default search action
IACR Cryptology ePrint Archive, Volume 2015
Volume 2015, 2015
- Oscar Reparaz:
A note on the security of Higher-Order Threshold Implementations. 1 - Baodong Qin, Shengli Liu, Tsz Hon Yuen, Robert H. Deng, Kefei Chen:
Continuous Non-Malleable Key Derivation and Its Application to Related-Key Security. 3 - Carmit Hazay:
Oblivious Polynomial Evaluation and Secure Set-Intersection from Algebraic PRFs. 4 - Srinivas Devadas, Marten van Dijk, Christopher W. Fletcher, Ling Ren:
Onion ORAM: A Constant Bandwidth and Constant Client Storage ORAM (without FHE or SWHE). 5 - Jan Camenisch, Robert R. Enderlein, Gregory Neven:
Two-Server Password-Authenticated Secret Sharing UC-Secure Against Transient Corruptions. 6 - Tobias Pulls, Roel Peeters:
Balloon: A Forward-Secure Append-Only Persistent Authenticated Data Structure. 7 - Satrajit Ghosh, Aniket Kate:
Post-Quantum Secure Onion Routing (Future Anonymity in Today's Budget). 8 - Donghoon Chang, Arpan Jati, Sweta Mishra, Somitra Kumar Sanadhya:
Rig: A simple, secure and flexible design for Password Hashing. 9 - Shengli Liu, Kenneth G. Paterson:
Simulation-based Selective Opening CCA Security for PKE from Key Encapsulation Mechanisms. 10 - Benjamin Buhrow, Paul Riemer, Mike Shea, Barry K. Gilbert, Erik S. Daniel:
Block Cipher Speed and Energy Efficiency Records on the MSP430: System Design Trade-Offs for 16-bit Embedded Applications. 11 - Tancrède Lepoint, Mehdi Tibouchi:
Cryptanalysis of a (Somewhat) Additively Homomorphic Encryption Scheme Used in PIR. 12 - Nico Döttling:
Low Noise LPN: KDM Secure Public Key Encryption and Sample Amplification. 13 - San Ling, Khoa Nguyen, Huaxiong Wang:
Group Signatures from Lattices: Simpler, Tighter, Shorter, Ring-based. 14 - Florian Bergsma, Tibor Jager, Jörg Schwenk:
One-Round Key Exchange with Strong Security: An Efficient and Generic Construction in the Standard Model. 15 - Yannis Rouselakis, Brent Waters:
Efficient Statically-Secure Large-Universe Multi-Authority Attribute-Based Encryption. 16 - Michel Abdalla, Florian Bourse, Angelo De Caro, David Pointcheval:
Simple Functional Encryption Schemes for Inner Products. 17 - Jintai Ding, Alexei Miasnikov, Alexander Ushakov:
A Linear Attack on a Key Exchange Protocol Using Extensions of Matrix Semigroups. 18 - Gilles Barthe, Edvard Fagerholm, Dario Fiore, Andre Scedrov, Benedikt Schmidt, Mehdi Tibouchi:
Strongly-Optimal Structure Preserving Signatures from Type II Pairings: Synthesis and Lower Bounds. 19 - Phong Q. Nguyen, Jiang Zhang, Zhenfeng Zhang:
Simpler Efficient Group Signatures from Lattices. 20 - Xin Li:
Non-Malleable Condensers for Arbitrary Min-Entropy, and Almost Optimal Protocols for Privacy Amplification. 21 - Bo Yang, Dengguo Feng, Yu Qin, Yingjun Zhang, Weijin Wang:
TMSUI: A Trust Management Scheme of USB Storage Devices for Industrial Control Systems. 22 - Chunsheng Gu:
Multilinear Maps Using Ideal Lattices without Encodings of Zero. 23 - Evgeni Begelfor, Stephen D. Miller, Ramarathnam Venkatesan:
Non-Abelian Analogs of Lattice Rounding. 24 - Benny Applebaum, Zvika Brakerski:
Obfuscating Circuits via Composite-Order Graded Encoding. 25 - Adam D. Smith, Ye Zhang:
On the Regularity of Lossy RSA: Improved Bounds and Applications to Padding-Based Encryption. 27 - Jeremy Maitin-Shepard:
Optimal software-implemented Itoh-Tsujii inversion for GF(2m). 28 - Sergey Gorbunov, Vinod Vaikuntanathan, Hoeteck Wee:
Predicate Encryption for Circuits from LWE. 29 - Christoph Dobraunig, Maria Eichlseder, Florian Mendel, Martin Schläffer:
Cryptanalysis of Ascon. 30 - Kai-Min Chung, Rafael Pass:
Tight Parallel Repetition Theorems for Public-Coin Arguments using KL-divergence. 31 - Zvika Brakerski, Vinod Vaikuntanathan:
Constrained Key-Homomorphic PRFs from Standard Lattice Assumptions Or: How to Secretly Embed a Circuit in Your PRF. 32 - Christoph Dobraunig, Maria Eichlseder, Stefan Mangard, Florian Mendel:
On the Security of Fresh Re-keying to Counteract Side-Channel and Fault Attacks. 33 - Hannes Groß, Erich Wenger, Christoph Dobraunig, Christoph Ehrenhöfer:
Suit up! Made-to-Measure Hardware Implementations of Ascon. 34 - Elena Dubrova, Mats Näslund, Göran Selander, Fredrik Lindqvist:
Cryptographically Secure CRC for Lightweight Message Authentication. 35 - Billy Bob Brumley:
Faster software for fast endomorphisms. 36 - Da-Zhi Sun, Zahra Ahmadian, Yue-Jiao Wang, Mahmoud Salmasizadeh, Mohammad Reza Aref:
Analysis and Enhancement of Desynchronization Attack on an Ultralightweight RFID Authentication Protocol. 37 - Aloni Cohen, Shafi Goldwasser, Vinod Vaikuntanathan:
Aggregatable Pseudorandom Functions and Connections to Learning. 38 - Véronique Cortier, Fabienne Eigner, Steve Kremer, Matteo Maffei, Cyrille Wiedling:
Type-Based Verification of Electronic Voting Protocols. 39 - Zahra Ahmadian, Shahram Rasoolzadeh, Mahmoud Salmasizadeh, Mohammad Reza Aref:
Automated Dynamic Cube Attack on Block Ciphers: Cryptanalysis of SIMON and KATAN. 40 - Artur Mariano, Thijs Laarhoven, Christian H. Bischof:
Parallel (probable) lock-free HashSieve: a practical sieving algorithm for the SVP. 41 - Rachid El Bansarkhani, Johannes Buchmann:
High Performance Lattice-based CCA-secure Encryption. 42 - Ai Ishida, Keita Emura, Goichiro Hanaoka, Yusuke Sakai, Keisuke Tanaka:
Group Signature with Deniability: How to Disavow a Signature. 43 - Binanda Sengupta, Abhijit Das:
Use of SIMD-Based Data Parallelism to Speed up Sieving in Integer-Factoring Algorithms. 44 - Valentina Banciu, Elisabeth Oswald, Carolyn Whitnall:
Reliable Information Extraction for Single Trace Attacks. 45 - Martin R. Albrecht, Rachel Player, Sam Scott:
On the concrete hardness of Learning with Errors. 46 - Guilhem Castagnos, Fabien Laguillaumie:
Linearly Homomorphic Encryption from DDH. 47 - Ran Canetti, Yael Tauman Kalai, Omer Paneth:
On Obfuscation with Random Oracles. 48 - Sonia Bogos, Florian Tramèr, Serge Vaudenay:
On Solving Lpn using BKW and Variants. 49 - Carla Ràfols:
Stretching Groth-Sahai: NIZK Proofs of Partial Satisfiability. 50 - Li Lin, Wenling Wu:
Improved Meet-in-the-Middle Distinguisher on Feistel Schemes. 51 - Mihir Bellare, Sriram Keelveedhi:
Interactive Message-Locked Encryption and Secure Deduplication. 52 - Peter Gazi, Krzysztof Pietrzak, Stefano Tessaro:
Tight Bounds for Keyed Sponges and Truncated CBC. 53 - Brett Hemenway, Rafail Ostrovsky, Alon Rosen:
Non-committing encryption from Φ-hiding. 54 - Vladimir Kolesnikov, Payman Mohassel, Ben Riva, Mike Rosulek:
Richer Efficiency/Security Trade-offs in 2PC. 55 - Alexandre Duc, Florian Tramèr, Serge Vaudenay:
Better Algorithms for LWE and LWR. 56 - Bertram Poettering, Dale L. Sibborn:
Cold Boot Attacks in the Discrete Logarithm Setting. 57 - Berry Schoenmakers, Meilof Veeningen:
Universally Verifiable Multiparty Computation from Threshold Homomorphic Cryptosystems. 58 - Alexandra Boldyreva, Jean Paul Degabriele, Kenneth G. Paterson, Martijn Stam:
Security of Symmetric Encryption in the Presence of Ciphertext Fragmentation. 59 - Gilles Barthe, Sonia Belaïd, François Dupressoir, Pierre-Alain Fouque, Benjamin Grégoire, Pierre-Yves Strub:
Verified Proofs of Higher-Order Masking. 60 - Gilad Asharov, Yehuda Lindell, Thomas Schneider, Michael Zohner:
More Efficient Oblivious Transfer Extensions with Security for Malicious Adversaries. 61 - Yuval Yarom, Gefei Li, Damith Chinthana Ranasinghe:
Evaluation and Cryptanalysis of the Pandaka Lightweight Cipher. 62 - Ryad Benadjila, Thomas Calderon, Marion Daubignard:
CamlCrush: A PKCS\#11 Filtering Proxy. 63 - Handan Kilinç, Alptekin Küpçü:
Optimally Efficient Multi-Party Fair Exchange and Fair Secure Multi-Party Computation. 64 - Andrey Dmukh, Denis Dygin, Grigory B. Marshalko:
A lightweight-friendly modifcation of GOST block cipher. 65 - Tobias Schneider, Amir Moradi, Tim Güneysu:
Arithmetic Addition over Boolean Masking - Towards First- and Second-Order Resistance in Hardware. 66 - Susumu Kiyoshima:
An Alternative Approach to Non-black-box Simulation in Fully Concurrent Setting. 67 - Gregor Leander, Brice Minaud, Sondre Rønjom:
A Generic Approach to Invariant Subspace Attacks: Cryptanalysis of Robin, iSCREAM and Zorro. 68 - Benoit Cogliati, Yannick Seurin:
On the Provable Security of the Iterated Even-Mansour Cipher against Related-Key and Chosen-Key Attacks. 69 - Gaëtan Leurent, Lei Wang:
The Sum Can Be Weaker Than Each Part. 70 - Jean-Sébastien Coron, Jean-Charles Faugère, Guénaël Renault, Rina Zeitoun:
Factoring N=pr qs for Large r and s. 71 - Olivier Blazy, Céline Chevalier, Damien Vergnaud:
Non-Interactive Zero-Knowledge Proofs of Non-Membership. 72 - Dana Dachman-Soled, Chang Liu, Charalampos Papamanthou, Elaine Shi, Uzi Vishkin:
Oblivious Network RAM. 73 - Gilles Barthe, Juan Manuel Crespo, Yassine Lakhnech, Benedikt Schmidt:
Mind the Gap: Modular Machine-checked Proofs of One-Round Key Exchange Protocols. 74 - Jian Guo, Yu Sasaki, Lei Wang, Meiqin Wang, Long Wen:
Equivalent Key Recovery Attacks against HMAC and NMAC with Whirlpool Reduced to 7 Rounds. 75 - Masayuki Abe, Markulf Kohlweiss, Miyako Ohkubo, Mehdi Tibouchi:
Fully Structure-Preserving Signatures and Shrinking Commitments. 76 - Yuwei Xu, Chuankun Wu:
On the Existence and Constructions of Vectorial Boolean Bent Functions. 77 - Chun-Xiang Gu, Dan Xin, Yonghui Zheng, Yuanji Kang:
Fully Homomorphic Encryption from Ring-LWE:Identity-Based,Arbitrary Cyclotomic,Tighter Parameters. 78 - Jiqiang Lu:
On the Security of the COPA and Marble Authenticated Encryption Algorithms against (Almost) Universal Forgery Attack. 79 - Feng Hao, Xun Yi, Liqun Chen, Siamak Fayyaz Shahandashti:
The Fairy-Ring Dance: Password Authenticated Key Exchange in a Group. 80 - Yan Huang, Jonathan Katz, Vladimir Kolesnikov, Ranjit Kumaresan, Alex J. Malozemoff:
Amortizing Garbled Circuits. 81 - Ihsan Haluk Akin, Berk Sunar:
On the Difficulty of Securing Web Applications using CryptDB. 82 - Massimo Chenal, Qiang Tang:
Key Recovery Attack against an NTRU-type Somewhat Homomorphic Encryption Scheme. 83 - Zhengjun Cao, Lihua Liu:
On the Disadvantages of Pairing-based Cryptography. 84 - Anne Canteaut, Joëlle Roué:
On the behaviors of affine equivalent Sboxes regarding differential and linear attacks. 85 - Patrick Märtens:
Practical Compact E-Cash with Arbitrary Wallet Size. 86 - David Derler, Christian Hanser, Daniel Slamanig:
Revisiting Cryptographic Accumulators, Additional Properties and Relations to other Primitives. 87 - Klaus Kursawe, Christiane Peters:
Structural Weaknesses in the Open Smart Grid Protocol. 88 - Thomas Eisenbarth, Aaron Meyerowitz, Rainer Steinwandt:
On the security margin of MAC striping. 89 - Yosuke Todo:
Structural Evaluation by Generalized Integral Property. 90 - Christoph Dobraunig, Maria Eichlseder, Florian Mendel:
Related-Key Forgeries for Prøst-OTR. 91 - Grasha Jacob, A. Murugan, Irine Viola:
Towards the Generation of a Dynamic Key-Dependent S-Box to Enhance Security. 92 - Murat Cenk, M. Anwar Hasan:
Some New Results on Binary Polynomial Multiplication. 94 - Dmitry Khovratovich, Ivica Nikolic, Josef Pieprzyk, Przemyslaw Sokolowski, Ron Steinfeld:
Rotational Cryptanalysis of ARX Revisited. 95 - Riham AlTawy, Amr M. Youssef:
Meet in the Middle Attacks on Reduced Round Kuznyechik. 96 - Bruce Schneier, Matthew Fredrikson, Tadayoshi Kohno, Thomas Ristenpart:
Surreptitiously Weakening Cryptographic Systems. 97 - Shantian Cheng, Juanyang Zhang:
Adaptive-ID Secure Revocable Identity-Based Encryption from Lattices via Subset Difference Method. 98 - Dirk Achenbach, Jörn Müller-Quade, Jochen Rill:
Universally Composable Firewall Architectures using Trusted Hardware. 99 - Christian Wittke, Zoya Dyka, Peter Langendörfer:
Influence of Electrical Circuits of ECC Designs on Shape of Electromagnetic Traces measured on FPGA. 100 - Nicky Mouha, Atul Luykx:
Multi-Key Security: The Even-Mansour Construction Revisited. 101 - Shay Gueron, Yehuda Lindell:
GCM-SIV: Full Nonce Misuse-Resistant Authenticated Encryption at Under One Cycle per Byte. 102 - Vincenzo Iovino, Karol Zebrowski:
Mergeable Functional Encryption. 103 - Rafael Dowsley, Jörn Müller-Quade, Tobias Nilges:
Weakening the Isolation Assumption of Tamper-proof Hardware Tokens. 104 - Josep Balasch, Sebastian Faust, Benedikt Gierlichs:
Inner Product Masking Revisited. 105 - Yara Elias, Kristin E. Lauter, Ekin Ozman, Katherine E. Stange:
Provably weak instances of Ring-LWE. 106 - Attila Altay Yavuz, Jorge Guajardo:
Dynamic Searchable Symmetric Encryption with Minimal Leakage and Efficient Updates on Commodity Hardware. 107 - Lucjan Hanzlik, Przemyslaw Kubiak, Miroslaw Kutylowski:
Tracing Attacks on U-Prove with Revocation Mechanism. 108 - Shijun Zhao, Qianying Zhang:
sHMQV: An Efficient Key Exchange Protocol for Power-limited Devices. 110 - Steven D. Galbraith, Barak Shani:
The Multivariate Hidden Number Problem. 111 - Satsuya Ohata, Yutaka Kawai, Takahiro Matsuda, Goichiro Hanaoka, Kanta Matsuura:
Re-encryption Verifiability: How to Detect Malicious Activities of a Proxy in Proxy Re-encryption. 112 - Anne Canteaut, Sergiu Carpov, Caroline Fontaine, Tancrède Lepoint, María Naya-Plasencia, Pascal Paillier, Renaud Sirdey:
How to Compress Homomorphic Ciphertexts. 113 - Shai Halevi, William Eric Hall, Charanjit S. Jutla, Arnab Roy:
Weak Ideal Functionalities for Designing Random Oracles with Applications to Fugue. 114 - Muhammad Yasir Malik:
Comprehensive Efficient Implementations of ECC on C54xx Family of Low-cost Digital Signal Processors. 115 - Riadh Brinci, Walid Khmiri, Mefteh Mbarek, Abdellatif Ben Rabaa, Ammar Bouallègue:
Efficient Hardware Design for Computing Pairings Using Few FPGA In-built DSPs. 116 - Maciej Skorski:
Nonuniform Indistinguishability and Unpredictability Hardcore Lemmas: New Proofs and Applications to Pseudoentropy. 117 - Takahiro Matsuda, Goichiro Hanaoka:
Constructing and Understanding Chosen Ciphertext Security via Puncturable Key Encapsulation Mechanisms. 118 - Alexandre Duc, Sebastian Faust, François-Xavier Standaert:
Making Masking Security Proofs Concrete Or How to Evaluate the Security of any Leaking Device. 119 - Debapriya Basu Roy, Shivam Bhasin, Sylvain Guilley, Jean-Luc Danger, Debdeep Mukhopadhyay:
Reconfigurable LUT: Boon or Bane for Secure Applications. 120 - Travis Mayberry, Erik-Oliver Blass, Guevara Noubir:
Multi-User Oblivious RAM Secure Against Malicious Servers. 121 - Siwei Sun, Lei Hu, Meiqin Wang, Peng Wang, Kexin Qiao, Xiaoshuang Ma, Danping Shi, Ling Song, Kai Fu:
Constructing Mixed-integer Programming Models whose Feasible Region is Exactly the Set of All Valid Differential Characteristics of SIMON. 122 - Dennis Hofheinz, Jessica Koch, Christoph Striecks:
Identity-based encryption with (almost) tight security in the multi-instance, multi-ciphertext setting. 123 - Alexander Wild, Amir Moradi, Tim Güneysu:
GliFreD: Glitch-Free Duplication - Towards Power-Equalized Circuits on FPGAs. 124 - Aloni Cohen, Justin Holmgren:
Multilinear Pseudorandom Functions. 125 - Nir Bitansky, Omer Paneth, Daniel Wichs:
Perfect Structure on the Edge of Chaos. 126 - Ricardo Dahab, Steven D. Galbraith, Eduardo Morais:
Adaptive key recovery attacks on NTRU-based somewhat homomorphic encryption schemes. 127 - Takashi Yamakawa, Shota Yamada, Goichiro Hanaoka, Noboru Kunihiro:
Self-bilinear Map on Unknown Order Groups from Indistinguishability Obfuscation and Its Applications. 128 - Nishanth Chandran, Vipul Goyal, Pratyay Mukherjee, Omkant Pandey, Jalaj Upadhyay:
Block-wise Non-Malleable Codes. 129 - Sune K. Jakobsen, Claudio Orlandi:
How to Bootstrap Anonymous Communication. 130 - Frederik Armknecht, Vasily Mikhalev:
On Lightweight Stream Ciphers with Shorter Internal States. 131 - Jung Hee Cheon, Miran Kim, Kristin E. Lauter:
Homomorphic Computation of Edit Distance. 132 - Kristin E. Lauter, Adriana López-Alt, Michael Naehrig:
Private Computation on Encrypted Genomic Data. 133 - Pierre Karpman:
From Related-Key Distinguishers to Related-Key-Recovery on Even-Mansour Constructions. 134 - Bernardo David, Ryo Nishimaki, Samuel Ranellucci, Alain Tapp:
Generalizing Efficient Multiparty Computation. 135 - Marcos A. Simplício Jr., Leonardo C. Almeida, Ewerton R. Andrade, Paulo C. F. dos Santos, Paulo S. L. M. Barreto:
Lyra2: Password Hashing Scheme with improved security against time-memory trade-offs. 136 - Mikhail Strizhov, Indrajit Ray:
Multi-keyword Similarity Search Over Encrypted Cloud Data. 137 - Vikram Singh:
A Practical Key Exchange for the Internet using Lattice Cryptography. 138 - Donghoon Chang, Arpan Jati, Sweta Mishra, Somitra Kumar Sanadhya:
Performance Analysis of Some Password Hashing Schemes. 139 - Neal Koblitz, Alfred Menezes:
The Random Oracle Model: A Twenty-Year Retrospective. 140 - Céline Blondeau, Marine Minier:
Analysis of Impossible, Integral and Zero-Correlation Attacks on Type-II Generalized Feistel Networks using the Matrix Method. 141 - S. Dov Gordon, Jonathan Katz, Feng-Hao Liu, Elaine Shi, Hong-Sheng Zhou:
Multi-Client Verifiable Computation with Stronger Security Guarantees. 142 - Erich Wenger, Paul Wolfger:
Harder, Better, Faster, Stronger - Elliptic Curve Discrete Logarithm Computations on FPGAs. 143 - Tyge Tiessen, Lars R. Knudsen, Stefan Kölbl, Martin M. Lauridsen:
Security of the AES with a Secret S-box. 144 - Stefan Kölbl, Gregor Leander, Tyge Tiessen:
Observations on the SIMON block cipher family. 145 - Itai Dinur, Orr Dunkelman, Nathan Keller, Adi Shamir:
New Attacks on Feistel Structures with Improved Memory Complexities. 146 - Lionel Rivière, Zakaria Najm, Pablo Rauzy, Jean-Luc Danger, Julien Bringer, Laurent Sauvage:
High Precision Fault Injections on the Instruction Cache of ARMv7-M Architectures. 147 - Yossef Oren, Ahmad-Reza Sadeghi, Christian Wachsmann:
On the Effectiveness of the Remanence Decay Side-Channel to Clone Memory-based PUFs. 148 - Jian Guo, Yu Sasaki, Lei Wang, Shuang Wu:
Cryptanalysis of HMAC/NMAC-Whirlpool. 149 - Tobias Pulls, Roel Peeters:
Insynd: Privacy-Preserving Secure One-Way Messaging Using Balloons. 150 - Daniel J. Bernstein, Andreas Hülsing, Tanja Lange, Ruben Niederhagen:
Bad directions in cryptographic hash functions. 151 - Ronan Lashermes, Jacques J. A. Fournier, Louis Goubin:
Inverting the Final exponentiation of Tate pairings on ordinary elliptic curves using faults. 152 - Kai-Min Chung, Jonathan Katz, Hong-Sheng Zhou:
Functional Encryption from (Small) Hardwae Tokens. 153 - Daniel Genkin, Yuval Ishai, Manoj Prabhakaran, Amit Sahai, Eran Tromer:
Circuits Resilient to Additive Attacks with Applications to Secure Computation. 154 - Loi Luu, Ratul Saha, Inian Parameshwaran, Prateek Saxena, Aquinas Hobor:
On Power Splitting Games in Distributed Computation: The Case of Bitcoin Pooled Mining. 155 - Brett Hemenway, Rafail Ostrovsky:
Building Lossy Trapdoor Functions from Lossy Encryption. 156 - Nuttapong Attrapadung, Shota Yamada:
Duality in ABE: Converting Attribute Based Encryption for Dual Predicate and Dual Policy via Computational Encodings. 157 - Zvika Brakerski, Ilan Komargodski, Gil Segev:
From Single-Input to Multi-Input Functional Encryption in the Private-Key Setting. 158 - Shengbao Wu, Hongjun Wu, Tao Huang, Mingsheng Wang, Wenling Wu:
Leaked-State-Forgery Attack Against The Authenticated Encryption Algorithm ALE. 159 - Tao Huang, Ivan Tjuawinata, Hongjun Wu:
Differential-Linear Cryptanalysis of ICEPOLE. 160 - Valentina Banciu, Elisabeth Oswald, Carolyn Whitnall:
Exploring the Resilience of Some Lightweight Ciphers Against Pro led Single Trace Attacks. 161 - Jean-Sébastien Coron, Tancrède Lepoint, Mehdi Tibouchi:
New Multilinear Maps over the Integers. 162 - Nir Bitansky, Vinod Vaikuntanathan:
Indistinguishability Obfuscation from Functional Encryption. 163 - Priyanka Bose, Dipanjan Das, C. Pandu Rangan:
Constant Size Ring Signature Without Random Oracle. 164 - Benny Applebaum:
The Cryptographic Hardness of Random Local Functions - Survey. 165 - Jeremiah Blocki, Manuel Blum, Anupam Datta:
Naturally Rehearsing Passwords. 166 - Saikrishna Badrinarayanan, Eric Miles, Amit Sahai, Mark Zhandry:
Post-Zeroizing Obfuscation: The case of Evasive Circuits. 167 - Claude Carlet:
More PS and H-like bent functions. 168 - Daniel R. L. Brown:
Short Schnorr signatures require a hash function with more than just random-prefix resistance. 169 - Daniel Genkin, Lev Pachmanov, Itamar Pipman, Eran Tromer:
Stealing Keys from PCs using a Radio: Cheap Electromagnetic Attacks on Windowed Exponentiation. 170 - Benjamin Dowling, Douglas Stebila, Greg Zaverucha:
Authenticated Network Time Synchronization. 171 - Aria Shahverdi, Mostafa Taha, Thomas Eisenbarth:
Silent Simon: A Threshold Implementation under 100 Slices. 172 - Prabhanjan Ananth, Abhishek Jain:
Indistinguishability Obfuscation from Compact Functional Encryption. 173 - Chenyang Tu, Neng Gao, Zeyi Liu, Lei Wang, Zongbin Liu, Bingke Ma:
A Practical Chosen Message Power Analysis Method on the Feistel-SP ciphers with Applications to CLEFIA and Camellia. 174 - Tomer Ashur, Bart Mennink:
Trivial Nonce-Misusing Attack on Pure OMD. 175 - Kim Laine, Kristin E. Lauter:
Key Recovery for LWE in Polynomial Time. 176 - B. R. Purushothama, Nishat Koti:
On the Security of an Efficient Group Key Agreement Scheme for MANETs. 177 - Pablo Azar, Shafi Goldwasser, Sunoo Park:
How to Incentivize Data-Driven Collaboration Among Competing Parties. 178 - Palash Sarkar, Shashank Singh:
A Simple Method for Obtaining Relations Among Factor Basis Elements for Special Hyperelliptic Curves. 179 - Abhishek Banerjee, Georg Fuchsbauer, Chris Peikert, Krzysztof Pietrzak, Sophie Stevens:
Key-Homomorphic Constrained Pseudorandom Functions. 180 - Bing Sun, Zhiqiang Liu, Vincent Rijmen, Ruilin Li, Lei Cheng, Qingju Wang, Hoda Alkhzaimi, Chao Li:
Links among Impossible Differential, Integral and Zero Correlation Linear Cryptanalysis. 181 - Rodolphe Lampe, Yannick Seurin:
Tweakable Blockciphers with Asymptotically Optimal Security. 182 - Céline Blondeau, Kaisa Nyberg:
New Links Between Differential and Linear Cryptanalysis. 183 - Céline Blondeau, Kaisa Nyberg:
Links Between Truncated Differential and Multidimensional Linear Properties of Block Ciphers and Underlying Attack Complexities. 184 - Elena Dubrova, Mats Näslund, Gunnar Carlsson, John Fornehed, Ben J. M. Smeets:
Remotely Managed Logic Built-In Self-Test for Secure M2M Communications. 185 - Sourav Das, Subhamoy Maitra, Willi Meier:
Higher Order Differential Analysis of NORX. 186 - Juan A. Garay, Jonathan Katz, Björn Tackmann, Vassilis Zikas:
How Fair is Your Protocol? A Utility-based Approach to Protocol Optimality. 187 - Fabrice Benhamouda, Olivier Blazy, Céline Chevalier, David Pointcheval, Damien Vergnaud:
New Techniques for SPHFs and Efficient One-Round PAKE Protocols. 188 - Viet Tung Hoang, Reza Reyhanitabar, Phillip Rogaway, Damian Vizár:
Online Authenticated-Encryption and its Nonce-Reuse Misuse-Resistance. 189 - Seung Geol Choi, Jonathan Katz, Ranjit Kumaresan, Carlos Cid:
Multi-Client Non-Interactive Verifiable Computation. 190 - Xiao Shaun Wang, Chang Liu, Kartik Nayak, Yan Huang, Elaine Shi:
iDASH Secure Genome Analysis Competition Using ObliVM. 191 - Sylvain Duquesne, Loubna Ghammam:
Memory-saving computation of the pairing fi nal exponentiation on BN curves. 192 - Karim Bigou, Arnaud Tisserand:
Improving Modular Inversion in RNS using the Plus-Minus Method. 193 - Dario Catalano, Dario Fiore:
Practical Homomorphic MACs for Arithmetic Circuits. 194 - Stephanie Bayer, Jens Groth:
Zero-knowledge Argument for Polynomial Evaluation with Application to Blacklists. 195 - Michel Abdalla, Fabrice Benhamouda, David Pointcheval:
Tighter Reductions for Forward-Secure Signature Schemes. 196 - N. Nalla Anandakumar:
SCA Resistance Analysis of MAC-PHOTON. 197 - Pascal Sasdrich, Oliver Mischke, Amir Moradi, Tim Güneysu:
Side-Channel Protection by Randomizing Look-Up Tables on Reconfigurable Hardware - Pitfalls of Memory Primitives. 198 - Amir Moradi, Gesine Hinterwälder:
Side-Channel Security Analysis of Ultra-Low-Power FRAM-based MCUs. 199 - Alexander Wild, Amir Moradi, Tim Güneysu:
Evaluating the Duplication of Dual-Rail Precharge Logics on FPGAs. 200 - Akbar Mahmoodi Rishakani, Seyed Mojtaba Dehnavi, M. R. Mirzaee Shamsabad, Hamidreza Maimani, Einollah Pasha:
Statistical Properties of Multiplication mod 2n. 201 - Shafi Goldwasser, Yael Tauman Kalai, Sunoo Park:
Adaptively Secure Coin-Flipping, Revisited. 202 - Pascal Sasdrich, Amir Moradi, Oliver Mischke, Tim Güneysu:
Achieving Side-Channel Protection with Dynamic Logic Reconfiguration on Modern FPGAs. 203 - Michel Abdalla, Sonia Belaïd, Pierre-Alain Fouque:
Leakage-Resilient Symmetric Encryption via Re-keying. 204 - Jooyoung Lee:
Towards Key-Length Extension with Optimal Security: Cascade Encryption and Xor-cascade Encryption. 205 - Bren Cavallo, Giovanni Di Crescenzo, Delaram Kahrobaei, Vladimir Shpilrain:
Efficient and Secure Delegation of Group Exponentiation to a Single Server. 206 - Tobias Schneider, Amir Moradi:
Leakage Assessment Methodology - a clear roadmap for side-channel evaluations. 207 - Ioana Boureanu, Aikaterini Mitrokotsa, Serge Vaudenay:
Towards Secure Distance Bounding. 208 - Daniel Dinu, Yann Le Corre, Dmitry Khovratovich, Léo Perrin, Johann Großschädl, Alex Biryukov:
Triathlon of Lightweight Block Ciphers for the Internet of Things. 209 - Chenglu Jin, Marten van Dijk:
Secure and Efficient Initialization and Authentication Protocols for SHIELD. 210 - Thijs Laarhoven, Benne de Weger:
Faster sieving for shortest lattice vectors using spherical locality-sensitive hashing. 211 - Christof Beierle, Philipp Jovanovic, Martin M. Lauridsen, Gregor Leander, Christian Rechberger:
Analyzing Permutations for AES-like Ciphers: Understanding ShiftRows. 212 - Javier Herranz:
Attribute-Based Versions of Schnorr and ElGamal. 213 - Yuichi Niwa, Keisuke Ohashi, Kazuhiko Minematsu, Tetsu Iwata:
GCM Security Bounds Reconsidered. 214 - Amadou Moctar Kane:
A revocable anonymity in Tor. 215 - Eike Kiltz, Hoeteck Wee:
Quasi-Adaptive NIZK for Linear Subspaces Revisited. 216 - Subhamoy Maitra, Goutam Paul, Willi Meier:
Salsa20 Cryptanalysis: New Moves and Revisiting Old Styles. 217 - Qinglong Wang:
Efficient k-out-of-n oblivious transfer protocol. 218 - Prakruti C, Sashank Dara, V. N. Muralidhara:
Efficient Format Preserving Encrypted Databases. 219 - Dan Boneh, Kevin Lewi, Hart William Montgomery, Ananth Raghunathan:
Key Homomorphic PRFs and Their Applications. 220 - Daniel J. Bernstein, Tanja Lange, Christine van Vredendaal:
Tighter, faster, simpler side-channel security evaluations beyond computing power. 221 - Elena Andreeva, Andrey Bogdanov, Bart Mennink:
Towards Understanding the Known-Key Security of Block Ciphers. 222 - Anubhab Baksi, Subhamoy Maitra, Santanu Sarkar:
New Distinguishers for Reduced Round Trivium and Trivia-SC using Cube Testers. 223 - Matteo Maffei, Giulio Malavolta, Manuel Reinert, Dominique Schröder:
Privacy and Access Control for Outsourced Personal Records. 224 - Ben Fisch, Daniel Freund, Moni Naor:
Secure Physical Computation using Disposable Circuits. 226 - Alex Biryukov, Dmitry Khovratovich:
Tradeoff Cryptanalysis of Memory-Hard Functions. 227 - Konrad Durnoga, Tomasz Kazana, Michal Zajac, Maciej Zdanowicz:
Leakage-Resilient Cryptography with Key Derived from Sensitive Data. 228 - Reza Hooshmand, Taraneh Eghlidos, Mohammad Reza Aref:
Improving GGH Public Key Scheme Using Low Density Lattice Codes. 229 - Der-Yeuan Yu, Aanjhan Ranganathan, Ramya Jayaram Masti, Claudio Soriente, Srdjan Capkun:
W-SPS: Designing a Wide-Area Secure Positioning System. 230 - Yonglin Hao:
A Related-Key Chosen-IV Distinguishing Attack on Full Sprout Stream Cipher. 231 - Virginie Lallemand, María Naya-Plasencia:
Cryptanalysis of Full Sprout. 232 - Ben Smyth, Steven Frink, Michael R. Clarkson:
Computational Election Verifiability: Definitions and an Analysis of Helios and JCJ. 233 - Megha Agrawal, Donghoon Chang, Mohona Ghosh, Somitra Kumar Sanadhya:
Collision Attack on 4-branch, Type-2 GFN based Hash Functions using Sliced Biclique Cryptanalysis Technique. 234 - Mashael AlSabah, Ian Goldberg:
Performance and Security Improvements for Tor: A Survey. 235 - Subhamoy Maitra, Santanu Sarkar, Anubhab Baksi, Pramit Dey:
Key Recovery from State Information of Sprout: Application to Cryptanalysis and Fault Attack. 236 - Wouter Lueks, Gergely Alpár, Jaap-Henk Hoepman, Pim Vullers:
Fast Revocation of Attribute-Based Credentials for Both Users and Verifiers. 237 - Konrad Durnoga, Stefan Dziembowski, Tomasz Kazana, Michal Zajac:
One Time Programs with Limited Memory. 238 - Patrick Derbez, Léo Perrin:
Meet-in-the-Middle Attacks and Structural Analysis of Round-Reduced PRINCE. 239 - Alex Biryukov, Patrick Derbez, Léo Perrin:
Differential Analysis and Meet-in-the-Middle Attack against Round-Reduced TWINE. 240 - Elena Dubrova, Martin Hell:
Espresso: A Stream Cipher for 5G Wireless Communication Systems. 241 - Benoît Libert, Thomas Peters, Marc Joye, Moti Yung:
Compactly Hiding Linear Spans: Tightly Secure Constant-Size Simulation-Sound QA-NIZK Proofs and Applications. 242 - Aris Pagourtzis, Giorgos Panagiotakos, Dimitris Sakavalas:
Reliable Message Transmission under Partial Knowledge. 243 - Jérémy Jean, Ivica Nikolic:
Internal Differential Boomerangs: Practical Analysis of the Round-Reduced Keccak-f Permutation. 244 - Pawel Morawiecki:
Practical Attacks on the Round-reduced PRINCE. 245 - Fabrice Benhamouda, Geoffroy Couteau, David Pointcheval, Hoeteck Wee:
Implicit Zero-Knowledge Arguments and Applications to the Malicious Setting. 246 - Paulo S. L. M. Barreto, Craig Costello, Rafael Misoczki, Michael Naehrig, C. C. F. Pereira Geovandro, Gustavo H. M. Zanon:
Subgroup security in pairing-based cryptography. 247 - Ryo Nishimaki, Keita Xagawa:
Verifiably Encrypted Signatures with Short Keys based on the Decisional Linear Problem and Obfuscation for Encrypted VES. 248 - Keita Xagawa:
Improved (Hierarchical) Inner-Product Encryption from Lattices. 249 - Junji Shikata:
Design and Analysis of Information-Theoretically Secure Authentication Codes with Non-Uniformly Random Keys. 250 - Kaoru Kurosawa, Yasuhiro Ohtaki:
How to Construct UC-Secure Searchable Symmetric Encryption Scheme. 251 - Haiyan Wang, Jianghua Zhong, Dongdai Lin:
Linearization of Multi-valued Nonlinear Feedback Shift Registers. 252 - Haiyan Wang, Dongdai Lin:
Stability and Linearization of Multi-valued Nonlinear Feedback Shift Registers. 253 - Pouyan Sepehrdad, Petr Susil, Serge Vaudenay, Martin Vuagnoux:
Tornado Attack on RC4 with Applications to WEP & WPA. 254 - David Bernhard, Véronique Cortier, David Galindo, Olivier Pereira, Bogdan Warinschi:
A comprehensive analysis of game-based ballot privacy definitions. 255 - Yang Lu, Quanling Zhang, Jiguo Li:
Cryptanalysis of Three Certificate-Based Authenticated Key Agreement Protocols and a Secure Construction. 256 - Vadim Lyubashevsky, Thomas Prest:
Quadratic Time, Linear Space Algorithms for Gram-Schmidt Orthogonalization and Gaussian Sampling in Structured Lattices. 257 - Siang Meng Sim, Khoongming Khoo, Frédérique E. Oggier, Thomas Peyrin:
Lightweight MDS Involution Matrices. 258 - Patrick Derbez, Pierre-Alain Fouque:
Exhausting Demirci-Selçuk Meet-in-the-Middle Attacks against Reduced-Round AES. 259 - Paul Bottinelli, Joppe W. Bos:
Computational Aspects of Correlation Power Analysis. 260 - Joseph Bonneau, Andrew Miller, Jeremy Clark, Arvind Narayanan, Joshua A. Kroll, Edward W. Felten:
Research Perspectives and Challenges for Bitcoin and Cryptocurrencies. 261 - Hanno Böck:
A look at the PGP ecosystem through the key server data. 262 - Ethan Heilman, Alison Kendler, Aviv Zohar, Sharon Goldberg:
Eclipse Attacks on Bitcoin's Peer-to-Peer Network. 263 - Justine Sherry, Chang Lan, Raluca Ada Popa, Sylvia Ratnasamy:
BlindBox: Deep Packet Inspection over Encrypted Traffic. 264 - George Hatzivasilis, Ioannis Papaefstathiou, Charalampos Manifavas:
Password Hashing Competition - Survey and Benchmark. 265 - Xianrui Meng, Seny Kamara, Kobbi Nissim, George Kollios:
GRECS: Graph Encryption for Approximate Shortest Distance Queries. 266 - Tung Chou, Claudio Orlandi:
The Simplest Protocol for Oblivious Transfer. 267 - Itai Dinur, Orr Dunkelman, Masha Gutman, Adi Shamir:
Improved Top-Down Techniques in Differential Cryptanalysis. 268 - Chunsheng Gu:
Ideal Multilinear Maps Based on Ideal Lattices. 269 - Markus Dichtl:
Fibonacci Ring Oscillators as True Random Number Generators - A Security Risk. 270 - Mariya Georgieva, Frédéric de Portzamparc:
Toward Secure Implementation of McEliece Decryption. 271 - Baodong Qin, Shengli Liu:
Leakage-Flexible CCA-secure Public-Key Encryption: Simple Construction and Free of Pairing. 272 - Hoeteck Wee:
Dual System Encryption via Predicate Encodings. 273 - Gizem S. Çetin, Yarkin Doröz, Berk Sunar, Erkay Savas:
Low Depth Circuits for Efficient Homomorphic Sorting. 274 - Takanori Yasuda, Xavier Dahan, Yun-Ju Huang, Tsuyoshi Takagi, Kouichi Sakurai:
MQ Challenge: Hardness Evaluation of Solving Multivariate Quadratic Problems. 275 - Binglong Chen, Chang-An Zhao:
An Improvment of the Elliptic Net Algorithm. 276 - Marco Tomamichel, Serge Fehr, Jedrzej Kaniewski, Stephanie Wehner:
One-Sided Device-Independent QKD and Position-based Cryptography from Monogamy Games. 277 - Sébastien Canard, David Pointcheval, Olivier Sanders:
Efficient Delegation of Zero-Knowledge Proofs of Knowledge in a Pairing-Friendly Setting. 278 - Jérémy Jean, María Naya-Plasencia, Thomas Peyrin:
Improved Cryptanalysis of AES-like Permutations. 279 - Jonathan Katz, Aishwarya Thiruvengadam, Hong-Sheng Zhou:
Feasibility and Infeasibility of Adaptively Secure Fully Homomorphic Encryption. 280 - Vinod Vaikuntanathan, Prashant Nalini Vasudevan:
From Statistical Zero Knowledge to Secret Sharing. 281 - Arash Afshar, Payman Mohassel, Benny Pinkas, Ben Riva:
Non-Interactive Secure Computation Based on Cut-and-Choose. 282 - Esha Ghosh, Michael T. Goodrich, Olga Ohrimenko, Roberto Tamassia:
Fully-Dynamic Verifiable Zero-Knowledge Order Queries for Network Data. 283 - Binglong Chen, Chuangqiang Hu, Chang-An Zhao:
A Note on Scalar Multiplication Using Division Polynomials. 284 - Tomer Ashur:
Improved Linear Trails for the Block Cipher Simon. 285 - Zhan Chen, Ning Wang, Xiaoyun Wang:
Impossible Differential Cryptanalysis of Reduced Round SIMON. 286 - John M. Schanck, William Whyte, Zhenfei Zhang:
A quantum-safe circuit-extension handshake for Tor. 287 - Aydin Aysu, Patrick Schaumont:
Precomputation Methods for Faster and Greener Post-Quantum Cryptography on Emerging Embedded Platforms. 288 - Muhammed F. Esgin, Orhun Kara:
Practical Cryptanalysis of Full Sprout with TMD Tradeoff Attacks. 289 - Joseph A. Akinyele, Christina Garman, Susan Hohenberger:
Automating Fast and Secure Translations from Type-I to Type-III Pairing Schemes. 290 - Takeshi Sugawara, Daisuke Suzuki, Minoru Saeki:
Two Operands of Multipliers in Side-Channel Attack. 291 - Shlomi Dolev, Yin Li:
Secret Shared Random Access Machine. 292 - Pratish Datta, Ratna Dutta, Sourav Mukhopadhyay:
Fully Secure Unbounded Revocable Attribute-Based Encryption in Prime Order Bilinear Groups via Subset Difference Method. 293 - Erdinç Öztürk, Yarkin Doröz, Berk Sunar, Erkay Savas:
Accelerating Somewhat Homomorphic Evaluation using FPGAs. 294 - Ralf Küsters, Tomasz Truderung:
Security Analysis of Re-Encryption RPC Mix Nets. 295 - Emil Lerner:
The Uniform Distribution of Sequences Generated by Iteration of Polynomials. 296 - Junzuo Lai, Robert H. Deng, Shengli Liu, Jian Weng, Yunlei Zhao:
Identity-Based Encryption Secure Against Selective Opening Chosen-Ciphertext Attack. 297 - Yongge Wang:
Secure Random Linear Code Based Public Key Encryption Scheme RLCE. 298 - Zhengjun Cao, Lihua Liu:
A Note on the Lindell-Waisbard Private Web Search Scheme. 299 - Sébastien Canard, David Pointcheval, Olivier Sanders, Jacques Traoré:
Scalable Divisible E-cash. 300 - Yupu Hu, Huiwen Jia:
Cryptanalysis of GGH Map. 301 - Reza Reyhanitabar, Serge Vaudenay, Damian Vizár:
Boosting OMD for Almost Free Authentication of Associated Data. 302 - Nicky Mouha:
The Design Space of Lightweight Cryptography. 303 - Joshua Baron, Karim El Defrawy, Joshua Lampkins, Rafail Ostrovsky:
Communication-Optimal Proactive Secret Sharing for Dynamic Groups. 304 - Jonas Schneider, Dominique Schröder:
Foundations of Reconfigurable PUFs (Full Version). 305 - Morris Dworkin, Ray A. Perlner:
Analysis of VAES3 (FF2). 306 - Sanjam Garg, Steve Lu, Rafail Ostrovsky:
Black-Box Garbled RAM. 307 - Patrick McCorry, Siamak Fayyaz Shahandashti, Dylan Clarke, Feng Hao:
Authenticated Key Exchange over Bitcoin. 308 - Tore Kasper Frederiksen, Thomas P. Jakobsen, Jesper Buus Nielsen, Roberto Trifiletti:
TinyLEGO: An Interactive Garbling Scheme for Maliciously Secure Two-party Computation. 309 - Igor A. Semaev:
New algorithm for the discrete logarithm problem on elliptic curves. 310 - Masayuki Abe, Bernardo David, Markulf Kohlweiss, Ryo Nishimaki, Miyako Ohkubo:
Tagged One-Time Signatures: Tight Security and Optimal Tag Size. 311 - Pierre-Alain Fouque, Thomas Vannet:
Improving Key Recovery to 784 and 799 rounds of Trivium using Optimized Cube Attacks. 312 - Ronald Cramer, Léo Ducas, Chris Peikert, Oded Regev:
Recovering Short Generators of Principal Ideals in Cyclotomic Rings. 313 - Qihong Yu, Jiguo Li, Yichen Zhang, Wei Wu, Xinyi Huang, Yang Xiang:
Certificate-Based Encryption Resilient to Key Leakage. 314 - Grégory Demay, Peter Gazi, Ueli Maurer, Björn Tackmann:
Query-Complexity Amplification for Random Oracles. 315 - Zhengan Huang, Shengli Liu, Xianping Mao, Kefei Chen:
Non-malleability under Selective Opening Attacks: Implication and Separation. 316 - Marcin Andrychowicz, Daniel Masny, Edoardo Persichetti:
Leakage-Resilient Cryptography over Large Finite Fields: Theory and Practice. 317 - Patrick Märtens:
Practical Divisible E-Cash. 318 - Koray Karabina:
Point Decomposition Problem in Binary Elliptic Curves. 319 - James Alderman, Christian Janson, Carlos Cid, Jason Crampton:
Hybrid Publicly Verifiable Computation. 320 - (Withdrawn) Size-Hiding in Private Set Intersection: what can be done and how to do it without random oracles. 321
- Peeter Laud, Alisa Pankova:
Transformation-Based Outsourcing of Linear Equation Systems over Real Numbers. 322 - (Withdrawn) Efficient, Pairing-Free, One Round Attribute-Based Authenticated Key Exchange. 323
- Divesh Aggarwal, Alexander Golovnev:
A Note on Lower Bounds for Non-interactive Message Authentication Using Weak Keys. 324 - Yuval Ishai, Rafail Ostrovsky, Vassilis Zikas:
Secure Multi-Party Computation with Identifiable Abort. 325 - Saeideh Kabirirad, Hamideh Hajiabadi:
Cryptanalysis Of An Authenticated Image Encryption Scheme Based On Chaotic Maps And Memory Cellular Automata. 326 - Subhadeep Banik:
Some results on Sprout. 327 - Xiaopeng Yang, Wenping Ma:
Strongly Secure Authenticated Key Exchange from Ideal Lattices. 328 - Dieter Schmidt:
PAGES - A Family of Block Ciiphers. 329 - Tarun Kumar Bansal, Donghoon Chang, Somitra Kumar Sanadhya:
Sponge based CCA2 secure asymmetric encryption for arbitrary length message. 330 - Megha Agrawal, Donghoon Chang, Somitra Kumar Sanadhya:
A New Authenticated Encryption Technique for Handling Long Ciphertexts in Memory Constrained Devices. 331 - Sumit Chakraborty:
Security Intelligence for Broadcast : Threat Analytics. 332 - Johannes Krupp, Dominique Schröder, Mark Simkin, Dario Fiore, Giuseppe Ateniese, Stefan Nürnberger:
Nearly Optimal Verifiable Data Streaming (Full Version). 333 - Ran Canetti, Yilei Chen, Leonid Reyzin:
On the Correlation Intractability of Obfuscated Pseudorandom Functions. 334 - Janaka Alawatugoda, Colin Boyd, Douglas Stebila:
Continuous After-the-fact Leakage-Resilient eCK-secure Key Exchange. 335 - Benny Applebaum, Jonathan Avron, Christina Brzuska:
Arithmetic Cryptography. 336 - Sujoy Sinha Roy, Kimmo Järvinen, Frederik Vercauteren, Vassil S. Dimitrov, Ingrid Verbauwhede:
Modular Hardware Architecture for Somewhat Homomorphic Function Evaluation. 337 - Amadou Moctar Kane:
Cryptanalysis of a fair anonymity for the tor network. 338 - Berry Schoenmakers, Meilof Veeningen:
Guaranteeing Correctness in Privacy-Friendly Outsourcing by Certificate Validation. 339 - Santanu Sarkar:
A New Distinguisher on Grain v1 for 106 rounds. 340 - Gilad Asharov, Gil Segev:
Limits on the Power of Indistinguishability Obfuscation and Functional Encryption. 341 - Yan Zhu, Xin Wang, Di Ma, Ruiqi Guo:
Identity-Set-based Broadcast Encryption supporting "Cut-or-Select" with Short Ciphertext. 342 - Michael Düll, Björn Haase, Gesine Hinterwälder, Michael Hutter, Christof Paar, Ana Helena Sánchez, Peter Schwabe:
High-speed Curve25519 on 8-bit, 16-bit, and 32-bit microcontrollers. 343 - Ryo Nishimaki, Daniel Wichs:
Watermarking Cryptographic Programs Against Arbitrary Removal Strategies. 344 - Pratyay Mukherjee, Daniel Wichs:
Two Round MPC from LWE via Multi-Key FHE. 345 - Aggelos Kiayias, Thomas Zacharias, Bingsheng Zhang:
End-to-End Verifiable Elections in the Standard Model∗. 346 - Riham AlTawy, Onur Duman, Amr M. Youssef:
Fault Analysis of Kuznyechik. 347 - Andreas Gornik, Amir Moradi, Jürgen Oehm, Christof Paar:
A Hardware-based Countermeasure to Reduce Side-Channel Leakage - Design, Implementation, and Evaluation. 348 - Chang Liu, Liehuang Zhu, Jinjun Chen:
Efficient Searchable Symmetric Encryption for Storing Multiple Source Data on Cloud. 349 - Florian Mendel, Tomislav Nad, Martin Schläffer:
Improving Local Collisions: New Attacks on Reduced SHA-256. 350 - Mohammad Etemad, Alptekin Küpçü:
Database Outsourcing with Hierarchical Authenticated Data Structures. 351 - Pavel Raykov:
Broadcast from Minicast Secure Against General Adversaries. 352 - Paz Morillo, Carla Ràfols, Jorge L. Villar:
Matrix Computational Assumptions in Multilinear Groups. 353 - Jacek Samotyja, Kerstin Lemke-Rust, Markus Ullmann:
SEMA and MESD Leakage of TinyECC 2.0 on a LOTUS Sensor Node. 354 - Tommaso Gagliardoni, Andreas Hülsing, Christian Schaffner:
Semantic Security and Indistinguishability in the Quantum World. 355 - Nir Bitansky, Sanjam Garg, Huijia Lin, Rafael Pass, Sidharth Telang:
Succinct Randomized Encodings and their Applications. 356 - Ming Li, Yupeng Jiang, Dongdai Lin:
A Group-theory Method to The Cycle Structures of Feedback Shift Registers. 357 - Yun-Ju Huang, Christophe Petit, Naoyuki Shinohara, Tsuyoshi Takagi:
On Generalized First Fall Degree Assumptions. 358 - Jean-Sébastien Coron, Emmanuel Prouff, Matthieu Rivain, Thomas Roche:
Higher-Order Side Channel Security and Mask Refreshing. 359 - Yanqing Yao, Zhoujun Li:
Achieving Differential Privacy with Bias-Control Limited Source. 360 - Dominique Unruh:
Computationally binding quantum commitments. 361 - Claude Crépeau, Raza Ali Kazmi:
Oblivious Transfer from weakly Random Self-Reducible Public-Key Cryptosystem. 362 - Bart Mennink:
Optimally Secure Tweakable Blockciphers. 363 - Qiang Tang, Jun Wang:
Privacy-preserving Context-aware Recommender Systems: Analysis and New Solutions. 364 - Masoumeh Safkhani, Nasour Bagheri, Mehdi Hosseinzadeh, Mojtaba Eslamnezhad Namin, Samad Rostampour:
On the (im)possibility of receiving security beyond 2l using an l-bit PRNG: the case of Wang et. al. protocol. 365 - Arjen K. Lenstra, Benjamin Wesolowski:
A random zoo: sloth, unicorn, and trx. 366 - Achiya Bar-On:
Improved Higher-Order Differential Attacks on MISTY1. 367 - Evgeny Sidorov:
Breaking the Rabin-Williams digital signature system implementation in the Crypto++ library. 368 - Nir Bitansky, Omer Paneth:
On Non-Black-Box Simulation and the Impossibility of Approximate Obfuscation. 369 - Sumit Chakraborty:
Financial Cryptography: Discriminatory Pricing Mechanism. 370 - S. Dov Gordon, Feng-Hao Liu, Elaine Shi:
Constant-Round MPC with Fairness and Guarantee of Output Delivery. 371 - Jérémy Jean, Ivica Nikolic, Thomas Peyrin, Lei Wang, Shuang Wu:
Security Analysis of PRINCE. 372 - Aloni Cohen, Justin Holmgren, Vinod Vaikuntanathan:
Publicly Verifiable Software Watermarking. 373 - Christoph Bader, Tibor Jager, Yong Li, Sven Schäge:
On the Impossibility of Tight Cryptographic Reductions. 374 - Daniel R. L. Brown:
Bounds on surmising remixed keys. 375 - Raza Ali Kazmi:
Cryptography from Post-Quantum Assumptions. 376 - Alessandro Chiesa, Eran Tromer, Madars Virza:
Cluster Computing in Zero Knowledge. 377 - Fatemeh Ganji, Shahin Tajik, Jean-Pierre Seifert:
PAC Learning of Arbiter PUFs. 378 - Jingwei Li, Anna Cinzia Squicciarini, Dan Lin, Smitha Sundareswaran, Chunfu Jia:
MMBcloud-tree: Authenticated Index for Verifiable Cloud Service Selection. 379 - Céline Blondeau, Aslí Bay, Serge Vaudenay:
Protecting against Multidimensional Linear and Truncated Differential Cryptanalysis by Decorrelation. 380 - Sumit Chakraborty:
Financial Cryptography: Algorithmic Mechanisms for a Hedonic Game. 381 - Thomas Pöppelmann, Tobias Oder, Tim Güneysu:
Speed Records for Ideal Lattice-Based Cryptography on AVR. 382 - Rafael Pass, Abhi Shelat:
Impossibility of VBB Obfuscation with Ideal Constant-Degree Graded Encodings. 383 - Maciej Skorski, Alexander Golovnev, Krzysztof Pietrzak:
Condensed Unpredictability. 384 - Serge Fehr, Jonathan Katz, Fang Song, Hong-Sheng Zhou, Vassilis Zikas:
Feasibility and Completeness of Cryptographic Tasks in the Quantum World. 385 - David J. Wu, Tony Feng, Michael Naehrig, Kristin E. Lauter:
Privately Evaluating Decision Trees and Random Forests. 386 - Scott Contini:
Method to Protect Passwords in Databases for Web Applications. 387 - Ran Canetti, Justin Holmgren:
Fully Succinct Garbled RAM. 388 - Guido Bertoni, Joan Daemen, Michaël Peeters, Gilles Van Assche:
Keccak. 389 - Nuttapong Attrapadung:
Dual System Encryption Framework in Prime-Order Groups. 390 - Deepesh Data, Manoj Prabhakaran, Vinod M. Prabhakaran:
On the Communication Complexity of Secure Computation. 391 - Christoph Dobraunig, Maria Eichlseder, Florian Mendel:
Forgery Attacks on round-reduced ICEPOLE-128. 392 - Mohammad Hossein Faghihi Sereshgi, Mohammad Dakhilalian, Mohsen Shakiba:
Biclique cryptanalysis of MIBS-80 and PRESENT-80. 393 - Christian Badertscher, Christian Matt, Ueli Maurer, Phillip Rogaway, Björn Tackmann:
Augmented Secure Channels and the Goal of the TLS 1.3 Record Layer. 394 - Nils Fleischhacker, Johannes Krupp, Giulio Malavolta, Jonas Schneider, Dominique Schröder, Mark Simkin:
Efficient Unlinkable Sanitizable Signatures from Signatures with Rerandomizable Keys. 395 - Dario Catalano, Dario Fiore, Rosario Gennaro, Luca Nizzardo:
Generalizing Homomorphic MACs for Arithmetic Circuits. 396 - Peter Gazi, Jooyoung Lee, Yannick Seurin, John P. Steinberger, Stefano Tessaro:
Relaxing Full-Codebook Security: A Refined Analysis of Key-Length Extension Schemes. 397 - Abderrahmane Nitaj, Tajjeeddine Rachidi:
Factoring RSA moduli with weak prime factors. 398 - Abderrahmane Nitaj, Tajjeeddine Rachidi:
New attacks on RSA with Moduli N=prq. 399 - Stephen R. Tate, Roopa Vishwanathan:
Expiration and Revocation of Keys for Attribute-based Signatures. 400 - Eike Kiltz, Daniel Masny, Krzysztof Pietrzak:
Simple Chosen-Ciphertext Security from Low-Noise LPN. 401 - Adrian Thillard, Emmanuel Prouff, Thomas Roche:
Success through confidence: Evaluating the effectiveness of a side-channel attack. 402 - Mehrdad Nojoumian, Douglas R. Stinson:
Sequential Secret Sharing as a New Hierarchical Access Structure. 403 - Esha Ghosh, Olga Ohrimenko, Dimitrios Papadopoulos, Roberto Tamassia, Nikos Triandopoulos:
Zero-Knowledge Accumulators and Set Operations. 404 - Dana Dachman-Soled, Nils Fleischhacker, Jonathan Katz, Anna Lysyanskaya, Dominique Schröder:
Feasibility and Infeasibility of Secure Computation with Malicious PUFs. 405 - Yu-Chi Chen, Sherman S. M. Chow, Kai-Min Chung, Russell W. F. Lai, Wei-Kai Lin, Hong-Sheng Zhou:
Computation-Trace Indistinguishability Obfuscation and its Applications. 406 - Christoph Dobraunig, Maria Eichlseder, Florian Mendel:
Higher-order cryptanalysis of LowMC. 407