - Henry Corrigan-Gibbs, Dan Boneh, Stuart E. Schechter:
Balloon Hashing: Provably Space-Hard Hash Functions with Data-Independent Access Patterns. 27 - Jos Wetzels, Wouter Bokslag:
Sponges and Engines: An introduction to Keccak and Keyak. 28 - Jos Wetzels, Wouter Bokslag:
Simple SIMON: FPGA implementations of the SIMON 64/128 Block Cipher. 29 - Sedat Akleylek, Nina Bindel, Johannes Buchmann, Juliane Krämer, Giorgia Azzurra Marson:
An Efficient Lattice-Based Signature Scheme with Provably Secure Instantiation. 30 - Antonio de la Piedra:
Beyond the selective disclosure of ABCs on RAM-constrained devices. 31 - Janaka Alawatugoda:
On the Leakage-Resilient Key Exchange. 32 - Frederik Armknecht, Daisuke Moriyama, Ahmad-Reza Sadeghi, Moti Yung:
Towards a Unified Security Model for Physically Unclonable Functions. 33 - Jan Camenisch, Robert R. Enderlein, Stephan Krenn, Ralf Küsters, Daniel Rausch:
Universal Composition with Responsive Environments. 34 - Tal Moran, Ilan Orlov:
Proofs of Space-Time and Rational Proofs of Storage. 35 - Wentan Yi, Shaozhen Chen:
Characterizations of the Degraded Boolean Function and Cryptanalysis of the SAFER Family. 36 - Thomas P. Jakobsen, Jesper Buus Nielsen, Claudio Orlandi:
A Framework for Outsourcing of Secure Computation. 37 - Iraklis Symeonidis, Bart Preneel:
Collateral Damage in Online Social Networks: computing the significance of information collection. 38 - Muhammad Nadeem:
Standard quantum bit commitment - an indefinite commitment time. 39 - (Withdrawn) Packet Header Anomaly Detection Using Bayesian Topic Models. 40
- Preeti Kulshrestha, Arun Kumar:
A NEW UNLINKABLE SECRET HANDSHAKES SCHEME BASED ON ZSS. 41 - Khushboo Bussi, Dhananjoy Dey, Manoj Kumar Biswas, Bal Kishan Dass:
Neeva: A Lightweight Hash Function. 42 - Amir S. Mortazavi, Mahmoud Salmasizadeh, Amir Daneshgar:
Strong Continuous Non-malleable Encoding Schemes with Tamper-Detection. 43 - Iris Anshel, Derek Atkins, Dorian Goldfeld, Paul E. Gunnells:
Defeating the Ben-Zvi, Blackburn, and Tsaban Attack on the Algebraic Eraser. 44 - Xi Jun Lin, Lin Sun, Haipeng Qu, Xiaoshuai Zhang:
New Approaches for Secure Outsourcing Algorithm for Modular Exponentiations. 45 - Yehuda Lindell:
How To Simulate It - A Tutorial on the Simulation Proof Technique. 46 - Andrey Bogdanov, Martin M. Lauridsen, Elmar Tischhauser:
Comb to Pipeline: Fast Software Encryption Revisited. 47 - Carsten Baum, Ivan Damgård, Tomas Toft, Rasmus Winther Zakarias:
Better Preprocessing for Secure Multiparty Computation. 48 - Christoph M. Mayer:
Implementing a Toolkit for Ring-LWE Based Cryptography in Arbitrary Cyclotomic Number Fields. 49 - Masahiro Yagisawa:
Improved Fully Homomorphic Encryption with Composite Number Modulus. 50 - Jialin Huang, Serge Vaudenay, Xuejia Lai, Kaisa Nyberg:
Capacity and Data Complexity in Multidimensional Linear Attack. 51 - Gunnar Hartung, Björn Kaidel, Alexander Koch, Jessica Koch, Andy Rupp
:
Fault-Tolerant Aggregate Signatures. 52 - Khalid Javeed, Xiaojun Wang:
Speed and Area Optimized Parallel Higher-Radix Modular Multipliers. 53 - Masahiro Yagisawa:
Fully Homomorphic Public-key Encryption Based on Discrete Logarithm Problem. 54 - Aanchal Malhotra, Sharon Goldberg:
Attacking NTP's Authenticated Broadcast Mode. 55 - Ethan Heilman, Foteini Baldimtsi, Sharon Goldberg:
Blindly Signed Contracts: Anonymous On-Blockchain and Off-Blockchain Bitcoin Transactions. 56 - Durga Prasad Sahoo, Phuong Ha Nguyen, Rajat Subhra Chakraborty, Debdeep Mukhopadhyay:
Architectural Bias: a Novel Statistical Metric to Evaluate Arbiter PUF Variants. 57 - Dimitrios Poulakis:
New Lattice Attacks on DSA Schemes. 58 - Muhammad Nadeem:
Secure positioning and quantum non-local correlations. 59 - Amir Herzberg, Yehonatan Kfir:
Topology-based Plug-and-Play Key-Setup. 60 - Christina Garman, Matthew Green, Ian Miers:
Accountable Privacy for Decentralized Anonymous Payments. 61 - Raphael Bost, Pierre-Alain Fouque, David Pointcheval:
Verifiable Dynamic Symmetric Searchable Encryption: Optimality and Forward Security. 62 - Rémi Bricout, Sean Murphy, Kenneth G. Paterson, Thyla van der Merwe:
Analysing and Exploiting the Mantin Biases in RC4. 63 - Yohei Watanabe, Goichiro Hanaoka, Junji Shikata:
Unconditionally Secure Revocable Storage: Tight Bounds, Optimal Construction, and Robustness. 64 - Yasufumi Hashimoto:
A note on Tensor Simple Matrix Encryption Scheme. 65 - Lingyue Qin, Huaifeng Chen:
Linear Hull Attack on Round-Reduced Simeck with Dynamic Key-guessing Techniques. 66 - Henry Carter, Patrick Traynor:
OPFE: Outsourcing Computation for Private Function Evaluation. 67 - (Withdrawn) Octonion Algebra and Noise-Free Fully Homomorphic Encryption (FHE) Schemes. 68
- Gergei Bana, Rohit Chadha:
Verification Methods for the Computationally Complete Symbolic Attacker Based on Indistinguishability. 69 - Kamil Kluczniak:
Domain-Specific Pseudonymous Signatures Revisited. 70 - Alex Biryukov, Léo Perrin, Aleksei Udovenko:
Reverse-Engineering the S-Box of Streebog, Kuznyechik and STRIBOBr1. 71 - Karthikeyan Bhargavan, Christina Brzuska, Cédric Fournet, Matthew Green, Markulf Kohlweiss, Santiago Zanella Béguelin:
Downgrade Resilience in Key-Exchange Protocols. 72 - Jinsheng Zhang, Wensheng Zhang, Daji Qiao:
MU-ORAM: Dealing with Stealthy Privacy Attacks in Multi-User Data Outsourcing Services. 73 - Carmit Hazay, Muthuramakrishnan Venkitasubramaniam:
On the Power of Secure Two-Party Computation. 74 - Gajraj Kuldeep, Devendra Kumar Yadav, A. K. Sharma:
Weaknesses in Hadamard Based Symmetric Key Encryption Schemes. 75 - Xi Jun Lin, Haipeng Qu, Xiaoshuai Zhang:
New Efficient and Flexible Algorithms for Secure Outsourcing of Bilinear Pairings. 76 - Shahram Rasoolzadeh, Håvard Raddum:
Multidimensional Meet in the Middle Cryptanalysis of KATAN. 77 - Ge Bai, Ivan Damgård, Claudio Orlandi, Yu Xia:
Non-Interactive Verifiable Secret Sharing For Monotone Circuits. 78 - Qiang Tang
, Balazs Pejo, Husen Wang:
Protect both Integrity and Confidentiality in Outsourcing Collaborative Filtering Computations. 79 - Shahram Rasoolzadeh, Håvard Raddum:
Cryptanalysis of PRINCE with Minimal Data. 80 - Benjamin Dowling, Marc Fischlin, Felix Günther, Douglas Stebila:
A Cryptographic Analysis of the TLS 1.3 draft-10 Full and Pre-shared Key Handshake Protocol. 81 - Olivier Blazy, David Derler, Daniel Slamanig, Raphael Spreitzer:
Non-Interactive Plaintext (In-)Equality Proofs and Group Signatures with Verifiable Controllable Linkability. 82 - Sharon Goldberg, Moni Naor, Dimitrios Papadopoulos, Leonid Reyzin:
NSEC5 from Elliptic Curves: Provably Preventing DNSSEC Zone Enumeration with Shorter Responses. 83 - Qianqian Yang, Lei Hu, Siwei Sun, Ling Song:
Truncated Differential Analysis of Round-Reduced RoadRunneR Block Cipher. 84 - Scott R. Fluhrer:
Cryptanalysis of ring-LWE based key exchange with key share reuse. 85 - Victor Costan, Srinivas Devadas:
Intel SGX Explained. 86 - Christina Brzuska, Håkon Jacobsen, Douglas Stebila:
Safely Exporting Keys from Secure Channels: On the security of EAP-TLS and TLS Key Exporters. 87 - Tomer Ashur, Vincent Rijmen:
On Linear Hulls and Trails in Simon. 88 - Johannes Buchmann, Florian Göpfert, Rachel Player, Thomas Wunderer:
On the Hardness of LWE with Binary Error: Revisiting the Hybrid Lattice-Reduction and Meet-in-the-Middle Attack. 89 - Joan Daemen:
Spectral characterization of iterating lossy mappings. 90 - Simon R. Blackburn, Matthew J. B. Robshaw:
On the Security of the Algebraic Eraser Tag Authentication Protocol. 91 - Subhadeep Banik, Takanori Isobe:
Cryptanalysis of the Full Spritz Stream Cipher. 92 - Ágnes Kiss, Thomas Schneider:
Valiant's Universal Circuit is Practical. 93 - Romain Gay, Dennis Hofheinz, Eike Kiltz, Hoeteck Wee:
Tightly Secure CCA-Secure Encryption without Pairings. 94 - Dingfeng Ye, Peng Liu:
Obfuscation without Multilinear Maps. 95 - Bing Sun, Meicheng Liu, Jian Guo, Vincent Rijmen, Ruilin Li:
Provable Security Evaluation of Structures against Impossible Differential and Zero Correlation Linear Cryptanalysis. 96 - Shashi Kant Pandey, Prasanna Raghaw Mishra, Bal Kishan Dass:
A Maiorana-McFarland Construction of a GBF on Galois ring. 97 - Stefan Kölbl, Martin M. Lauridsen, Florian Mendel, Christian Rechberger:
Haraka - Efficient Short-Input Hashing for Post-Quantum Applications. 98 - Michael Clear, Ciaran McGoldrick:
Attribute-Based Fully Homomorphic Encryption with a Bounded Number of Inputs. 99 - Joël Alwen, Binyi Chen, Chethan Kamath, Vladimir Kolmogorov, Krzysztof Pietrzak, Stefano Tessaro:
On the Complexity of Scrypt and Proofs of Space in the Parallel Random Oracle Model. 100 - Benoît Libert, San Ling, Fabrice Mouhartem, Khoa Nguyen, Huaxiong Wang:
Signature Schemes with Efficient Protocols and Dynamic Group Signatures from Lattice Assumptions. 101 - Sanjam Garg
, Omkant Pandey, Akshayaram Srinivasan, Mark Zhandry:
Breaking the Sub-Exponential Barrier in Obfustopia. 102 - Nicolas T. Courtois, Guangyan Song, Ryan Castellucci:
Speed Optimizations in Bitcoin Key Recovery Attacks. 103 - Jos Wetzels:
Open Sesame: The Password Hashing Competition and Argon2. 104 - Kristian Gjøsteen, Martin Strand:
Fully homomorphic encryption must be fat or ugly? 105 - Ivan Damgård, Helene Haagh, Claudio Orlandi:
Access Control Encryption: Enforcing Information Flow with Cryptography. 106 - Hitesh Tewari, Arthur Hughes:
Fully Anonymous Transferable Ecash. 107 - Alex Davidson, Carlos Cid:
Computing Private Set Operations with Linear Complexities. 108 - Ivan Damgård, Tomas Toft, Rasmus Winther Zakarias:
Fast Multiparty Multiplications from shared bits. 109 - Navid Alamati, Chris Peikert:
Three's Compromised Too: Circular Insecurity for Any Cycle Length from (Ring-)LWE. 110 - Yoshinori Aono, Takuya Hayashi, Le Trieu Phong, Lihua Wang:
Scalable and Secure Logistic Regression via Homomorphic Encryption. 111 - Dario Fiore, Anca Nitulescu:
On the (In)security of SNARKs in the Presence of Oracles. 112 - Serge Fehr, Max Fillinger:
On the Composition of Two-Prover Commitments, and Applications to Multi-Round Relativistic Commitments. 113 - Mark Zhandry:
The Magic of ELFs. 114 - Joël Alwen, Jeremiah Blocki:
Efficiently Computing Data-Independent Memory-Hard Functions. 115 - Eli Ben-Sasson, Alessandro Chiesa, Nicholas Spooner:
Interactive Oracle Proofs. 116 - Venkata Koppula, Brent Waters:
Circular Security Counterexamples for Arbitrary Length Cycles from LWE. 117 - Zvika Brakerski, Vinod Vaikuntanathan:
Circuit-ABE from LWE: Unbounded Attributes and Semi-Adaptive Security. 118 - Christof Beierle, Thorsten Kranz, Gregor Leander:
Lightweight Multiplication in GF(2^n) with Applications to MDS Matrices. 119 - Ignacio Cascudo, Ivan Damgård, Felipe Lacerda, Samuel Ranellucci:
Oblivious Transfer from Any Non-Trivial Elastic Noisy Channels via Secret Key Agreement. 120 - (Withdrawn) Tightly-Secure Pseudorandom Functions via Work Factor Partitioning. 121
- Shay Gueron, Nicky Mouha:
Simpira v2: A Family of Efficient Permutations Using the AES Round Function. 122 - Michel Abdalla, Mario Cornejo, Anca Nitulescu, David Pointcheval:
Robust Password-Protected Secret Sharing. 123 - Pierrick Gaudry, Laurent Grémy, Marion Videau:
Collecting relations for the Number Field Sieve in GF(p6). 124 - Daniel Apon, Xiong Fan, Feng-Hao Liu:
Fully-Secure Lattice-Based IBE as Compact as PKE. 125 - Emre Yüce, Ali Aydin Selçuk:
Server Notaries: A Complementary Approach to the Web PKI Trust Model. 126 - Martin R. Albrecht, Shi Bai, Léo Ducas:
A subfield lattice attack on overstretched NTRU assumptions: Cryptanalysis of some FHE and Graded Encoding Schemes. 127 - Geoffroy Couteau, Thomas Peters, David Pointcheval:
Removing the Strong RSA Assumption from Arguments over the Integers. 128 - Daniel Genkin, Lev Pachmanov, Itamar Pipman, Eran Tromer:
ECDH Key-Extraction via Low-Bandwidth Electromagnetic Attacks on PCs. 129 - Loubna Ghammam, Emmanuel Fouotsa:
On the Computation of the Optimal Ate Pairing at the 192-bit Security Level. 130 - Itai Dinur:
New Attacks on the Concatenation and XOR Hash Combiners. 131 - Shahram Rasoolzadeh, Håvard Raddum:
Cryptanalysis of 6-round PRINCE using 2 Known Plaintexts. 132 - Claude Carlet:
On the nonlinearity of monotone Boolean functions. 133 - Michael T. Goodrich, Evgenios M. Kornaropoulos, Michael Mitzenmacher, Roberto Tamassia:
More Practical and Secure History-Independent Hash Tables. 134 - Jung Hee Cheon, Pierre-Alain Fouque, Changmin Lee, Brice Minaud, Hansol Ryu:
Cryptanalysis of the New CLT Multilinear Map over the Integers. 135 - Emmanuel Volte, Valérie Nachef, Nicolas Marrière:
Automatic Expectation and Variance Computing for Attacks on Feistel Schemes. 136 - Ignacio Cascudo, Ivan Damgård, Bernardo David, Nico Döttling, Jesper Buus Nielsen:
Rate-1, Linear Time and Additively Homomorphic UC Commitments. 137 - Shoukat Ali, Murat Cenk:
A new algorithm for residue multiplication modulo 2521-1. 138 - Jung Hee Cheon, Jinhyuck Jeong, Changmin Lee:
An Algorithm for NTRU Problems and Cryptanalysis of the GGH Multilinear Map without an encoding of zero. 139 - Shota Yamada:
Adaptively Secure Identity-Based Encryption from Lattices with Asymptotically Shorter Public Parameters. 140 - Igor A. Semaev:
On low degree polynomials in 2-round AES. 141 - Mihir Bellare, Daniel J. Bernstein, Stefano Tessaro:
Hash-Function based PRFs: AMAC and its Multi-User Security. 142 - Lilya Budaghyan, Claude Carlet, Tor Helleseth, Nian Li:
On the (non-)existence of APN (n, n)-functions of algebraic degree n. 143 - Stanislaw Jarecki, Aggelos Kiayias, Hugo Krawczyk, Jiayu Xu:
Highly-Efficient and Composable Password-Protected Secret Sharing (Or: How to Protect Your Bitcoin Wallet Online). 144 - Jeremiah Blocki, Hong-Sheng Zhou:
Designing Proof of Human-work Puzzles for Cryptocurrency and Beyond. 145 - Yoshinori Aono, Yuntao Wang, Takuya Hayashi, Tsuyoshi Takagi:
Improved Progressive BKZ Algorithms and their Precise Cost Estimation by Sharp Simulator. 146 - Eric Miles, Amit Sahai, Mark Zhandry:
Annihilation Attacks for Multilinear Maps: Cryptanalysis of Indistinguishability Obfuscation over GGH13. 147 - M. Seshadri Srinath, Venkatachalam Chandrasekaran:
Isogeny-based Quantum-resistant Undeniable Blind Signature Scheme. 148 - Wentan Yi, Shaozhen Chen:
Improved Integral and Zero-correlation Linear Cryptanalysis of Reduced-round CLEFIA Block Cipher. 149 - Carsten Baum:
On Garbling Schemes With And Without Privacy. 150 - Yu Yu, John P. Steinberger:
Pseudorandom Functions in Almost Constant Depth from Low-Noise LPN. 151 - Oscar García Morchon, Ronald Rietman, Ludo Tolhuizen, Jose Luis Torre-Arce, Moon Sung Lee, Domingo Gómez-Pérez, Jaime Gutierrez, Berry Schoenmakers:
Attacks and parameter choices in HIMMO. 152 - Jeremiah Blocki, Anupam Datta, Joseph Bonneau:
Differentially Private Password Frequency Lists. 153 - David Derler, Daniel Slamanig:
Fully-Anonymous Short Dynamic Group Signatures Without Encryption. 154 - Jun Xu, Lei Hu, Santanu Sarkar, Xiaona Zhang, Zhangjie Huang, Liqiang Peng:
Cryptanalysis of Multi-Prime Φ-Hiding Assumption. 155 - Yehuda Lindell, Nigel P. Smart, Eduardo Soria-Vazquez:
More Efficient Constant-Round Multi-Party Computation from BMR and SHE. 156 - Maciej Skorski
:
Key Derivation for Squared-Friendly Applications: Lower Bounds. 157 - Maciej Skórski
:
A Subgradient Algorithm For Computational Distances and Applications to Cryptography. 158 - Krzysztof Pietrzak, Maciej Skorski
:
Pseudoentropy: Lower-bounds for Chain rules and Transformations. 159 - Tyge Tiessen:
Polytopic Cryptanalysis. 160 - Ashwin Jha, Mridul Nandi:
Revisiting Structure Graph and Its Applications to CBC-MAC and EMAC. 161 - Mihir Bellare, Igors Stepanovs, Brent Waters:
New Negative Results on Differing-Inputs Obfuscation. 162 - Irene Giacomelli, Jesper Madsen, Claudio Orlandi:
ZKBoo: Faster Zero-Knowledge for Boolean Circuits. 163 - Léo Ducas, Damien Stehlé:
Sanitization of FHE Ciphertexts. 164 - (Withdrawn) PrAd: Enabling Privacy-Aware Location based Advertising. 165
- Grégory Demay, Peter Gazi, Ueli Maurer, Björn Tackmann:
Per-Session Security: Password-Based Cryptography Revisited. 166 - Ilias Giechaskiel, Cas Cremers, Kasper Bonne Rasmussen:
On Bitcoin Security in the Presence of Broken Crypto Primitives. 167 - Fan Zhang, Ethan Cecchetti, Kyle Croman, Ari Juels, Elaine Shi:
Town Crier: An Authenticated Data Feed for Smart Contracts. 168 - Peter Gazi, Stefano Tessaro:
Provably Robust Sponge-Based PRNGs and KDFs. 169 - Ran Raz:
Fast Learning Requires Good Memory: A Time-Space Lower Bound for Parity Learning. 170 - Jacques Patarin, Valérie Nachef:
Commutativity, Associativity, and Public Key Cryptography. 171 - Yupeng Zhang, Jonathan Katz, Charalampos Papamanthou:
All Your Queries Are Belong to Us: The Power of File-Injection Attacks on Searchable Encryption. 172 - Marcin Andrychowicz, Stefan Dziembowski, Sebastian Faust:
Circuit Compilers with O(1/ log(n)) Leakage Rate. 173 - Joseph Jaeger, Thomas Ristenpart, Qiang Tang:
Honey Encryption Beyond Message Recovery Security. 174 - Michele Ciampi, Giuseppe Persiano, Alessandra Scafuro, Luisa Siniscalchi, Ivan Visconti:
Online/Offline OR Composition of Sigma Protocols. 175 - (Withdrawn) Anonymous Role-Based Access Control on E-Health Records. 176
- Christine van Vredendaal:
Reduced Memory Meet-in-the-Middle Attack against the NTRU Private Key. 177 - Meiqin Wang, Tingting Cui, Huaifeng Chen, Ling Sun, Long Wen, Andrey Bogdanov:
Integrals go Statistical: Cryptanalysis of Full Skipjack Variants. 178 - Hugo Labrande, Emmanuel Thomé:
Computing theta functions in quasi-linear time in genus 2 and above. 179 - Dennis Hofheinz, Tibor Jager, Andy Rupp
:
Public-Key Encryption with Simulation-Based Selective-Opening Security and Compact Ciphertexts. 180 - Souvik Sonar, Debapriya Basu Roy, Rajat Subhra Chakraborty, Debdeep Mukhopadhyay:
Side-Channel Watchdog: Run-Time Evaluation of Side-Channel Vulnerability in FPGA-Based Crypto-systems. 182 - Houssem Maghrebi, Victor Servant, Julien Bringer:
There is Wisdom in Harnessing the Strengths of your Enemy: Customized Encoding to Thwart Side-Channel Attacks - Extended Version -. 183 - Jonathan Katz, Alex J. Malozemoff, Xiao Wang:
Efficiently Enforcing Input Validity in Secure Two-party Computation. 184 - Atul Luykx, Bart Preneel, Alan Szepieniec, Kan Yasuda:
On the Influence of Message Length in PMAC's Security Bounds. 185 - Meicheng Liu, Siang Meng Sim:
Lightweight MDS Generalized Circulant Matrices. 186 - Carsten Baum, Emmanuela Orsini, Peter Scholl:
Efficient Secure Multiparty Computation with Identifiable Abort. 187 - Faruk Göloglu, Vincent Rijmen, Qingju Wang:
On the division property of S-boxes. 188 - Vladimir Shpilrain, Bianca Sosnovski:
Compositions of linear functions and applications to hashing. 189 - Atul Luykx, Bart Preneel, Elmar Tischhauser, Kan Yasuda:
A MAC Mode for Lightweight Block Ciphers. 190 - Eike Kiltz, Daniel Masny, Jiaxin Pan:
Optimal Security Proofs for Signatures from Identification Schemes. 191 - Douglas Miller, Adam Scrivener, Jesse Stern, Muthuramakrishnan Venkitasubramaniam:
On Negation Complexity of Injections, Surjections and Collision-Resistance in Cryptography. 192 - Hao Chen, Kristin E. Lauter, Katherine E. Stange:
Vulnerable Galois RLWE Families and Improved Attacks. 193 - Ilan Komargodski, Moni Naor, Eylon Yogev:
How to Share a Secret, Infinitely. 194 - Atsushi Takayasu, Noboru Kunihiro:
How to Generalize RSA Cryptanalyses. 195 - Chris Peikert, Sina Shiehian:
Multi-Key FHE from LWE, Revisited. 196 - Mayuresh Vivekanand Anand, Ehsan Ebrahimi Targhi, Gelo Noel Tabia, Dominique Unruh:
Post-quantum Security of the CBC, CFB, OFB, CTR, and XTS Modes of Operation. 197 - Ko Stoffelen:
Optimizing S-box Implementations for Several Criteria using SAT Solvers. 198 - Andrew Miller, Yu Xia, Kyle Croman, Elaine Shi, Dawn Song:
The Honey Badger of BFT Protocols. 199 - Yilei Chen:
An Alternative View of the Graph-Induced Multilinear Maps. 200 - Nico Döttling, Daniel Kraschewski, Jörn Müller-Quade, Tobias Nilges:
From Stateful Hardware to Resettable Hardware Using Symmetric Assumptions. 201 - Simona Samardjiska, Danilo Gligoroski:
An Encryption Scheme based on Random Split of St-Gen Codes. 202 - Pascal Sasdrich, Amir Moradi, Tim Güneysu:
White-Box Cryptography in the Gray Box - A Hardware Implementation and its Side Channels. 203 - Shay Gueron:
A Memory Encryption Engine Suitable for General Purpose Processors. 204 - Derek Atkins, Dorian Goldfeld:
Addressing the Algebraic Eraser Diffie-Hellman Over-the-Air Protocol. 205 - Johannes Blömer, Gennadij Liske:
Construction of Fully CCA-Secure Predicate Encryptions from Pair Encoding Schemes. 206 - Dibyendu Roy, Sourav Mukhopadhyay:
Fault analysis and weak key-IV attack on Sprout. 207 - Sandro Coretti, Juan A. Garay, Martin Hirt, Vassilis Zikas:
Constant-Round Asynchronous Multi-Party Computation. 208 - Ling Song, Zhangjie Huang, Qianqian Yang:
Automatic Differential Analysis of ARX Block Ciphers with Application to SPECK and LEA. 209 - Boaz Barak:
Hopes, Fears and Software Obfuscation: A Survey. 210 - Sonia Belaïd, Fabrice Benhamouda, Alain Passelègue, Emmanuel Prouff, Adrian Thillard, Damien Vergnaud:
Randomness Complexity of Private Circuits for Multiplication. 211 - Vadim N. Tsypyschev:
Low Linear Complexity Estimates for Coordinate Sequences of Linear Recurrences of Maximal Period over Galois Ring. 212 - Nir Bitansky, Zvika Brakerski, Yael Tauman Kalai, Omer Paneth, Vinod Vaikuntanathan:
3-Message Zero Knowledge Against Human Ignorance. 213 - Pei Luo, Liwei Zhang, Yunsi Fei, A. Adam Ding:
An Improvement of Both Security and Reliability for Keccak Implementations on Smart Card. 214 - Steven D. Galbraith, Shishay W. Gebregiyorgis, Sean Murphy:
Algorithms for the Approximate Common Divisor Problem. 215 - Sumit Kumar Debnath, Ratna Dutta:
Fair mPSI and mPSI-CA: Efficient Constructions in Prime Order Groups with Security in the Standard Model against Malicious Adversary. 216 - Eric R. Verheul:
Practical backward unlinkable revocation in FIDO, German e-ID, Idemix and U-Prove. 217 - Danilo Gligoroski, Simona Samardjiska:
Semantic Security and Key-Privacy With Random Split of St-Gen Codes. 218 - Jörg Schwenk:
Nonce-based Kerberos is a Secure Delegated AKE Protocol. 219 - Paul Kirchner:
Algorithms on Ideal over Complex Multiplication order. 220 - Katriel Cohn-Gordon, Cas Cremers, Luke Garratt:
On Post-Compromise Security. 221 - Paul Kirchner, Pierre-Alain Fouque:
Time-Memory Trade-Off for Lattice Enumeration in a Ball. 222 - Mehmet Sabir Kiraz, Osmanbey Uzunkol:
Still Wrong Use of Pairings in Cryptography. 223 - Yuval Yarom, Daniel Genkin, Nadia Heninger:
CacheBleed: A Timing Attack on OpenSSL Constant Time RSA. 224 - Qian Guo, Thomas Johansson:
A New Birthday-Type Algorithm for Attacking the Fresh Re-Keying Countermeasure. 225 - Zvika Brakerski, Christina Brzuska, Nils Fleischhacker:
On Statistically Secure Obfuscation with Approximate Correctness. 226 - Jean-Michel Cioranesco, Houda Ferradi, Rémi Géraud, David Naccache:
Process Table Covert Channels: Exploitation and Countermeasures. 227 - Serguei Popov:
On a decentralized trustless pseudo-random number generation algorithm. 228 - Reza Azarderakhsh, David Jao, Kassem Kalach, Brian Koziel, Christopher Leonardi:
Key Compression for Isogeny-Based Cryptosystems. 229 - Daniel Genkin, Lev Pachmanov, Itamar Pipman, Eran Tromer, Yuval Yarom:
ECDSA Key Extraction from Mobile Devices via Nonintrusive Physical Side Channels. 230 - Pierre Belgarric, Pierre-Alain Fouque, Gilles Macario-Rat, Mehdi Tibouchi:
Side-Channel Analysis of Weierstrass and Koblitz Curve ECDSA on Android Smartphones. 231 - Sungwook Kim, Jinsu Kim, Dongyoung Koo, Yuna Kim, Hyunsoo Yoon, Jun-Bum Shin:
Efficient Privacy-Preserving Matrix Factorization via Fully Homomorphic Encryption. 232 - Charanjit S. Jutla, Arnab Roy:
Smooth NIZK Arguments with Applications to Asymmetric UC-PAKE. 233 - Raphael Bost, Olivier Sanders:
Trick or Tweak: On the (In)security of OTR's Tweaks. 234 - Takahiro Matsuda, Goichiro Hanaoka:
Trading Plaintext-Awareness for Simulatability to Achieve Chosen Ciphertext Security. 235 - Guoyan Zhang, Meicheng Liu:
A Distinguisher on PRESENT-Like Permutations with Application to SPONGENT. 236 - Shoichi Hirose:
May-Ozerov Algorithm for Nearest-Neighbor Problem over 𝔽q and Its Application to Information Set Decoding. 237 - Ágnes Kiss, Juliane Krämer, Pablo Rauzy, Jean-Pierre Seifert:
Algorithmic Countermeasures Against Fault Attacks and Power Analysis for RSA-CRT. 238 - Wouter Castryck, Ilia Iliashenko, Frederik Vercauteren:
Provably Weak Instances of Ring-LWE Revisited. 239 - Wouter Castryck, Ilia Iliashenko, Frederik Vercauteren:
On the tightness of the error bound in Ring-LWE. 240 - Boris Skoric:
A trivial debiasing scheme for Helper Data Systems. 241 - Yusuke Sakai, Nuttapong Attrapadung, Goichiro Hanaoka:
Attribute-Based Signatures for Circuits from Bilinear Map. 242 - Fuyuki Kitagawa, Takahiro Matsuda, Goichiro Hanaoka, Keisuke Tanaka:
On the Key Dependent Message Security of the Fujisaki-Okamoto Constructions. 243 - Christoph Dobraunig, Maria Eichlseder, Florian Mendel:
Cryptanalysis of Simpira. 244 - Peter Linder:
DEcryption Contract ENforcement Tool (DECENT): A Practical Alternative to Government Decryption Backdoors. 245 - Peder Sparell, Mikael Simovits:
Linguistic Cracking of Passphrases Using Markov Chains. 246 - (Withdrawn) Public Veri able Function Secret Sharing. 247
- Sondre Rønjom:
Invariant subspaces in Simpira. 248 - Amir Moradi, Tobias Schneider:
Improved Side-Channel Analysis Attacks on Xilinx Bitstream Encryption of 5, 6, and 7 Series. 249 - Anamaria Costache, Nigel P. Smart, Srinivas Vivek, Adrian Waller:
Fixed Point Arithmetic in SHE Scheme. 250 - Gilad Asharov, Moni Naor, Gil Segev, Ido Shahaf:
Searchable Symmetric Encryption: Optimal Locality in Linear Space via Two-Dimensional Balanced Allocations. 251 - Sanjam Garg
, Pratyay Mukherjee, Omkant Pandey, Antigoni Polychroniadou:
The Exact Round Complexity of Secure Computation. 252 - Wenjie Xiong, André Schaller, Nikolaos A. Anagnostopoulos, Muhammad Umair Saleem, Sebastian Gabmeyer, Stefan Katzenbeisser, Jakub Szefer:
Practical DRAM PUFs in Commodity Devices. 253 - Pierrick Méaux, Anthony Journault, François-Xavier Standaert, Claude Carlet:
Towards Stream Ciphers for Efficient FHE with Low-Noise Ciphertexts. 254 - Essam Ghadafi:
More Efficient Structure-Preserving Signatures - Or: Bypassing the Type-III Lower Bounds. 255 - Qiumao Ma, Jinsheng Zhang, Wensheng Zhang, Daji Qiao:
SE-ORAM: A Storage-Efficient Oblivious RAM for Privacy-Preserving Access to Cloud Storage. 256 - Huijia Lin:
Indistinguishability Obfuscation from Constant-Degree Graded Encoding Schemes. 257 - Olivier Blazy, Céline Chevalier:
Structure-Preserving Smooth Projective Hashing. 258 - Olivier Blazy, Céline Chevalier, Paul Germouty:
Adaptive Oblivious Transfer and Generalizations. 259 - Jens Groth:
On the Size of Pairing-based Non-interactive Arguments. 260 - Oliver Willers, Christopher Huth, Jorge Guajardo, Helmut Seidel:
MEMS-based Gyroscopes as Physical Unclonable Functions. 261 - Riccardo Longo, Chiara Marcolla, Massimiliano Sala:
Collaborative Multi-Authority KP-ABE for Shorter Keys and Parameters. 262 - Jonathan Bootle, Andrea Cerulli, Pyrros Chaidos, Jens Groth, Christophe Petit:
Efficient Zero-Knowledge Arguments for Arithmetic Circuits in the Discrete Log Setting. 263 - Dahmun Goudarzi, Matthieu Rivain:
How Fast Can Higher-Order Masking Be in Software? 264 - Maura B. Paterson, Douglas R. Stinson, Jalaj Upadhyay:
Multi-prover Proof-of-Retrievability. 265 - Shin-ichi Kawamura, Tomoko Yonemura, Yuichi Komano, Hideo Shimizu:
Exact Error Bound of Cox-Rower Architecture for RNS Arithmetic. 266 - Yonglin Hao:
Improved Meet-in-the-Middle Attacks on Round-Reduced Crypton-256. 267 - Ahmad Boorghany, Siavash Bayat Sarmadi, Rasool Jalili:
Efficient Lattice-based Authenticated Encryption: A Practice-Oriented Provable Security Approach. 268 - Ming Li, Dongdai Lin:
The Adjacency Graphs of Linear Feedback Shift Registers with Primitive-like Characteristic Polynomials. 269 - Miguel Ambrona, Gilles Barthe, Benedikt Schmidt:
Automated Unbounded Analysis of Cryptographic Constructions in the Generic Group Model. 270 - Sébastien Duval, Virginie Lallemand, Yann Rotella:
Cryptanalysis of the FLIP Family of Stream Ciphers. 271 - Yevgeniy Dodis, Shai Halevi, Ron D. Rothblum, Daniel Wichs:
Spooky Encryption and its Applications. 272 - Andrea Visconti, Simone Bossi, Hany Ragab, Alexandro Calò:
On the weaknesses of PBKDF2. 273 - Simone Bossi, Andrea Visconti:
What users should know about Full Disk Encryption based on LUKS. 274 - Bin Zhang, Lin Jiao, Mingsheng Wang:
Faster Algorithms for Solving LPN. 275 - Markku-Juhani O. Saarinen:
Arithmetic Coding and Blinding Countermeasures for Ring-LWE. 276 - Xi Jun Lin, Haipeng Qu, Xiaoshuai Zhang:
Public Key Encryption Supporting Equality Test and Flexible Authorization without Bilinear Pairings. 277 - Xiong Fan, Feng-Hao Liu:
Various Proxy Re-Encryption Schemes from Lattices. 278 - Hamza Abusalah, Georg Fuchsbauer:
Constrained PRFs for Unbounded Inputs with Short Keys. 279 - Pedro Maat C. Massolino, Lejla Batina, Ricardo Chaves, Nele Mentens:
Low Power Montgomery Modular Multiplication on Reconfigurable Systems. 280 - Prabhanjan Ananth, Aayush Jain, Moni Naor, Amit Sahai, Eylon Yogev:
Universal Obfuscation and Witness Encryption: Boosting Correctness and Combining Security. 281 - Oscar Reparaz:
Detecting flawed masking schemes with leakage detection tests. 282 - Gunnar Hartung:
Secure Audit Logs with Verifiable Excerpts. 283 - Mehmet Sinan Inci, Berk Gülmezoglu, Thomas Eisenbarth, Berk Sunar:
Co-location detection on the Cloud. 284 - Yosuke Todo, Masakatu Morii:
Bit-Based Division Property and Application to Simon Family. 285 - Anastasiya Gorodilova:
On a remarkable property of APN Gold functions. 286 - Véronique Cortier, David Galindo, Ralf Küsters, Johannes Müller
, Tomasz Truderung:
Verifiability Notions for E-Voting Protocols. 287 - Sonia Bogos, Serge Vaudenay:
Optimization of LPN Solving Algorithms. 288 - Marc Fischlin, Amir Herzberg, Hod Bin Noon, Haya Schulmann:
Obfuscation Combiners. 289 - Mihir Bellare, Björn Tackmann:
Nonce-Based Cryptography: Retaining Security when Randomness Fails. 290 - Cynthia Dwork, Moni Naor, Guy N. Rothblum:
Spooky Interaction and its Discontents: Compilers for Succinct Two-Message Argument Systems. 291 - Yusuke Naito, Kan Yasuda:
New Bounds for Keyed Sponges with Extendable Output: Independence between Capacity and Message Length. 292 - David Nuñez, Isaac Agudo, Javier López:
A Parametric Family of Attack Models for Proxy Re-Encryption. 293 - Weijia Wang, Yu Yu, Junrong Liu, Zheng Guo, François-Xavier Standaert, Dawu Gu, Sen Xu, Rong Fu:
Evaluation and Improvement of Generic-Emulating DPA Attacks. 294 - Thomas Peyrin:
Collision Attack on GRINDAHL. 295 - Sonia Bogos, Serge Vaudenay:
How to Sequentialize Independent Parallel Attacks? 296 - Liwei Zhang, A. Adam Ding, Yunsi Fei, Pei Luo:
A Unified Metric for Quantifying Information Leakage of Cryptographic Devices under Power Analysis Attacks. 297 - Max Fillinger, Marc Stevens:
Reverse-Engineering of the Cryptanalytic Attack Used in the Flame Super-Malware. 298 - Jérémy Jean, Ivica Nikolic:
Efficient Design Strategies Based on the AES Round Function. 299 - Leon Groot Bruinderink, Andreas Hülsing, Tanja Lange, Yuval Yarom:
Flush, Gauss, and Reload - A Cache Attack on the BLISS Lattice-Based Signature Scheme. 300 - Apoorvaa Deshpande, Venkata Koppula, Brent Waters:
Constrained Pseudorandom Functions for Unconstrained Inputs. 301 - Alain Couvreur, Ayoub Otmani, Jean-Pierre Tillich, Valérie Gauthier-Umaña:
A Polynomial-Time Attack on the BBCRS Scheme. 302 - Yael Tauman Kalai, Guy N. Rothblum, Ron D. Rothblum:
From Obfuscation to the Security of Fiat-Shamir for Proofs. 303 - Yacov Yacobi:
A Fast Attribute Based Encryption. 304 - Jayaprakash Kar:
Certi cateless Aggregate Short Signature Scheme. 305 - Yevgeniy Dodis, Chaya Ganesh, Alexander Golovnev, Ari Juels, Thomas Ristenpart:
A Formal Treatment of Backdoored Pseudorandom Generators. 306 - Marshall Ball
, Dana Dachman-Soled, Mukul Kulkarni, Tal Malkin:
Non-Malleable Codes for Bounded Depth, Bounded Fan-in Circuits. 307 - Rongmao Chen, Yi Mu, Guomin Yang, Willy Susilo, Fuchun Guo:
Strongly Leakage-Resilient Authenticated Key Exchange. 308 - Céline Chevalier, Fabien Laguillaumie, Damien Vergnaud:
Privately Outsourcing Exponentiation to a Single Server: Cryptanalysis and Optimal Constructions. 309 - Qian Guo, Thomas Johansson, Paul Stankovski:
Coded-BKW: Solving LWE Using Lattice Codes. 310 - Bin Zhang, Chao Xu, Willi Meier:
Fast Correlation Attacks over Extension Fields, Large-unit Linear Approximation and Cryptanalysis of SNOW 2.0. 311 - Ivica Nikolic, Yu Sasaki:
Refinements of the k-tree Algorithm for the Generalized Birthday Problem. 312 - Arno Mittelbach, Daniele Venturi:
Fiat-Shamir for Highly Sound Protocols is Instantiable. 313 - Santos Merino Del Pozo, François-Xavier Standaert:
Blind Source Separation from Single Measurements using Singular Spectrum Analysis. 314 - Yarkin Doröz, Berk Sunar:
Flattening NTRU for Evaluation Key Free Homomorphic Encryption. 315 - Mohammad Mahmoody, Ameer Mohammed, Soheil Nematihaji, Rafael Pass, Abhi Shelat:
A Note on Black-Box Complexity of Indistinguishability Obfuscation. 316 - Rishab Goyal, Venkata Koppula, Brent Waters:
Semi-Adaptive Security and Bundling Functionalities Made Generic and Easy. 317 - Jayaprakash Kar, Sagar Naik:
Generic Construction of Certificateless Signcryption Scheme. 318 - Brett Hemenway, Steve Lu, Rafail Ostrovsky, William Welser IV:
High-precision Secure Computation of Satellite Collision Probabilities. 319 - Linus Feiten, Matthias Sauer, Bernd Becker:
On Metrics to Quantify the Inter-Device Uniqueness of PUFs. 320 - Claude Carlet, Emmanuel Prouff, Matthieu Rivain, Thomas Roche:
Algebraic Decomposition for Probing Security. 321 - Ulrich Rührmair:
On the Security of PUF Protocols under Bad PUFs and PUFs-inside-PUFs Attacks. 322 - Chaohui Du, Guoqiang Bai:
A Family of Scalable Polynomial Multiplier Architectures for Ring-LWE Based Cryptosystems. 323 - Eli Ben-Sasson, Alessandro Chiesa, Ariel Gabizon, Michael Riabzev, Nicholas Spooner:
Short Interactive Oracle Proofs with Constant Query Complexity, via Composition and Sumcheck. 324 - Taras Stanko, Fitria Nur Andini, Boris Skoric:
Optimized quantization in Zero Leakage Helper Data Systems. 325 - Christoph Dobraunig, Maria Eichlseder, Florian Mendel:
Square Attack on 7-Round Kiasu-BC. 326 - Le Trieu Phong, Lihua Wang, Yoshinori Aono, Manh Ha Nguyen, Xavier Boyen:
Proxy Re-Encryption Schemes with Key Privacy from LWE. 327 - Jennifer S. Balakrishnan, Sorina Ionica, Kristin E. Lauter, Christelle Vincent:
Constructing genus 3 hyperelliptic Jacobians with CM. 328 - Emmanuel Thomé:
A modified block Lanczos algorithm with fewer vectors. 329 - Michael Hutter, Jürgen Schilling, Peter Schwabe, Wolfgang Wieser:
NaCl's Crypto_Box in Hardware. 330 - Fatih Tiryakioglu, Mehmet Sabir Kiraz, Fatih Birinci, Mehmet Karahan:
TRVote: A New, Trustworthy and Robust Electronic Voting System. 331 - Rafael Pass, Abhi Shelat:
Micropayments for Decentralized Currencies. 332 - Ling Ren, Srinivas Devadas:
Proof of Space from Stacked Bipartite Graphs. 333 - Jung Hee Cheon, Duhyeong Kim:
Probability that the k-gcd of products of positive integers is B-smooth. 334 - Chunming Tang, Can Xiang, Yanfeng Qi, Keqin Feng:
Complete characterization of generalized bent and 2^k-bent Boolean functions. 335 - Margarita Osadchy, Julio C. Hernandez-Castro, Stuart J. Gibson, Orr Dunkelman, Daniel Pérez-Cabo:
No Bot Expects the DeepCAPTCHA! Introducing Immutable Adversarial Examples with Applications to CAPTCHA. 336 - Martin Gábris, Martin Stanek:
State recovery of RC4 and Spritz Revisited. 337 - Siwei Sun, Lei Hu, Peng Wang, Meiqin Wang, Danping Shi, Xiaoshuang Ma, Qianqian Yang, Kai Fu:
Mixed Integer Programming Models for Finite Automaton and Its Application to Additive Differential Patterns of Exclusive-Or. 338 - Zvika Brakerski, Renen Perlman:
Lattice-Based Fully Dynamic Multi-Key FHE with Short Ciphertexts. 339 - Eshan Chattopadhyay, Vipul Goyal, Xin Li:
Non-Malleable Extractors and Codes, with their Many Tampered Extensions. 340 - Adam L. Young, Moti Yung:
Semantically Secure Anonymity: Foundations of Re-encryption. 341 - Felix Heuer, Tibor Jager, Eike Kiltz, Sven Schäge:
On the Selective Opening Security of Practical Public-Key Encryption Schemes. 342 - Eric Miles, Emanuele Viola:
On the complexity of constructing pseudorandom functions (especially when they don't exist). 343 - HeeWon Chung, Myungsun Kim:
Encoding Rational Numbers for FHE-based Applications. 344 - Satsuya Ohata, Takahiro Matsuda, Kanta Matsuura:
Provably Secure Password Reset Protocol: Model, Definition, and Generic Construction. 345 - (Withdrawn) New Framework for Secure Server-Designation Public Key Encryption with Keyword Search. 346
- Payal Chaudhari, Manik Lal Das:
Cryptanalysis of Searchable Anonymous Attribute Based Encryption. 347 - Oriol Farràs, Sebastià Martín Molleví, Carles Padró:
A Note on Non-Perfect Secret Sharing. 348 - Patrick Derbez
:
Note on Impossible Differential Attacks. 349 - Ran Cohen, Sandro Coretti, Juan A. Garay, Vassilis Zikas:
Probabilistic Termination and Composability of Cryptographic Protocols. 350 - Chris Peikert:
How (Not) to Instantiate Ring-LWE. 351 - Pascal Sasdrich, Tim Güneysu:
Closing the Gap in RFC 7748: Implementing Curve448 in Hardware. 352 - Atsushi Takayasu, Noboru Kunihiro:
General Bounds for Small Inverse Problems and Its Applications to Multi-Prime RSA. 353 - Suvradip Chakraborty, Srinivasan Raghuraman, C. Pandu Rangan:
A Pairing-Free, One Round Identity Based Authenticated Key Exchange Protocol Secure Against Memory-Scrapers. 354 - Vahid Aminghafari, Honggang Hu:
Fruit: ultra-lightweight stream cipher with shorter internal state. 355 - Somindu C. Ramanna:
More Efficient Constructions for Inner-Product Encryption. 356 - David A. McGrew, Panos Kampanakis, Scott R. Fluhrer, Stefan-Lukas Gazdag, Denis Butin, Johannes Buchmann:
State Management for Hash Based Signatures. 357 - Ari Juels, Ahmed E. Kosba, Elaine Shi:
The Ring of Gyges: Investigating the Future of Criminal Smart Contracts. 358 - Nicolas Bruneau, Sylvain Guilley, Annelie Heuser, Damien Marion
, Olivier Rioul:
Less is More - Dimensionality Reduction from a Theoretical Perspective. 359 - Sanjit Chatterjee, Neal Koblitz, Alfred Menezes, Palash Sarkar:
Another Look at Tightness II: Practical Issues in Cryptography. 360 - Shweta Agrawal, Alon Rosen:
Online-Offline Functional Encryption for Bounded Collusions. 361 - Lalitha Kiran Nemana, V. Ch. Venkaiah:
An Empirical Study towards Refining the AKS Primality Testing Algorithm. 362 - Houda Ferradi, Rémi Géraud, Diana Maimut, David Naccache, David Pointcheval:
Legally Fair Contract Signing Without Keystones. 363 - (Withdrawn) Cryptographic Analysis of the 3GPP AKA Protocol. 364
- Masahiro Ishii, Jérémie Detrey, Pierrick Gaudry, Atsuo Inomata, Kazutoshi Fujikawa:
Fast Modular Arithmetic on the Kalray MPPA-256 Processor for an Energy-Efficient Implementation of ECM. 365 - Joost Renes, Peter Schwabe, Benjamin Smith, Lejla Batina:
\(\mu\)Kummer: efficient hyperelliptic signatures and key exchange on microcontrollers. 366 - Falko Strenzke:
An Analysis of OpenSSL's Random Number Generator. 367 - Jonathan Bootle, Andrea Cerulli, Pyrros Chaidos, Essam Ghadafi, Jens Groth:
Foundations of Fully Dynamic Group Signatures. 368 - Ronald Cramer, Chaoping Xing, Chen Yuan:
On Multi-Point Local Decoding of Reed-Muller Codes. 369 - Cécile Pierrot, Benjamin Wesolowski:
Malleability of the blockchain's entropy. 370 - Stéphanie Alt, Pierre-Alain Fouque, Gilles Macario-Rat, Benjamin Richard, Cristina Onete
:
A Cryptographic Analysis of UMTS/LTE AKA. 371 - Mihir Bellare, Georg Fuchsbauer, Alessandra Scafuro:
NIZKs with an Untrusted CRS: Security in the Face of Parameter Subversion. 372 - Dennis Hofheinz:
Adaptive partitioning. 373 - Christoph Dobraunig, Maria Eichlseder, Florian Mendel:
Analysis of SHA-512/224 and SHA-512/256. 374 - Alon Rosen, Gil Segev, Ido Shahaf:
Can PPAD Hardness be Based on Standard Cryptographic Assumptions? 375 - Stephen Checkoway, Shaanan Cohney, Christina Garman, Matthew Green, Nadia Heninger, Jacob Maskiewicz, Eric Rescorla, Hovav Shacham, Ralf-Philipp Weinmann:
A Systematic Analysis of the Juniper Dual EC Incident. 376 - Arka Rai Choudhuri, Subhamoy Maitra:
Differential Cryptanalysis of Salsa and ChaCha - An Evaluation with a Hybrid Model. 377 - Delaram Kahrobaei, Vladimir Shpilrain:
Using semidirect product of (semi)groups in public key cryptography. 378 - Jean Lancrenon, Marjan Skrobot, Qiang Tang
:
Two More Efficient Variants of the J-PAKE Protocol. 379 - Elena Kirshanova, Alexander May, Friedrich Wiemer:
Parallel Implementation of BDD enumeration for LWE. 380 - Florian Bourse, Rafaël Del Pino, Michele Minelli, Hoeteck Wee:
FHE Circuit Privacy Almost For Free. 381 - Daniel J. Bernstein, Susanne Engels, Tanja Lange, Ruben Niederhagen, Christof Paar, Peter Schwabe, Ralf Zimmermann:
Faster discrete logarithms on FPGAs. 382 - Dung Hoang Duong, Albrecht Petzoldt, Tsuyoshi Takagi:
Reducing the Key Size of the SRP Encryption Scheme - Extended version. 383 - Anne Canteaut, Yann Rotella:
Attacks against Filter Generators Exploiting Monomial Mappings. 384 - Guillaume Bonnoron, Caroline Fontaine:
A note on Ring-LWE security in the case of Fully Homomorphic Encryption. 385 - Vladimir Rozic, Bohan Yang, Nele Mentens, Ingrid Verbauwhede:
Canary Numbers: Design for Light-weight Online Testability of True Random Number Generators. 386 - Karim Baghery, Behzad Abdolmaleki, Mohammad Javad Emadi:
Game-Based Cryptanalysis of a Lightweight CRC-Based Authentication Protocol for EPC Tags. 387 - Mojahed Mohamed, Xiaofen Wang, Xiaosong Zhang:
Tightly-Secure Authenticated Key Exchange without NAXOS' approach based on Decision Linear Problem. 388 - Georg Fuchsbauer, Zahra Jafargholi, Krzysztof Pietrzak:
A Quasipolynomial Reduction for Generalized Selective Decryption on Trees. 389 - Sanjam Garg
, Pratyay Mukherjee, Akshayaram Srinivasan:
Obfuscation without the Vulnerabilities of Multilinear Maps. 390 - Danilo Gligoroski, Simona Samardjiska:
A Digital Signature Scheme Based on Random Split of St-Gen Codes. 391 - (Withdrawn) Towards a Further Understanding of Bit-Based Division Property. 392
- Ming Li, Dongdai Lin:
Adjacency Graphs, Irreducible Polynomials and Cyclotomy. 393 - Benoît Cogliati, Yannick Seurin:
Strengthening the Known-Key Security Notion for Block Ciphers. 394 - Christian Forler, Eik List, Stefan Lucks, Jakob Wenzel:
Efficient Beyond-Birthday-Bound-Secure Deterministic Authenticated Encryption with Minimal Stretch. 395 - Jérémy Jean:
Cryptanalysis of Haraka. 396 - Ronald Cramer, Ivan Damgård, Nico Döttling, Irene Giacomelli, Chaoping Xing:
Linear-Time Non-Malleable Codes in the Bit-Wise Independent Tampering Model. 397 - Léo Perrin, Aleksei Udovenko:
Algebraic Insights into the Secret Feistel Network (Full version). 398 - Houda Ferradi, Rémi Géraud, David Naccache:
Slow Motion Zero Knowledge Identifying With Colliding Commitments. 399 - Sunoo Park, Ronald L. Rivest:
Towards Secure Quadratic Voting. 400 - Palash Sarkar, Shashank Singh:
Tower Number Field Sieve Variant of a Recent Polynomial Selection Method. 401 - Seiko Arita, Shota Nakasato:
Fully Homomorphic Encryption for Point Numbers. 402 - Sanjit Chatterjee, Alfred Menezes, Francisco Rodríguez-Henríquez:
On Implementing Pairing-Based Protocols with Elliptic Curves of Embedding Degree One. 403 - Subhabrata Samajder, Palash Sarkar:
A New Test Statistic for Key Recovery Attacks Using Multiple Linear Approximations. 404 - Subhabrata Samajder, Palash Sarkar:
Multiple Differential Cryptanalysis: A Rigorous Analysis. 405 - Yongqiang Li, Mingsheng Wang:
On the Construction of Lightweight Circulant Involutory MDS Matrices. 406 - Kai Fu, Meiqin Wang, Yinghua Guo, Siwei Sun, Lei Hu:
MILP-Based Automatic Search Algorithms for Diff erential and Linear Trails for Speck. 407 - Patrick McCorry, Malte Möser, Siamak Fayyaz Shahandashti, Feng Hao:
Towards Bitcoin Payment Networks. 408 - Alex Biryukov, Vesselin Velichkov, Yann Le Corre:
Automatic Search for the Best Trails in ARX: Application to Block Cipher \textsc{Speck}. 409 - Óscar García-Morchón, Ronald Rietman, Ludo Tolhuizen, Jose Luis Torre-Arce, Sauvik Bhattacharya, Maarten P. Bodlaender:
Efficient quantum-resistant trust Infrastructure based on HIMMO. 410 - Eric R. Verheul, Bart Jacobs, Carlo Meijer, Mireille Hildebrandt, Joeri de Ruiter:
Polymorphic Encryption and Pseudonymisation for Personalised Healthcare. 411 - Chen-Mou Cheng, Tung Chou, Ruben Niederhagen, Bo-Yin Yang:
Solving Quadratic Equations with XL on Parallel Architectures - extended version. 412 - Craig Costello, Patrick Longa, Michael Naehrig:
Efficient algorithms for supersingular isogeny Diffie-Hellman. 413 - Li Lin, Wenling Wu, Yafei Zheng:
Automatic Search for Key-Bridging Technique: Applications to LBlock and TWINE (Full Version). 414 - Nina Bindel, Johannes Buchmann, Juliane Krämer:
Lattice-Based Signature Schemes and their Sensitivity to Fault Attacks. 415 - Rémi Bazin, Alexander Schaub, Omar Hasan, Lionel Brunie:
A Decentralized Anonymity-Preserving Reputation System with Constant-time Score Retrieval. 416 - Lisa Kohl:
New Tools for Multi-Party Computation. 417 - Zvika Brakerski, Or Dagmi:
Shorter Circuit Obfuscation in Challenging Security Models. 418 - Yi Lu, Yvo Desmedt:
Walsh-Hadamard Transform and Cryptographic Applications in Bias Computing. 419 - Santos Merino Del Pozo, François-Xavier Standaert:
A note on the security of threshold implementations with d+1 input shares. 420 - Jung Hee Cheon, Andrey Kim, Miran Kim, Yong Soo Song:
Floating-Point Homomorphic Encryption. 421 - Sumanta Sarkar, Siang Meng Sim:
A deeper understanding of the XOR count distribution in the context of lightweight cryptography. 422 - Pooya Farshim, Arno Mittelbach:
Modeling Random Oracles under Unpredictable Queries. 423 - Gorjan Alagic, Anne Broadbent, Bill Fefferman, Tommaso Gagliardoni, Christian Schaffner, Michael St. Jules:
Computational Security of Quantum Encryption. 424 - Michel Abdalla, Mariana Raykova, Hoeteck Wee:
Multi-Input Inner-Product Functional Encryption from Pairings. 425 - Fahad Shaon, Murat Kantarcioglu:
A Practical Framework for Executing Complex Queries over Encrypted Multimedia Data. 426 - Varsha Bhat Kukkala, Jaspal Singh Saini, S. R. S. Iyengar:
Network Deprived SNA : An Alternative To Anonymization. 427 - Phuong Ha Nguyen, Durga Prasad Sahoo:
An Efficient and Scalable Modeling Attack on Lightweight Secure Physically Unclonable Function. 428 - Boris Ryabko:
Information-Theoretical Analysis of Two Shannon's Ciphers. 429 - Jian Liu, Lusheng Chen, Sihem Mesnager:
Partially homomorphic encryption schemes over finite fields. 430 - David Bernhard, Oksana Kulyk, Melanie Volkamer:
Security Proofs for Participation Privacy and Stronger Veri ability for Helios. 431 - Kwangsu Lee, Dong Hoon Lee:
Two-Input Functional Encryption for Inner Products from Bilinear Maps. 432 - Guillaume Scerri, Ryan Stanley-Oakes:
Analysis of Key Wrapping APIs: Generic Policies, Computational Security. 433 - Cong Chen, Mohammad Farmani, Thomas Eisenbarth:
A Tale of Two Shares: Why Two-Share Threshold Implementation Seems Worthwhile-and Why it is Not. 434 - Rafaël Del Pino, Vadim Lyubashevsky, David Pointcheval:
The Whole is Less than the Sum of its Parts: Constructing More Efficient Lattice-Based AKEs. 435 - Nasour Bagheri, Tao Huang, Keting Jia, Florian Mendel, Yu Sasaki:
Cryptanalysis of Reduced NORX. 436 - Sonia Bogos, Serge Vaudenay:
Observations on the LPN Solving Algorithm from Eurocrypt'16. 437 - Ralf Küsters, Johannes Müller
, Enrico Scapin, Tomasz Truderung:
sElect: A Lightweight Verifiable Remote Voting System. 438 - Hao Chen:
A Measure Version of Gaussian Heuristic. 439 - Sam Kim, Kevin Lewi, Avradip Mandal, Hart William Montgomery, Arnab Roy, David J. Wu:
Function-Hiding Inner Product Encryption is Practical. 440 - Durga Prasad Sahoo, Sikhar Patranabis, Debdeep Mukhopadhyay, Rajat Subhra Chakraborty:
Fault Tolerant Implementations of Delay-based Physically Unclonable Functions on FPGA. 441 - Franziskus Kiefer, Mark Manulis:
Blind Password Registration for Verifier-based PAKE. 442 - Simon Cogliani, Houda Ferradi, Rémi Géraud, David Naccache:
Thrifty Zero-Knowledge - When Linear Programming Meets Cryptography. 443 - Roberto Avanzi:
The QARMA Block Cipher Family - Almost MDS Matrices Over Rings With Zero Divisors, Nearly Symmetric Even-Mansour Constructions With Non-Involutory Central Rounds, and Search Heuristics for Low-Latency S-Boxes. 444 - Alhassan Khedr, P. Glenn Gulak:
SecureMed: Secure Medical Computation using GPU-Accelerated Homomorphic Encryption Scheme. 445 - (Withdrawn) Quantum key distribution with combined conjugate coding and information overloading. 446
- Peter Hyun-Jeen Lee, Siamak Fayyaz Shahandashti:
Theoretical Attacks on E2E Voting Systems. 447 - Zhengjun Cao, Lihua Liu:
A Note on "Outsourcing Large Matrix Inversion Computation to a Public Cloud". 448 - Thomas Espitau, Pierre-Alain Fouque, Benoît Gérard, Mehdi Tibouchi:
Loop abort Faults on Lattice-Based Fiat-Shamir & Hash'n Sign signatures. 449 - Maryam Rajabzadeh Asaar, Mahmoud Salmasizadeh, Mohammad Reza Aref:
A Provably Secure Code-based Concurrent Signature Scheme. 450 - Waclaw Banasik, Stefan Dziembowski
, Daniel Malinowski:
Efficient Zero-Knowledge Contingent Payments in Cryptocurrencies Without Scripts. 451 - Benjamin Dowling, Felix Günther, Udyani Herath, Douglas Stebila:
Secure Logging Schemes and Certificate Transparency. 452 - Seny Kamara, Tarik Moataz:
SQL on Structurally-Encrypted Databases. 453 - Rafael Pass, Lior Seeman, Abhi Shelat:
Analysis of the Blockchain Protocol in Asynchronous Networks. 454 - Linus Feiten, Matthias Sauer:
Extracting the RC4 secret key of the Open Smart Grid Protocol. 455 - Yuval Ishai, Eyal Kushilevitz, Manoj Prabhakaran, Amit Sahai, Ching-Hua Yu:
Secure Protocol Transformations. 456 - Wei Yuan:
Dynamic Policy Update for Ciphertext-Policy Attribute-Based Encryption. 457 - Adam Groce, Alex Ledger, Alex J. Malozemoff, Arkady Yerukhimovich:
CompGC: Efficient Offline/Online Semi-honest Two-party Computation. 458 - Zvika Brakerski, Justin Holmgren
, Yael Tauman Kalai:
Non-Interactive RAM and Batch NP Delegation from any PIR. 459 - Kwangsu Lee, Seunghwan Park:
Revocable Hierarchical Identity-Based Encryption with Shorter Private Keys and Update Keys. 460 - Daniel J. Bernstein, Chitchanok Chuengsatiansup, Tanja Lange, Christine van Vredendaal:
NTRU Prime. 461 - Masahiro Yagisawa:
Fully Homomorphic Encryption with Isotropic Elements. 462 - Reza Reyhanitabar, Serge Vaudenay, Damian Vizár:
Authenticated Encryption with Variable Stretch. 463 - Kyle Soska, Albert Kwon, Nicolas Christin, Srinivas Devadas:
Beaver: A Decentralized Anonymous Marketplace with Secure Reputation. 464 - Subhabrata Samajder, Palash Sarkar:
Can Large Deviation Theory be Used for Estimating Data Complexity? 465 - Ania M. Piotrowska, Jamie Hayes, Nethanel Gelernter, George Danezis, Amir Herzberg:
AnoNotify: A Private Notification Service. 466 - Shay Gueron, Fabian Schlieker:
Speeding up R-LWE post-quantum key exchange. 467 - Maciej A. Czyzewski:
Chaos Machine: Different Approach to the Application and Significance of Numbers. 468 - Andrew Egbert, Brad Chun, Thomas Otte:
Identity Chains. 469 - Myungsun Kim, Hyung Tae Lee, San Ling, Shu Qin Ren, Benjamin Hong Meng Tan, Huaxiong Wang:
Better Security for Queries on Encrypted Databases. 470 - Wei Dai, John M. Schanck, Berk Sunar, William Whyte, Zhenfei Zhang:
NTRU Modular Lattice Signature Scheme on CUDA GPUs. 471 - Loubna Ghammam, Emmanuel Fouotsa:
Adequate Elliptic Curve for Computing the Product of n Pairings. 472 - Thomas Unterluggauer, Stefan Mangard:
Exploiting the Physical Disparity: Side-Channel Attacks on Memory Encryption. 473 - Gideon Samid:
T-Proof: Secure Communication via Non-Algorithmic Randomization. 474 - Hanno Böck, Aaron Zauner, Sean Devlin, Juraj Somorovsky, Philipp Jovanovic:
Nonce-Disrespecting Adversaries: Practical Forgery Attacks on GCM in TLS. 475 - Keita Xagawa:
Groth-Sahai Proofs Revisited Again: A Bug in "Optimized" Randomization. 476 - Kazuma Ohara, Keita Emura, Goichiro Hanaoka, Ai Ishida, Kazuo Ohta, Yusuke Sakai:
Shortening the Libert-Peters-Yung Revocable Group Signature Scheme by Using the Random Oracle Methodology. 477 - Erman Ayday, Qiang Tang
, Arif Yilmaz:
Cryptographic Solutions for Credibility and Liability Issues of Genomic Data. 478 - Jakub Szefer:
Survey of Microarchitectural Side and Covert Channels, Attacks, and Defenses. 479 - Pierre-Alain Fouque, Cristina Onete
, Benjamin Richard:
Achieving Better Privacy for the 3GPP AKA Protocol. 480 - Amir Moradi, Tobias Schneider:
Side-Channel Analysis Protection and Low-Latency in Action - case study of PRINCE and Midori. 481 - Shashank Agrawal, David J. Wu:
Functional Encryption: Deterministic to Randomized Functions from Simple Assumptions. 482 - Hiroaki Anada, Seiko Arita, Kouichi Sakurai:
Proof of Knowledge on Monotone Predicates and its Application to Attribute-Based Identifications and Signatures. 483 - Jung Hee Cheon, HeeWon Chung, Myungsun Kim, Kang-Won Lee:
Ghostshell: Secure Biometric Authentication using Integrity-based Homomorphic Evaluations. 484 - Palash Sarkar, Shashank Singh:
A General Polynomial Selection Method and New Asymptotic Complexities for the Tower Number Field Sieve Algorithm. 485 - Hannes Groß, Stefan Mangard, Thomas Korak:
Domain-Oriented Masking: Compact Masked Hardware Implementations with Arbitrary Protection Order. 486 - Amine Mrabet, Nadia El Mrabet, Ronan Lashermes, Jean-Baptiste Rigaud, Belgacem Bouallegue, Sihem Mesnager, Mohsen Machhout:
A Systolic Hardware Architectures of Montgomery Modular Multiplication for Public Key Cryptosystems. 487 - Husen Wang, Qiang Tang
:
Methods for Efficient Homomorphic Integer Polynomial Evaluation based on GSW FHE. 488 - Nethanel Gelernter, Amir Herzberg, Hemi Leibowitz:
Two Cents for Strong Anonymity: The Anonymous Post-office Protocol. 489 - Cihangir Tezcan:
Truncated, Impossible, and Improbable Differential Analysis of Ascon. 490 - Daniel P. Martin, Luke Mather, Elisabeth Oswald, Martijn Stam:
Characterisation and Estimation of the Key Rank Distribution in the Context of Side Channel Evaluations. 491 - Martin R. Albrecht, Lorenzo Grassi, Christian Rechberger, Arnab Roy, Tyge Tiessen:
MiMC: Efficient Encryption and Cryptographic Hashing with Minimal Multiplicative Complexity. 492 - Arnaud Bannier, Nicolas Bodin, Eric Filiol:
Partition-Based Trapdoor Ciphers. 493 - Bo Yang, Kang Yang, Zhenfeng Zhang, Yu Qin, Dengguo Feng:
AEP-M: Practical Anonymous E-Payment for Mobile Devices using ARM TrustZone and Divisible E-Cash (Full Version). 494 - Jesper Buus Nielsen, Claudio Orlandi:
Cross&Clean: Amortized Garbled Circuits with Constant Overhead. 495 - Daniel Kraschewski, Dakshita Khurana, Hemanta K. Maji, Manoj Prabhakaran, Amit Sahai:
All Complete Functionalities are Reversible. 496 - Dakshita Khurana, Hemanta K. Maji, Amit Sahai:
Secure Computation from Elastic Noisy Channels. 497 - Xavier Boyen, Qinyi Li:
Towards Tightly Secure Short Signature and IBE. 498 - Gideon Samid:
Drone Targeted Cryptography. 499 - Jong Hwan Park, Kwangsu Lee, Dong Hoon Lee:
Efficient Identity-Based Encryption and Public-Key Signature from Trapdoor Subgroups. 500 - Libo He, Chen Yuan, Hu Xiong, Zhiguang Qin:
Certificateless Key Insulated Encryption: Cryptographic Primitive for Achieving Key-escrow free and Key-exposure Resilience. 501 - Christina Boura, Avik Chakraborti, Gaëtan Leurent, Goutam Paul, Dhiman Saha, Hadi Soleimany, Valentin Suder:
Key Recovery Attack against 2.5-round pi-Cipher. 502 - Rachid El Bansarkhani, Mohamed Saied Emam Mohamed, Albrecht Petzoldt:
MQSAS - A Multivariate Sequential Aggregate Signature Scheme. 503 - Patrick Longa, Michael Naehrig:
Speeding up the Number Theoretic Transform for Faster Ideal Lattice-Based Cryptography. 504 - Marcel Keller, Emmanuela Orsini, Peter Scholl:
MASCOT: Faster Malicious Arithmetic Secure Computation with Oblivious Transfer. 505 - Ioana-Cristina Panait, Cristian Pop, Alexandru Sirbu, Adelina Vidovici, Emil Simion:
TOR - Didactic pluggable transport. 506 - Aurore Guillevic, François Morain, Emmanuel Thomé:
Solving discrete logarithms on a 170-bit MNT curve by pairing reduction. 507 - Dominique Unruh:
Collapse-binding quantum commitments without random oracles. 508 - Xiaoyang Dong, Xiaoyun Wang:
Chosen-Key Distinguishers on 12-Round Feistel-SP and 11-Round Collision Attacks on Its Hashing Modes. 509 - Jean-Claude Bajard, Julien Eynard, M. Anwar Hasan, Vincent Zucca:
A Full RNS Variant of FV like Somewhat Homomorphic Encryption Schemes. 510 - Ran Canetti, Oxana Poburinnaya, Mariana Raykova:
Optimal-Rate Non-Committing Encryption in a CRS Model. 511 - Lucjan Hanzlik, Kamil Kluczniak:
Security Analysis of ePrint Report 2016/500 "Efficient Identity-Based Encryption and Public-Key Signature from Trapdoor Subgroups". 512 - Michael Tunstall, Gilbert Goodwill:
Applying TVLA to Public Key Cryptographic Algorithms. 513 - Yu Yu, Jiang Zhang:
Cryptography with Auxiliary Input and Trapdoor from Constant-Noise LPN. 514 - Mihai Barbulescu, Adrian Stratulat, Vlad Traista-Popescu, Emil Simion:
RSA Weak Public Keys available on the Internet. 515 - Ferucio Laurentiu Tiplea, George Teseleanu, Sorin Iftene, Anca-Maria Nica:
Boneh-Gentry-Hamburg's Identity-based Encryption Schemes Revisited. 516 - David McCann, Carolyn Whitnall, Elisabeth Oswald:
ELMO: Emulating Leaks for the ARM Cortex-M0 without Access to a Side Channel Lab. 517 - Vladimir Kolesnikov, Hugo Krawczyk, Yehuda Lindell, Alex J. Malozemoff, Tal Rabin:
Attribute-based Key Exchange with General Policies. 518 - Benny Applebaum, Pavel Raykov:
On the Relationship between Statistical Zero-Knowledge and Statistical Randomized Encodings. 519 - Franziskus Kiefer, Mark Manulis:
Universally Composable Two-Server PAKE. 520 - Frédéric Lafitte, Liran Lerman, Olivier Markowitch, Dirk Van Heule:
SAT-based cryptanalysis of ACORN. 521 - Daisuke Fujimoto, Shivam Bhasin, Makoto Nagata, Jean-Luc Danger:
A Novel Methodology for Testing Hardware Security and Trust Exploiting On-Chip Power Noise Measurements (Extended Version). 522 - Jiang Zhang, Yu Chen, Zhenfeng Zhang:
Programmable Hash Functions from Lattices: Short Signatures and IBEs with Small Key Sizes. 523 - Sanjam Garg
, Akshayaram Srinivasan:
Unifying Security Notions of Functional Encryption. 524 - Benoît Cogliati, Yannick Seurin:
EWCDM: An Efficient, Beyond-Birthday Secure, Nonce-Misuse Resistant MAC. 525 - Jinhyuck Jeong, Taechan Kim:
Extended Tower Number Field Sieve with Application to Finite Fields of Arbitrary Composite Extension Degree. 526 - Giuseppe Ateniese, Aggelos Kiayias, Bernardo Magri, Yiannis Tselekounis, Daniele Venturi:
Secure Outsourcing of Circuit Manufacturing. 527 - Thomas Espitau, Antoine Joux:
Adaptive precision LLL and Potential-LLL reductions with Interval arithmetic. 528 - Antonio Faonio
, Daniele Venturi:
Efficient Public-Key Cryptography with Bounded Leakage and Tamper Resilience. 529 - Alexander Russell, Qiang Tang, Moti Yung, Hong-Sheng Zhou:
Destroying Steganography via Amalgamation: Kleptographically CPA Secure Public Key Encryption. 530 - Alexandre Gélin, Antoine Joux:
Reducing number field defining polynomials: An application to class group computations. 531 - Tomer Ashur, Achiya Bar-On, Orr Dunkelman:
Cryptanalysis of GOST2. 532 - Bing Sun, Meicheng Liu, Jian Guo, Longjiang Qu, Vincent Rijmen:
New Insights on AES-like SPN Ciphers. 533 - Tomer Ashur, Bart Mennink:
Damaging, Simplifying, and Salvaging p-OMD. 534 - (Withdrawn) Impossible Differential Cryptanalysis of Midori. 535
- Joshua Brody, Stefan Dziembowski
, Sebastian Faust, Krzysztof Pietrzak:
Position-Based Cryptography and Multiparty Communication Complexity. 536 - Palash Sarkar, Shashank Singh:
A Generalisation of the Conjugation Method for Polynomial Selection for the Extended Tower Number Field Sieve Algorithm. 537 - Carsten Baum, Ivan Damgård, Kasper Green Larsen, Michael Nielsen:
How to prove knowledge of small secrets. 538 - Léo Perrin, Aleksei Udovenko, Alex Biryukov:
Cryptanalysis of a Theorem: Decomposing the Only Known Solution to the Big APN Problem (Full Version). 539 - Alberto Battistello, Jean-Sébastien Coron, Emmanuel Prouff, Rina Zeitoun:
Horizontal Side-Channel Attacks and Countermeasures on the ISW Masking Scheme. 540 - Mihir Bellare, Daniel Kane, Phillip Rogaway:
Big-Key Symmetric Encryption: Resisting Key Exfiltration. 541 - Lorenzo Grassi, Christian Rechberger, Dragos Rotaru, Peter Scholl, Nigel P. Smart:
MPC-Friendly Symmetric Key Primitives. 542 - Adam J. Aviv, Seung Geol Choi, Travis Mayberry, Daniel S. Roche:
ObliviSync: Practical Oblivious File Backup and Synchronization. 543 - Geoffroy Couteau:
Efficient Secure Comparison Protocols. 544 - Aggelos Kiayias, Giorgos Panagiotakos:
On Trees, Chains and Fast Transactions in the Blockchain. 545 - Lucas Schabhüser, Denise Demirel, Johannes Buchmann:
An Unconditionally Hiding Auditing Procedure for Multi-Party Computations. 546 - Markus Kammerstetter, Markus Muellner, Daniel Burian, Christian Kudera, Wolfgang Kastner:
Efficient High-Speed WPA2 Brute Force Attacks using Scalable Low-Cost FPGA Clustering. 547 - Brent Carmer, Mike Rosulek:
Linicrypt: A Model for Practical Cryptography. 548 - Xiong Fan, Juan A. Garay, Payman Mohassel:
Short and Adjustable Signatures. 549 - Andrew D. Zonenberg, Bülent Yener:
Antikernel: A Decentralized Secure Hardware-Software Operating System Architecture. 550 - Jean-Sébastien Coron, Rina Zeitoun:
Improved Factorization of N=prqs. 551 - Jintai Ding, Saed Alsayigh, Jean Lancrenon, Saraswathy RV, Michael Snook:
Provably Secure Password Authenticated Key Exchange Based on RLWE for the Post-QuantumWorld. 552 - (Withdrawn) Storage Efficient Substring Searchable Symmetric Encryption. 553
- Christina Boura, Anne Canteaut:
Another view of the division property. 554 - Arthur Gervais, Ghassan O. Karame, Karl Wüst, Vasileios Glykantzis, Hubert Ritzdorf, Srdjan Capkun:
On the Security and Performance of Proof of Work Blockchains. 555 - Martin Hirt, Ueli Maurer, Daniel Tschudi, Vassilis Zikas:
Network-Hiding Communication and Applications to Multi-Party Protocols. 556 - Dahmun Goudarzi, Matthieu Rivain:
On the Multiplicative Complexity of Boolean Functions and Bitsliced Higher-Order Masking. 557 - Nir Bitansky, Ryo Nishimaki, Alain Passelègue, Daniel Wichs:
From Cryptomania to Obfustopia through Secret-Key Functional Encryption. 558 - Yfke Dulek, Christian Schaffner, Florian Speelman:
Quantum homomorphic encryption for polynomial-sized circuits. 559 - Itai Dinur, Orr Dunkelman, Nathan Keller, Adi Shamir:
Memory-Efficient Algorithms for Finding Needles in Haystacks. 560 - Baiyu Li, Daniele Micciancio:
Compactness vs Collusion Resistance in Functional Encryption. 561 - Daniel Apon, Xiong Fan, Feng-Hao Liu:
Deniable Attribute Based Encryption for Branching Programs from LWE. 562 - Carmen Kempka, Ryo Kikuchi, Susumu Kiyoshima, Koutarou Suzuki:
Garbling Scheme for Formulas with Constant Size of Garbled Gates. 563 - Mihir Bellare, Björn Tackmann:
The Multi-User Security of Authenticated Encryption: AES-GCM in TLS 1.3. 564 - Andrej Bogdanov, Yuval Ishai, Emanuele Viola, Christopher Williamson:
Bounded Indistinguishability and the Complexity of Recovering Secrets. 565 - Michele Ciampi, Rafail Ostrovsky, Luisa Siniscalchi, Ivan Visconti:
Concurrent Non-Malleable Commitments (and More) in 3 Rounds. 566 - Takashi Yamakawa, Shota Yamada, Goichiro Hanaoka, Noboru Kunihiro:
Adversary-dependent Lossy Trapdoor Function from Hardness of Factoring Semi-smooth RSA Subgroup Moduli. 567 - Tobias Boelter, Rishabh Poddar, Raluca Ada Popa:
A Secure One-Roundtrip Index for Range Queries. 568 - Kimmo Järvinen, Andrea Miele, Reza Azarderakhsh, Patrick Longa:
FourQ on FPGA: New Hardware Speed Records for Elliptic Curve Cryptography over Large Prime Characteristic Fields. 569 - Masayuki Abe, Fumitaka Hoshino, Miyako Ohkubo:
Design in Type-I, Run in Type-III: Fast and Scalable Bilinear-Type Conversion using Integer Programming. 570 - Romain Poussier, François-Xavier Standaert, Vincent Grosso:
Simple Key Enumeration (and Rank Estimation) using Histograms: an Integrated Approach. 571 - Jean-Sébastien Coron, Aurélien Greuet, Emmanuel Prouff, Rina Zeitoun:
Faster Evaluation of SBoxes via Common Shares. 572 - Stefan Dziembowski
, Sebastian Faust, Gottfried Herold, Anthony Journault, Daniel Masny, François-Xavier Standaert:
Towards Sound Fresh Re-Keying with Hard (Physical) Learning Problems. 573 - Nir Bitansky, Akshay Degwekar, Vinod Vaikuntanathan:
Structure vs Hardness through the Obfuscation Lens. 574 - Ethan Heilman, Foteini Baldimtsi, Leen Alshenibr, Alessandra Scafuro, Sharon Goldberg:
TumbleBit: An Untrusted Tumbler for Bitcoin-Compatible Anonymous Payments. 575 - (Withdrawn) Indistinguishability Obfuscation Does Not Reduce to Structured Languages. 576
- Jean Paul Degabriele, Kenneth G. Paterson, Jacob C. N. Schuldt, Joanne Woodage:
Backdoors in Pseudorandom Number Generators: Possibility and Impossibility Results. 577 - Viet Tung Hoang, Stefano Tessaro:
Key-alternating Ciphers and Key-length Extension: Exact Bounds and Multi-user Security. 578 - Patrick Derbez
, Pierre-Alain Fouque:
Automatic Search of Meet-in-the-Middle and Impossible Differential Attacks. 579 - Akshay Degwekar, Vinod Vaikuntanathan, Prashant Nalini Vasudevan:
Fine-grained Cryptography. 580 - Jan Camenisch, Maria Dubovitskaya, Alfredo Rial:
UC Commitments for Modular Protocol Design and Applications to Revocation and Attribute Tokens. 581 - Tanujay Saha:
TV-PUF : A Fast Lightweight Analog Physically Unclonable Function. 582 - Melissa Chase, Chaya Ganesh, Payman Mohassel:
Efficient Zero-Knowledge Proof of Algebraic and Non-Algebraic Statements with Applications to Privacy Preserving Credentials. 583 - Ranjit Kumaresan, Srinivasan Raghuraman, Adam Sealfon:
Network Oblivious Transfer. 584 - Elette Boyle, Niv Gilboa, Yuval Ishai:
Breaking the Circuit Size Barrier for Secure Computation Under DDH. 585 - Thomas Shrimpton, Martijn Stam, Bogdan Warinschi:
A Modular Treatment of Cryptographic APIs: The Symmetric-Key Case. 586 - Sergey Agievich, Vadim Marchuk, Alexander Maslau, Vlad Semenov:
Bash-f: another LRX sponge function. 587 - Eric Miles, Amit Sahai, Mark Zhandry:
Secure obfuscation in a weak multilinear map model: A simple construction secure against all known attacks. 588 - Jacob Alperin-Sheriff, Daniel Apon:
Dimension-Preserving Reductions from LWE to LWR. 589 - Yang Xie, Ankur Srivastava:
Mitigating SAT Attack on Logic Locking. 590 - Rishabh Poddar, Tobias Boelter, Raluca Ada Popa:
Arx: A Strongly Encrypted Database System. 591 - Lorenzo Grassi, Christian Rechberger, Sondre Rønjom:
Subspace Trail Cryptanalysis and its Applications to AES. 592 - Heiko Lohrke, Shahin Tajik, Christian Boit, Jean-Pierre Seifert:
No Place to Hide: Contactless Probing of Secret Data on FPGAs. 593 - Cesar Pereida García, Billy Bob Brumley, Yuval Yarom:
"Make Sure DSA Signing Exponentiations Really are Constant-Time". 594 - Rei Ueno, Sumio Morioka, Naofumi Homma, Takafumi Aoki:
A High Throughput/Gate AES Hardware Architecture by Compressing Encryption and Decryption Datapaths - Toward Efficient CBC-Mode Implementation. 595 - Mehmet Sinan Inci, Berk Gülmezoglu, Gorka Irazoqui, Thomas Eisenbarth, Berk Sunar:
Cache Attacks Enable Bulk Key Recovery on the Cloud. 596 - Margaux Dugardin, Sylvain Guilley, Jean-Luc Danger, Zakaria Najm, Olivier Rioul:
Correlated Extra-Reductions Defeat Blinded Regular Exponentiation - Extended Version. 597 - Ryan Henry:
Polynomial Batch Codes for Efficient IT-PIR. 598 - Nico Döttling, Sanjam Garg
, Divya Gupta, Peihan Miao, Pratyay Mukherjee:
Obfuscation from Low Noise Multilinear Maps. 599 - Samaneh Ghandali, Georg T. Becker, Daniel E. Holcomb, Christof Paar:
A Design Methodology for Stealthy Parametric Trojans and Its Application to Bug Attacks. 600 - Shalabh Jain, Jorge Guajardo:
Physical Layer Group Key Agreement for Automotive Controller Area Networks. 601 - Gilad Asharov, Yehuda Lindell, Thomas Schneider, Michael Zohner:
More Efficient Oblivious Transfer Extensions. 602 - Thomaz Oliveira, Julio López, Francisco Rodríguez-Henríquez:
Software implementation of Koblitz curves over quadratic fields. 603 - Amir S. Mortazavi, Mahmoud Salmasizadeh, Amir Daneshgar:
FMNV Continuous Non-malleable Encoding Scheme is More Efficient Than Believed. 604 - Razvan Barbulescu, Pierrick Gaudry, Aurore Guillevic, François Morain:
Improving NFS for the discrete logarithm problem in non-prime finite fields. 605 - Fatemeh Ganji, Shahin Tajik, Fabian Fäßler, Jean-Pierre Seifert:
Strong Machine Learning Attack against PUFs with No Mathematical Model. 606 - Mehrad Jaberi, Hamid Mala:
Protocols for Authenticated Oblivious Transfer. 607 - Hoda Maleki, Reza Rahaeimehr, Marten van Dijk:
LightSource: Ultra Lightweight Clone Detection of RFID Tags from Software Unclonable Responses. 608 - Jake Longo, Daniel P. Martin, Luke Mather, Elisabeth Oswald, Benjamin Sach, Martijn Stam:
How low can you go? Using side-channel data to enhance brute-force key recovery. 609 - Aloni Cohen, Saleet Klein:
The GGM PRF is a Weakly One-Way Family of Functions. 610 - Robert K. Cunningham, Benjamin Fuller, Sophia Yakoubov:
Catching MPC Cheaters: Identification and Openability. 611 - Kevin Lewi, David J. Wu:
Order-Revealing Encryption: New Constructions, Applications, and Lower Bounds. 612 - Qian Ge, Yuval Yarom, David A. Cock, Gernot Heiser:
A Survey of Microarchitectural Timing Attacks and Countermeasures on Contemporary Hardware. 613 - Ran Canetti, Oxana Poburinnaya:
Better Two-Round Adaptive Multiparty Computation. 614 - Jeremias Mechler, Jörn Müller-Quade, Tobias Nilges:
Universally Composable (Non-Interactive) Two-Party Computation from Untrusted Reusable Hardware Tokens. 615 - Christoph Dobraunig, Maria Eichlseder, Thomas Korak, Victor Lomné, Florian Mendel:
Practical Fault Attacks on Authenticated Encryption Modes for AES. 616 - Yuzhe Tang:
On the Impossibility of Merkle Merge Homomorphism. 617 - Sarani Bhattacharya, Debdeep Mukhopadhyay:
Curious case of Rowhammer: Flipping Secret Exponent Bits using Timing Analysis. 618 - Kevin Lewi, Alex J. Malozemoff, Daniel Apon, Brent Carmer, Adam Foltzer, Daniel Wagner, David W. Archer, Dan Boneh, Jonathan Katz, Mariana Raykova:
5Gen: A Framework for Prototyping Applications Using Multilinear Maps and Matrix Branching Programs. 619 - Ran Gilad-Bachrach, Kim Laine, Kristin E. Lauter, Peter Rindal, Mike Rosulek:
Secure Data Exchange: A Marketplace in the Cloud. 620 - Michele Ciampi, Rafail Ostrovsky, Luisa Siniscalchi, Ivan Visconti:
On Round-Efficient Non-Malleable Protocols. 621 - Marc Joye, Alain Passelègue:
Practical Trade-Offs for Multi-Input Functional Encryption. 622 - Dhiman Saha, Dipanwita Roy Chowdhury:
EnCounter: On Breaking the Nonce Barrier in Differential Fault Analysis with a Case-Study on PAEQ. 623 - Baiyu Li, Daniele Micciancio:
Equational Security Proofs of Oblivious Transfer Protocols. 624 - Kota Kondo, Yu Sasaki, Tetsu Iwata:
On the Design Rationale of SIMON Block Cipher: Integral Attacks and Impossible Differential Attacks against SIMON Variants. 625 - Ekawat Homsirikamol, William Diehl, Ahmed Ferozpuri, Farnoud Farahmand, Panasayya Yalla, Jens-Peter Kaps, Kris Gaj:
CAESAR Hardware API. 626 - Gideon Samid:
Cyber Passport: Preventing Massive Identity Theft. 627 - Liliya R. Ahmetzyanova, Evgeny K. Alekseev, Igor B. Oshkin, Stanislav V. Smyshlyaev, Lolita A. Sonina:
On the properties of the CTR encryption mode of the Magma and Kuznyechik block ciphers with re-keying method based on CryptoPro Key Meshing. 628 - Saikrishna Badrinarayanan, Vipul Goyal, Aayush Jain, Amit Sahai:
Verifiable Functional Encryption. 629 - Ravikumar Selvam, Dillibabu Shanmugam, Suganya Annadurai, Jothi Rangasamy:
Decomposed S-Boxes and DPA Attacks: A Quantitative Case Study using PRINCE. 630 - Thomas De Cnudde, Oscar Reparaz, Begül Bilgin
, Svetla Nikova, Ventzislav Nikov, Vincent Rijmen:
Masking AES with d+1 Shares in Hardware. 631 - Peter Rindal, Mike Rosulek:
Faster Malicious 2-party Secure Computation with Online/Ofine Dual Execution. 632 - Loi Luu, Duc-Hiep Chu, Hrishi Olickel, Prateek Saxena, Aquinas Hobor:
Making Smart Contracts Smarter. 633 - Weiran Liu, Jianwei Liu, Qianhong Wu, Bo Qin, David Naccache, Houda Ferradi:
Compact CCA2-secure Hierarchical Identity-Based Broadcast Encryption for Fuzzy-entity Data Sharing. 634 - Florian Tramèr
, Fan Zhang, Huang Lin, Jean-Pierre Hubaux, Ari Juels, Elaine Shi:
Sealed-Glass Proofs: Using Transparent Enclaves to Prove and Sell Knowledge. 635 - Saikrishna Badrinarayanan, Dakshita Khurana, Rafail Ostrovsky, Ivan Visconti:
New Feasibility Results in Unconditional UC-Secure Computation with (Malicious) PUFs. 636 - Wenbin Zhang, Chik How Tan:
On the Security and Key Generation of the ZHFE Encryption Scheme. 637 - Shoichi Hirose, Atsushi Yabumoto:
A Tweak for a PRF Mode of a Compression Function and Its Applications. 638 - Qiang Tang
, Balazs Pejo:
Game-Theoretic Framework for Integrity Veri cation in Computation Outsourcing. 639 - Aslí Bay, Oguzhan Ersoy, Ferhat Karakoç
:
Universal Forgery and Key Recovery Attacks on ELmD Authenticated Encryption Algorithm. 640 - Pawel Swierczynski, Georg T. Becker, Amir Moradi, Christof Paar:
Bitstream Fault Injections (BiFI) - Automated Fault Attacks against SRAM-based FPGAs. 641 - Pierre-Alain Fouque, Pierre Karpman, Paul Kirchner, Brice Minaud:
Efficient and Provable White-Box Primitives. 642 - Jesper Buus Nielsen, Samuel Ranellucci:
On the Computational Overhead of MPC with Dishonest Majority. 643 - David Wong:
How to Backdoor Diffie-Hellman. 644 - Patrick Longa:
FourQNEON: Faster Elliptic Curve Scalar Multiplications on ARM Processors. 645 - Eli Ben-Sasson, Iddo Bentov, Alessandro Chiesa, Ariel Gabizon, Daniel Genkin, Matan Hamilis, Evgenya Pergament, Michael Riabzev, Mark Silberstein, Eran Tromer, Madars Virza:
Computational integrity with a public random string from quasi-linear PCPs. 646 - Erik Boss, Vincent Grosso, Tim Güneysu, Gregor Leander, Amir Moradi, Tobias Schneider:
Strong 8-bit Sboxes with Efficient Masking in Hardware. 647 - Tobias Schneider, Amir Moradi, Tim Güneysu:
ParTI - Towards Combined Hardware Countermeasures against Side-Channel and Fault-Injection Attacks. 648 - Behzad Abdolmaleki, Karim Baghery, Shahram Khazaei, Mohammad Reza Aref:
Game-Based Privacy Analysis of RFID Security Schemes for Confident Au-thentication in IoT. 649 - Peeter Laud, Alisa Pankova:
Securing Multiparty Protocols against the Exposure of Data to Honest Parties. 650 - Christof Beierle:
Pen and Paper Arguments for SIMON and SIMON-like Designs. 651 - Arnaud Bannier, Nicolas Bodin, Eric Filiol:
Automatic Search for a Maximum Probability Differential Characteristic in a Substitution-Permutation Network. 652 - Masahiro Yagisawa:
Fully Homomorphic Encryption with Zero Norm Cipher Text. 653 - Shweta Agrawal:
Interpolating Predicate and Functional Encryption from Learning With Errors. 654 - Jongkil Kim, Willy Susilo, Fuchun Guo, Man Ho Au:
A Tag Based Encoding: An Efficient Encoding for Predicate Encoding in Prime Order Groups. 655 - Eiichiro Fujisaki:
Improving Practical UC-Secure Commitments based on the DDH Assumption. 656 - Tatiana Bradley, Sky Faber, Gene Tsudik:
Bounded Size-Hiding Private Set Intersection. 657 - Kevin Atighehchi, Alexis Bonnecaze:
On Plausible Tree Hash Modes for SHA-3. 658 - Joppe W. Bos, Craig Costello, Léo Ducas, Ilya Mironov, Michael Naehrig, Valeria Nikolaenko, Ananth Raghunathan, Douglas Stebila:
Frodo: Take off the ring! Practical, Quantum-Secure Key Exchange from LWE. 659 - Christof Beierle, Jérémy Jean, Stefan Kölbl, Gregor Leander, Amir Moradi, Thomas Peyrin, Yu Sasaki, Pascal Sasdrich, Siang Meng Sim:
The SKINNY Family of Block Ciphers and its Low-Latency Variant MANTIS. 660 - David Cash, Feng-Hao Liu, Adam O'Neill, Cong Zhang:
Reducing the Leakage in Practical Order-Revealing Encryption. 661 - Georg Fuchsbauer, Christian Hanser, Chethan Kamath, Daniel Slamanig:
Practical Round-Optimal Blind Signatures in the Standard Model from Weaker Assumptions. 662 - Jan Camenisch, Manu Drijvers, Anja Lehmann:
Anonymous Attestation Using the Strong Diffie Hellman Assumption Revisited. 663 - Yoo-Seung Won, Dong-Guk Han:
Efficient Conversion Method from Arithmetic to Boolean Masking in Constrained Devices. 664 - Mikkel Lambæk:
Breaking and Fixing Private Set Intersection Protocols. 665 - Wei-Guo Zhang, Luyang Li, Enes Pasalic:
A GMM type construction for resilient S-boxes with higher-dimensional vectorial outputs and strictly almost optimal nonlinearity. 666 - Andrey Bogdanov, Elmar Tischhauser, Philip S. Vejre:
Multivariate Linear Cryptanalysis: The Past and Future of PRESENT. 667 - (Withdrawn) Analysis of a Secure and Verifiable Policy Update Outsourcing Scheme for Big Data Access Control in the Cloud. 668
- Reza Azarderakhsh, Brian Koziel, Amir Jalali, Mehran Mozaffari Kermani, David Jao:
NEON-SIDH: Effi cient Implementation of Supersingular Isogeny Diffi e-Hellman Key-Exchange Protocol on ARM. 669 - Siamak Fayyaz Shahandashti, Feng Hao:
DRE-ip: A Verifiable E-Voting Scheme without Tallying Authorities. 670 - Yongzhuang Wei, Enes Pasalic, Fengrong Zhang, Samir Hodzic:
Efficient probabilistic algorithm for estimating the algebraic properties of Boolean functions for large n. 671 - (Withdrawn) FPGA-SIDH: High-Performance Implementation of Supersingular Isogeny Diffie-Hellman Key-Exchange Protocol on FPGA. 672
- Abderrahmane Nitaj, Willy Susilo, Joseph Tonien:
Dirichlet Product for Boolean Functions. 673 - Urbi Chatterjee, Rajat Subhra Chakraborty, Debdeep Mukhopadhyay:
A PUF-based Secure Communication Protocol for IoT. 674 - Angela Jäschke, Frederik Armknecht:
Accelerating Homomorphic Computations on Rational Numbers. 675 - Xiaoyang Dong, Yanzhao Shen:
Cryptanalysis of Reduced-Round Midori64 Block Cipher. 676 - Mohamed Sabt, Jacques Traoré:
Breaking Into the KeyStore: A Practical Forgery Attack Against Android KeyStore. 677 - Michael Backes, Amir Herzberg, Aniket Kate, Ivan Pryvalov:
Anonymous RAM. 678 - Jihoon Cho, Kyu Young Choi, Orr Dunkelman, Nathan Keller, Dukjae Moon, Aviya Vaidberg:
Hybrid WBC: Secure and Efficient White-Box Encryption Schemes. 679 - Colin Boyd, Christopher Carr:
Fair Client Puzzles from the Bitcoin Blockchain. 680 - Ronald Cramer, Ivan Damgård:
Amortized Complexity of Zero-Knowledge Proofs Revisited: Achieving Linear Soundness Slack. 681 - Steven D. Galbraith, Joel Laity, Barak Shani:
Finding Significant Fourier Coefficients: Clarifications, Simplifications, Applications and Limitations. 682 - Rasmus Dahlberg, Tobias Pulls, Roel Peeters:
Efficient Sparse Merkle Trees: Caching Strategies and Secure (Non-)Membership Proofs. 683 - Aurore Guillevic:
Faster individual discrete logarithms in non-prime finite fields with the NFS and FFS algorithms. 684 - W. Sean Kennedy, Vladimir Kolesnikov, Gordon T. Wilfong:
Overlaying Circuit Clauses for Secure Computation. 685 - Jian Bai, Dingkang Wang:
The Lightest 4x4 MDS Matrices over GL(4, 픽2). 686 - Martin R. Albrecht, Christian Rechberger, Thomas Schneider, Tyge Tiessen, Michael Zohner:
Ciphers for MPC and FHE. 687 - Antonio Marcedone, Rafael Pass, Abhi Shelat:
Bounded KDM Security from iO and OWF. 688 - Tingting Cui, Keting Jia, Kai Fu, Shiyao Chen, Meiqin Wang:
New Automatic Search Tool for Impossible Differentials and Zero-Correlation Linear Approximations. 689 - Myrto Arapinis, Véronique Cortier, Steve Kremer:
When Are Three Voters Enough for Privacy Properties? 690 - Zvika Brakerski, David Cash, Rotem Tsabary, Hoeteck Wee:
Targeted Homomorphic Attribute Based Encryption. 691 - Jiguo Li, Hong Yuan, Yichen Zhang:
Cryptanalysis and improvement of certificateless aggregate signature with conditional privacy-preserving for vehicular sensor networks. 692 - Sikhar Patranabis, Debdeep Mukhopadhyay:
Identity-Based Key Aggregate Cryptosystem from Multilinear Maps. 693 - Yin Li, Xingpo Ma, Yu Zhang, Chuanda Qi:
Mastrovito form of Karatsuba Multiplier for All Trinomials. 694 - Ivan Damgård, Jesper Buus Nielsen, Michael Nielsen, Samuel Ranellucci:
Gate-scrambling Revisited - or: The TinyTable protocol for 2-Party Secure Computation. 695 - Mehmet Sabir Kiraz:
Solving the Secure Storage Dilemma: An Efficient Scheme for Secure Deduplication with Privacy-Preserving Public Auditing. 696 - Damian Vizár:
Ciphertext Forgery on HANUMAN. 697 - Zhengjun Cao, Lihua Liu:
A Note on One Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in the Cloud. 698 - Zhengjun Cao, Lihua Liu:
A Note on One Privacy-Preserving Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data. 699 - Sami Saab, Pankaj Rohatgi, Craig Hampel:
Side-Channel Protections for Cryptographic Instruction Set Extensions. 700 - Matthew D. Green, Ian Miers:
Bolt: Anonymous Payment Channels for Decentralized Currencies. 701 - Jacques Patarin:
Mirror Theory and Cryptography. 702 - Sebastian R. Verschoor, Tanja Lange:
(In-)Secure messaging with the Silent Circle instant messaging protocol. 703 - Nicolas T. Courtois:
High Saturation Complete Graph Approach for EC Point Decomposition and ECDL Problem. 704 - (Withdrawn) New construction of single cycle T-function families. 705
- Jan Camenisch, Robert R. Enderlein, Ueli Maurer:
Memory Erasability Amplification. 706 - Dana Dachman-Soled, Angela Park, Ben San Nicolas:
Towards a Characterization of the Related-Key Attack Security of the Iterated Even-Mansour Cipher. 707 - Andreas Hülsing, Joost Rijneveld, Simona Samardjiska, Peter Schwabe:
From 5-pass MQ-based identification to MQ-based signatures. 708 - Pei Luo, Yunsi Fei, Liwei Zhang, A. Adam Ding:
Differential Fault Analysis of SHA3-224 and SHA3-256. 709 - Mostafa M. I. Taha, Arash Reyhani-Masoleh, Patrick Schaumont
:
Keymill: Side-Channel Resilient Key Generator. 710 - Hugo Krawczyk:
A Unilateral-to-Mutual Authentication Compiler for Key Exchange (with Applications to Client Authentication in TLS 1.3). 711 - Basel Halak, Said Subhan Waizi, Asad Islam:
A Survey of Hardware Implementations of Elliptic Curve Cryptographic Systems. 712 - Shi Bai, Thijs Laarhoven, Damien Stehlé:
Tuple lattice sieving. 713 - Peter Schwabe, Ko Stoffelen:
All the AES You Need on Cortex-M3 and M4. 714 - Tim Beyne, Begül Bilgin
:
Uniform First-Order Threshold Implementations. 715 - Tuyet Duong, Lei Fan, Thomas Veale, Hong-Sheng Zhou:
Securing Bitcoin-like Backbone Protocols against a Malicious Majority of Computing Power. 716 - Paul Kirchner, Pierre-Alain Fouque:
Comparison between Subfield and Straightforward Attacks on NTRU. 717 - David Cash, Paul Grubbs, Jason Perry, Thomas Ristenpart:
Leakage-Abuse Attacks Against Searchable Encryption. 718 - Tobias Schneider, Amir Moradi, François-Xavier Standaert, Tim Güneysu:
Bridging the Gap: Advanced Tools for Side-Channel Leakage Estimation beyond Gaussian Templates and Histograms. 719 - Seung Geol Choi, Dana Dachman-Soled, Tal Malkin, Hoeteck Wee:
A Black-Box Construction of Non-Malleable Encryption from Semantically Secure Encryption. 720 - Lucas Kowalczyk, Tal Malkin, Jonathan R. Ullman, Mark Zhandry:
Strong Hardness of Privacy from Weak Traitor Tracing. 721 - Li Lin, Wenling Wu:
Improved Meet-in-the-Middle Attacks on Reduced-Round Kalyna-128/256 and Kalyna-256/512. 722 - Marc Fischlin, Anja Lehmann, Krzysztof Pietrzak:
Robust Multi-Property Combiners for Hash Functions. 723 - Frederik Armknecht, Jens-Matthias Bohli, David Froelicher, Ghassan O. Karame:
SPORT: Sharing Proofs of Retrievability across Tenants. 724 - Mustafa Khairallah, Maged Ghoneima:
Tile-Based Modular Architecture for Accelerating Homomorphic Function Evaluation on FPGA. 725 - Oriol Farràs, Jordi Ribes-González, Sara Ricci:
Bounds on the Information Ratios of Secret Sharing Schemes for Close Access Structures. 726 - Yuqing Zhu, Jincheng Zhuang, Chang Lv, Dongdai Lin:
Improvements on the Individual Logarithm Step in exTNFS. 727 - Raphael Bost:
Sophos - Forward Secure Searchable Encryption. 728 - Herman Galteland, Stig Fr. Mjølsnes, Ruxandra F. Olimid:
Attacks on cMix - Some Small Overlooked Details. 729 - Dana Dachman-Soled, S. Dov Gordon, Feng-Hao Liu, Adam O'Neill, Hong-Sheng Zhou:
Leakage-Resilient Public-Key Encryption from Obfuscation. 730 - Mohammad Mardani Shahrbabak, Shahab Abdolmaleky:
SRMAP and ISLAP Authentication Protocols: Attacks and Improvements. 731 - Yosuke Todo, Gregor Leander, Yu Sasaki:
Nonlinear Invariant Attack -Practical Attack on Full SCREAM, iSCREAM, and Midori64. 732 - Thomas Wunderer:
Revisiting the Hybrid Attack: Improved Analysis and Refined Security Estimates. 733 - Aram Jivanyan, Gurgen Khachatryan, Andriy Oliynyk, Mykola Raievskyi:
Efficient Oblivious Transfer Protocols based on White-Box Cryptography. 734 - Brett Hemenway, Rafail Ostrovsky:
Efficient Robust Secret Sharing from Expander Graphs. 735 - Martine De Cock, Rafael Dowsley, Caleb Horst, Raj S. Katti, Anderson C. A. Nascimento, Stacey C. Newman, Wing-Sea Poon:
Efficient and Private Scoring of Decision Trees, Support Vector Machines and Logistic Regression Models based on Pre-Computation. 736 - (Withdrawn) Zero Knowledge Authentication Protocols With Algebraic Geometry Techniques. 737
- Masahiro Yagisawa:
FHPKE with Zero Norm Noises based on DLA&CDH. 738 - Ryan Amiri, Aysajan Abidin, Petros Wallden, Erika Andersson:
Unconditionally Secure Signatures. 739 - Ralph Ankele, Robin Ankele:
Software Benchmarking of the 2nd round CAESAR Candidates. 740 - Mohammad Hadi Valizadeh, Hoda Maleki, William Koch, Azer Bestavros, Marten van Dijk:
Markov Modeling of Moving Target Defense Games. 741 - Johannes Braun, Johannes Buchmann, Denise Demirel, Mikio Fujiwara, Matthias Geihs, Shiho Moriai, Masahide Sasaki, Atsushi Waseda:
LINCOS - A Storage System Providing Long-Term Integrity, Authenticity, and Confidentiality (Full Paper). 742 - Md. Iftekhar Salam, Harry Bartlett, Ed Dawson, Josef Pieprzyk, Leonie Simpson, Kenneth Koon-Ho Wong:
Investigating Cube Attacks on the Authenticated Encryption Stream Cipher ACORN. 743 - Xi Chen, Longjiang Qu, Chao Li, Jiao Du:
A New Method to Investigate the CCZ-Equivalence between Functions with Low Differential Uniformity. 744 - Solenn Brunet, Sébastien Canard, Sébastien Gambs, Baptiste Olivier:
Novel differentially private mechanisms for graphs. 745 - Peter Rindal, Mike Rosulek:
Improved Private Set Intersection against Malicious Adversaries. 746 - Pasquale Forte, Diego Romano, Giovanni Schmid:
Beyond Bitcoin - Part II: Blockchain-based systems without mining. 747 - Mohammad Etemad, Alptekin Küpçü:
A Generic Dynamic Provable Data Possession Framework. 748 - Kwangsu Lee:
Revocable Hierarchical Identity-Based Encryption with Adaptive Security. 749 - Simon Cogliani, Feng Bao, Houda Ferradi, Rémi Géraud, Diana Maimut, David Naccache, Rodrigo Portella do Canto, Guilin Wang:
Public-Key Based Lightweight Swarm Authentication. 750 - Adnan Baysal, Mustafa Çoban, Mehmet Özen:
Feistel Like Construction of Involutory Binary Matrices With High Branch Number. 751 - Adnan Baysal, Ünal Koçabas:
ELiF : An Extremely Lightweight & Flexible Block Cipher Family and Its Experimental Security. 752 - Shi Bai, Damien Stehlé, Weiqiang Wen:
Improved Reduction from the Bounded Distance Decoding Problem to the Unique Shortest Vector Problem in Lattices. 753 - Christoph Dobraunig, Maria Eichlseder, Florian Mendel:
Key Recovery for MANTIS-5. 754 - Michael T. Goodrich, Evgenios M. Kornaropoulos, Michael Mitzenmacher, Roberto Tamassia:
Auditable Data Structures. 755 - David Bernhard, Véronique Cortier, Olivier Pereira, Ben Smyth, Bogdan Warinschi:
Adapting Helios for provable ballot privacy. 756 - Giuseppe Ateniese, Bernardo Magri, Daniele Venturi, Ewerton R. Andrade:
Redactable Blockchain - or - Rewriting History in Bitcoin and Friends. 757 - Erdem Alkim, Philipp Jakubeit, Peter Schwabe:
A new hope on ARM Cortex-M. 758 - Joël Alwen, Jeremiah Blocki:
Towards Practical Attacks on Argon2i and Balloon Hashing. 759 - Russell Impagliazzo, Ragesh Jaiswal, Valentine Kabanets, Bruce M. Kapron, Valerie King, Stefano Tessaro:
Simultaneous Secrecy and Reliability Amplification for a General Channel Model. 760 - Xiaopeng Yang, Wenping Ma:
Two-party authenticated key exchange protocol using lattice-based cryptography. 761 - Xiao Wang, Alex J. Malozemoff, Jonathan Katz:
Faster Two-Party Computation Secure Against Malicious Adversaries in the Single-Execution Setting. 762 - Houda Ferradi, Rémi Géraud, David Naccache:
Human Public-Key Encryption. 763 - Tim Dittler, Florian Tschorsch, Stefan Dietzel, Björn Scheuermann:
ANOTEL: Cellular Networks with Location Privacy (Extended Version). 764 - David Bernhard, Bogdan Warinschi:
Cryptographic Voting - A Gentle Introduction. 765 - Benoît Libert, Somindu C. Ramanna, Moti Yung:
Functional Commitment Schemes: From Polynomial Commitments to Pairing-Based Accumulators from Simple Assumptions. 766 - Jean-Pierre Flori:
A conjecture about Gauss sums and bentness of binomial Boolean functions. 767 - Toshinori Araki, Jun Furukawa
, Yehuda Lindell, Ariel Nof, Kazuma Ohara:
High-Throughput Semi-Honest Secure Three-Party Computation with an Honest Majority. 768 - Nikolaos A. Anagnostopoulos, Stefan Katzenbeisser, Markus Rosenstihl, André Schaller, Sebastian Gabmeyer, Tolga Arul:
Low-temperature data remanence attacks against intrinsic SRAM PUFs. 769 - Guido Bertoni, Joan Daemen, Michaël Peeters, Gilles Van Assche, Ronny Van Keer:
KangarooTwelve: fast hashing based on Keccak-p. 770 - David Bernhard, Olivier Pereira, Bogdan Warinschi:
How not to Prove Yourself: Pitfalls of the Fiat-Shamir Heuristic and Applications to Helios. 771 - Pierre Belgarric, Shivam Bhasin, Nicolas Bruneau, Jean-Luc Danger, Nicolas Debande, Sylvain Guilley, Annelie Heuser, Zakaria Najm, Olivier Rioul:
Time-Frequency Analysis for Second-Order Attacks. 772 - Vassil S. Dimitrov, Liisi Kerik, Toomas Krips, Jaak Randmets, Jan Willemson
:
Alternative Implementations of Secure Real Numbers. 773 - Tanujay Saha, Vikash Sehwag:
TV-PUF : A Fast Lightweight Aging-Resistant Threshold Voltage PUF. 774 - Sonia Bogos, John Gaspoz, Serge Vaudenay:
Cryptanalysis of a Homomorphic Encryption Scheme. 775 - Arnis Parsovs:
Homomorphic Tallying for the Estonian Internet Voting System. 776 - Ping Ngai Chung, Craig Costello, Benjamin Smith:
Fast, uniform scalar multiplication for genus 2 Jacobians with fast Kummers. 777 - Sumit Chakraborty:
Algorithmic Mechanism Construction bridging Secure Multiparty Computation and Intelligent Reasoning. 778 - Maryam Rajabzadeh Asaar, Mahmoud Salmasizadeh, Mohammad Reza Aref:
Code-based Strong Designated Verifier Signatures: Security Analysis and a New Construction. 779 - Mohammad Hassan Ameri, Javad Mohajeri, Mahmoud Salmasizadeh:
Efficient and Provable Secure Anonymous Hierarchical Identity-based Broadcast Encryption (HIBBE) Scheme without Random Oracle. 780 - Justin Bedo, Thomas C. Conway, Kim Ramchen, Vanessa Teague:
Privately Matching k-mers. 781 - Eric Crockett, Chris Peikert:
Challenges for Ring-LWE. 782 - Joël Alwen, Peter Gazi, Chethan Kamath, Karen Klein, Georg Osang, Krzysztof Pietrzak, Leonid Reyzin, Michal Rolínek, Michal Rybár:
On the Memory-Hardness of Data-Independent Password-Hashing Functions. 783 - Pratish Datta, Ratna Dutta, Sourav Mukhopadhyay:
Verifiable and Delegatable Constrained Pseudorandom Functions for Unconstrained Inputs. 784 - Fabrice Benhamouda, Tancrède Lepoint, Claire Mathieu, Hang Zhou:
Optimization of Bootstrapping in Circuits. 785 - F. Betül Durak, Thomas DuBuisson, David Cash:
What Else is Revealed by Order-Revealing Encryption? 786 - Yasufumi Hashimoto:
On the security of new vinegar-like variant of multivariate signature scheme. 787 - Yasufumi Hashimoto:
On the security of Cubic UOV. 788 - Kirat Pal Singh, Shiwani Dod:
An Efficient Hardware design and Implementation of Advanced Encryption Standard (AES) Algorithm. 789 - Senyang Huang, Xiaoyun Wang, Guangwu Xu, Meiqin Wang, Jingyuan Zhao:
Conditional Cube Attack on Reduced-Round Keccak Sponge Function. 790 - Ilan Komargodski:
Leakage Resilient One-Way Functions: The Auxiliary-Input Setting. 791 - David Derler, Daniel Slamanig:
Key-Homomorphic Signatures and Applications to Multiparty Signatures. 792 - Christoph Dobraunig, Maria Eichlseder, Thomas Korak, Florian Mendel:
Side-Channel Analysis of Keymill. 793 - Mihir Bellare, Viet Tung Hoang, Stefano Tessaro:
Message-recovery attacks on Feistel-based Format Preserving Encryption. 794 - Huijia Lin, Vinod Vaikuntanathan:
Indistinguishability Obfuscation from DDH-like Assumptions on Constant-Degree Graded Encodings. 795 - Vadim Lyubashevsky:
Digital Signatures Based on the Hardness of Ideal Lattice Problems in all Rings. 796 - Aysajan Abidin, Abdelrahaman Aly, Sara Cleemput, Mustafa A. Mustafa:
An MPC-based Privacy-Preserving Protocol for a Local Electricity Trading Market. 797 - Karthikeyan Bhargavan, Gaëtan Leurent:
On the Practical (In-)Security of 64-bit Block Ciphers: Collision Attacks on HTTP over TLS and OpenVPN. 798 - Vladimir Kolesnikov, Ranjit Kumaresan, Mike Rosulek, Ni Trieu:
Efficient Batched Oblivious PRF with Applications to Private Set Intersection. 799 - Bar Alon, Eran Omri:
Almost-Optimally Fair Multiparty Coin-Tossing with Nearly Three-Quarters Malicious. 800 - Gizem S. Çetin, Wei Dai, Yarkin Doröz, William J. Martin, Berk Sunar:
Blind Web Search: How far are we from a privacy preserving search engine? 801 - (Withdrawn) Proofs of Data Residency: Checking whether Your Cloud Files Have Been Relocated. 802
- Kirat Pal Singh:
Biometric Based Network Security Using MIPS Cryptography Processor. 803 - Dario Fiore, Aikaterini Mitrokotsa, Luca Nizzardo, Elena Pagnin:
Multi-Key Homomorphic Authenticators. 804 - Carmit Hazay, Avishay Yanai:
Constant-Round Maliciously Secure Two-Party Computation in the RAM Model. 805 - Mohammad Hadi Valizadeh:
Healing the Hill Cipher, Improved Approach to Secure Modified Hill against Zero-plaintext Attack. 806 - Hyunjin Ahn, Dong-Guk Han:
Multilateral White-Box Cryptanalysis: Case study on WB-AES of CHES Challenge 2016. 807 - Maciej Skorski
:
Simulating Auxiliary Inputs, Revisited. 808 - Daniel Genkin, Yuval Ishai, Mor Weiss:
Binary AMD Circuits from Secure Multiparty Computation. 809 - Colin O'Flynn:
Fault Injection using Crowbars on Embedded Systems. 810 - Ling Sun, Wei Wang, Meiqin Wang:
MILP-Aided Bit-Based Division Property for Primitives with Non-Bit-Permutation Linear Layers. 811 - Dana Dachman-Soled:
Towards Non-Black-Box Separations of Public Key Encryption and One Way Function. 812 - Benny Applebaum, Pavel Raykov:
Fast Pseudorandom Functions Based on Expander Graphs. 813 - Zahra Jafargholi, Daniel Wichs:
Adaptive Security of Yao's Garbled Circuits. 814 - Sanjam Garg
, Divya Gupta, Peihan Miao, Omkant Pandey:
Secure Multiparty RAM Computation in Constant Rounds. 815 - Mark Bun, Thomas Steinke:
Concentrated Differential Privacy: Simplifications, Extensions, and Lower Bounds. 816 - Sanjam Garg
, Eric Miles, Pratyay Mukherjee, Amit Sahai, Akshayaram Srinivasan, Mark Zhandry:
Secure Obfuscation in a Weak Multilinear Map Model. 817 - Carmit Hazay, Muthuramakrishnan Venkitasubramaniam:
Composable Adaptive Secure Protocols without Setup under Polytime Assumptions. 818 - Shashank Agrawal, Manoj Prabhakaran, Ching-Hua Yu:
Virtual Grey-Boxes Beyond Obfuscation: A Statistical Security Notion for Cryptographic Agents. 819 - Mark Bun, Yi-Hsiu Chen, Salil P. Vadhan:
Separating Computational and Statistical Differential Privacy in the Client-Server Model. 820 - Duggirala Meher Krishna, Duggirala Ravi:
Multivariate Cryptography with Mappings of Discrete Logarithms and Polynomials. 821 - Maryam Rajabzadeh Asaar, Mahmoud Salmasizadeh, Willy Susilo:
Proxy-based Authentication Scheme for Vehicular Ad Hoc Networks: Security Analysis and an Efficient Scheme. 822 - Rachid El Bansarkhani, Ali El Kaafarani:
Post-Quantum Attribute-Based Signatures from Lattice Assumptions. 823 - Tim Ruffing, Pedro Moreno-Sanchez
, Aniket Kate:
P2P Mixing and Unlinkable Bitcoin Transactions. 824 - Chun Guo, Dongdai Lin, Meicheng Liu:
Cascade Ciphers Revisited: Indifferentiability Analysis. 825 - Tomer Ashur, Yunwen Liu:
Rotational Cryptanalysis in the Presence of Constants. 826 - Atul Luykx, Bart Mennink, Samuel Neves:
Security Analysis of BLAKE2's Modes of Operation. 827 - Shahram Rasoolzadeh, Håvard Raddum:
Faster Key Recovery Attack on Round-Reduced PRINCE. 828 - Shuai Han, Shengli Liu, Lin Lyu:
Efficient KDM-CCA Secure Public-Key Encryption for Polynomial Functions. 829 - Ian Miers, Payman Mohassel:
IO-DSSE: Scaling Dynamic Searchable Encryption to Millions of Indexes By Improving Locality. 830 - Jürgen Pulkus, Srinivas Vivek:
Reducing the Number of Non-linear Multiplications in Masking Schemes. 831 - Colin Chaigneau, Henri Gilbert:
Is AEZ v4.1 Sufficiently Resilient Against Key-Recovery Attacks? 832 - Kazuki Yoneyama, Reo Yoshida, Yuto Kawahara, Tetsutaro Kobayashi, Hitoshi Fuji, Tomohide Yamamoto:
Multi-Cast Key Distribution: Scalable, Dynamic and Provably Secure Construction. 833 - Russell W. F. Lai, Raymond K. H. Tai, Harry W. H. Wong, Sherman S. M. Chow:
A Zoo of Homomorphic Signatures: Multi-Key and Key-Homomorphism. 834 - Sumanta Sarkar, Habeeb Syed:
Lightweight Diffusion Layer: Importance of Toeplitz Matrices. 835 - H. Gopalakrishna Gadiyar, R. Padma:
The Discrete Logarithm Problem over Prime Fields can be transformed to a Linear Multivariable Chinese Remainder Theorem. 836 - Jung Hee Cheon, Damien Stehlé:
Fully Homomorphic Encryption over the Integers Revisited. 837 - Masoumeh Safkhani, Nasour Bagheri:
Passive Secret Disclosure Attack on an Ultralightweight Authentication Protocol for Internet of Things. 838 - Zejun Xiang, Wentao Zhang, Dongdai Lin:
On the Division Property of SIMON48 and SIMON64. 839 - Melissa Chase, Mary Maller, Sarah Meiklejohn:
Deja Q All Over Again: Tighter and Broader Reductions of q-Type Assumptions. 840 - Guido Bertoni, Marco Martinoli:
A Methodology for the Characterisation of Leakages in Combinatorial Logic. 841 - Seung Geol Choi, Dana Dachman-Soled, Tal Malkin, Hoeteck Wee:
Improved, Black-Box, Non-Malleable Encryption from Semantic Security. 842 - Shuichi Katsumata, Shota Yamada:
Partitioning via Non-Linear Polynomial Functions: More Compact IBEs from Ideal Lattices and Bilinear Maps. 843 - Kamalesh Acharya, Ratna Dutta:
Secure and E fficient Construction of Broadcast Encryption with Dealership. 844 - Felix Heuer, Bertram Poettering:
Selective Opening Security from Simulatable Data Encapsulation. 845 - Onur Demir, Wenjie Xiong, Faisal Zaghloul, Jakub Szefer:
Survey of Approaches for Security Verification of Hardware/Software Systems. 846 - Jianwei Li:
On the smallest ratio problem of lattice bases. 847 - Linfeng Zhou:
From Weakly Selective to Selective Security in Compact Functional Encryption. 848 - Kartik Nayak, Ling Ren, Ittai Abraham, Benny Pinkas:
An Oblivious RAM with Sub-logarithmic Bandwidth Blowup. 849 - Conor Patrick, Bilgiday Yuce, Nahid Farhady Ghalaty, Patrick Schaumont
:
Lightweight Fault Attack Resistance in Software Using Intra-Instruction Redundancy. 850 - Ivica Nikolic, Yu Sasaki:
A New Algorithm for the Unbalanced Meet-in-the-Middle Problem. 851 - Arnold Neumaier, Damien Stehlé:
Faster LLL-type Reduction of Lattice Bases. 852 - Tetsu Iwata, Kazuhiko Minematsu:
Stronger Security Variants of GCM-SIV. 853 - Matthias Hiller, Michael Pehl, Gerhard Kramer, Georg Sigl:
Algebraic Security Analysis of Key Generation with Physical Unclonable Functions. 854 - Douglas R. Stinson, Ruizhong Wei:
Combinatorial Repairability for Threshold Schemes. 855 - Ronald L. Rivest, Jacob C. N. Schuldt:
Spritz - a spongy RC4-like stream cipher and hash function. 856 - Zejun Xiang, Wentao Zhang, Zhenzhen Bao, Dongdai Lin:
Applying MILP Method to Searching Integral Distinguishers Based on Division Property for 6 Lightweight Block Ciphers. 857 - Qian Guo, Thomas Johansson, Paul Stankovski:
A Key Recovery Attack on MDPC with CCA Security Using Decoding Errors. 858 - Steven D. Galbraith, Christophe Petit, Barak Shani, Yan Bo Ti:
On the Security of Supersingular Isogeny Cryptosystems. 859 - Junqing Gong, Xiaolei Dong, Jie Chen, Zhenfu Cao:
Efficient IBE with Tight Reduction to Standard Assumption in the Multi-challenge Setting. 860 - Jack Doerner, David Evans, Abhi Shelat:
Secure Stable Matching at Scale. 861 - (Withdrawn) Flaw in the Security Analysis of Leakage-resilient Authenticated Key Exchange Protocol from CT-RSA 2016 and Restoring the Security Proof. 862
- Shuangyi Zhu, Yuan Ma, Jingqiang Lin, Jia Zhuang, Jiwu Jing:
More Powerful and Reliable Second-level Statistical Randomness Tests for NIST SP 800-22. 863 - Thomas Shrimpton, R. Seth Terashima:
Salvaging Weak Security Bounds for Blockcipher-Based Constructions. 864 - Sarah Miracle, Scott Yilek:
Reverse Cycle Walking and Its Applications. 865 - Prastudy Fauzi, Helger Lipmaa, Michal Zajac:
A Shuffle Argument Secure in the Generic Model. 866 - Eduard Marin, Enrique Argones-Rúa, Dave Singelée, Bart Preneel:
A survey on physiological-signal-based security for medical devices. 867 - Viet Tung Hoang, Jonathan Katz, Adam O'Neill, Mohammad Zaheri:
Selective-Opening Security in the Presence of Randomness Failures. 868 - Ted Chinburg, Brett Hemenway, Nadia Heninger, Zachary Scherr:
Cryptographic applications of capacity theory: On the optimality of Coppersmith's method for univariate polynomials. 869 - Ilaria Chillotti, Nicolas Gama, Mariya Georgieva, Malika Izabachène:
Faster Fully Homomorphic Encryption: Bootstrapping in less than 0.1 Seconds. 870 - Xavier Boyen, Christopher Carr, Thomas Haines:
Blockchain-Free Cryptocurrencies. A Rational Framework for Truly Decentralised Fast Transactions. 871 - Fuchun Guo, Willy Susilo, Yi Mu, Rongmao Chen, Jianchang Lai, Guomin Yang:
Iterated Random Oracle: A Universal Approach for Finding Loss in Security Reduction. 872 - Rongmao Chen, Yi Mu, Guomin Yang, Willy Susilo, Fuchun Guo, Mingwu Zhang:
Cryptographic Reverse Firewall via Malleable Smooth Projective Hash Functions. 873 - Joël Alwen, Jeremiah Blocki, Krzysztof Pietrzak:
Depth-Robust Graphs and Their Cumulative Memory Complexity. 875 - Lei Wang, Jian Guo, Guoyan Zhang, Jingyuan Zhao, Dawu Gu:
How to Build Fully Secure Tweakable Blockciphers from Classical Blockciphers. 876 - Yuyu Wang, Zongyang Zhang, Takahiro Matsuda, Goichiro Hanaoka, Keisuke Tanaka:
How to Obtain Fully Structure-Preserving (Automorphic) Signatures from Structure-Preserving Ones. 877 - Jian Guo, Meicheng Liu, Ling Song:
Linear Structures: Applications to Cryptanalysis of Round-Reduced Keccak. 878 - Benoît Libert, San Ling, Fabrice Mouhartem, Khoa Nguyen, Huaxiong Wang:
Zero-Knowledge Arguments for Matrix-Vector Relations and Lattice-Based Group Encryption. 879 - Silvio Biagioni, Daniel Masny, Daniele Venturi:
Naor-Yung Paradigm with Shared Randomness and Applications. 880 - Anindya Shankar Bhandari:
Near Collisions in the RC4 Stream Cipher. 881 - Jinsheng Zhang, Qiumao Ma, Wensheng Zhang, Daji Qiao:
MSKT-ORAM: A Constant Bandwidth ORAM without Homomorphic Encryption. 882 - Nikolaj Volgushev, Malte Schwarzkopf, Andrei Lapets, Mayank Varia, Azer Bestavros:
DEMO: Integrating MPC in Big Data Workflows. 883 - Ben Lampert, Riad S. Wahby, Shane Leonard, Philip Alexander Levis:
Robust, low-cost, auditable random number generation for embedded system security. 884 - Ronald Cramer, Léo Ducas, Benjamin Wesolowski:
Short Stickelberger Class Relations and application to Ideal-SVP. 885 - Daniel Hutchinson:
A Robust and Sponge-Like PRNG with Improved Efficiency. 886 - Anne Canteaut, Sébastien Duval, Léo Perrin:
A generalisation of Dillon's APN permutation with the best known differential and linear properties for all fields of size 24k+2. 887 - Thijs Laarhoven:
Randomized lattice sieving for the closest vector problem (with preprocessing). 888 - Aggelos Kiayias, Ioannis Konstantinou, Alexander Russell, Bernardo David, Roman Oliynykov:
A Provably Secure Proof-of-Stake Blockchain Protocol. 889 - Artur Mariano, Thijs Laarhoven, Christian H. Bischof:
A Parallel Variant of LDSieve for the SVP on Lattices. 890 - Jie Chen:
Tightly Secure IBE under Constant-size Master Public Key. 891 - Adrià Gascón, Phillipp Schoppmann, Borja Balle, Mariana Raykova, Jack Doerner, Samee Zahur, David Evans:
Secure Linear Regression on Vertically Partitioned Datasets. 892 - Raluca Ada Popa, Emily Stark, Jonas Helfer, Steven Valdez, Nickolai Zeldovich, M. Frans Kaashoek, Hari Balakrishnan:
Building web applications on top of encrypted data using Mylar. 893 - Chun Guo, Dongdai Lin:
Indifferentiability of 3-Round Even-Mansour with Random Oracle Key Derivation. 894 - Paul Grubbs, Kevin Sekniqi, Vincent Bindschaedler, Muhammad Naveed, Thomas Ristenpart:
Leakage-Abuse Attacks against Order-Revealing Encryption. 895 - Muhammad Yasin, Bodhisatwa Mazumdar, Ozgur Sinanoglu, Jeyavijayan Rajendran:
Security Analysis of Anti-SAT. 896 - Gérald Gavin:
An efficient somewhat homomorphic encryption scheme based on factorization. 897 - Sha Tao, Elena Dubrova:
Physical Unclonable Functions based on Temperature Compensated Ring Oscillators. 898 - Kittiphop Phalakarn, Kittiphon Phalakarn, Vorapong Suppakitpaisarn:
Parallelized Side-Channel Attack Resisted Scalar Multiplication Using q-Based Addition-Subtraction k-chains. 899 - Arthur Gervais, Alexandros Filios, Vincent Lenders, Srdjan Capkun:
Quantifying Web Adblocker Privacy. 900 - Mathilde Igier, Serge Vaudenay:
Distance Bounding based on PUF. 901 - Bin Liu, Bogdan Warinschi:
Universally Composable Cryptographic Role-Based Access Control. 902 - Ueli Maurer, Renato Renner:
From Indifferentiability to Constructive Cryptography (and Back). 903 - Pratish Datta, Ratna Dutta, Sourav Mukhopadhyay:
Succinct Predicate and Online-Offline Multi-Input Inner Product Encryptions under Standard Static Assumptions. 904 - Masoumeh Safkhani, Nasour Bagheri:
Generalized Desynchronization Attack on UMAP: Application to RCIA, KMAP, SLAP and SASI+ protocols. 905 - Tianren Liu:
On Basing Search SIVP on NP-Hardness. 906 - Peihan Miao:
Cut-and-Choose for Garbled RAM. 907 - Kalikinkar Mandal, Basel Alomair, Radha Poovendran:
Secure Error-Tolerant Graph Matching Protocols. 908 - Bo-Yuan Peng, Yuan-Che Hsu, Yu-Jia Chen, Di-Chia Chueh, Chen-Mou Cheng, Bo-Yin Yang:
Multi-core FPGA Implementation of ECC with Homogeneous Co-Z Coordinate Representation. 909 - Léo Ducas, Wessel P. J. van Woerden:
The closest vector problem in tensored root lattices of type A and in their duals. 910 - Mohamed Saied Emam Mohamed, Albrecht Petzoldt:
The Shortest Signatures Ever. 911 - Gilles Barthe, François Dupressoir, Sebastian Faust, Benjamin Grégoire, François-Xavier Standaert, Pierre-Yves Strub:
Parallel Implementations of Masking Schemes and the Bounded Moment Leakage Model. 912 - Boru Gong, Yunlei Zhao:
Small Field Attack, and Revisiting RLWE-Based Authenticated Key Exchange from Eurocrypt'15. 913 - Gora Adj, Isaac Andrés Canales Martinez, Nareli Cruz Cortés, Alfred Menezes, Thomaz Oliveira, Luis Rivera-Zamarripa, Francisco Rodríguez-Henríquez:
Computing discrete logarithms in cryptographically-interesting characteristic-three finite fields. 914 - Melissa Chase, Sarah Meiklejohn:
Transparency Overlays and Applications. 915 - Rafael Pass, Elaine Shi:
FruitChains: A Fair Blockchain. 916 - Rafael Pass, Elaine Shi:
Hybrid Consensus: Efficient Consensus in the Permissionless Model. 917 - Iddo Bentov, Rafael Pass, Elaine Shi:
The Sleepy Model of Consensus. 918 - Iddo Bentov, Rafael Pass, Elaine Shi:
Snow White: Provably Secure Proofs of Stake. 919 - Paul Grubbs, Richard McPherson, Muhammad Naveed, Thomas Ristenpart, Vitaly Shmatikov:
Breaking Web Applications Built On Top of Encrypted Data. 920 - Houssem Maghrebi, Thibault Portigliatti, Emmanuel Prouff:
Breaking Cryptographic Implementations Using Deep Learning Techniques. 921 - (Withdrawn) Leakage Characterizing and Detecting Based on Communication Theory. 922
- Erick Nascimento, Lukasz Chmielewski, David F. Oswald, Peter Schwabe:
Attacking embedded ECC implementations through cmov side channels. 923 - Koh-ichi Nagao:
Bit Coincidence Mining Algorithm II. 924 - Liang Wang, Rafael Pass, Abhi Shelat, Thomas Ristenpart:
Secure Channel Injection and Anonymous Proofs of Account Ownership. 925 - Matthias Hamann, Matthias Krause, Willi Meier:
LIZARD - A Lightweight Stream Cipher for Power-constrained Devices. 926 - Subhadeep Banik, Andrey Bogdanov, Francesco Regazzoni:
Atomic-AES: A Compact Implementation of the AES Encryption/Decryption Core. 927 - Massoud Hadian Dehkordi, Ali Safi:
The complexity of the connected graph access structure on seven participants. 928 - Tanujay Sha:
A Generalized Ideal Secret Sharing Scheme. 929 - Benny Pinkas, Thomas Schneider, Michael Zohner:
Scalable Private Set Intersection Based on OT Extension. 930 - Jakub Breier, Xiaolu Hou:
Feeding Two Cats with One Bowl: On Designing a Fault and Side-Channel Resistant Software Encoding Scheme. 931 - Jakub Breier, Dirmanto Jap, Shivam Bhasin:
Mistakes Are Proof That You Are Trying: On Verifying Software Encoding Schemes' Resistance to Fault Injection Attacks. 932 - Michele Orrù, Emmanuela Orsini, Peter Scholl:
Actively Secure 1-out-of-N OT Extension with Application to Private Set Intersection. 933 - Prabhanjan Ananth, Aloni Cohen, Abhishek Jain
:
Cryptography with Updates. 934 - Hannes Groß, Manuel Jelinek, Stefan Mangard, Thomas Unterluggauer, Mario Werner:
Concealing Secrets in Embedded Processors Designs. 935 - Vadim N. Tsypyschev:
Linear Complexity of Designs based on Coordinate Sequences of LRS and on Digital Sequences of Matrix/Skew LRS Coordinate Sequences over Galois Ring. 936 - Nur Azman Abu, Shekh Faisal Abdul-Latip, Muhammad Rezal Kamel Ariffin:
A Comparative S-Index in Factoring RSA Modulus via Lucas Sequences. 937 - Sabyasachi Karati, Palash Sarkar:
Kummer for Genus One over Prime Order Fields. 938 - Brice Colombier, Lilian Bossuet, David Hély, Viktor Fischer:
Key Reconciliation Protocols for Error Correction of Silicon PUF Responses. 939 - Arpita Patra, Pratik Sarkar, Ajith Suresh:
Fast Actively Secure OT Extension for Short Secrets. 940 - Jian Bai, Dingkang Wang:
A New Class of Differentially 4-uniform Permutations from the Inverse Function. 941 - Peeter Laud, Alisa Pankova:
Optimizing Secure Computation Programs with Private Conditionals. 942 - Nirvan Tyagi, Yossi Gilad, Matei Zaharia, Nickolai Zeldovich:
Stadium: A Distributed Metadata-Private Messaging System. 943 - Jun Furukawa
, Yehuda Lindell, Ariel Nof, Or Weinstein:
High-Throughput Secure Three-Party Computation for Malicious Adversaries and an Honest Majority. 944 - Kostas Papapagiannopoulos:
High throughput in slices: the case of PRESENT, PRINCE and KATAN64 ciphers. 945 - Wouter de Groot, Kostas Papagiannopoulos, Antonio de la Piedra, Erik Schneider, Lejla Batina:
Bitsliced Masking and ARM: Friends or Foes? 946 - Ernest Hunter Brooks, Dimitar Jetchev, Benjamin Wesolowski:
Isogeny graphs of ordinary abelian varieties. 947 - Foteini Baldimtsi, Dimitrios Papadopoulos, Stavros Papadopoulos, Alessandra Scafuro, Nikos Triandopoulos:
Secure Computation in Online Social Networks. 948 - Jongkil Kim, Willy Susilo, Fuchun Guo, Man Ho Au:
Functional Encryption for Computational Hiding in Prime Order Groups via Pair Encodings. 949 - Zhongxiang Zheng, Xiaoyun Wang, Yang Yu:
Orthogonalized Lattice Enumeration for Solving SVP. 950 - Geoffroy Couteau:
Revisiting Covert Multiparty Computation. 951 - Christoph Dobraunig, Maria Eichlseder, Stefan Mangard, Florian Mendel, Thomas Unterluggauer:
ISAP - Authenticated Encryption Inherently Secure Against Passive Side-Channel Attacks. 952 - Linfeng Zhou:
Collusion Resistant Broadcast Encryption with Tight Reductions and Beyond. 953 - WeiGuo Zhang, Enes Pasalic:
Improving the lower bound on the maximum nonlinearity of 1-resilient Boolean functions and designing functions satisfying all cryptographic criteria. 954 - Massimo Bartoletti, Roberto Zunino:
Constant-deposit multiparty lotteries on Bitcoin. 955 - Jacques Patarin:
Two Simple Composition Theorems with H-coefficients. 956 - Thomas Espitau, Pierre-Alain Fouque, Alexandre Gélin, Paul Kirchner:
Computing generator in cyclotomic integer rings. 957 - Michal Zielinski:
SafeDeflate: compression without leaking secrets. 958 - Shashank Agrawal, Venkata Koppula, Brent Waters:
Impossibility of Simulation Secure Functional Encryption Even with Random Oracles. 959 - Gorjan Alagic, Alexander Russell:
Quantum-Secure Symmetric-Key Cryptography Based on Hidden Shifts. 960 - Joshua Fried, Pierrick Gaudry, Nadia Heninger, Emmanuel Thomé:
A kilobit hidden SNFS discrete logarithm computation. 961 - Nir Bitansky, Huijia Lin, Omer Paneth:
On Removing Graded Encodings from Functional Encryption. 962 - Craig Costello, David Jao, Patrick Longa, Michael Naehrig, Joost Renes, David Urbanik:
Efficient compression of SIDH public keys. 963 - Lorenzo Grassi, Christian Rechberger:
Practical low data-complexity subspace-trail cryptanalysis of round-reduced PRINCE. 964 - Maciej Skorski
:
A Cryptographic Proof of Regularity Lemmas. 965 - Bahram Rashidi, Sayed Masoud Sayedi, Reza Rezaeian Farashahi:
High-speed VLSI implementation of Digit-serial Gaussian normal basis Multiplication over GF(2m). 966 - Pei Luo, Yunsi Fei:
Faulty Clock Detection for Crypto Circuits Against Differential Fault Analysis Attack. 967 - Pei Luo, Chao Luo, Yunsi Fei:
System Clock and Power Supply Cross-Checking for Glitch Detection. 968 - Marshall Ball
, Tal Malkin, Mike Rosulek:
Garbling Gadgets for Boolean and Arithmetic Circuits. 969 - Liwei Zhang, A. Adam Ding, Yunsi Fei, Zhen Hang Jiang:
Statistical Analysis for Access-Driven Cache Attacks Against AES. 970 - Boris Skoric, Pepijn W. H. Pinkse, Allard P. Mosk:
Authenticated communication from Quantum Readout of PUFs. 971 - Helene Haagh, Yue Ji, Chenxing Li, Claudio Orlandi, Yifan Song:
Revealing Encryption for Partial Ordering. 972 - Jian Guo, Jérémy Jean, Ivica Nikolic, Yu Sasaki, Siang Meng Sim:
Invariant Subspace Attack Against Midori64 and The Resistance Criteria for S-box Designs. 973 - Khoa Nguyen, Huaxiong Wang, Juanyang Zhang:
Server-Aided Revocable Identity-Based Encryption from Lattices. 974 - Gina Gallegos-García, Vincenzo Iovino, Alfredo Rial, Peter B. Rønne, Peter Y. A. Ryan:
(Universal) Unconditional Verifiability in E-Voting without Trusted Parties. 975 - Ran Cohen, Chris Peikert:
On Adaptively Secure Multiparty Computation with a Short CRS. 976 - Frederik Armknecht, Colin Boyd, Gareth T. Davies, Kristian Gjøsteen, Mohsen Toorani:
Side channels in deduplication: trade-offs between leakage and efficiency. 977 - Muhammad Yasin, Ozgur Sinanoglu, Jeyavijayan Rajendran:
Testing the Trustworthiness of IC Testing: An Oracle-less Attack on IC Camouflaging. 978 - Zhengjun Cao, Lihua Liu:
The Reason Why Some Divide-and-Conquer Algorithms Cannot Be Efficiently Implemented. 979 - Ning Zhang, Kun Sun, Deborah Shands, Wenjing Lou, Y. Thomas Hou:
TruSpy: Cache Side-Channel Information Leakage from the Secure World on ARM Devices. 980 - Wakaha Ogata, Kaoru Kurosawa:
Efficient No-dictionary Verifiable SSE. 981 - Christopher Huth, Daniela Becker, Jorge Guajardo, Paul Duplys, Tim Güneysu:
Securing Systems with Scarce Entropy: LWE-Based Lossless Computational Fuzzy Extractor for the IoT. 982 - Avijit Dutta, Ashwin Jha, Mridul Nandi:
Exact Security Analysis of Hash-then-Mask Type Probabilistic MAC Constructions. 983 - Daniel Dinu, Léo Perrin, Aleksei Udovenko, Vesselin Velichkov, Johann Großschädl, Alex Biryukov:
Design Strategies for ARX with Provable Bounds: SPARX and LAX (Full Version). 984 - Dario Fiore, Cédric Fournet, Esha Ghosh, Markulf Kohlweiss, Olga Ohrimenko, Bryan Parno:
Hash First, Argue Later: Adaptive Verifiable Computations on Outsourced Data. 985 - Joppe W. Bos, Simon Friedberger:
Fast Arithmetic Modulo 2xpy± 1. 986 - Sylvain Guilley, Annelie Heuser, Olivier Rioul:
A Key to Success - Success Exponents for Side-Channel Distinguishers. 987 - Eli Ben-Sasson, Alessandro Chiesa, Michael A. Forbes, Ariel Gabizon, Michael Riabzev, Nicholas Spooner:
On Probabilistic Checking in Perfect Zero Knowledge. 988 - Joël Alwen, Binyi Chen, Krzysztof Pietrzak, Leonid Reyzin, Stefano Tessaro:
Scrypt is Maximally Memory-Hard. 989 - Tomer Ashur, Tim Beyne, Vincent Rijmen:
Revisiting the Wrong-Key-Randomization Hypothesis. 990 - Juan A. Garay, Aggelos Kiayias, Nikos Leonardos, Giorgos Panagiotakos:
Bootstrapping the Blockchain - Directly. 991 - Matthew Amy, Olivia Di Matteo, Vlad Gheorghiu, Michele Mosca, Alex Parent, John M. Schanck:
Estimating the cost of generic quantum pre-image attacks on SHA-2 and SHA-3. 992 - Liran Lerman, Olivier Markowitch, Nikita Veshchikov:
Comparing Sboxes of Ciphers from the Perspective of Side-Channel Attacks. 993 - Leonid Reyzin, Dmitry Meshkov, Alexander Chepurnoy, Sasha Ivanov:
Improving Authenticated Dynamic Dictionaries, with Applications to Cryptocurrencies. 994 - Luke Valenta, David Adrian, Antonio Sanso, Shaanan Cohney, Joshua Fried, Marcella Hastings, J. Alex Halderman, Nadia Heninger:
Measuring small subgroup attacks against Diffie-Hellman. 995 - Francesco Berti, François Koeune, Olivier Pereira, Thomas Peters, François-Xavier Standaert:
Leakage-Resilient and Misuse-Resistant Authenticated Encryption. 996 - Carsten Baum, Ivan Damgård, Sabine Oechsner, Chris Peikert:
Efficient Commitments and Zero-Knowledge Protocols from Ring-SIS with Applications to Lattice-based Threshold Cryptosystems. 997 - Yilei Chen, Craig Gentry, Shai Halevi:
Cryptanalyses of Candidate Branching Program Obfuscators. 998 - Kristen Dorey, Nicholas Chang-Fong, Aleksander Essex:
Indiscreet Logs: Persistent Diffie-Hellman Backdoors in TLS. 999 - (Withdrawn) Solving Trapdoor Basis of Ideal Lattice from Public Basis. 1000
- Amit Jana, Goutam Paul:
Revisiting RC4 Key Collision: Faster Search Algorithm and New 22-byte Colliding Key Pairs. 1001 - Anders Smedstuen Lund, Martin Strand:
Decryption phase in Norwegian electronic voting. 1002 - Daniel Apon, Nico Döttling, Sanjam Garg
, Pratyay Mukherjee:
Cryptanalysis of Indistinguishability Obfuscations of Circuits over GGH13. 1003 - Stefan Dziembowski
, Sebastian Faust, François-Xavier Standaert:
Private Circuits III: Hardware Trojan-Resilience via Testing Amplification. 1004 - Subhadeep Banik, Andrey Bogdanov, Francesco Regazzoni:
Atomic-AES v 2.0. 1005 - Aanchal Malhotra, Matthew Van Gundy, Mayank Varia, Haydn Kennedy, Jonathan Gardner, Sharon Goldberg:
The Security of NTP's Datagram Protocol. 1006 - Nicola Atzei, Massimo Bartoletti, Tiziana Cimoli:
A survey of attacks on Ethereum smart contracts. 1007 - Jorge Munilla:
KP+ : Fixing Availability Issues on KP Ownership Transfer Protocols. 1008 - Tobias Nilges:
Efficient Resettably Secure Two-Party Computation. 1009 - Yossi Gilad, Avichai Cohen, Amir Herzberg, Michael Schapira, Haya Schulmann:
Are We There Yet? On RPKI's Deployment and Security. 1010 - Jean-Sébastien Coron, Moon Sung Lee, Tancrède Lepoint, Mehdi Tibouchi:
Zeroizing Attacks on Indistinguishability Obfuscation over CLT13. 1011 - Damien Vergnaud:
Comment on "Attribute-Based Signatures for Supporting Anonymous Certification" by N. Kaaniche and M. Laurent (ESORICS 2016). 1012 - Katriel Cohn-Gordon, Cas Cremers, Benjamin Dowling, Luke Garratt, Douglas Stebila:
A Formal Security Analysis of the Signal Messaging Protocol. 1013 - Liqun Chen, Thalia M. Laing, Keith M. Martin:
Revisiting and Extending the AONT-RS scheme: a Robust Computationally Secure Secret Sharing Scheme. 1014 - Yossi Gilad, Omar Sagga, Sharon Goldberg:
MaxLength Considered Harmful to the RPKI. 1015 - Mihir Bellare, Bertram Poettering, Douglas Stebila:
Deterring Certificate Subversion: Efficient Double-Authentication-Preventing Signatures. 1016 - Douglas Stebila, Michele Mosca:
Post-Quantum Key Exchange for the Internet and the Open Quantum Safe Project. 1017 - Stephanos Matsumoto, Raphael M. Reischuk:
IKP: Turning a PKI Around with Blockchains. 1018 - Anamaria Costache, Nigel P. Smart, Srinivas Vivek:
Faster Homomorphic Evaluation of Discrete Fourier Transforms. 1019 - Yu Chen, Jiang Zhang, Yi Deng, Jinyong Chang:
KDM Security for Identity-Based Encryption: Constructions and Separations. 1020 - Yan Yan, Elisabeth Oswald, Theo Tryfonas:
Cryptographic Randomness on a CC2538: a Case Study. 1021 - Eleonora Guerrini, Laurent Imbert, Théo Winterhalter:
Randomized Mixed-Radix Scalar Multiplication. 1022 - Michael Hutter, Michael Tunstall:
Constant-Time Higher-Order Boolean-to-Arithmetic Masking. 1023 - Rauf Mahmudlu, Valentina Banciu, Lejla Batina, Ileana Buhan:
LDA-Based Clustering as a Side-Channel Distinguisher. 1024 - Wenlun Pan, Zhenzhen Bao
, Dongdai Lin, Feng Liu:
An Algorithm for Counting the Number of 2n-Periodic Binary Sequences with Fixed k-Error Linear Complexity. 1025 - Paulo S. L. M. Barreto, Patrick Longa, Michael Naehrig, Jefferson E. Ricardini, Gustavo H. M. Zanon:
Sharper Ring-LWE Signatures. 1026 - Rafael Pass, Elaine Shi, Florian Tramèr
:
Formal Abstractions for Attested Execution Secure Processors. 1027 - Mihir Bellare, Asha Camper Singh, Joseph Jaeger, Maya Nyayapati, Igors Stepanovs:
Ratcheted Encryption and Key Exchange: The Security of Messaging. 1028 - Yuqiao Deng, Ge Song:
Scalable Attribute-Based Encryption Under the Strictly Weaker Assumption Family. 1029 - Yuqiao Deng, Ge Song:
Novel Inner Product Encryption Resistant to Partial Collusion Attacks. 1030 - Durga Prasad Sahoo, Debdeep Mukhopadhyay, Rajat Subhra Chakraborty, Phuong Ha Nguyen:
A Multiplexer based Arbiter PUF Composition with Enhanced Reliability and Security. 1031 - Stanislaw Jarecki:
Efficient Covert Two-Party Computation. 1032 - Alessandro Chiesa, Matthew Green, Jingcheng Liu, Peihan Miao, Ian Miers, Pratyush Mishra:
Decentralized Anonymous Micropayments. 1033 - Arka Rai Choudhuri, Subhamoy Maitra:
Significantly Improved Multi-bit Differentials for Reduced Round Salsa and ChaCha. 1034 - Maciej Skorski
:
Improved Estimation of Collision Entropy in High and Low-Entropy Regimes and Applications to Anomaly Detection. 1035 - Zhiyuan Guo, Renzhang Liu, Wenling Wu, Dongdai Lin:
Direct Construction of Lightweight Rotational-XOR MDS Diffusion Layers. 1036 - Dawid Gawel, Maciej Kosarzecki, Poorvi L. Vora, Hua Wu, Filip Zagórski:
Apollo - End-to-end Verifiable Internet Voting with Recovery from Vote Manipulation. 1037 - Shifeng Sun, Joseph K. Liu, Amin Sakzad, Ron Steinfeld, Tsz Hon Yuen:
An Efficient Non-Interactive Multi-client Searchable Encryption with Support for Boolean Queries. 1038 - Simon Cogliani, Rémi Géraud, David Naccache:
A Fiat-Shamir Implementation Note. 1039 - (Withdrawn) Semi-Honest Secure Multiparty Computation Can Be Insecure with Use of Even Almost Uniformly Random Number Generators. 1040
- Chia-Mu Yu:
XDedup: Efficient Provably-Secure Cross-User Chunk-Level Client-Side Deduplicated Cloud Storage of Encrypted Data. 1041 - Leon Groot Bruinderink, Andreas Hülsing:
"Oops, I did it again" - Security of One-Time Signatures under Two-Message Attacks. 1042 - Brandon Broadnax, Nico Döttling, Gunnar Hartung, Jörn Müller-Quade, Matthias Nagel:
Concurrently Composable Security With Shielded Super-polynomial Simulators. 1043 - Brian Koziel, Reza Azarderakhsh, Mehran Mozaffari Kermani:
Fast Hardware Architectures for Supersingular Isogeny Diffie-Hellman Key Exchange on FPGA. 1044 - Brian Koziel, Reza Azarderakhsh, David Jao, Mehran Mozaffari Kermani:
On Fast Calculation of Addition Chains for Isogeny-Based Cryptography. 1045 - Angshuman Karmakar, Sujoy Sinha Roy, Frederik Vercauteren, Ingrid Verbauwhede:
Efficient Finite field multiplication for isogeny based post quantum cryptography. 1046 - Eyal Ronen, Colin O'Flynn, Adi Shamir, Achi-Or Weingarten:
IoT Goes Nuclear: Creating a ZigBee Chain Reaction. 1047 - Juan A. Garay, Aggelos Kiayias, Nikos Leonardos:
The Bitcoin Backbone Protocol with Chains of Variable Difficulty. 1048 - Michal Kulis, Pawel Lorek, Filip Zagórski:
Randomized stopping times and provably secure pseudorandom permutation generators. 1049 - Alex van Poppelen:
Cryptographic decoding of the Leech lattice. 1050 - Shuai Han, Shengli Liu, Lin Lyu:
Super-Strong RKA Secure MAC, PKE and SE from Tag-based Hash Proof System. 1051 - Iris Anshel, Derek Atkins, Dorian Goldfeld, Paul E. Gunnells:
Hickory Hash(TM): Implementing an Instance of an Algebraic Eraser(TM) Hash Function on an MSP430 Microcontroller. 1052 - Ashutosh Dhar Dwivedi, Milos Kloucek, Pawel Morawiecki, Ivica Nikolic, Josef Pieprzyk, Sebastian Wójtowicz:
SAT-based Cryptanalysis of Authenticated Ciphers from the CAESAR Competition. 1053 - Giulio Malavolta, Pedro Moreno-Sanchez
, Aniket Kate, Matteo Maffei:
SilentWhispers: Enforcing Security and Privacy in Decentralized Credit Networks. 1054 - Jung Hee Cheon, Kyoohyung Han, Jinsu Kim, Changmin Lee, Yongha Son:
A Practical Post-Quantum Public-Key Cryptosystem Based on spLWE. 1055 - Atsushi Takayasu, Noboru Kunihiro:
A Tool Kit for Partial Key Exposure Attacks on RSA. 1056 - Raad Bahmani, Manuel Barbosa, Ferdinand Brasser, Bernardo Portela, Ahmad-Reza Sadeghi, Guillaume Scerri, Bogdan Warinschi:
Secure Multiparty Computation from SGX. 1057 - Markku-Juhani O. Saarinen:
Ring-LWE Ciphertext Compression and Error Correction: Tools for Lightweight Post-Quantum Cryptography. 1058 - Ping Zhang, Peng Wang, Honggang Hu:
The INT-RUP Security of OCB with Intermediate (Parity) Checksum. 1059 - Jakub Breier:
On Analyzing Program Behavior Under Fault Injection Attacks. 1060 - Joan Daemen:
Changing of the Guards: a simple and efficient method for achieving uniformity in threshold sharing. 1061 - Alin Tomescu, Srinivas Devadas:
Catena: Preventing Lies with Bitcoin. 1062 - Yuzhe Richard Tang, Ju Chen:
Write-Optimized Consistency Verification in Cloud Storage with Minimal Trust. 1063 - David Derler, Stephan Krenn, Daniel Slamanig:
Signer-Anonymous Designated-Verifier Redactable Signatures for Cloud-Based Data Sharing. 1064 - Yasuhiko Ikematsu, Dung Hoang Duong, Albrecht Petzoldt, Tsuyoshi Takagi:
Revisiting the Efficient Key Generation of ZHFE. 1065 - Aner Ben-Efraim, Yehuda Lindell, Eran Omri:
Optimizing Semi-Honest Secure Multiparty Computation for the Internet. 1066 - Ewa Syta, Philipp Jovanovic, Eleftherios Kokoris-Kogias, Nicolas Gailly, Linus Gasser, Ismail Khoffi, Michael J. Fischer, Bryan Ford:
Scalable Bias-Resistant Distributed Randomness. 1067 - Elena Dubrova, Maxim Teslenko:
A SAT-Based Algorithm for Finding Short Cycles in Shift Register Based Stream Ciphers. 1068 - Jesper Buus Nielsen, Thomas Schneider, Roberto Trifiletti:
Constant Round Maliciously Secure 2PC with Function-independent Preprocessing using LEGO. 1069 - Rex Fernando, Peter M. R. Rasmussen, Amit Sahai:
Preventing CLT Zeroizing Attacks on Obfuscation. 1070 - Sergey Gorbunov, Dhinakaran Vinayagamurthy:
Functional Encryption from Secure Enclaves. 1071 - Haruna Higo, Keisuke Tanaka, Akihiro Yamada, Kenji Yasunaga:
Game-Theoretic Security for Two-Party Protocols. 1072 - Daniel Slamanig, Raphael Spreitzer, Thomas Unterluggauer:
Group Signatures with Linking-Based Revocation: A Pragmatic Approach for Efficient Revocation Checks. 1073 - Thomas Unterluggauer, Mario Werner, Stefan Mangard:
Side-Channel Plaintext-Recovery Attacks on Leakage-Resilient Encryption. 1074 - Chunsheng Gu:
Cryptanalysis of Simple Matrix Scheme for Encryption. 1075 - Mark Zhandry:
A Note on Quantum-Secure PRPs. 1076 - Nikolaos P. Karvelas, Andreas Peter, Stefan Katzenbeisser:
Blurry-ORAM: A Multi-Client Oblivious Storage Architecture. 1077 - Deng Tang, Subhamoy Maitra:
Construction of n-variable (n ≡ 2 mod 4) balanced Boolean functions with maximum absolute value in autocorrelation spectra < 2n/2. 1078 - Dung Hoang Duong, Albrecht Petzoldt, Yacheng Wang, Tsuyoshi Takagi:
Revisiting the Cubic UOV Signature Scheme. 1079 - Thomas De Cnudde, Begül Bilgin
, Benedikt Gierlichs, Ventzislav Nikov, Svetla Nikova, Vincent Rijmen:
Does Coupling Affect the Security of Masked Implementations? 1080 - David Nuñez, Isaac Agudo, Javier López:
Attacks to a proxy-mediated key agreement protocol based on symmetric encryption. 1081 - Si Gao, Hua Chen, Wenling Wu, Limin Fan, Weiqiong Cao, Xiangliang Ma:
My traces learn what you did in the dark: recovering secret signals without key guesses. 1082 - Dingding Jia, Xianhui Lu, Bao Li:
Constructions Secure against Receiver Selective Opening and Chosen Ciphertext Attacks. 1083 - T.-H. Hubert Chan, Elaine Shi:
Circuit OPRAM: A (Somewhat) Tight Oblivious Parallel RAM. 1084 - David Derler, Claudio Orlandi, Sebastian Ramacher, Christian Rechberger, Daniel Slamanig:
Digital Signatures from Symmetric-Key Primitives. 1085 - Reyhaneh Rabaninejad, Mohammad Hassan Ameri, Mahshid Delavar, Javad Mohajeri:
An Attribute-Based Anonymous Broadcast Encryption Scheme with Adaptive Security in the Standard Model. 1086 - Tetsu Iwata, Bart Mennink, Damian Vizár:
CENC is Optimally Secure. 1087 - Anat Paskin-Cherniavsky:
How to infinitely share a secret more efficiently. 1088 - Jérémy Chotard, Duong Hieu Phan, David Pointcheval:
Homomorphic-Policy Attribute-Based Key Encapsulation Mechanisms. 1089 - Ritam Bhaumik, Mridul Nandi:
OleF: An Inverse-Free Online Cipher. 1090 - Yuan Ma, Jingqiang Lin, Jiwu Jing:
On the Entropy of Oscillator-Based True Random Number Generators. 1091 - Alexandre Gélin, Thorsten Kleinjung, Arjen K. Lenstra:
Parametrizations for Families of ECM-friendly curves. 1092 - Siva Nishok Dhanuskodi, Daniel E. Holcomb:
Energy Optimization of Unrolled Block Ciphers using Combinational Checkpointing. 1093 - Yohei Watanabe, Keita Emura, Jae Hong Seo:
New Revocable IBE in Prime-Order Groups: Adaptively Secure, Decryption Key Exposure Resistant, and with Short Public Parameters. 1094 - Noboru Kunihiro, Yuki Takahashi:
Improved Key Recovery Algorithms from Noisy RSA Secret Keys with Analog Noise. 1095 - Huijia Lin:
Indistinguishability Obfuscation from DDH on 5-linear Maps and Locality-5 PRGs. 1096 - Prabhanjan Ananth, Amit Sahai:
Projective Arithmetic Functional Encryption and Indistinguishability Obfuscation From Degree-5 Multilinear Maps. 1097 - Zhiyuan Guo, Wenling Wu, Renzhang Liu, Liting Zhang:
Multi-key Analysis of Tweakable Even-Mansour with Applications to Minalpher and OPP. 1098 - Arjun Chopra:
Improved Parameters for the Ring-TESLA Digital Signature Scheme. 1099 - Quentin Alamélou, Paul-Edmond Berthier, Stéphane Cauchie, Philippe Gaborit:
Practical Reusable Fuzzy Extractors for the Set Difference Metric and Adaptive Fuzzy Extractors. 1100 - Ling Sun, Wei Wang, Ru Liu, Meiqin Wang:
MILP-Aided Bit-Based Division Property for ARX-Based Block Cipher. 1101 - Alfred Menezes, Palash Sarkar, Shashank Singh:
Challenges with Assessing the Impact of NFS Advances on the Security of Pairing-based Cryptography. 1102 - Debrup Chakraborty, Sebati Ghosh, Palash Sarkar:
A Fast Single-Key Two-Level Universal Hash Function. 1103 - Carmen Elisabetta Zaira Baltico, Dario Catalano, Dario Fiore:
Practical Functional Encryption for Bilinear Forms. 1104 - Miguel Ambrona, Gilles Barthe, Benedikt Schmidt:
Generic Transformations of Predicate Encodings: Constructions and Applications. 1105 - Romain Gay:
Functional Encryption for Quadratic Functions, and Applications to Predicate Encryption. 1106 - Yi Deng:
Magic Adversaries Versus Individual Reduction: Science Wins Either Way. 1107 - Guozhen Liu, Mohona Ghosh, Song Ling:
Security Analysis of SKINNY under Related-Tweakey Settings. 1108 - Tobias Oder, Tobias Schneider, Thomas Pöppelmann, Tim Güneysu:
Practical CCA2-Secure and Masked Ring-LWE Implementation. 1109 - Steven Goldfeder, Melissa Chase, Greg Zaverucha
:
Efficient Post-Quantum Zero-Knowledge and Signatures. 1110 - Pascal Sasdrich, Amir Moradi, Tim Güneysu:
Hiding Higher-Order Side-Channel Leakage - Randomizing Cryptographic Implementations in Reconfigurable Hardware. 1111 - Victor Cauchois, Pierre Loidreau, Nabil Merkiche:
Direct construction of quasi-involutory recursive-like MDS matrices from 2-cyclic codes. 1112 - Sabyasachi Dutta, Tamal Bhore, Avishek Adhikari:
Efficient Construction of Visual Cryptographic Scheme for Compartmented Access Structures. 1113 - Louiza Khati, Nicky Mouha, Damien Vergnaud:
Full Disk Encryption: Bridging Theory and Practice. 1114 - Mohamed Tolba, Ahmed Abdelkhalek, Amr M. Youssef:
Impossible Differential Cryptanalysis of Reduced-Round SKINNY. 1115 - Maciej Skorski
:
Evaluating Entropy for TRNGs: Efficient, Robust and Provably Secure. 1116 - Joppe W. Bos, Wouter Castryck, Ilia Iliashenko, Frederik Vercauteren:
Privacy-friendly Forecasting for the Smart Grid using Homomorphic Encryption and the Group Method of Data Handling. 1117 - Ruoxin Zhao, Baofeng Wu, Rui Zhang, Qian Zhang:
Designing Optimal Implementations of Linear Layers (Full Version). 1118 - Quentin Alamélou, Olivier Blazy, Stéphane Cauchie, Philippe Gaborit:
A Code-Based Group Signature Scheme. 1119 - Sadegh Sadeghi, Tahere Mohammadi, Nasour Bagheri:
Cryptanalysis of Reduced round SKINNY Block Cipher. 1120 - Farzaneh Abed, Francesco Berti, Stefan Lucks:
Insecurity of RCB: Leakage-Resilient Authenticated Encryption. 1121 - Boris Skoric, Manon de Vries:
Quantum Key Recycling with eight-state encoding (The Quantum One Time Pad is more interesting than we thought). 1122 - Oscar Reparaz, Josep Balasch, Ingrid Verbauwhede:
Dude, is my code constant time? 1123 - Kazuya Imamura, Kazuhiko Minematsu, Tetsu Iwata:
Integrity Analysis of Authenticated Encryption Based on Stream Ciphers. 1124 - (Withdrawn) Estonian Voting Verification Mechanism Revisited. 1125
- Jung Hee Cheon, Duhyeong Kim, Joohee Lee, Yong Soo Song:
Lizard: Cut off the Tail! // Practical Post-Quantum Public-Key Encryption from LWE and LWR. 1126 - Ralph Ankele, Subhadeep Banik, Avik Chakraborti, Eik List, Florian Mendel, Siang Meng Sim, Gaoli Wang:
Related-Key Impossible-Differential Attack on Reduced-Round SKINNY. 1127 - Martin Ekerå:
Modifying Shor's algorithm to compute short discrete logarithms. 1128 - (Withdrawn) Certificateless Public Key Encryption with Equality Test. 1129
- Atakan Arslan, Süleyman Kardas, Sultan Aldirmaz Çolak, Sarp Ertürk:
Are RNGs Achilles' heel of RFID Security and Privacy Protocols ? 1130 - Shiyi Zhang, Yongjuan Wang, Yang Gao, Tao Wang:
On the Construction of the lightest Circulant MDS Matrices. 1131 - Dibyendu Roy, Sourav Mukhopadhyay:
Some results on ACORN. 1132 - Pedro Maat C. Massolino, Joost Renes, Lejla Batina:
Implementing Complete Formulas on Weierstrass Curves in Hardware. 1133 - Qiang Tang
, Husen Wang:
Privacy-preserving Hybrid Recommender System. 1134 - Thorben Moos, Amir Moradi, Bastian Richter:
Static Power Side-Channel Analysis of a Threshold Implementation Prototype Chip. 1135 - Duong Hieu Phan, Neal Koblitz:
Cryptography during the French and American Wars in Vietnam. 1136 - Hochang Lee, HyungChul Kang, Deukjo Hong, Jaechul Sung, Seokhie Hong:
New Impossible Differential Characteristic of SPECK64 using MILP. 1137 - Takeshi Koshiba, Katsuyuki Takashima:
Pairing Cryptography Meets Isogeny: A New Framework of Isogenous Pairing Groups. 1138 - (Withdrawn) Comments on "Flaw in the Security Analysis of Leakage-resilient Authenticated Key Exchange Protocol from CT-RSA 2016 and Restoring the Security Proof". 1139
- Xiaoyi Li, Kaitai Liang, Zhen Liu, Duncan S. Wong:
Attribute Based Encryption: Traitor Tracing, Revocation and Fully Security on Prime Order Groups. 1140 - Kartik Nayak, Jonathan Katz:
An Oblivious Parallel RAM with O(log2 N) Parallel Runtime Blowup. 1141 - Shiyi Zhang, Yongjuan Wang, Guangpu Gao:
New construction of single-cycle T-function families. 1142 - Yongbo Hu, Chen Zhang, Yeyang Zheng, Mathias Wagner:
Ciphertext and Plaintext Leakage Reveals the Entire TDES Key. 1143 - Xavier Carpent, Sky Faber, Tomas Sander, Gene Tsudik:
Private Projections & Variants. 1144 - Merrielle Spain, Mayank Varia:
Evolving S-Boxes with Reduced Differential Power Analysis Susceptibility. 1145 - Zengpeng Li, Steven D. Galbraith, Chunguang Ma:
Preventing Adaptive Key Recovery Attacks on the Gentry-Sahai-Waters Leveled Homomorphic Encryption Scheme. 1146 - Nasrollah Pakniat, Mahnaz Noroozi:
Cryptanalysis of a certificateless aggregate signature scheme. 1147 - Frank Wang, Catherine Yun, Shafi Goldwasser, Vinod Vaikuntanathan, Matei Zaharia:
Splinter: Practical Private Queries on Public Data. 1148 - Krishna Bagadia, Urbi Chatterjee, Debapriya Basu Roy, Debdeep Mukhopadhyay, Rajat Subhra Chakraborty:
Exploiting Safe Error based Leakage of RFID Authentication Protocol using Hardware Trojan Horse. 1149 - Rio LaVigne:
Simple Homomorphisms of Cocks IBE and Applications. 1150 - Mike Scott:
A Novel Multi-factor ID-based Designated Verifier Signature scheme. 1151 - Debapriya Basu Roy, Shivam Bhasin, Sikhar Patranabis, Debdeep Mukhopadhyay, Sylvain Guilley:
What Lies Ahead: Extending TVLA Testing Methodology Towards Success Rate. 1152 - Momonari Kudo:
Attacks against search Poly-LWE. 1153 - Steven D. Galbraith, Christophe Petit, Javier Silva:
Signature Schemes Based On Supersingular Isogeny Problems. 1154 - Mathias Wagner, Yongbo Hu, Chen Zhang, Yeyang Zheng:
Comparative Study of Various Approximations to the Covariance Matrix in Template Attacks. 1155 - Pablo Lamela Seijas, Simon J. Thompson, Darryl McAdams:
Scripting smart contracts for distributed ledger technology. 1156 - Erdem Alkim, Léo Ducas, Thomas Pöppelmann, Peter Schwabe:
NewHope without reconciliation. 1157 - Eric R. Verheul:
Activate Later Certificates for V2X - Combining ITS efficiency with privacy. 1158 - Yonatan Sompolinsky, Yoad Lewenberg, Aviv Zohar:
SPECTRE: A Fast and Scalable Cryptocurrency Protocol. 1159 - Rui Zong, Xiaoyang Dong:
Meet-in-the-Middle Attack on QARMA Block Cipher. 1160 - Rui Zong, Xiaoyang Dong, Xiaoyun Wang:
Impossible Differential Attack on Simpira v2. 1161 - Jian Guo, Jérémy Jean, Ivica Nikolic, Yu Sasaki:
Meet-in-the-Middle Attacks on Classes of Contracting and Expanding Feistel Constructions. 1162 - Wenjie Lu, Shohei Kawasaki, Jun Sakuma:
Using Fully Homomorphic Encryption for Statistical Analysis of Categorical, Ordinal and Numerical Data. 1163 - Ilaria Chillotti, Nicolas Gama, Louis Goubin:
Attacking FHE-based applications by software fault injections. 1164 - Stuart Haber, William G. Horne, Miaomiao Zhang:
Efficient Transparent Redactable Signatures with a Single Signature Invocation. 1165 - María Isabel González Vasco, Angel L. Pérez del Pozo, Adriana Suárez Corona:
Group key exchange protocols withstanding ephemeral-key reveals. 1166 - Sumit Chakraborty:
Mobile Commerce: Secure Multi-party Computation & Financial Cryptography. 1167 - (Withdrawn) Generic Zero-Knowledge and Multivariate Quadratic Systems. 1168
- Qi Cheng, Jincheng Zhuang:
LWE from Non-commutative Group Rings. 1169 - Christoph Dobraunig, Eik List:
Impossible-Differential and Boomerang Cryptanalysis of Round-Reduced Kiasu-BC. 1170 - Roberto Avanzi:
A Salad of Block Ciphers. 1171 - Ping Zhang, Honggang Hu:
On the Provable Security of the Tweakable Even-Mansour Cipher Against Multi-Key and Related-Key Attacks. 1172 - Lijing Zhou, Licheng Wang, Yiru Sun:
Construction of Lightweight MDS Matrices over Matrix Polynomial Residue Ring. 1173 - Eik List, Mridul Nandi:
Revisiting Full-PRF-Secure PMAC and Using It for Beyond-Birthday Authenticated Encryption. 1174 - Dario Catalano, Dario Fiore, Luca Nizzardo:
On the Security Notions for Homomorphic Signatures. 1175 - Jintai Ding, Saed Alsayigh, Saraswathy RV, Scott R. Fluhrer:
Leakage of Signal function with reused keys in RLWE key exchange. 1176 - Achiya Bar-On, Eli Biham, Orr Dunkelman, Nathan Keller:
Efficient Slide Attacks. 1177 - Karthikeyan Bhargavan, Antoine Delignat-Lavaud, Cédric Fournet, Markulf Kohlweiss, Jianyang Pan, Jonathan Protzenko, Aseem Rastogi, Nikhil Swamy, Santiago Zanella Béguelin, Jean Karim Zinzindohoue:
Implementing and Proving the TLS 1.3 Record Layer. 1178 - Afonso Arriaga, Vincenzo Iovino, Qiang Tang
:
Updatable Functional Encryption. 1179 - (Withdrawn) How to Meet Big Data When Private Set Intersection Realizes Constatnt Communication Complexity. 1180
- Yu Sasaki, Yosuke Todo:
New Impossible Differential Search Tool from Design and Cryptanalysis Aspects. 1181 - Hyung Tae Lee, San Ling, Jae Hong Seo, Huaxiong Wang, Taek-Young Youn:
Public Key Encryption with Equality Test in the Standard Model. 1182 - Lilya Budaghyan, Tor Helleseth, Nian Li, Bo Sun:
Some Results on the Known Classes of Quadratic APN Functions. 1183 - Sergi Delgado-Segura, Cristina Pérez-Solà, Jordi Herrera-Joancomartí, Guillermo Navarro-Arribas:
Bitcoin Private Key Locked Transactions. 1184 - (Withdrawn) A Digital Signature Scheme Based On Supersingular Isogeny Problem. 1185
- Maciej Skorski
:
On the Complexity of Breaking Pseudoentropy. 1186 - Emmanuel Fouotsa, Nadia El Mrabet, Aminatou Pecha:
Optimal Ate Pairing on Elliptic Curves with Embedding Degree 9, 15 and 27. 1187 - Guido Bertoni, Joan Daemen, Michaël Peeters, Gilles Van Assche, Ronny Van Keer:
Farfalle: parallel permutation-based cryptography. 1188 - Barak Shani:
On the Bit Security of Elliptic Curve Diffie-Hellman. 1189 - Ran Canetti, Oxana Poburinnaya, Muthuramakrishnan Venkitasubramaniam:
Equivocating Yao: Constant-Round Adaptively Secure Multiparty Computation in the Plain Model. 1190 - Peter T. Breuer, Jonathan P. Bowen:
On the Security of Practical and Complete Homomorphic Encrypted Computation. 1191 - Antonio Faonio
, Jesper Buus Nielsen:
Non-Malleable Codes with Split-State Refresh. 1192 - Peter T. Breuer, Jonathan P. Bowen:
Superscalar Encrypted RISC: A Secret Computer in Simulation. 1193 - Carlos Aguilar Melchor, Olivier Blazy, Jean-Christophe Deneuville, Philippe Gaborit, Gilles Zémor:
Efficient Encryption from Random Quasi-Cyclic Codes. 1194 - Cesar Pereida García, Billy Bob Brumley:
Constant-Time Callees with Variable-Time Callers. 1195 - Gorka Irazoqui, Thomas Eisenbarth, Berk Sunar:
MASCAT: Stopping Microarchitectural Attacks Before Execution. 1196

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.