default search action
IACR Cryptology ePrint Archive, Volume 2012
Volume 2012, 2012
- Andrew C. Yao, Yunlei Zhao:
Digital Signatures from Challenge-Divided Sigma-Protocols. 1 - Daniel J. Bernstein, Hsieh-Chung Chen, Chen-Mou Cheng, Tanja Lange, Ruben Niederhagen, Peter Schwabe, Bo-Yin Yang:
ECC2K-130 on NVIDIA GPUs. 2 - Qun-Xiong Zheng, Wen-Feng Qi, Tian Tian:
On the distinctness of binary sequences derived from primitive sequences modulo square-free odd integers. 3 - Daniel J. Bernstein, Tanja Lange:
The new SHA-3 software shootout. 4 - Benjamin Fuller, Adam O'Neill, Leonid Reyzin:
A Unified Approach to Deterministic Encryption: New Constructions and a Connection to Computational Entropy. 5 - Susan Hohenberger, Allison B. Lewko, Brent Waters:
Detecting Dangerous Queries: A New Approach for Chosen Ciphertext Security. 6 - Qiang Li, Xiangxue Li, Dong Zheng, Kefei Chen:
Optimal Multiple Assignments with (m, m)-Scheme for General Access Structures. 7 - Hubert Comon-Lundh, Véronique Cortier, Guillaume Scerri:
Security proof with dishonest keys. 8 - Saif Al-Kuwari:
On the Indifferentiability of the Integrated-Key Hash Functions. 9 - Charanjit S. Jutla, Moti Yung:
PayTree: "Amortized Signature" for Flexible Micro-Payments. 10 - Shao-zhen Chen, Tian-min Xu:
Biclique Attack of the Full ARIA-256. 11 - Melissa Chase, Markulf Kohlweiss, Anna Lysyanskaya, Sarah Meiklejohn:
Malleable Proof Systems and Applications. 12 - (Withdrawn) Higher Order Algebraic Attacks on Stream Ciphers. 13
- Yusuke Naito:
On the Indifferentiable Hash Functions in the Multi-Stage Security Games. 14 - Mihir Bellare, Stefano Tessaro, Alexander Vardy:
A Cryptographic Treatment of the Wiretap Channel. 15 - (Withdrawn) Efficient Mix-Net Veri cation by Proofs of Random Blocks. 16
- Brajesh Kumar Singh:
Secondary constructions on generalized bent functions. 17 - Kazuhiko Minematsu, Hiraku Morita, Tetsu Iwata:
Cryptanalysis of EAXprime. 18 - Gergei Bana, Hubert Comon-Lundh:
Towards Unconditional Soundness: Computationally Complete Symbolic Attacker. 19 - Jean-Pierre Flori, Sihem Mesnager:
Dickson polynomials, hyperelliptic curves and hyper-bent functions. 20 - (Withdrawn) Security Analysis of J-PAKE. 21
- Mihir Bellare, Stefano Tessaro:
Polynomial-Time, Semantically-Secure Encryption Achieving the Secrecy Capacity. 22 - Masoumeh Safkhani, Nasour Bagheri, Majid Naderi:
How a Cryptographer Can Get Rich? 23 - Somindu C. Ramanna, Sanjit Chatterjee, Palash Sarkar:
Variants of Waters' Dual-System Primitives Using Asymmetric Pairings. 24 - Xiangtao Yan, Yifa Li:
A new remote data integrity checking scheme for cloud storage. 25 - Anja Becker, Antoine Joux, Alexander May, Alexander Meurer:
Decoding Random Binary Linear Codes in 2n/20: How 1+1=0 Improves Information Set Decoding. 26 - (Withdrawn) Breaking the provably secure SAKE-C authenticated key exchange protocol with Extended Key Compromise Impersonation (E-KCI) Attack. 27
- Houssem Maghrebi, Emmanuel Prouff, Sylvain Guilley, Jean-Luc Danger:
A First-Order Leak-Free Masking Countermeasure. 28 - Yannick Seurin:
On the Exact Security of Schnorr-Type Signatures in the Random Oracle Model. 29 - Shekh Faisal Abdul-Latip, Reza Reyhanitabar, Willy Susilo, Jennifer Seberry:
Fault Analysis of the KATAN Family of Block Ciphers. 30 - Da-Zhi Sun:
An error in "On a new formal proof model for RFID location privacy". 31 - Yevgeniy Dodis, Abhishek Jain, Tal Moran, Daniel Wichs:
Counterexamples to Hardness Amplification Beyond Negligible. 32 - Sihem Mesnager, Jean-Pierre Flori:
A note on hyper-bent functions via Dillon-like exponents. 33 - Boris Köpf, Laurent Mauborgne, Martín Ochoa:
Automatic Quantification of Cache Side-Channels. 34 - Andrey Bogdanov, Lars R. Knudsen, Gregor Leander, François-Xavier Standaert, John P. Steinberger, Elmar Tischhauser:
Key-Alternating Ciphers in a Provable Setting: Encryption Using a Small Number of Public Permutations. 35 - Ashish Kundu, Mikhail J. Atallah, Elisa Bertino:
Efficient Leakage-free Authentication of Trees, Graphs and Forests. 36 - Deep Singh, Maheshanand Bhaintwal, Brajesh Kumar Singh:
Recent Results on Generalized q-ary Bent Functions. 37 - François Durvaux, Mathieu Renauld, François-Xavier Standaert, Loïc van Oldeneel tot Oldenzeel, Nicolas Veyrat-Charvillon:
Cryptanalysis of the CHES 2009/2010 Random Delay Countermeasure. 38 - Feng Hao, Dylan Clarke:
Security Analysis of a Multi-Factor Authenticated Key Exchange Protocol. 39 - Marc Stevens:
Single-block collision attack on MD5. 40 - (Withdrawn) STITCH-256: A New Dedicated Cryptographic Hash Function. 41
- Naoyuki Shinohara, Takeshi Shimoyama, Takuya Hayashi, Tsuyoshi Takagi:
Key Length Estimation of Pairing-based Cryptosystems using ηT Pairing. 42 - Ching-Fang Hsu, Bing Zeng, Qi Cheng, Guohua Cui:
A novel Group Key Transfer Protocol. 43 - Jun Zhou, Zhenfu Cao:
PSCPA: Patient Self-controllable Privacy-preserving Cooperative Authentication in Distributed m-Healthcare Systems. 44 - Sebastian Faust, Carmit Hazay, Jesper Buus Nielsen, Peter Sebastian Nordholt, Angela Zottarel:
Signature Schemes Secure against Hard-to-Invert Leakage. 45 - Konstantinos Limniotis, Nicholas Kolokotronis, Nicholas Kalouptsidis:
Modifying Boolean Functions to Ensure Maximum Algebraic Immunity. 46 - Ilya Mironov, Omkant Pandey, Omer Reingold, Gil Segev:
Incremental Deterministic Public-Key Encryption. 47 - Sourav Sen Gupta, Anupam Chattopadhyay, Ayesha Khalid:
Designing Integrated Accelerator for Stream Ciphers with Structural Similarities. 48 - Yu Sasaki, Lei Wang:
2-Dimension Sums: Distinguishers Beyond Three Rounds of RIPEMD-128 and RIPEMD-160. 49 - Jeremy Constantin, Andreas Burg, Frank K. Gürkaynak:
Investigating the Potential of Custom Instruction Set Extensions for SHA-3 Candidates on a 16-bit Microcontroller Architecture. 50 - Benedikt Driessen:
Eavesdropping on Satellite Telecommunication Systems. 51 - Alexandra Boldyreva, Vipul Goyal, Virendra Kumar:
Identity-based Encryption with Efficient Revocation. 52 - Yevgeniy Dodis:
Beating Shannon requires BOTH efficient adversaries AND non-zero advantage. 53 - Emiliano De Cristofaro, Gene Tsudik:
On the performance of certain Private Set Intersection protocols. (And some remarks on the recent paper by Huang et al. in NDSS'12). 54 - (Withdrawn) Cryptanalysis of Mun et al.'s anonymous authentication scheme for roaming service in global mobility networks. 55
- Alexandra Boldyreva, Virendra Kumar:
A New Pseudorandom Generator from Collision-Resistant Hash Functions. 56 - Somindu C. Ramanna, Palash Sarkar:
Constant-Size Ciphertext HIBE From Asymmetric Pairings Using the Dual-System Technique. 57 - Christopher Portmann:
Key recycling in authentication. 58 - Yevgeniy Dodis, Eike Kiltz, Krzysztof Pietrzak, Daniel Wichs:
Message Authentication, Revisited. 59 - David Mandell Freeman:
Improved Security for Linearly Homomorphic Signatures: A Generic Framework. 60 - Maryam Rajabzadeh Asaar, Mahmoud Salmasizadeh:
A Pairing Based Strong Designated Verifier Signature Scheme without Random Oracles. 61 - (Withdrawn) On the Security of Attribute Based Signature Schemes. 62
- Shahram Khazaei, Douglas Wikström:
Randomized Partial Checking Revisited. 63 - Arjen K. Lenstra, James P. Hughes, Maxime Augier, Joppe W. Bos, Thorsten Kleinjung, Christophe Wachter:
Ron was wrong, Whit is right. 64 - Tsukasa Ishiguro:
Modified version of "Latin Dances Revisited: New Analytic Results of Salsa20 and ChaCha". 65 - Jiqiang Lu, Wun-She Yap, Yongzhuang Wei:
Weak Keys of the Full MISTY1 Block Cipher for Related-Key Cryptanalysis. 66 - Shay Gueron, Vlad Krasnov:
Parallelizing message schedules to accelerate the computations of hash functions. 67 - (Withdrawn) Extended Security Arguments for (Ring) Signature Schemes. 68
- Charles Bouillaguet, Patrick Derbez, Pierre-Alain Fouque:
Automatic Search of Attacks on round-reduced AES and Applications. 69 - Razvan Barbulescu, Joppe W. Bos, Cyril Bouvier, Thorsten Kleinjung, Peter L. Montgomery:
Finding ECM-Friendly Curves through a Study of Galois Properties. 70 - Eli Ben-Sasson, Alessandro Chiesa, Daniel Genkin, Eran Tromer:
Fast Reductions from RAMs to Delegatable Succinct Constraint Satisfaction Problems. 71 - Craig Costello:
Particularly Friendly Members of Family Trees. 72 - Wei Gao, Guilin Wang, Xueli Wang, Kefei Chen:
Efficient identity-based threshold signature scheme from bilinear pairings in the standard model. 73 - Neal Koblitz, Alfred Menezes:
Another look at HMAC. 74 - Wei Gao, Guilin Wang, Kefei Chen, Xueli Wang, Guoyan Zhang:
Efficient identity-based threshold decryption scheme from bilinear pairings. 75 - Mark Zhandry:
Identity-based Encryption is Secure in the Quantum Random Oracle Model. 76 - Sébastien Tiran, Philippe Maurine:
Magnitude Squared Coherence based SCA. 77 - Zvika Brakerski:
Fully Homomorphic Encryption without Modulus Switching from Classical GapSVP. 78 - Masao Kasahara:
Public Key Cryptosystems Constructed Based on Reed-Solomon Codes, K(XV)SE(2)PKC, Realizing Coding Rate of Exactly 1.0. 79 - S. Sree Vivek, S. Sharmila Deva Selvi, Guhan Balasubramanian, C. Pandu Rangan:
Strongly Unforgeable Proxy Re-Signature Schemes in the Standard model. 80 - Michael Backes, Fabian Bendun, Dominique Unruh:
Computational Soundness of Symbolic Zero-knowledge Proofs: Weaker Assumptions and Mechanized Verification. 81 - Liran Lerman, Stephane Fernandes Medeiros, Nikita Veshchikov, Cédric Meuter, Gianluca Bontempi, Olivier Markowitch:
Semi-Supervised Template Attack. 82 - Casey Devet, Ian Goldberg, Nadia Heninger:
Optimally Robust Private Information Retrieval. 83 - Mohamed Saied Emam Mohamed, Stanislav Bulygin, Michael Zohner, Annelie Heuser, Michael Walter:
Improved Algebraic Side-Channel Attack on AES. 84 - Stanislav Bulygin, Michael Walter:
Study of the invariant coset attack on PRINTcipher: more weak keys with practical key recovery. 85 - (Withdrawn) Remarks on- an ideal multi-secret sharing scheme based on MSP. 86
- Joppe W. Bos, Alina Dudeanu, Dimitar Jetchev:
Collision Bounds for the Additive Pollard Rho Algorithm for Solving Discrete Logarithms. 87 - (Withdrawn) A Lattice-Based Traitor Tracing Scheme. 88
- Joppe W. Bos, Thorsten Kleinjung:
ECM at Work. 89 - Adeline Langlois, Damien Stehlé:
Worst-Case to Average-Case Reductions for Module Lattices. 90 - (Withdrawn) Hardness of decision (R)LWE for any modulus. 91
- Yossef Oren, Avishai Wool:
Tolerant Algebraic Side-Channel Analysis of AES. 92 - Ying-ming Guo, Guang-pu Gao, Ya-qun Zhao:
Recent Results on Balanced Symmetric Boolean Functions. 93 - Jintai Ding, Dieter Schmidt:
Algebraic attack on lattice based cryptosystems via solving equations over real numbers. 94 - Nir Bitansky, Ran Canetti, Alessandro Chiesa, Eran Tromer:
Recursive Composition and Bootstrapping for SNARKs and Proof-Carrying Data. 95 - Ewan Fleischmann, Christian Forler, Stefan Lucks, Jakob Wenzel:
The Collision Security of MDC-4 The Collision Security of MDC-4. 96 - Yingpu Deng, Yanbin Pan:
An algorithm for factoring integers. 97 - François Dassance, Alexandre Venelli:
Combined Attacks on the AES Key Schedule. 98 - Craig Gentry, Shai Halevi, Nigel P. Smart:
Homomorphic Evaluation of the AES Circuit. 99 - Shahram Khazaei, Björn Terelius, Douglas Wikström:
Cryptanalysis of a Universally Verifiable Efficient Re-encryption Mixnet. 100 - (Withdrawn) Unbalanced Elementary Symmetric Boolean Functions with the Degree "d" and "wt(d)≥ 3". 101
- Ron Rothblum:
On the Circular Security of Bit-Encryption. 102 - Marten van Dijk, Ari Juels, Alina Oprea, Ronald L. Rivest:
FlipIt: The Game of "Stealthy Takeover". 103 - Wei Gao, Guilin Wang, Kefei Chen, Xueli Wang:
Provably Secure Generic Construction of Certificate Based Signature from Certificateless Signature in Standard Model. 104 - Wei Gao, Guilin Wang, Kefei Chen, Xueli Wang:
Generic Construction of Certificate Based Encryption from Certificateless Encryption Revisited. 105 - Santanu Sarkar, Subhamoy Maitra:
More on Correcting Errors in RSA Private Keys: Breaking CRT-RSA with Low Weight Decryption Exponents. 106 - Guilin Wang, Jiangshan Yu, Qi Xie:
Security Analysis of A Single Sign-On Mechanism for Distributed Computer Networks. 107 - Yoshinori Aono, Manindra Agrawal, Takakazu Satoh, Osamu Watanabe:
On the Optimality of Lattices for the Coppersmith Technique. 108 - (Withdrawn) Chosen-Ciphertext Secure Efficiently Searchable Encryption in the Standard Model. 109
- Razvan Barbulescu, Jérémie Detrey, Nicolas Estibals, Paul Zimmermann:
Finding Optimal Formulae for Bilinear Maps. 110 - Yin Zhang, Meicheng Liu, Dongdai Lin:
On the Immunity of Rotation Symmetric Boolean Functions Against Fast Algebraic Attacks. 111 - Meltem Sönmez Turan:
On The Nonlinearity of Maximum-length NFSR Feedbacks. 112 - Bart Mennink:
On the Collision and Preimage Security of MDC-4 in the Ideal Cipher Model. 113 - Danyang Chen, Yongbin Zhou, Yang Han, Rui Xue, Qing He:
On Hardening Leakage Resilience of Random Extractors for Instantiations of Leakage Resilient Cryptographic Primitives. 114 - X. U. Chun-xiang, H. E. Xiao-hu, Daniel Abraha:
Cryptanalysis of auditing protocol proposed by Wang et al. for data storage security in Cloud Computing. 115 - Ralf Küsters, Tomasz Truderung, Andreas Vogt:
Clash Attacks on the Verifiability of E-Voting Systems. 116 - Ran Canetti, Margarita Vald:
Universally Composable Security With Local Adversaries. 117 - S. Sree Vivek, S. Sharmila Deva Selvi, C. Pandu Rangan:
Stronger Public Key Encryption Schemes Withstanding RAM Scraper Like Attacks. 118 - Taechan Kim, Sungwook Kim, Jung Hee Cheon:
Accelerating the Final Exponentiation in the Computation of the Tate Pairings. 119 - Yongge Wang:
Password Protected Smart Card and Memory Stick Authentication Against Off-line Dictionary Attacks. 120 - Mitra Fatemi, Taraneh Eghlidos, Mohammad Reza Aref:
An Efficient Multistage Secret Sharing Scheme Using Linear One-way Functions and Bilinear Maps. 121 - Reza Rezaeian Farashahi, Hongfeng Wu, Changan Zhao:
Efficient Arithmetic on Hessian Curves over Fields of Characteristic Three. 122 - Amine Dehbaoui, Jean-Max Dutertre, Bruno Robisson, P. Orsatelli, Philippe Maurine, Assia Tria:
Injection of transient faults using electromagnetic pulses -Practical results on a cryptographic system-. 123 - Sandra Diaz-Santiago, Debrup Chakraborty:
On Securing Communication From Profilers. 124 - (Withdrawn) Short and Efficient Expressive Attribute-Based Signature in the Standard Model. 125
- Nuray At, Jean-Luc Beuchat, Ismail San:
Compact Implementation of Threefish and Skein on FPGA. 126 - Deep Singh, Maheshanand Bhaintwal:
Additive autocorrelation of some classes of cubic semi-bent Boolean functions. 127 - Marc Fischlin, Cristina Onete:
Provably Secure Distance-Bounding: an Analysis of Prominent Protocols. 128 - Nelly Fazio, Irippuge Milinda Perera:
Outsider-Anonymous Broadcast Encryption with Sublinear Ciphertexts. 129 - Juan A. Garay, Clint Givens, Rafail Ostrovsky:
Broadcast-Efficient Secure Multiparty Computation. 130 - Rodolphe Lampe, Jacques Patarin:
Security of Feistel Schemes with New and Various Tools. 131 - Grégory Landais, Nicolas Sendrier:
CFS Software Implementation. 132 - Jacob R. Lorch, James W. Mickens, Bryan Parno, Mariana Raykova, Joshua Schiffman:
Toward Practical Private Access to Data Centers via Parallel ORAM. 133 - Dimitrios Poulakis, Robert Rolland:
A Digital Signature Scheme for Long-Term Security. 134 - Nico Döttling, Daniel Kraschewski, Jörn Müller-Quade:
David & Goliath Oblivious Affine Function Evaluation - Asymptotically Optimal Building Blocks for Universally Composable Two-Party Computation from a Single Untrusted Stateful Tamper-Proof Hardware Token. 135 - Zilong Wang, Danfeng (Daphne) Yao, Rongquan Feng:
Adaptive Key Protection in Complex Cryptosystems with Attributes. 136