


default search action
IACR Cryptology ePrint Archive, Volume 2012
Volume 2012, 2012
- Andrew C. Yao, Yunlei Zhao:

Digital Signatures from Challenge-Divided Sigma-Protocols. 1 - Daniel J. Bernstein, Hsieh-Chung Chen, Chen-Mou Cheng, Tanja Lange, Ruben Niederhagen, Peter Schwabe, Bo-Yin Yang:

ECC2K-130 on NVIDIA GPUs. 2 - Qun-Xiong Zheng, Wen-Feng Qi, Tian Tian:

On the distinctness of binary sequences derived from primitive sequences modulo square-free odd integers. 3 - Daniel J. Bernstein, Tanja Lange:

The new SHA-3 software shootout. 4 - Benjamin Fuller, Adam O'Neill, Leonid Reyzin:

A Unified Approach to Deterministic Encryption: New Constructions and a Connection to Computational Entropy. 5 - Susan Hohenberger, Allison B. Lewko, Brent Waters:

Detecting Dangerous Queries: A New Approach for Chosen Ciphertext Security. 6 - Qiang Li, Xiangxue Li, Dong Zheng, Kefei Chen:

Optimal Multiple Assignments with (m, m)-Scheme for General Access Structures. 7 - Hubert Comon-Lundh, Véronique Cortier, Guillaume Scerri:

Security proof with dishonest keys. 8 - Saif Al-Kuwari:

On the Indifferentiability of the Integrated-Key Hash Functions. 9 - Charanjit S. Jutla, Moti Yung:

PayTree: "Amortized Signature" for Flexible Micro-Payments. 10 - Shao-zhen Chen, Tian-min Xu:

Biclique Attack of the Full ARIA-256. 11 - Melissa Chase, Markulf Kohlweiss, Anna Lysyanskaya, Sarah Meiklejohn:

Malleable Proof Systems and Applications. 12 - (Withdrawn) Higher Order Algebraic Attacks on Stream Ciphers. 13

- Yusuke Naito:

On the Indifferentiable Hash Functions in the Multi-Stage Security Games. 14 - Mihir Bellare, Stefano Tessaro, Alexander Vardy:

A Cryptographic Treatment of the Wiretap Channel. 15 - (Withdrawn) Efficient Mix-Net Veri cation by Proofs of Random Blocks. 16

- Brajesh Kumar Singh:

Secondary constructions on generalized bent functions. 17 - Kazuhiko Minematsu, Hiraku Morita, Tetsu Iwata:

Cryptanalysis of EAXprime. 18 - Gergei Bana, Hubert Comon-Lundh:

Towards Unconditional Soundness: Computationally Complete Symbolic Attacker. 19 - Jean-Pierre Flori, Sihem Mesnager:

Dickson polynomials, hyperelliptic curves and hyper-bent functions. 20 - (Withdrawn) Security Analysis of J-PAKE. 21

- Mihir Bellare, Stefano Tessaro:

Polynomial-Time, Semantically-Secure Encryption Achieving the Secrecy Capacity. 22 - Masoumeh Safkhani, Nasour Bagheri, Majid Naderi:

How a Cryptographer Can Get Rich? 23 - Somindu C. Ramanna, Sanjit Chatterjee, Palash Sarkar:

Variants of Waters' Dual-System Primitives Using Asymmetric Pairings. 24 - Xiangtao Yan, Yifa Li:

A new remote data integrity checking scheme for cloud storage. 25 - Anja Becker, Antoine Joux, Alexander May, Alexander Meurer:

Decoding Random Binary Linear Codes in 2n/20: How 1+1=0 Improves Information Set Decoding. 26 - (Withdrawn) Breaking the provably secure SAKE-C authenticated key exchange protocol with Extended Key Compromise Impersonation (E-KCI) Attack. 27

- Houssem Maghrebi, Emmanuel Prouff, Sylvain Guilley, Jean-Luc Danger:

A First-Order Leak-Free Masking Countermeasure. 28 - Yannick Seurin:

On the Exact Security of Schnorr-Type Signatures in the Random Oracle Model. 29 - Shekh Faisal Abdul-Latip, Reza Reyhanitabar, Willy Susilo, Jennifer Seberry:

Fault Analysis of the KATAN Family of Block Ciphers. 30 - Da-Zhi Sun:

An error in "On a new formal proof model for RFID location privacy". 31 - Yevgeniy Dodis, Abhishek Jain

, Tal Moran, Daniel Wichs:
Counterexamples to Hardness Amplification Beyond Negligible. 32 - Sihem Mesnager, Jean-Pierre Flori:

A note on hyper-bent functions via Dillon-like exponents. 33 - Boris Köpf, Laurent Mauborgne, Martín Ochoa:

Automatic Quantification of Cache Side-Channels. 34 - Andrey Bogdanov, Lars R. Knudsen, Gregor Leander, François-Xavier Standaert, John P. Steinberger, Elmar Tischhauser:

Key-Alternating Ciphers in a Provable Setting: Encryption Using a Small Number of Public Permutations. 35 - Ashish Kundu, Mikhail J. Atallah, Elisa Bertino:

Efficient Leakage-free Authentication of Trees, Graphs and Forests. 36 - Deep Singh, Maheshanand Bhaintwal, Brajesh Kumar Singh:

Recent Results on Generalized q-ary Bent Functions. 37 - François Durvaux, Mathieu Renauld, François-Xavier Standaert, Loïc van Oldeneel tot Oldenzeel, Nicolas Veyrat-Charvillon:

Cryptanalysis of the CHES 2009/2010 Random Delay Countermeasure. 38 - Feng Hao, Dylan Clarke:

Security Analysis of a Multi-Factor Authenticated Key Exchange Protocol. 39 - Marc Stevens:

Single-block collision attack on MD5. 40 - (Withdrawn) STITCH-256: A New Dedicated Cryptographic Hash Function. 41

- Naoyuki Shinohara, Takeshi Shimoyama, Takuya Hayashi, Tsuyoshi Takagi:

Key Length Estimation of Pairing-based Cryptosystems using ηT Pairing. 42 - Ching-Fang Hsu, Bing Zeng, Qi Cheng, Guohua Cui:

A novel Group Key Transfer Protocol. 43 - Jun Zhou, Zhenfu Cao:

PSCPA: Patient Self-controllable Privacy-preserving Cooperative Authentication in Distributed m-Healthcare Systems. 44 - Sebastian Faust, Carmit Hazay, Jesper Buus Nielsen, Peter Sebastian Nordholt, Angela Zottarel:

Signature Schemes Secure against Hard-to-Invert Leakage. 45 - Konstantinos Limniotis, Nicholas Kolokotronis, Nicholas Kalouptsidis:

Modifying Boolean Functions to Ensure Maximum Algebraic Immunity. 46 - Ilya Mironov, Omkant Pandey, Omer Reingold, Gil Segev:

Incremental Deterministic Public-Key Encryption. 47 - Sourav Sen Gupta, Anupam Chattopadhyay, Ayesha Khalid:

Designing Integrated Accelerator for Stream Ciphers with Structural Similarities. 48 - Yu Sasaki, Lei Wang:

2-Dimension Sums: Distinguishers Beyond Three Rounds of RIPEMD-128 and RIPEMD-160. 49 - Jeremy Constantin, Andreas Burg, Frank K. Gürkaynak:

Investigating the Potential of Custom Instruction Set Extensions for SHA-3 Candidates on a 16-bit Microcontroller Architecture. 50 - Benedikt Driessen:

Eavesdropping on Satellite Telecommunication Systems. 51 - Alexandra Boldyreva, Vipul Goyal, Virendra Kumar:

Identity-based Encryption with Efficient Revocation. 52 - Yevgeniy Dodis:

Beating Shannon requires BOTH efficient adversaries AND non-zero advantage. 53 - Emiliano De Cristofaro, Gene Tsudik:

On the performance of certain Private Set Intersection protocols. (And some remarks on the recent paper by Huang et al. in NDSS'12). 54 - (Withdrawn) Cryptanalysis of Mun et al.'s anonymous authentication scheme for roaming service in global mobility networks. 55

- Alexandra Boldyreva, Virendra Kumar:

A New Pseudorandom Generator from Collision-Resistant Hash Functions. 56 - Somindu C. Ramanna, Palash Sarkar:

Constant-Size Ciphertext HIBE From Asymmetric Pairings Using the Dual-System Technique. 57 - Christopher Portmann:

Key recycling in authentication. 58 - Yevgeniy Dodis, Eike Kiltz, Krzysztof Pietrzak, Daniel Wichs:

Message Authentication, Revisited. 59 - David Mandell Freeman:

Improved Security for Linearly Homomorphic Signatures: A Generic Framework. 60 - Maryam Rajabzadeh Asaar, Mahmoud Salmasizadeh:

A Pairing Based Strong Designated Verifier Signature Scheme without Random Oracles. 61 - (Withdrawn) On the Security of Attribute Based Signature Schemes. 62

- Shahram Khazaei, Douglas Wikström:

Randomized Partial Checking Revisited. 63 - Arjen K. Lenstra, James P. Hughes, Maxime Augier, Joppe W. Bos, Thorsten Kleinjung, Christophe Wachter:

Ron was wrong, Whit is right. 64 - Tsukasa Ishiguro:

Modified version of "Latin Dances Revisited: New Analytic Results of Salsa20 and ChaCha". 65 - Jiqiang Lu, Wun-She Yap, Yongzhuang Wei:

Weak Keys of the Full MISTY1 Block Cipher for Related-Key Cryptanalysis. 66 - Shay Gueron, Vlad Krasnov:

Parallelizing message schedules to accelerate the computations of hash functions. 67 - (Withdrawn) Extended Security Arguments for (Ring) Signature Schemes. 68

- Charles Bouillaguet, Patrick Derbez

, Pierre-Alain Fouque:
Automatic Search of Attacks on round-reduced AES and Applications. 69 - Razvan Barbulescu, Joppe W. Bos, Cyril Bouvier, Thorsten Kleinjung, Peter L. Montgomery:

Finding ECM-Friendly Curves through a Study of Galois Properties. 70 - Eli Ben-Sasson, Alessandro Chiesa, Daniel Genkin, Eran Tromer:

Fast Reductions from RAMs to Delegatable Succinct Constraint Satisfaction Problems. 71 - Craig Costello:

Particularly Friendly Members of Family Trees. 72 - Wei Gao, Guilin Wang, Xueli Wang, Kefei Chen:

Efficient identity-based threshold signature scheme from bilinear pairings in the standard model. 73 - Neal Koblitz, Alfred Menezes:

Another look at HMAC. 74 - Wei Gao, Guilin Wang, Kefei Chen, Xueli Wang, Guoyan Zhang:

Efficient identity-based threshold decryption scheme from bilinear pairings. 75 - Mark Zhandry:

Identity-based Encryption is Secure in the Quantum Random Oracle Model. 76 - Sébastien Tiran, Philippe Maurine:

Magnitude Squared Coherence based SCA. 77 - Zvika Brakerski:

Fully Homomorphic Encryption without Modulus Switching from Classical GapSVP. 78 - Masao Kasahara:

Public Key Cryptosystems Constructed Based on Reed-Solomon Codes, K(XV)SE(2)PKC, Realizing Coding Rate of Exactly 1.0. 79 - S. Sree Vivek, S. Sharmila Deva Selvi, Guhan Balasubramanian, C. Pandu Rangan:

Strongly Unforgeable Proxy Re-Signature Schemes in the Standard model. 80 - Michael Backes, Fabian Bendun, Dominique Unruh:

Computational Soundness of Symbolic Zero-knowledge Proofs: Weaker Assumptions and Mechanized Verification. 81 - Liran Lerman, Stephane Fernandes Medeiros, Nikita Veshchikov, Cédric Meuter, Gianluca Bontempi, Olivier Markowitch:

Semi-Supervised Template Attack. 82 - Casey Devet, Ian Goldberg, Nadia Heninger:

Optimally Robust Private Information Retrieval. 83 - Mohamed Saied Emam Mohamed, Stanislav Bulygin, Michael Zohner, Annelie Heuser, Michael Walter:

Improved Algebraic Side-Channel Attack on AES. 84 - Stanislav Bulygin, Michael Walter:

Study of the invariant coset attack on PRINTcipher: more weak keys with practical key recovery. 85 - (Withdrawn) Remarks on- an ideal multi-secret sharing scheme based on MSP. 86

- Joppe W. Bos, Alina Dudeanu, Dimitar Jetchev:

Collision Bounds for the Additive Pollard Rho Algorithm for Solving Discrete Logarithms. 87 - (Withdrawn) A Lattice-Based Traitor Tracing Scheme. 88

- Joppe W. Bos, Thorsten Kleinjung:

ECM at Work. 89 - Adeline Langlois, Damien Stehlé:

Worst-Case to Average-Case Reductions for Module Lattices. 90 - (Withdrawn) Hardness of decision (R)LWE for any modulus. 91

- Yossef Oren, Avishai Wool:

Tolerant Algebraic Side-Channel Analysis of AES. 92 - Ying-ming Guo, Guang-pu Gao, Ya-qun Zhao:

Recent Results on Balanced Symmetric Boolean Functions. 93 - Jintai Ding, Dieter Schmidt:

Algebraic attack on lattice based cryptosystems via solving equations over real numbers. 94 - Nir Bitansky, Ran Canetti, Alessandro Chiesa, Eran Tromer:

Recursive Composition and Bootstrapping for SNARKs and Proof-Carrying Data. 95 - Ewan Fleischmann, Christian Forler, Stefan Lucks, Jakob Wenzel:

The Collision Security of MDC-4 The Collision Security of MDC-4. 96 - Yingpu Deng, Yanbin Pan:

An algorithm for factoring integers. 97 - François Dassance, Alexandre Venelli:

Combined Attacks on the AES Key Schedule. 98 - Craig Gentry, Shai Halevi, Nigel P. Smart:

Homomorphic Evaluation of the AES Circuit. 99 - Shahram Khazaei, Björn Terelius, Douglas Wikström:

Cryptanalysis of a Universally Verifiable Efficient Re-encryption Mixnet. 100 - (Withdrawn) Unbalanced Elementary Symmetric Boolean Functions with the Degree "d" and "wt(d)≥ 3". 101

- Ron Rothblum:

On the Circular Security of Bit-Encryption. 102 - Marten van Dijk, Ari Juels, Alina Oprea, Ronald L. Rivest:

FlipIt: The Game of "Stealthy Takeover". 103 - Wei Gao, Guilin Wang, Kefei Chen, Xueli Wang:

Provably Secure Generic Construction of Certificate Based Signature from Certificateless Signature in Standard Model. 104 - Wei Gao, Guilin Wang, Kefei Chen, Xueli Wang:

Generic Construction of Certificate Based Encryption from Certificateless Encryption Revisited. 105 - Santanu Sarkar, Subhamoy Maitra:

More on Correcting Errors in RSA Private Keys: Breaking CRT-RSA with Low Weight Decryption Exponents. 106 - Guilin Wang, Jiangshan Yu, Qi Xie:

Security Analysis of A Single Sign-On Mechanism for Distributed Computer Networks. 107 - Yoshinori Aono, Manindra Agrawal, Takakazu Satoh, Osamu Watanabe:

On the Optimality of Lattices for the Coppersmith Technique. 108 - (Withdrawn) Chosen-Ciphertext Secure Efficiently Searchable Encryption in the Standard Model. 109

- Razvan Barbulescu, Jérémie Detrey, Nicolas Estibals, Paul Zimmermann:

Finding Optimal Formulae for Bilinear Maps. 110 - Yin Zhang, Meicheng Liu, Dongdai Lin:

On the Immunity of Rotation Symmetric Boolean Functions Against Fast Algebraic Attacks. 111 - Meltem Sönmez Turan:

On The Nonlinearity of Maximum-length NFSR Feedbacks. 112 - Bart Mennink:

On the Collision and Preimage Security of MDC-4 in the Ideal Cipher Model. 113 - Danyang Chen, Yongbin Zhou, Yang Han, Rui Xue, Qing He:

On Hardening Leakage Resilience of Random Extractors for Instantiations of Leakage Resilient Cryptographic Primitives. 114 - Chun-xiang Xu, Xiao-hu He, Daniel Abraha:

Cryptanalysis of auditing protocol proposed by Wang et al. for data storage security in Cloud Computing. 115 - Ralf Küsters, Tomasz Truderung, Andreas Vogt:

Clash Attacks on the Verifiability of E-Voting Systems. 116 - Ran Canetti, Margarita Vald:

Universally Composable Security With Local Adversaries. 117 - S. Sree Vivek, S. Sharmila Deva Selvi, C. Pandu Rangan:

Stronger Public Key Encryption Schemes Withstanding RAM Scraper Like Attacks. 118 - Taechan Kim, Sungwook Kim, Jung Hee Cheon:

Accelerating the Final Exponentiation in the Computation of the Tate Pairings. 119 - Yongge Wang:

Password Protected Smart Card and Memory Stick Authentication Against Off-line Dictionary Attacks. 120 - Mitra Fatemi, Taraneh Eghlidos, Mohammad Reza Aref:

An Efficient Multistage Secret Sharing Scheme Using Linear One-way Functions and Bilinear Maps. 121 - Reza Rezaeian Farashahi, Hongfeng Wu, Changan Zhao:

Efficient Arithmetic on Hessian Curves over Fields of Characteristic Three. 122 - Amine Dehbaoui, Jean-Max Dutertre, Bruno Robisson, P. Orsatelli, Philippe Maurine, Assia Tria:

Injection of transient faults using electromagnetic pulses -Practical results on a cryptographic system-. 123 - Sandra Diaz-Santiago, Debrup Chakraborty:

On Securing Communication From Profilers. 124 - (Withdrawn) Short and Efficient Expressive Attribute-Based Signature in the Standard Model. 125

- Nuray At, Jean-Luc Beuchat, Ismail San:

Compact Implementation of Threefish and Skein on FPGA. 126 - Deep Singh, Maheshanand Bhaintwal:

Additive autocorrelation of some classes of cubic semi-bent Boolean functions. 127 - Marc Fischlin, Cristina Onete

:
Provably Secure Distance-Bounding: an Analysis of Prominent Protocols. 128 - Nelly Fazio, Irippuge Milinda Perera:

Outsider-Anonymous Broadcast Encryption with Sublinear Ciphertexts. 129 - Juan A. Garay, Clint Givens, Rafail Ostrovsky:

Broadcast-Efficient Secure Multiparty Computation. 130 - Rodolphe Lampe, Jacques Patarin:

Security of Feistel Schemes with New and Various Tools. 131 - Grégory Landais, Nicolas Sendrier:

CFS Software Implementation. 132 - Jacob R. Lorch, James W. Mickens, Bryan Parno, Mariana Raykova, Joshua Schiffman:

Toward Practical Private Access to Data Centers via Parallel ORAM. 133 - Dimitrios Poulakis, Robert Rolland:

A Digital Signature Scheme for Long-Term Security. 134 - Nico Döttling, Daniel Kraschewski, Jörn Müller-Quade:

David & Goliath Oblivious Affine Function Evaluation - Asymptotically Optimal Building Blocks for Universally Composable Two-Party Computation from a Single Untrusted Stateful Tamper-Proof Hardware Token. 135 - Zilong Wang, Danfeng (Daphne) Yao, Rongquan Feng:

Adaptive Key Protection in Complex Cryptosystems with Attributes. 136 - Daniel J. Bernstein, Hsieh-Chung Chen, Chen-Mou Cheng, Tanja Lange, Ruben Niederhagen, Peter Schwabe, Bo-Yin Yang:

Usable assembly language for GPUs: a success story. 137 - Nicolas T. Courtois:

An Improved Differential Attack on Full GOST. 138 - Vinh-Thong Ta:

Formal verification of secure ad-hoc network routing protocols using deductive model-checking. 139 - Selçuk Baktir, Erkay Savas:

Highly-Parallel Montgomery Multiplication for Multi-core General-Purpose Microprocessors. 140 - Dmitry Khovratovich:

Bicliques for permutations: collision and preimage attacks in stronger settings. 141 - David Galindo, Javier Herranz, Jorge Luis Villar:

Identity-Based Encryption with Master Key-Dependent Message Security and Applications. 142 - Rafail Ostrovsky, Alessandra Scafuro, Ivan Visconti, Akshay Wadia:

Universally Composable Secure Computation with (Malicious) Physically Uncloneable Functions. 143 - Junfeng Fan, Frederik Vercauteren:

Somewhat Practical Fully Homomorphic Encryption. 144 - Shigeo Tsujii, Kohtaro Tadaki, Masahito Gotaishi, Ryou Fujita:

Construction of the Tsujii-Shamir-Kasahara (TSK) Type Multivariate Public Key Cryptosystem, which relies on the Difficulty of Prime Factorization. 145 - Christophe Petit, Jean-Jacques Quisquater:

On Polynomial Systems Arising from a Weil Descent. 146 - Elena Andreeva, Andrey Bogdanov, Bart Mennink, Bart Preneel, Christian Rechberger:

On Security Arguments of the Second Round SHA-3 Candidates. 147 - Michael Scott:

Client-Server Authentication Using Pairings. 148 - Martin Stanek:

Attacking Scrambled Burrows-Wheeler Transform. 149 - Dennis Hofheinz:

Circular chosen-ciphertext security with compact ciphertexts. 150 - Alexander Rostovtsev, Alexey Mizyukin:

On Boolean Ideals and Varieties with Application to Algebraic Attacks. 151 - Limin Shen, Yinxia Sun:

On security of a Certificateless Aggregate Signature Scheme. 152 - Ralf Küsters, Tomasz Truderung, Juergen Graf:

A Framework for the Cryptographic Verification of Java-like Programs. 153 - (Withdrawn) The Joint Signature and Encryption Revisited. 154

- Laila El Aimani, Marc Joye:

Toward Practical Group Encryption. 155 - Dag Arne Osvik:

Fast Embedded Software Hashing. 156 - Chunsheng Gu:

Attack on Fully Homomorphic Encryption over the Integers. 157 - Peter Gazi, Stefano Tessaro:

Efficient and Optimally Secure Key-Length Extension for Block Ciphers via Randomized Cascading. 158 - Gregory M. Zaverucha

:
Hybrid Encryption in the Multi-User Setting. 159 - (Withdrawn) New Construction of Perfect Sequence Set and Low Correlation Zone Sequence Set. 160

- Hai Xiong, Chao Li, Qingping Dai, Shaojing Fu:

New Constructions of Low Correlation Sequences with High Linear Complexity. 161 - Jayaprakash Kar:

Provably Secure Online/Off-line Identity-Based Signature Scheme for Wireless Sensor Network. 162 - Joan Daemen, Gilles Van Assche:

Differential propagation analysis of Keccak. 163 - Morten Dahl, Chao Ning, Tomas Toft:

On Secure Two-party Integer Division. 164 - Cristina Onete

:
Key Updates for RFID Distance-Bounding Protocols: Achieving Narrow-Destructive Privacy. 165 - Elena Dubrova:

A List of Maximum Period NLFSRs. 166 - Sorina Ionica:

Pairing-based algorithms for jacobians of genus 2 curves with maximal endomorphism ring. 167 - Valérie Gauthier, Ayoub Otmani, Jean-Pierre Tillich:

A Distinguisher-Based Attack of a Homomorphic Encryption Scheme Relying on Reed-Solomon Codes. 168 - Xiaopei Guo, Kejian Xu, Tongsen Sun, Xiubin Fan:

Analysis of Minimum Numbers of Linearly Active S-Boxes of a Class of Generalized Feistel Block Ciphers. 169 - Vladyslav Kovtun, Andrew Okhrimenko:

Approaches for the performance increasing of software implementation of integer multiplication in prime fields. 170 - Scott Aaronson, Paul F. Christiano:

Quantum Money from Hidden Subspaces. 171 - Pierre-Alain Fouque, Nicolas Guillermin, Delphine Leresteux, Mehdi Tibouchi, Jean-Christophe Zapalowicz:

Attacking RSA-CRT Signatures with Faults on Montgomery Multiplication. 172 - Bruno Blanchet:

Automatically Verified Mechanized Proof of One-Encryption Key Exchange. 173 - Emmanuel Volte, Jacques Patarin, Valérie Nachef:

Zero Knowledge with Rubik's Cubes. 174 - Houssem Maghrebi, Claude Carlet, Sylvain Guilley, Jean-Luc Danger:

Optimal First-Order Masking with Linear and Non-Linear Bijections. 175 - Satrajit Ghosh, Abhijit Das:

Improvements of Algebraic Attacks Based on Structured Gaussian Elimination. 176 - Dominique Unruh:

Everlasting Quantum Security. 177 - Aleksander Essex, Jeremy Clark, Urs Hengartner, Carlisle Adams:

Eperio: Mitigating Technical Complexity in Cryptographic Election Verification. 178 - Benjamin Kreuter, Abhi Shelat, Chih-Hao Shen:

Towards Billion-Gate Secure Computation with Malicious Adversaries. 179 - Brian Baldwin, William P. Marnane:

Yet Another SHA-3 Round 3 FPGA Results Paper. 180 - Nils Fleischhacker, Mark Manulis, Amir Azodi:

Modular Design and Analysis Framework for Multi-Factor Authentication and Key Exchange. 181 - Mark Zhandry:

How to Construct Quantum Random Functions. 182 - Michael Backes, Sebastian Meiser:

Differentially Private Smart Metering with Battery Recharging. 183 - Dion Boesten, Boris Skoric:

Asymptotic fingerprinting capacity in the Combined Digit Model. 184 - Ben Smyth:

Replay attacks that violate ballot secrecy in Helios. 185 - Brajesh Kumar Singh:

Third-order nonlinearities of some biquadratic monomial Boolean functions. 186 - Alexandra Dmitrienko, Ahmad-Reza Sadeghi, Sandeep Tamrakar, Christian Wachsmann:

SmartTokens: Delegable Access Control with NFC-enabled Smartphones (Full Version). 187 - Xin Li:

Non-Malleable Extractors, Two-Source Extractors and Privacy Amplification. 188 - Steve Kremer, Robert Künnemann, Graham Steel:

Universally Composable Key-Management. 189 - Ding Wang, Chunguang Ma:

On the Security of an Improved Password Authentication Scheme Based on ECC. 190 - Liangliang Xiao, I-Ling Yen:

Security Analysis and Enhancement for Prefix-Preserving Encryption Schemes. 191 - Liangliang Xiao, I-Ling Yen, Dung T. Huynh:

Extending Order Preserving Encryption for Multi-User Systems. 192 - Liangliang Xiao, Osbert Bastani, I-Ling Yen:

An Efficient Homomorphic Encryption Protocol for Multi-User Systems. 193 - Albrecht Petzoldt, Stanislav Bulygin, Johannes Buchmann:

A Multivariate based Threshold Ring Signature Scheme. 194 - Markku-Juhani O. Saarinen:

The BlueJay Ultra-Lightweight Hybrid Cryptosystem. 195 - Mihir Bellare, Stefano Tessaro, Thomas Ristenpart:

Multi-Instance Security and its Application to Password-Based Cryptography. 196 - Foteini Baldimtsi, Anna Lysyanskaya:

On The Security of One-Witness Blind Signature Schemes. 197 - Jae Hong Seo, Jung Hee Cheon:

Beyond the Limitation of Prime-Order Bilinear Groups, and Round Optimal Blind Signatures. 198 - Jean-Charles Faugère, Pierrick Gaudry, Louise Huot, Guénaël Renault:

Using Symmetries in the Index Calculus for Elliptic Curves Discrete Logarithm. 199 - Alexander W. Dent:

Aggregate Signcryption. 200 - J. H. Zhang, Y. B. Cui:

Comment an Anonymous Multi-receiver Identity-based Encryption Scheme. 201 - Bo Zhang, Fangguo Zhang:

Secure Similarity Coefficients Computation with Malicious Adversaries. 202 - Debiao He:

Robust biometric-based user authentication scheme for wireless sensor networks. 203 - Matthew K. Franklin, Haibin Zhang:

Unique Group Signatures. 204 - John C. Mitchell, Rahul Sharma, Deian Stefan, Joe Zimmerman:

Information-flow control for programming on encrypted data. 205 - Shuang Wu, Dengguo Feng, Wenling Wu, Jian Guo, Le Dong, Jian Zou:

(Pseudo) Preimage Attack on Round-Reduced Grøstl Hash Function and Others (Extended Version). 206 - (Withdrawn) Cryptanalysis of Hummingbird-2. 207

- Jay Shah, Ayan Mahalanobis:

A New Guess-and-Determine Attack on the A5/1. 208 - Donghoon Chang, Moti Yung:

Adaptive Preimage Resistance Analysis Revisited: \\ Requirements, Subtleties and Implications. 209 - Yusong Du, Fangguo Zhang:

On the Existence of Boolean Functions with Optimal Resistance against Fast Algebraic Attacks. 210 - Atsushi Fujioka

, Koutarou Suzuki, Keita Xagawa, Kazuki Yoneyama:
Strongly Secure Authenticated Key Exchange from Factoring, Codes, and Lattices. 211 - Meicheng Liu, Yin Zhang, Dongdai Lin:

Perfect Algebraic Immune Functions. 212 - Kaoru Kurosawa, Ryo Nojima, Le Trieu Phong:

Relation between Verifiable Random Functions and Convertible Undeniable Signatures, and New Constructions. 213 - Shengbao Wu, Mingsheng Wang:

Automatic Search of Truncated Impossible Differentials and Applications. 214 - Rosario Gennaro, Craig Gentry, Bryan Parno, Mariana Raykova:

Quadratic Span Programs and Succinct NIZKs without PCPs. 215 - Duong Hieu Phan, David Pointcheval, Siamak Fayyaz Shahandashti, Mario Strefler:

Adaptive CCA Broadcast Encryption with Constant-Size Secret Keys and Ciphertexts. 216 - Itai Dinur, Orr Dunkelman, Nathan Keller, Adi Shamir:

Efficient Dissection of Composite Problems, with Applications to Cryptanalysis, Knapsacks, and Combinatorial Search Problems. 217 - T.-H. Hubert Chan, Mingfei Li, Elaine Shi, Wenchang Xu:

Differentially Private Continual Monitoring of Heavy Hitters from Distributed Streams. 218 - Siamak Fayyaz Shahandashti, Reihaneh Safavi-Naini, Philip Ogunbona:

Private Fingerprint Matching. 219 - Mihir Bellare, Zvika Brakerski, Moni Naor, Thomas Ristenpart, Gil Segev, Hovav Shacham, Scott Yilek:

Hedged Public-key Encryption: How to Protect against Bad Randomness. 220 - Nishanth Chandran, Juan A. Garay, Rafail Ostrovsky:

Almost-Everywhere Secure Computation with Edge Corruptions. 221 - Kai-Yuen Cheong:

A secret sharing scheme of prime numbers based on hardness of factorization. 222 - Enrico Thomae:

A Generalization of the Rainbow Band Separation Attack and its Applications to Multivariate Schemes. 223 - Jie Chen, Hoon Wei Lim, San Ling, Huaxiong Wang, Hoeteck Wee:

Shorter IBE and Signatures via Asymmetric Pairings. 224 - Zvika Brakerski:

When Homomorphism Becomes a Liability. 225 - Sarah Meiklejohn, C. Christopher Erway, Alptekin Küpçü, Theodora Hinkle, Anna Lysyanskaya:

ZKPDL: A Language-Based System for Efficient Zero-Knowledge Proofs and Electronic Cash. 226 - (Withdrawn) Secure password-based remote user authentication scheme with non-tamper resistant smart cards. 227

- Marten van Dijk, Ulrich Rührmair:

Physical Unclonable Functions in Cryptographic Protocols: Security Proofs and Impossibility Results. 228 - Mohammad Mahmoody, David Xiao:

Languages with Efficient Zero-Knowledge PCP's are in SZK. 229 - Vadim Lyubashevsky, Chris Peikert, Oded Regev:

On Ideal Lattices and Learning with Errors Over Rings. 230 - Reihaneh Safavi-Naini, Mohammed Ashraful Tuhin, Pengwei Wang:

A General Construction for 1-round δ-RMT and (0, δ)-SMT. 231 - Diego F. Aranha, Laura Fuentes-Castañeda, Edward Knapp, Alfred Menezes, Francisco Rodríguez-Henríquez:

Implementing Pairings at the 192-bit Security Level. 232 - Qi Chai, Guang Gong:

A Cryptanalysis of HummingBird-2: The Differential Sequence Analysis. 233 - Jiali Choy, Huihui Yap, Khoongming Khoo, Jian Guo, Thomas Peyrin, Axel Poschmann, Chik How Tan:

SPN-Hash: Improving the Provable Resistance Against Differential Collision Attacks. 234 - Léo Ducas, Alain Durmus:

Ring-LWE in Polynomial Rings. 235 - David Bernhard, Olivier Pereira, Bogdan Warinschi:

On Necessary and Sufficient Conditions for Private Ballot Submission. 236 - Rkia Aouinatou, Mostafa Belkasmi:

In the point of view security, An efficient scheme in IBE with random oracle. 237 - Hongbo Yu, Jiazhe Chen, Xiaoyun Wang:

The Boomerang Attacks on the Round-Reduced Skein-512. 238 - Valérie Nachef, Jacques Patarin, Emmanuel Volte:

Zero-Knowledge for Multivariate Polynomials. 239 - Craig Gentry, Shai Halevi, Nigel P. Smart:

Ring Switching in BGV-Style Homomorphic Encryption. 240 - Masahiro Yagisawa:

Key distribution system and attribute-based encryption. 241 - Christina Brzuska, Marc Fischlin, Nigel P. Smart, Bogdan Warinschi, Stephen C. Williams:

Less is More: Relaxed yet Composable Security Notions for Key Exchange. 242 - Myungsun Kim, Jihye Kim, Jung Hee Cheon:

Compress Multiple Ciphertexts Using ElGamal Encryption Schemes. 243 - Leonard J. Schulman:

Cryptography from tensor problems. 244 - Qiang Li, Xiangxue Li, Dong Zheng, Zheng Huang, Kefei Chen:

On the Equivalence between the Set Covering Problem and the Problem of Finding Optimal Cumulative Assignment Schemes. 245 - Maggie E. Habeeb, Delaram Kahrobaei, Vladimir Shpilrain:

A Secret Sharing Scheme Based on Group Presentations and the Word Problem. 246 - Xusheng Zhang, Kunpeng Wang, Dongdai Lin:

On Efficient Pairings on Elliptic Curves over Extension Fields. 247 - Ghassan Karame, Elli Androulaki, Srdjan Capkun:

Two Bitcoins at the Price of One? Double-Spending Attacks on Fast Payments in Bitcoin. 248 - Boris Skoric, Jan-Jaap Oosterwijk:

Binary and q-ary Tardos codes, revisited. 249 - Xu An Wang, Xiaoyuan Yang:

New Identity Based Encryption And Its Proxy Re-encryption. 250 - Patrick Lacharme, Andrea Röck, Vincent Strubel, Marion Videau:

The Linux Pseudorandom Number Generator Revisited. 251 - Changyu Dong, Liqun Chen, Jan Camenisch, Giovanni Russello:

Fair Private Set Intersection with a Semi-trusted Arbiter. 252 - Zhian Zhu:

Cryptanalysis of pairing-free certificateless authenticated key agreement protocol. 253 - Emil Stefanov, Elaine Shi:

FastPRP: Fast Pseudo-Random Permutations for Small Domains. 254 - Benny Applebaum, Yuval Ishai, Eyal Kushilevitz:

How to Garble Arithmetic Circuits. 255 - Carolyn Whitnall, Elisabeth Oswald, François-Xavier Standaert:

The myth of generic DPA...and the magic of learning. 256 - (Withdrawn) The Transformation from the Galois NLFSR to the Fibonacci Configuration. 257

- José Bacelar Almeida, Manuel Barbosa, Endre Bangerter, Gilles Barthe, Stephan Krenn, Santiago Zanella-Béguelin:

Full Proof Cryptography: Verifiable Compilation of Efficient Zero-Knowledge Protocols. 258 - Maryam Rajabzadeh Asaar, Mahmoud Salmasizadeh:

A Novel Strong Designated Verifier Signature Scheme without Random Oracles. 259 - Jialin Huang, Xuejia Lai:

Transposition of AES Key Schedule. 260 - Michael Gerbush, Allison B. Lewko, Adam O'Neill, Brent Waters:

Dual Form Signatures: An Approach for Proving Security from Static Assumptions. 261 - Ivan Damgård, Marcel Keller, Enrique Larraia, Christian Miles, Nigel P. Smart:

Implementing AES via an Actively/Covertly Secure Dishonest-Majority MPC Protocol. 262 - Kai-Yuen Cheong:

One-way Functions from Chebyshev Polynomials. 263 - Lei Wei, Thomas Peyrin, Przemyslaw Sokolowski, San Ling, Josef Pieprzyk, Huaxiong Wang:

On the (In)Security of IDEA in Various Hashing Modes. 264 - Mihir Bellare, Viet Tung Hoang, Phillip Rogaway:

Garbling Schemes. 265 - Christopher W. Fletcher, Marten van Dijk, Srinivas Devadas:

Compilation Techniques for Efficient Encrypted Computation. 266 - Steven D. Galbraith, Chang-An Zhao:

Self-pairings on Hyperelliptic Curves. 267 - Edoardo Persichetti:

On a CCA2-secure variant of McEliece in the standard model. 268 - Luke Mather, Elisabeth Oswald:

Quantifying Side-Channel Information Leakage from Web Applications. 269 - Enrico Thomae:

Quo Vadis Quaternion? Cryptanalysis of Rainbow over Non-Commutative Rings. 270 - (Withdrawn) Homomorphic Signature for Identity Authentication in Cloud Computing. 271

- Martin Hirt, Christoph Lucas, Ueli Maurer, Dominik Raub:

Passive Corruption in Statistical Multi-Party Computation. 272 - Yun-Ju Huang, Feng-Hao Liu, Bo-Yin Yang:

Public-Key Cryptography from New Multivariate Quadratic Assumptions. 273 - Aleksandar Kircanski, Amr M. Youssef:

Boomerang and Slide-Rotational Analysis of the SM3 Hash Function. 274 - Samuel Neves, Jean-Philippe Aumasson:

Implementing BLAKE with AVX, AVX2, and XOP. 275 - Alptekin Küpçü:

Official Arbitration and its Application to Secure Cloud Storage. 276 - Rkia Aouinatou, Mostafa Belkasmi:

Cyptanalysis CDHP , BDHP and Tate pairing under certain conditions The Tate pairing is less secure than Weil. 277 - Dustin Moody, Souradyuti Paul, Daniel Smith-Tone:

Improved Indifferentiability Security Bound for the JH Mode. 278 - Abhishek Jain

, Rafail Ostrovsky, Silas Richelson, Ivan Visconti:
Concurrent Zero Knowledge in the Bounded Player Model. 279 - Michael Tunstall:

Improved "Partial Sums"-based Square Attack on AES. 280 - Dario Fiore, Rosario Gennaro:

Publicly Verifiable Delegation of Large Polynomials and Matrix Computations, with Applications. 281 - Md. Iftekhar Salam, Hoon-Jae Lee:

Algebraic Countermeasure to Enhance the Improved Summation Generator with 2-Bit Memory. 282 - Deep Singh, Maheshanand Bhaintwal:

Some properties of q-ary functions based on spectral analysis. 283 - Olivier Blazy, Céline Chevalier, David Pointcheval, Damien Vergnaud:

Efficient UC-Secure Authenticated Key-Exchange for Algebraic Languages. 284 - Masayuki Abe, Melissa Chase, Bernardo David, Markulf Kohlweiss, Ryo Nishimaki, Miyako Ohkubo:

Constant-Size Structure-Preserving Signatures: Generic Constructions and Simple Assumptions. 285 - Subidh Ali, Debdeep Mukhopadhyay:

Protecting Last Four Rounds of CLEFIA is Not Enough Against Differential Fault Analysis. 286 - Andrew C. Yao, Yunlei Zhao:

Computationally-Fair Group and Identity-Based Key-Exchange. 287 - Philippe Camacho:

Fair Exchange of Short Signatures without Trusted Third Party. 288 - Liqun Chen:

Ring Group Signatures. 289 - Rosario Gennaro, Daniel Wichs:

Fully Homomorphic Message Authenticators. 290 - Yihua Zhang, Marina Blanton

:
Efficient Dynamic Provable Possession of Remote Data via Update Trees. 291 - Jon Passki, Tom Ritter:

An Adaptive-Ciphertext Attack against "I ⊕ C" Block Cipher Modes With an Oracle. 292 - Wei Wei, Chengliang Tian, Xiaoyun Wang:

New Transference Theorems on Lattices Possessing nε-unique Shortest Vectors. 293 - Daniel J. Bernstein, Tanja Lange:

Two grumpy giants and a baby. 294 - Michelle Kendall, Keith M. Martin, Siaw-Lynn Ng, Maura B. Paterson, Douglas R. Stinson:

Broadcast-enhanced Key Predistribution Schemes. 295 - Sergei Skorobogatov, Christopher Woods:

In the blink of an eye: There goes your AES key. 296 - Feng-Hao Liu, Anna Lysyanskaya:

Tamper and Leakage Resilience in the Split-State Model. 297 - Foteini Baldimtsi, Anna Lysyanskaya:

Anonymous Credentials Light. 298 - Ming Tang, Pingpan Cheng, Zhenlong Qiu:

Differential Power Analysis on ZUC Algorithm. 299 - Begül Bilgin

, Svetla Nikova, Ventzislav Nikov, Vincent Rijmen, Georg Stütz:
Threshold Implementations of all 3x3 and 4x4 S-boxes. 300 - Myungsun Kim, Jinsu Kim, Jung Hee Cheon:

A Public Shuffle without Private Permutations. 301 - István Vajda:

On instance separation in the UC-framework. 302 - Mohamed Ahmed Abdelraheem, Martin Ågren, Peter Beelen, Gregor Leander:

On The Distribution of Linear Biases: Three Instructive Examples. 303 - Frédéric Dupuis, Jesper Buus Nielsen, Louis Salvail:

Actively Secure Two-Party Evaluation of any Quantum Operation. 304 - Duong Hieu Phan, Viet Cuong Trinh:

Resistance to Pirates 2.0: A Method from Leakage Resilient Cryptography. 305 - Marcel Keller, Gert Læssøe Mikkelsen, Andy Rupp

:
Efficient Threshold Zero-Knowledge with Applications to User-Centric Protocols. 306 - Duong Hieu Phan, David Pointcheval, Viet Cuong Trinh:

Multi-Channel Broadcast Encryption. 307 - Gilles Barthe, David Pointcheval, Santiago Zanella-Béguelin:

Verified Security of Redundancy-Free Encryption from Rabin and RSA. 308 - Mike Hamburg:

Fast and compact elliptic-curve cryptography. 309 - Koji Nuida, Takuro Abe, Shizuo Kaji, Toshiaki Maeno, Yasuhide Numata:

A mathematical problem for security analysis of hash functions and pseudorandom generators. 310 - Dennis Hofheinz, Tibor Jager:

Tightly Secure Signatures and Public-Key Encryption. 311 - Debiao He:

Cryptanalysis of a Provably Secure Gateway-Oriented Password-Based Authenticated Key Exchange Protocol. 312 - (Withdrawn) An anonymous proxy signature scheme without random oracles. 313

- Tomasz Rachwalik, Janusz Szmidt, Robert Wicik, Janusz Zablocki:

Generation of Nonlinear Feedback Shift Registers with special-purpose hardware. 314 - Teng Guo, Feng Liu, Chuan Kun Wu, YoungChang Hou:

Using Variance to Analyze Visual Cryptography Schemes. 315 - Gergei Bana, Pedro Adão, Hideki Sakurada:

Computationally Sound Verification of the NSL Protocol via Computationally Complete Symbolic Attacker. 316 - Markku-Juhani O. Saarinen, Daniel W. Engels:

A Do-It-All-Cipher for RFID: Design Requirements (Extended Abstract). 317 - Daniel J. Bernstein, Tanja Lange:

Non-uniform cracks in the concrete: the power of free precomputation. 318 - Ignacio Cascudo Pueyo, Ronald Cramer, Chaoping Xing:

Bounds on the Threshold Gap in Secret Sharing over Small Fields. 319 - Matan Banin, Boaz Tsaban:

The Discrete Logarithm Problem in non-representable rings. 320 - Erik Tews:

DECT Security Analysis. 321 - Anupam Pattanayak:

Revisiting Dedicated and Block Cipher based Hash Functions. 322 - Thore Graepel, Kristin E. Lauter, Michael Naehrig:

ML Confidential: Machine Learning on Encrypted Data. 323 - Sébastien Briais, Stéphane Caron, Jean-Michel Cioranesco, Jean-Luc Danger, Sylvain Guilley, Jacques-Henri Jourdan, Arthur Milchior, David Naccache, Thibault Porteboeuf:

3D Hardware Canaries. 324 - Sugata Gangopadhyay, Enes Pasalic, Pantelimon Stanica:

A note on generalized bent criteria for Boolean functions. 325 - Allison B. Lewko, Brent Waters:

New Proof Methods for Attribute-Based Encryption: Achieving Full Security through Selective Techniques. 326 - Shaohui Wang, Zhijie Han, Sujuan Liu, Dan-wei Chen:

Security Analysis of RAPP An RFID Authentication Protocol based on Permutation. 327 - Danilo Gligoroski, Simona Samardjiska:

The Multivariate Probabilistic Encryption Scheme MQQ-ENC. 328 - Claude Crépeau, Raza Ali Kazmi:

An Analysis of ZVP-Attack on ECC Cryptosystems. 329 - ZiJie Xu, Ke Xu:

A Way Reduce Signed Bitwise Differences that Transformed Into Same Modular Differences. 330 - ZhaoHui Tang:

Homomorphic A-codes for Network Coding. 331 - Maryam Rajabzadeh Asaar, Mahmoud Salmasizadeh:

A Non-delegatable Identity-based Designated Verifier Signature Scheme without Bilinear Pairings. 332 - Yehuda Lindell, Hila Zarosim:

On the Feasibility of Extending Oblivious Transfer. 333 - Masoumeh Safkhani, Nasour Bagheri, Majid Naderi:

On the Traceability of Tags in SUAP RFID Authentication Protocols. 334 - Yu Lou, Huiting Han, Chunming Tang, Maozhi Xu:

Constructing Vectorial Boolean Functions with High Algebraic Immunity Based on Group Decomposition. 335 - Gérald Gavin:

RSA modulus generation in the two-party case. 336 - Sanjay Bhattacherjee, Palash Sarkar:

Analysis and Trade-Offs for the (Complete Tree) Layered Subset Difference Broadcast Encryption Scheme. 337 - Xiao Zhong, Mingsheng Wang:

Algebraic Attack on LFSR-Based Multi-Output Stream Ciphers and Research on Algebraic Immunity for Multi-Output Boolean Functions. 338 - Adi Shamir, Eldad Zinger:

A Practical Polynomial-Time Known-Plaintext Attack on a Cryptosystem Proposed by John Nash. 339 - Henning Schnoor:

Deciding Epistemic and Strategic Properties of Cryptographic Protocols. 340 - Michel Abdalla, Dario Fiore, Vadim Lyubashevsky:

From Selective to Full Security: Semi-Generic Transformations in the Standard Model. 341 - Joseph K. Liu, Man Ho Au, Willy Susilo, Jianying Zhou:

Enhancing Location Privacy for Electric Vehicles (at the right time). 342 - Tamas Györfi, Octavian Cret, Guillaume Hanrot, Nicolas Brisebarre:

High-Throughput Hardware Architecture for the SWIFFT / SWIFFTX Hash Functions. 343 - Masao Kasahara:

Construction of New Classes of Knapsack Type Public Key Cryptosystem Using Uniform Secret Sequence, K(II)ΣΠPKC, Constructed Based on Maximum Length Code. 344 - Takuya Hayashi, Takeshi Shimoyama, Naoyuki Shinohara, Tsuyoshi Takagi:

Breaking pairing-based cryptosystems using ηT pairing over GF(397). 345 - Oumar Diao, Emmanuel Fouotsa:

Edwards model of elliptic curves defined over any fields. 346 - Xin-jie Zhao, Shize Guo, Fan Zhang, Tao Wang, Zhijie Shi, Keke Ji:

Algebraic Differential Fault Attacks on LED using a Single Fault Injection. 347 - Jan Camenisch, Maria Dubovitskaya, Robert R. Enderlein, Gregory Neven:

Oblivious Transfer with Hidden Access Control from Attribute-Based Encryption. 348 - Subhadeep Banik, Subhamoy Maitra, Santanu Sarkar:

A Differential Fault Attack on Grain-128a using MACs. 349 - Liangliang Xiao, I-Ling Yen:

A Note for the Ideal Order-Preserving Encryption Object and Generalized Order-Preserving Encryption. 350 - Jean-Philippe Aumasson, Daniel J. Bernstein:

SipHash: a fast short-input PRF. 351 - Ashish Kundu, Elisa Bertino:

On Hashing Graphs. 352 - Robert Beat, Philipp Grabher, Dan Page, Stefan Tillich, Marcin Wójcik:

On Reconfigurable Fabrics and Generic Side-Channel Countermeasures. 353 - Arno Mittelbach:

Hash Combiners for Second Pre-Image Resistance, Target Collision Resistance and Pre-Image Resistance have Long Output. 354 - Daniel J. Bernstein, Tanja Lange:

Never trust a bunny. 355 - Jan Camenisch, Gregory Neven, Markus Rückert:

Fully Anonymous Attribute Tokens from Lattices. 356 - Juan Manuel González Nieto, Mark Manulis, Bertram Poettering, Jothi Rangasamy, Douglas Stebila:

Publicly Verifiable Ciphertexts. 357 - Gilles Piret, Thomas Roche, Claude Carlet:

PICARO - A Block Cipher Allowing Efficient Higher-Order Side-Channel Resistance - Extended Version -. 358 - Neal Koblitz, Alfred Menezes:

Another look at non-uniformity. 359 - Céline Blondeau, Benoît Gérard, Kaisa Nyberg:

Multiple Differential Cryptanalysis using \LLR and χ2 Statistics. 360 - Michele Mosca, Douglas Stebila, Berkant Ustaoglu:

Quantum Key Distribution in the Classical Authenticated Key Exchange Framework. 361 - Omkant Pandey:

Achieving Constant Round Leakage-Resilient Zero-Knowledge. 362 - Anne Canteaut, Thomas Fuhr, María Naya-Plasencia, Pascal Paillier, Jean-René Reinhard, Marion Videau:

A Unified Indifferentiability Proof for Permutation- or Block Cipher-Based Hash Functions. 363 - Ivan Damgård, Adriana López-Alt:

Zero-Knowledge Proofs with Low Amortized Communication from Lattice Assumptions. 364 - Shaohui Wang, Dan-wei Chen, Zhi-Wei Wang, Suqin Chang:

Public Auditing for Ensuring Cloud Data Storage Security With Zero Knowledge Privacy. 365 - Dana Dachman-Soled, Yael Tauman Kalai:

Securing Circuits Against Constant-Rate Tampering. 366 - Shweta Agrawal, Yevgeniy Dodis, Vinod Vaikuntanathan, Daniel Wichs:

On Continual Leakage of Discrete Log Representations. 367 - Kris Gaj, Ekawat Homsirikamol, Marcin Rogawski, Rabia Shahid, Malik Umar Sharif:

Comprehensive Evaluation of High-Speed and Medium-Speed Implementations of Five SHA-3 Finalists Using Xilinx and Altera FPGAs. 368 - Shi Bai, Emmanuel Thomé, Paul Zimmermann:

Factorisation of RSA-704 with CADO-NFS. 369 - Renaud Dubois, Aurore Guillevic, Marine Sengelin Le Breton:

Improved Broadcast Encryption Scheme with Constant-Size Ciphertext. 370 - Shay Gueron, Vlad Krasnov:

Simultaneous hashing of multiple messages. 371 - (Withdrawn) New Preimage Attacks on Hash Modes of AES-256. 372

- T.-H. Hubert Chan, Elaine Shi, Dawn Song:

Optimal Lower Bound for Differentially Private Multi-Party Aggregation. 373 - Omar Choudary, Felix Gröbert, Joachim Metz:

Infiltrate the Vault: Security Analysis and Decryption of Lion Full Disk Encryption. 374 - Reto E. Koenig, Rolf Haenni:

How to Store some Secrets. 375 - Colleen Swanson, Douglas R. Stinson:

Combinatorial Solutions Providing Improved Security for the Generalized Russian Cards Problem. 376 - Aniket Kate, Yizhou Huang, Ian Goldberg:

Distributed Key Generation in the Wild. 377 - Ran Gelles, Rafail Ostrovsky, Kina Winoto:

Multiparty Proximity Testing with Dishonest Majority from Equality Testing. 378 - Eiichiro Fujisaki:

A Framework for Efficient Fully-Equipped UC Commitments. 379 - Ioana Boureanu, Serge Vaudenay:

Several Weak Bit-Commitments Using Seal-Once Tamper-Evident Devices. 380 - (Withdrawn) Strongly Authenticated Key Exchange Protocol from Bilinear Groups without Random Oracles. 381

- Afonso Arriaga, Manuel Barbosa, Pooya Farshim:

On the Joint Security of Signature and Encryption Schemes under Randomness Reuse: Efficiency and Security Amplification. 382 - Junji Shikata:

Formalization of Information-Theoretic Security for Encryption and Key Agreement, Revisited. 383 - Brent Waters:

Functional Encryption for Regular Languages. 384 - Chang Liu, Xuyun Zhang, Chi Yang, Jinjun Chen:

CCBKE - Session Key Negotiation for Fast and Secure Scheduling of Scientific Applications in Cloud Computing. 385 - Rafael Martínez-Peláez, Francisco Rico-Novella:

Cryptanalysis of Sood et al.'s Authentication Scheme using Smart Cards. 386 - Jintai Ding:

New cryptographic constructions using generalized learning with errors problem. 387 - Ignacio Cascudo Pueyo, Ronald Cramer, Chaoping Xing:

The Arithmetic Codex. 388 - Roel Peeters, Jens Hermans:

Wide Strong Private RFID Identification based on Zero-Knowledge. 389 - Chol-Sun Sin:

Regular Ternary Algorithm for Scalar Multiplication on Elliptic Curves over Finite Fields of Characteristic Three. 390 - Shaohui Wang, Sujuan Liu, Dan-wei Chen:

Analysis and Construction of Efficient RFID Authentication Protocol with Backward Privacy. 391 - S. Sharmila Deva Selvi, S. Sree Vivek, Dhinakaran Vinayagamurthy, C. Pandu Rangan:

ID Based Signcryption Scheme in Standard Model. 392 - Mohammad Sabzinejad Farash, Mahmoud Ahmadian-Attari, Majid Bayat:

A Certificateless Multiple-key Agreement Protocol Based on Bilinear Pairings. 393 - Mohammad Sabzinejad Farash, Mahmoud Ahmadian-Attari:

An ID-Based Key Agreement Protocol Based on ECC Among Users of Separate Networks. 394 - Morteza Arifi, Mahmoud Gardeshi, Mohammad Sabzinejad Farash:

A New Efficient Authenticated ID-Based Group Key Agreement Protocol. 395 - Brajesh Kumar Singh:

On second-order nonlinearity and maximum algebraic immunity of some bent functions in PS+. 396 - Liqun Chen, Hoon Wei Lim, Guomin Yang:

Cross-Domain Password-Based Authenticated Key Exchange Revisited. 397 - Travis Mayberry, Erik-Oliver Blass, Agnes Hui Chan:

PIRMAP: Efficient Private Information Retrieval for MapReduce. 398 - Kitae Jeong:

Differential Fault Analysis on Block Cipher Piccolo. 399 - Philipp Jovanovic, Martin Kreuzer, Ilia Polian:

An Algebraic Fault Attack on the LED Block Cipher. 400 - Martin R. Albrecht, Gregor Leander:

An All-In-One Approach to Differential Cryptanalysis for Small Block Ciphers. 401 - Juan Manuel González Nieto, Mark Manulis, Dongdong Sun:

Forward-Secure Hierarchical Predicate Encryption. 402 - Juan Manuel González Nieto, Mark Manulis, Dongdong Sun:

Fully Private Revocable Predicate Encryption. 403 - Amos Beimel, Oriol Farràs, Yuval Mintz:

Secret Sharing Schemes for Very Dense Graphs. 404 - Mehrdad Aliasgari, Marina Blanton

, Yihua Zhang, Aaron Steele:
Secure Computation on Floating Point Numbers. 405 - Jue-Sam Chou, Yalin Chen, Chun-Hui Huang, Yu-Siang Huang:

Comments on four multi-server authentication protocols using smart card. 406 - Julien Bringer, Hervé Chabanne, Alain Patey:

Cross-Unlinkable Hierarchical Group Signatures. 407 - Gurleen Grewal, Reza Azarderakhsh, Patrick Longa, Shi Hu, David Jao:

Efficient Implementation of Bilinear Pairings on ARM Processors. 408 - Rafael Misoczki, Jean-Pierre Tillich, Nicolas Sendrier, Paulo S. L. M. Barreto:

MDPC-McEliece: New McEliece Variants from Moderate Density Parity-Check Codes. 409 - Qingfeng Cheng:

Cryptanalysis of an Identity-Based Multiple Key Agreement Scheme. 410 - Alexander Dibert, László Csirmaz:

Infinite Secret Sharing - Examples. 411 - László Csirmaz:

Probabilistic Infinite Secret Sharing. 412 - Mukund Kalyanaraman, Michael Orshansky:

Highly Secure Strong PUF based on Nonlinearity of MOSFET Subthreshold Operation. 413 - Yin Li, Gongliang Chen, Xiao-ning Xie:

Low complexity bit-parallel GF(2m) multiplier for all-one polynomials. 414 - Jialin Huang, Xuejia Lai:

Revisiting Key Schedule's Diffusion In Relation With Round Function's Diffusion. 415 - Cas Cremers, Michèle Feltz:

Beyond eCK: Perfect Forward Secrecy under Actor Compromise and Ephemeral-Key Reveal. 416 - Romain Bardou, Riccardo Focardi, Yusuke Kawamoto, Lorenzo Simionato, Graham Steel, Joe-Kai Tsay:

Efficient Padding Oracle Attacks on Cryptographic Hardware. 417 - Rafael Martínez-Peláez, Francisco Rico-Novella:

Weaknesses of an Improvement Authentication Scheme using. 418 - (Withdrawn) DAC-MACS: Effective Data Access Control for Multi-Authority Cloud Storage Systems. 419

- Denise Demirel, Jeroen van de Graaf:

A Publicly-Veri able Mix-net with Everlasting Privacy Towards Observers. 420 - Ekawat Homsirikamol, Pawel Morawiecki, Marcin Rogawski, Marian Srebrny:

Security margin evaluation of SHA-3 contest finalists through SAT-based attacks. 421 - Mustafa Çoban, Ferhat Karakoç

, Özkan Boztas:
Biclique Cryptanalysis of TWINE. 422 - Dominique Unruh:

Programmable encryption and key-dependent messages. 423 - Benoît Libert, Thomas Peters, Moti Yung:

Scalable Group Signatures with Revocation. 424 - Gautham Sekar:

The Stream Cipher Core of the 3GPP Encryption Standard 128-EEA3: Timing Attacks and Countermeasures. 425 - Ed Kendall, Michelle Kendall, Wilfrid S. Kendall:

A Generalised Formula for Calculating the Resilience of Random Key Predistribution Schemes. 426 - Robert Drylo:

Constructing Pairing-Friendly Genus 2 Curves with Split Jacobian. 427 - Long Hoang Nguyen:

Rational authentication protocols and their use in financial transactions. 428 - Long Hoang Nguyen, Andrew William Roscoe:

Simple construction of epsilon-biased distribution. 429 - Sébastien Briais, Sylvain Guilley, Jean-Luc Danger:

A formal study of two physical countermeasures against side channel attacks. 430 - Yusuke Sakai, Jacob C. N. Schuldt, Keita Emura, Goichiro Hanaoka, Kazuo Ohta:

On the Security of Dynamic Group Signatures: Preventing Signature Hijacking. 431 - Alex Biryukov, Ivan Pustogarov, Ralf-Philipp Weinmann:

TorScan: Tracing Long-lived Connections and Differential Scanning Attacks. 432 - Sanjam Garg

, Abishek Kumarasubramanian, Rafail Ostrovsky, Ivan Visconti:
Impossibility Results for Static Input Secure Computation. 433 - Dario Fiore, Rosario Gennaro:

Improved Publicly Verifiable Delegation of Large Polynomials and Matrix Computations. 434 - Yevgeniy Dodis, Adriana López-Alt, Ilya Mironov, Salil P. Vadhan:

Differential Privacy with Imperfect Randomness. 435 - Melissa Chase, Ivan Visconti:

Secure Database Commitments and Universal Arguments of Quasi Knowledge. 436 - Amit Sahai, Hakan Seyalioglu, Brent Waters:

Dynamic Credentials and Ciphertext Delegation for Attribute-Based Encryption. 437 - Tetsu Iwata, Keisuke Ohashi, Kazuhiko Minematsu:

Breaking and Repairing GCM Security Proofs. 438 - Ding Wang, Chunguang Ma:

Robust Smart Card based Password Authentication Scheme against Smart Card Loss Problem. 439 - Simon Knellwolf, Dmitry Khovratovich:

New Preimage Attacks Against Reduced SHA-1. 440 - Sanjam Garg

, Amit Sahai:
Adaptively Secure Multi-Party Computation with Dishonest Majority. 441 - Benoît Libert, Thomas Peters, Moti Yung:

Group Signatures with Almost-for-free Revocation. 442 - Kristin E. Lauter, Damien Robert:

Improved CRT Algorithm for Class Polynomials in Genus 2. 443 - Greg Childers:

Factorization of a 1061-bit number by the Special Number Field Sieve. 444 - Debiao He, Miaomiao Tian:

A note on 'An efficient certificateless aggregate signature with constant pairing computations'. 445 - Subidh Ali, Debdeep Mukhopadhyay, Michael Tunstall:

Differential Fault Analysis of AES: Towards Reaching its Limits. 446 - ZhaoHui Tang, Hoon Wei Lim:

Multi-receiver Homomorphic Authentication Codes for Network Coding. 447 - Goichiro Hanaoka, Takahiro Matsuda, Jacob C. N. Schuldt:

On the Impossibility of Constructing Efficient Key Encapsulation and Programmable Hash Functions in Prime Order Groups. 448 - Johannes Braun, Johannes Buchmann, Ciaran Mullan, Alexander Wiesmaier:

Long Term Confidentiality: a Survey. 449 - Will Landecker, Thomas Shrimpton, R. Seth Terashima:

Tweakable Blockciphers with Beyond Birthday-Bound Security. 450 - John P. Steinberger, Xiaoming Sun, Zhe Yang:

Stam's Conjecture and Threshold Phenomena in Collision Resistance. 451 - Erik-Oliver Blass, Guevara Noubir, Triet Vo Huu:

EPiC: Efficient Privacy-Preserving Counting for MapReduce. 452 - Kaoru Kurosawa, Ryo Nojima, Le Trieu Phong:

New Leakage Resilient CCA-Secure Public Key Encryption. 453 - Abhishek Parakh:

A Probabilistic Quantum Key Transfer Protocol. 454 - Mike Rosulek:

Must you know the code of f to securely compute f? 455 - Johannes Gehrke, Michael Hay, Edward Lui, Rafael Pass:

Crowd-Blending Privacy. 456 - Gideon Samid:

Hush Functions Extended to Any Size Input versus Any Size Output. 457 - Daniel J. Bernstein, Tanja Lange:

Computing small discrete logarithms faster. 458 - Daniel Wichs:

Barriers in Cryptography with Weak, Correlated and Leaky Sources. 459 - Yohei Watanabe, Takenobu Seito, Junji Shikata:

Information-Theoretic Timed-Release Security: Key-Agreement, Encryption, and Authentication Codes. 460 - Nir Bitansky, Alessandro Chiesa:

Succinct Arguments from Multi-Prover Interactive Proofs and their Efficiency Benefits. 461 - Yang Wang, Man Ho Au, Willy Susilo:

Perfect Ambiguous Optimistic Fair Exchange. 462 - Xiang Xie, Rui Xue, Rui Zhang:

Deterministic Public Key Encryption and Identity-Based Encryption from Lattices in the Auxiliary-Input Setting. 463 - Carles Padró, Leonor Vázquez, An Yang:

Finding Lower Bounds on the Complexity of Secret Sharing Schemes by Linear Programming. 464 - Kaoutar Elkhiyaoui, Erik-Oliver Blass, Refik Molva:

T-MATCH: Privacy-Preserving Item Matching for Storage-Only RFID Tags. 465 - Benjamin Fuller, Leonid Reyzin:

Computational Entropy and Information Leakage. 466 - Yupeng Jiang, Yingpu Deng:

New results on nonexistence of generalized bent functions. 467 - Shweta Agrawal, Sergey Gorbunov, Vinod Vaikuntanathan, Hoeteck Wee:

Functional Encryption: New Perspectives and Lower Bounds. 468 - Mototsugu Nishioka:

Perfect Keyword Privacy in PEKS Systems. 469 - Sorin Iftene:

Some Connections Between Primitive Roots and Quadratic Non-Residues Modulo a Prime. 470 - Matthew Battey, Abhishek Parakh:

A Quasigroup Based Random Number Generator for Resource Constrained Environments. 471 - Amir Moradi, Oliver Mischke:

On the Simplicity of Converting Leakages from Multivariate to Univariate - Case Study of a Glitch-Resistant Masking Scheme -. 472 - Zhengan Huang, Shengli Liu, Baodong Qin:

Sender Equivocable Encryption Schemes Secure against Chosen-Ciphertext Attacks Revisited. 473 - Manuel Barbosa, Pooya Farshim:

Semantically Secure Functional Encryption, Revisited. 474 - David Bernhard, Georg Fuchsbauer, Essam Ghadafi:

Efficient Signatures of Knowledge and DAA in the Standard Model. 475 - Shay Gueron:

A j-lanes tree hashing mode and j-lanes SHA-256. 476 - Patrick Derbez

, Pierre-Alain Fouque, Jérémy Jean:
Improved Key Recovery Attacks on Reduced-Round AES in the Single-Key Setting. 477 - Qinglong Wang, Li Xu:

Cryptanalysis on a novel unconditionally secure oblivious polynomial evaluation protocol. 478 - Reza Reyhanitabar, Willy Susilo:

Mix-Compress-Mix Revisited: Dispensing with Non-invertible Random Injection Oracles. 479 - Jae Hong Seo:

Short Signatures From Diffie-Hellman: Realizing Short Public Key. 480 - John P. Steinberger:

Improved Security Bounds for Key-Alternating Ciphers via Hellinger Distance. 481 - Vladyslav Kovtun, Andrew Okhrimenko:

Approaches for the Parallelization of Software Implementation of Integer Multiplication. 482 - Jayaprakash Kar:

An Efficient Signcryption Scheme from q-Diffie-Hellman Problems. 483 - Ding Wang, Chunguang Ma, De-li Gu, Zhen-shan Cui:

Cryptanalysis of Two Dynamic ID-based Remote User Authentication Schemes for Multi-Server Architecture. 484 - Neil Hanley, HeeSeok Kim, Michael Tunstall:

Exploiting Collisions in Addition Chain-based Exponentiation Algorithms. 485 - Michael Backes, Ankit Malik, Dominique Unruh:

Computational Soundness without Protocol Restrictions. 486 - Benjamin Pousse:

Short communication: An interpretation of the Linux entropy estimator. 487 - Mohammad Beheshti-Atashgah, Majid Bayat, Mahmoud Gardeshi, Mohammad Reza Aref:

Designated Verifier Threshold Proxy Signature Scheme without Random Oracles. 488 - Zahra Ahmadian, Mahmoud Salmasizadeh, Mohammad Reza Aref:

Recursive Linear and Differential Cryptanalysis of Ultralightweight Authentication Protocols. 489 - Zahra Ahmadian, Mahmoud Salmasizadeh, Mohammad Reza Aref:

Desynchronization Attack on RAPP Ultralightweight Authentication Protocol. 490 - Lidong Han, Wei Wei, Mingjie Liu:

On the Multiple Fault Attack on RSA Signatures with LSBs of Messages Unknown. 491 - Elena Dubrova:

A Method for Generating Full Cycles by a Composition of NLFSRs. 492 - Qingji Zheng, Shouhuai Xu, Giuseppe Ateniese:

Efficient Query Integrity for Outsourced Dynamic Databases. 493 - Kevin P. Dyer, Scott E. Coull, Thomas Ristenpart, Thomas Shrimpton:

Format-Transforming Encryption: More than Meets the DPI. 494 - Alfredo De Santis, Moti Yung:

"Metaproofs" (and their Cryptographic Applications). 495 - Nishant Doshi, Devesh Jinwala:

Updating attribute in CP-ABE: A New Approach. 496 - Mike Bond, George French, Nigel P. Smart, Gaven J. Watson:

The low-call diet: Authenticated Encryption for call counting HSM users. 497 - Meicheng Liu, Yin Zhang, Dongdai Lin:

On the immunity of Boolean functions against fast algebraic attacks using bivariate polynomial representation. 498 - (Withdrawn) Authenticity, Integrity and Proof-of-Existence for Long-Term Archiving: a Survey. 499

- Nishant Doshi, Devesh Jinwala:

Constant Ciphertext Length in CP-ABE. 500 - Nishanth Chandran, Bhavana Kanukurthi, Rafail Ostrovsky, Leonid Reyzin:

Privacy Amplification with Asymptotically Optimal Entropy Loss. 501 - Viet Pham, Carlos Cid:

Are We Compromised? Modelling Security Assessment Games. 502 - Alex Escala, Javier Herranz, Benoît Libert, Carla Ràfols:

Hierarchical Identity-Based (Lossy) Trapdoor Functions. 503 - Kashi Neupane, Rainer Steinwandt, Adriana Suárez Corona:

Scalable Deniable Group Key Establishment. 504 - Koji Nuida:

On pseudorandomization of information-theoretically secure schemes without hardness assumptions. 505 - Melissa Chase, Markulf Kohlweiss, Anna Lysyanskaya, Sarah Meiklejohn:

Succinct Malleable NIZKs and an Application to Compact Shuffles. 506 - Josep Balasch, Baris Ege, Thomas Eisenbarth, Benoît Gérard, Zheng Gong, Tim Güneysu, Stefan Heyse, Stéphanie Kerckhof, François Koeune, Thomas Plos, Thomas Pöppelmann, Francesco Regazzoni, François-Xavier Standaert, Gilles Van Assche, Ronny Van Keer, Loïc van Oldeneel tot Oldenzeel, Ingo von Maurich:

Compact Implementation and Performance Evaluation of Hash Functions in ATtiny Devices. 507 - Yi Deng, Juan A. Garay, San Ling, Huaxiong Wang, Moti Yung:

On the (Im)Plausibility of Constant-Round Public-Coin Straight-Line-Simulatable Zero-Knowledge Proofs. 508 - Sebastian Kutzner, Phuong Ha Nguyen, Axel Poschmann, Huaxiong Wang:

On 3-share Threshold Implementations for 4-bit S-boxes. 509 - Sebastian Kutzner, Phuong Ha Nguyen, Axel Poschmann:

Enabling 3-share Threshold Implementations for any 4-bit S-box. 510 - Giuseppe Ateniese, Özgür Dagdelen, Ivan Damgård, Daniele Venturi:

Entangled Cloud Storage. 511 - Ivan Damgård, Sarah Zakarias:

Constant-Overhead Secure Computation for Boolean Circuits in the Preprocessing Model. 512 - Abhishek Jain

, Stephan Krenn, Krzysztof Pietrzak, Aris Tentes:
Commitments and Efficient Zero-Knowledge Proofs from Hard Learning Problems. 513 - Mihir Bellare, Kenneth G. Paterson, Susan Thomson:

RKA Security beyond the Linear Barrier: IBE, Encryption and Signatures. 514 - Mihir Bellare, Adam O'Neill:

Semantically-Secure Functional Encryption: Possibility Results, Impossibility Results and the Quest for a General Definition. 515 - Benny Applebaum:

Garbling XOR Gates "For Free" in the Standard Model. 516 - Ashish Choudhury, Martin Hirt, Arpita Patra:

Unconditionally Secure Asynchronous Multiparty Computation with Linear Communication Complexity. 517 - Kwangsu Lee, Dong Hoon Lee, Moti Yung:

Sequential Aggregate Signatures with Short Public Keys: Design, Analysis and Implementation Studies. 518 - Diego F. Aranha, Armando Faz-Hernández, Julio López, Francisco Rodríguez-Henríquez:

Faster implementation of scalar multiplication on Koblitz curves. 519 - Miroslaw Kutylowski, Maciej Gebala:

Optimizing Segment Based Document Protection (Corrected Version). 520 - Sergey Gorbunov, Vinod Vaikuntanathan, Hoeteck Wee:

Functional Encryption with Bounded Collusions via Multi-Party Computation. 521 - Antonino Simone, Boris Skoric:

False Positive probabilities in q-ary Tardos codes: comparison of attacks. 522 - Mohammad Mahmoody, Rafael Pass:

The Curious Case of Non-Interactive Commitments. 523 - Zooko Wilcox-O'Hearn, Brian Warner:

Tahoe - The Least-Authority Filesystem. 524 - Gaetan Bisson:

Computing endomorphism rings of abelian varieties of dimension two. 525 - Hyung Tae Lee, Hyunsook Hong, Jung Hee Cheon:

Invertible Polynomial Representation for Private Set Operations. 526 - Michael Scott:

Cryptanalysis of a recent two factor authentication scheme. 527 - Graham Enos, Yuliang Zheng:

An ID-Based Signcryption Scheme with Compartmented Secret Sharing for Unsigncryption. 528 - Julia Borghoff, Anne Canteaut, Tim Güneysu, Elif Bilge Kavun, Miroslav Knezevic, Lars R. Knudsen, Gregor Leander, Ventzislav Nikov, Christof Paar, Christian Rechberger, Peter Rombouts, Søren S. Thomsen, Tolga Yalçin:

PRINCE - A Low-latency Block Cipher for Pervasive Computing Applications (Full version). 529 - Seny Kamara, Charalampos Papamanthou, Tom Roeder:

Dynamic Searchable Symmetric Encryption. 530 - Murat Ak, Aggelos Kiayias, Serdar Pehlivanoglu, Ali Aydin Selçuk:

Generic Construction of Trace and Revoke Schemes. 531 - Liangze Li, Hongfeng Wu, Fan Zhang:

Pairing computation on Edwards curves with high-degree twists. 532 - Thijs Laarhoven, Joop van de Pol, Benne de Weger:

Solving Hard Lattice Problems and the Security of Lattice-Based Cryptosystems. 533 - Maura B. Paterson, Douglas R. Stinson:

A Simplified Combinatorial Treatment of Constructions and Threshold Gaps of Ramp Schemes. 534 - Nuray At, Jean-Luc Beuchat, Eiji Okamoto, Ismail San, Teppei Yamazaki:

A Low-Area Unified Hardware Architecture for the AES and the Cryptographic Hash Function Grøstl. 535 - Ivan Bjerre Damgård, Jonas Kölker, Peter Bro Miltersen:

Secret Sharing and Secure Computing from Monotone Formulae. 536 - Özgür Dagdelen, Marc Fischlin:

Unconditionally-Secure Universally Composable Password-Based Key-Exchange based on One-Time Memory Tokens. 537 - Myungsun Kim, Abedelaziz Mohaisen, Jung Hee Cheon, Yongdae Kim:

Private Top-k Aggregation Protocols. 538 - Sami A. Nagar, Saad Alshamma:

Efficient Implementation of RSA Algorithm with MKE. 539 - Ga Won Lee, Jin Hong:

A Comparison of Perfect Table Cryptanalytic Tradeoff Algorithms. 540 - (Withdrawn) 2048XKS - A Software Oriented High Security Block Cipher. 541

- Seny Kamara, Payman Mohassel, Ben Riva:

Salus: A System for Server-Aided Secure Function Evaluation. 542 - Dana Dachman-Soled, Georg Fuchsbauer, Payman Mohassel, Adam O'Neill:

Enhanced Chosen-Ciphertext Security and Applications. 543 - Florian Mendel, Vincent Rijmen, Deniz Toz, Kerem Varici:

Differential Analysis of the LED Block Cipher. 544 - Haibo Yi, Shaohua Tang:

A Versatile Multi-Input Multiplier over Finite Fields. 545 - Pawel Morawiecki, Josef Pieprzyk, Marian Srebrny:

Rotational cryptanalysis of round-reduced Keccak. 546 - Bodhisatwa Mazumdar, Debdeep Mukhopadhyay, Indranil Sengupta:

Constrained Search for a Class of Good S-Boxes with Improved DPA Resistivity. 547 - Helger Lipmaa, Bingsheng Zhang:

New Non-Interactive Zero-Knowledge Subset Sum, Decision Knapsack And Range Arguments. 548 - Daniel J. Bernstein, Jeroen Doumen, Tanja Lange, Jan-Jaap Oosterwijk:

Faster batch forgery identification. 549 - David Cash, Alptekin Küpçü, Daniel Wichs:

Dynamic Proofs of Retrievability via Oblivious RAM. 550 - Liangze Li, Hongfeng Wu, Fan Zhang:

Faster Pairing Computation on Jacobi quartic Curves with High-Degree Twists. 551 - Xiaofei Guo, Debdeep Mukhopadhyay, Ramesh Karri

:
Provably Secure Concurrent Error Detection Against Differential Fault Analysis. 552 - Andrey Sidorenko, Joachim van den Berg, Remko Foekema, Michiel Grashuis, Jaap de Vos:

Bellcore attack in practice. 553 - Young-joo Shin, Junbeom Hur, Kwangjo Kim:

Security weakness in the Proof of Storage with Deduplication. 554 - Shweta Agrawal, Vipul Goyal, Abhishek Jain

, Manoj Prabhakaran, Amit Sahai:
New Impossibility Results for Concurrent Composition and a Non-Interactive Completeness Theorem for Secure Computation. 555 - Juan A. Garay, David S. Johnson, Aggelos Kiayias, Moti Yung:

Resource-based Corruptions and the Combinatorics of Hidden Diversity. 556 - Stefan Katzenbeisser, Ünal Koçabas, Vladimir Rozic, Ahmad-Reza Sadeghi, Ingrid Verbauwhede, Christian Wachsmann:

PUFs: Myth, Fact or Busted? A Security Evaluation of Physically Unclonable Functions (PUFs) Cast in Silicon (Extended Version). 557 - Jens Bender, Özgür Dagdelen, Marc Fischlin, Dennis Kügler:

Domain-Specifi c Pseudonymous Signatures for the German Identity Card. 558 - Mark Manulis, Bertram Poettering, Douglas Stebila:

Plaintext Awareness in Identity-Based Key Encapsulation. 559 - Mohammad Hajiabadi, Bruce M. Kapron:

Computational Soundness of Coinductive Symbolic Security under Active Attacks. 560 - Yupu Hu, Fenghe Wang:

An Attack on a Fully Homomorphic Encryption Scheme. 561 - Kwangsu Lee, Dong Hoon Lee, Moti Yung:

Aggregating CL-Signatures Revisited: Extended Functionality and Better Efficiency. 562 - Kai-Min Chung, Huijia Lin, Rafael Pass:

Constant-Round Concurrent Zero Knowledge From Falsifiable Assumptions. 563 - Mihir Bellare, Viet Tung Hoang, Phillip Rogaway:

Adaptively Secure Garbling with Applications to One-Time Programs and Secure Outsourcing. 564 - Zvika Brakerski, Craig Gentry, Shai Halevi:

Packed Ciphertexts in LWE-based Homomorphic Encryption. 565 - Joep A. de Groot, Boris Skoric, Niels de Vreede, Jean-Paul M. G. Linnartz:

Information Leakage of Continuous-Source Zero Secrecy Leakage Helper Data Schemes. 566 - Claude Carlet, Jean-Luc Danger, Sylvain Guilley, Houssem Maghrebi:

Leakage Squeezing of Order Two. 567 - Stefan G. Weber:

On Transaction Pseudonyms with Implicit Attributes. 568 - San Ling, Khoa Nguyen, Damien Stehlé, Huaxiong Wang:

Improved Zero-knowledge Proofs of Knowledge for the ISIS Problem, and Applications. 569 - Hadi Soleimany:

Zero-Correlation Linear Cryptanalysis of Reduced-Round LBlock. 570 - Changyong Peng, Chuangying Zhu, Yuefei Zhu, Fei Kang:

Improved side channel attack on the block cipher NOEKEON. 571 - Divya Gupta, Amit Sahai:

On Constant-Round Concurrent Zero-Knowledge from a Knowledge Assumption. 572 - Iftach Haitner, Eran Omri, Hila Zarosim:

On the Power of Random Oracles. 573 - Alex D. Myasnikov, Alexander Ushakov:

Quantum algorithm for the discrete logarithm problem for matrices over finite group rings. 574 - Jeyavijayan Rajendran, Ramesh Karri

, James B. Wendt, Miodrag Potkonjak, Nathan R. McDonald, Garrett S. Rose, Bryant T. Wysocki:
Nanoelectronic Solutions for Hardware Security. 575 - Xiao Tan, Qiong Huang, Duncan S. Wong:

Concurrent Signature without Random Oracles. 576 - Matthew K. Franklin, Haibin Zhang:

A Framework for Unique Ring Signatures. 577 - Nicolas Veyrat-Charvillon, Benoît Gérard, François-Xavier Standaert:

Security Evaluations Beyond Computing Power: How to Analyze Side-Channel Attacks you Cannot Mount? 578 - Kevin D. Bowers, Marten van Dijk, Robert Griffin, Ari Juels, Alina Oprea, Ronald L. Rivest, Nikos Triandopoulos:

Defending Against the Unknown Enemy: Applying FlipIt to System Security. 579 - Peng Wang, Wenling Wu, Liting Zhang:

Cryptanalysis of the OKH Authenticated Encryption Scheme. 580 - Ding Wang, Chunguang Ma:

On the (in)security of some smart-card-based password authentication schemes for WSN. 581 - Sabyasachi Karati, Abhijit Das, Dipanwita Roy Chowdhury:

Using Randomizers for Batch Verification of ECDSA Signatures. 582 - Yannis Rouselakis, Brent Waters:

New Constructions and Proof Methods for Large Universe Attribute-Based Encryption. 583 - Dorit Ron, Adi Shamir:

Quantitative Analysis of the Full Bitcoin Transaction Graph. 584 - K. Preetha Mathew, Sachin Vasant, C. Pandu Rangan:

On Provably Secure Code-Based Signature and Signcryption Scheme. 585 - Julien Bringer, Hervé Chabanne, Alain Patey:

SHADE: Secure HAmming DistancE computation from oblivious transfer. 586 - Changyong Peng, Chuangying Zhu, Yuefei Zhu, Fei Kang:

Symbolic computation in block cipher with application to PRESENT. 587 - Hans-Joachim Knobloch:

Breaking Public Keys - How to Determine an Unknown RSA Public Modulus. 588 - Farzaneh Abed, Christian Forler, Eik List, Stefan Lucks, Jakob Wenzel:

Biclique Cryptanalysis of the PRESENT and LED Lightweight Ciphers. 591 - Amit Sahai, Brent Waters:

Attribute-Based Encryption for Circuits from Multilinear Maps. 592 - Tomoko Yonemura, Taichi Isogai, Hirofumi Muratani, Yoshikazu Hanatani:

Factor-4 and 6 (De)compression for Values of Pairings using Trace Maps. 593 - Ya Liu, Dawu Gu, Zhiqiang Liu, Wei Li:

Improved Impossible Differential Attack on Reduced Version of Camellia-192/256. 594 - Oriol Farràs, Carles Padró:

Extending Brickell-Davenport Theorem to Non-Perfect Secret Sharing Schemes. 595 - Elli Androulaki, Ghassan Karame, Marc Roeschlin, Tobias Scherer, Srdjan Capkun:

Evaluating User Privacy in Bitcoin. 596 - Souradyuti Paul, Ekawat Homsirikamol, Kris Gaj:

A Novel Permutation-based Hash Mode of Operation FP and the Hash Function SAMOSA. 597 - Srinath T. V. Setty, Victor Vu, Nikhil Panpalia, Benjamin Braun, Andrew J. Blumberg, Michael Walfish:

Taking proof-based verified computation a few steps closer to practicality (extended version). 598 - Min Yang, Qingshu Meng, Zhang-yi Wang, Huanguo Zhang:

Some observations to speed the polynomial selection in the number field sieve. 599 - Jian Guo, Thomas Peyrin, Axel Poschmann, Matthew J. B. Robshaw:

The LED Block Cipher. 600 - Steve Lu, Rafail Ostrovsky:

How to Garble RAM Programs. 601 - Andreas Wiemers:

A note on invariant linear transformations in multivariate public key cryptography. 602 - Alexis Bonnecaze, Robert Rolland:

Collecting Data while Preserving Individuals' Privacy: A Case Study. 603 - Carmit Hazay, Adriana López-Alt, Hoeteck Wee, Daniel Wichs:

Leakage-Resilient Cryptography from Minimal Assumptions. 604 - Jin Li, Xiaofeng Chen, Jingwei Li, Chunfu Jia, Duncan S. Wong, Willy Susilo:

Secure Outsourced Attribute-Based Signatures. 605 - Dan Boneh, Mark Zhandry:

Quantum-Secure Message Authentication Codes. 606 - Charles Bouillaguet, Pierre-Alain Fouque, Amandine Véber:

Graph-Theoretic Algorithms for the "Isomorphism of Polynomials" Problem. 607 - Marina Blanton

, Mehrdad Aliasgari:
On the (Non-)Reusability of Fuzzy Sketches and Extractors and Security Improvements in the Computational Setting. 608 - Taechan Kim, Jung Hee Cheon:

A New Approach to Discrete Logarithm Problem with Auxiliary Inputs. 609 - Sanjam Garg

, Craig Gentry, Shai Halevi:
Candidate Multilinear Maps from Ideal Lattices and Applications. 610 - Maura B. Paterson, Douglas R. Stinson, Jalaj Upadhyay:

A coding theory foundation for the analysis of general unconditionally secure proof-of-retrievability schemes for cloud storage. 611 - Byoung-Il Kim, Jin Hong:

Analysis of the Non-Perfect Table Fuzzy Rainbow Tradeoff. 612 - Grégory Demay, Peter Gazi, Martin Hirt, Ueli Maurer:

Resource-Restricted Indifferentiability. 613 - Kristin E. Lauter, Bianca Viray:

An arithmetic intersection formula for denominators of Igusa class polynomials. 614 - Boaz Tsaban:

Polynomial time cryptanalysis of noncommutative-algebraic key exchange protocols. 615 - Nishanth Chandran, Sanjam Garg

:
Hardness Preserving Constructions of Pseudorandom Functions, Revisited. 616 - Stefan Tillich, Marcin Wójcik:

Security Analysis of an Open Car Immobilizer Protocol Stack. 617 - (Withdrawn) Towards fully collusion-resistant ID-based establishment of pairwise keys. 618

- Michael Backes, Amit Datta, Aniket Kate:

Asynchronous Computational VSS with Reduced Communication Complexity. 619 - Claus-Peter Schnorr, Taras Shevchenko:

Solving Subset Sum Problems of Densioty close to 1 by "randomized" BKZ-reduction. 620 - Kitae Jeong, HyungChul Kang, Changhoon Lee, Jaechul Sung, Seokhie Hong:

Biclique Cryptanalysis of Lightweight Block Ciphers PRESENT, Piccolo and LED. 621 - Srinath T. V. Setty, Benjamin Braun, Victor Vu, Andrew J. Blumberg, Bryan Parno, Michael Walfish:

Resolving the conflict between generality and plausibility in verified computation. 622 - David A. McGrew:

Impossible plaintext cryptanalysis and probable-plaintext collision attacks of 64-bit block cipher modes. 623 - Alexandra Boldyreva, Nathan Chenette, Younho Lee, Adam O'Neill:

Order-Preserving Symmetric Encryption. 624 - Alexandra Boldyreva, Nathan Chenette, Adam O'Neill:

Order-Preserving Encryption Revisited: Improved Security Analysis and Alternative Solutions. 625 - Xi Xiong, Haining Fan:

Bit-Parallel GF(2n) Squarer Using Shifted Polynomial Basis. 626 - Laila El Aimani, Olivier Sanders:

Efficient Group Signatures in the Standard Model. 627 - Muhammad Yasir Malik:

Efficient Group Key Management Schemes for Multicast Dynamic Communication Systems. 628 - Yael Ejgenberg, Moriya Farbstein, Meital Levy, Yehuda Lindell:

SCAPI: The Secure Computation Application Programming Interface. 629 - Florian Giesen, Florian Kohlar, Douglas Stebila:

On the Security of TLS Renegotiation. 630 - Mihir Bellare, Sriram Keelveedhi, Thomas Ristenpart:

Message-Locked Encryption and Secure Deduplication. 631 - Abdoul Aziz Ciss, Djiby Sow:

Pairings on Generalized Huff Curves. 632 - Deukjo Hong, Daesung Kwon:

New Preimage Attack on MDC-4. 633 - Deukjo Hong, Daesung Kwon:

Cryptanalysis of Double-Block-Length Hash Mode MJH. 634 - (Withdrawn) Secure Outsourced Attribute-based Encryption. 635

- Martin R. Albrecht, Carlos Cid, Jean-Charles Faugère, Robert Fitzpatrick, Ludovic Perret:

On the Complexity of the BKW Algorithm on LWE. 636 - Aviad Kipnis, Eliphaz Hibshoosh:

Efficient Methods for Practical Fully Homomorphic Symmetric-key Encrypton, Randomization and Verification. 637 - Cai-xue Zhou:

Cryptanalysis and Improvement of a Multi-Receiver Generalized Signcryption Scheme. 638 - Daniel Loebenberger, Michael Nüsken:

Coarse-grained integer - Smooth? Rough? Both! 639 - Gaoli Wang, Yanzhao Shen:

Preimage and Pseudo-Collision Attacks on Step-Reduced SM3 Hash Function. 640 - Bin Wang:

A unidirectional conditional proxy re-encryption scheme based on non-monotonic access structure. 641 - Ivan Damgård, Marcel Keller, Enrique Larraia, Valerio Pastro, Peter Scholl, Nigel P. Smart:

Practical Covertly Secure MPC for Dishonest Majority - or: Breaking the SPDZ Limits. 642 - Amos Beimel, Eran Omri, Ilan Orlov:

Protocols for Multiparty Coin Toss With Dishonest Majority. 643 - Atul Luykx, Elena Andreeva, Bart Mennink, Bart Preneel:

Impossibility Results for Indifferentiability with Resets. 644 - Eduarda S. V. Freire, Kenneth G. Paterson, Bertram Poettering:

Simple, Efficient and Strongly KI-Secure Hierarchical Key Assignment Schemes. 645 - Sanjit Chatterjee, Chethan Kamath, Vikas Kumar:

Galindo-Garcia Identity-Based Signature Revisited. 646 - Daniel Smith-Tone, Cristina Tone:

A Measure of Dependence for Cryptographic Primitives Relative to Ideal Functions. 647 - Qiang Tang

:
Search in Encrypted Data: Theoretical Models and Practical Applications. 648 - Yannick Seurin, Joana Treger:

A Robust and Plaintext-Aware Variant of Signed ElGamal Encryption. 649 - Ben Smyth, Mark Dermot Ryan, Liqun Chen:

Formal analysis of privacy in Direct Anonymous Attestation schemes. 650 - (Withdrawn) TAAC: Temporal Attribute-based Access Control for Multi-Authority Cloud Storage Systems. 651

- Vipul Goyal, Omkant Pandey, Amit Sahai:

Round-Efficient Concurrently Composable Secure Computation via a Robust Extraction Lemma. 652 - Periklis A. Papakonstantinou, Charles Rackoff, Yevgeniy Vahlis:

How powerful are the DDH hard groups? 653 - Qiang Tang

, Yuanjie Zhao, Xiaofeng Chen, Hua Ma:
Refine the Concept of Public Key Encryption with Delegated Search. 654 - Kwangsu Lee, Intae Kim, Seong Oun Hwang:

Privacy Preserving Revocable Predicate Encryption Revisited. 655 - Mohammad Ali Orumiehchiha, Josef Pieprzyk, Elham Shakour, Ron Steinfeld:

Security Evaluation of Rakaposhi Stream Cipher. 656 - Sungwook Kim, Jung Hee Cheon:

Fixed Argument Pairing Inversion on Elliptic Curves. 657 - Eike Kiltz, Krzysztof Pietrzak, Mario Szegedy:

Digital Signatures with Minimal Overhead. 658 - Hassan Jameel Asghar, Shujun Li, Ron Steinfeld, Josef Pieprzyk:

Does Counting Still Count? Revisiting the Security of Counting based User Authentication Protocols against Statistical Attacks. 659 - (Withdrawn) Design of Secure Image Transmission in MANET using Number Theory Based Image Compression and Quasigroup Encryption (NTICQE) Algorithm. 660

- Markus Dichtl, Pascale Böffgen:

Breaking Another Quasigroup-Based Cryptographic Scheme. 661 - Julian P. Murphy:

Asynchronous Physical Unclonable Functions - AsyncPUF. 662 - Alexander Rostovtsev:

Virtual isomorphisms of ciphers: is AES secure against differential / linear attack? 663 - Jiang Zhang, Zhenfeng Zhang, Yu Chen:

PRE - Stronger Security Notion and Efficient Construction with New Property. 664 - Daniel R. L. Brown:

Uniform Compression Functions Can Fail to Preserve "Full" Entropy. 665 - Rock C. Liu, Zhiwi Yeh:

Estimating the φ(n) of Upper/Lower Bound in its RSA Cryptosystem. 666 - Antonino Simone, Boris Skoric:

False Negative probabilities in Tardos codes. 667 - Gaëtan Leurent:

Construction of Differential Characteristics in ARX Designs - Application to Skein. 668 - Zhen Liu, Zhenfu Cao, Duncan S. Wong:

Expressive Black-box Traceable Ciphertext-Policy Attribute-Based Encryption. 669 - Joppe W. Bos, Craig Costello, Hüseyin Hisil, Kristin E. Lauter:

Two is Greater than One. 670 - Tatsuaki Okamoto, Katsuyuki Takashima:

Fully Secure Unbounded Inner-Product and Attribute-Based Encryption. 671 - Itai Dinur, Orr Dunkelman, Adi Shamir:

Self-Differential Cryptanalysis of Up to 5 Rounds of SHA-3. 672 - Pooya Farshim, Benoît Libert, Kenneth G. Paterson, Elizabeth A. Quaglia:

Robust Encryption, Revisited. 673 - Carles Padró:

Lecture Notes in Secret Sharing. 674 - Yoshinori Aono:

Minkowski sum based lattice construction for solving simultaneous modular equations and applications to RSA. 675 - Julia Borghoff:

Mixed-integer Linear Programming in the Analysis of Trivium and Ktantan. 676 - Jialin Huang, Xuejia Lai:

What is the Effective Key Length for a Block Cipher: an Attack on Every Block Cipher. 677 - Benedikt Gierlichs, Jörn-Marc Schmidt, Michael Tunstall:

Infective Computation and Dummy Rounds: Fault Protection for Block Ciphers without Check-before-Output. 678 - Yehuda Lindell, Kobbi Nissim, Claudio Orlandi:

Hiding the Input-Size in Secure Two-Party Computation. 679 - Oriol Farràs, Carles Padró, Chaoping Xing, An Yang:

Natural Generalizations of Threshold Secret Sharing. 680 - Guang Gong, Mark D. Aagaard, Xinxin Fan:

Resilience to Distinguishing Attacks on WG-7 Cipher and Their Generalizations. 681 - Jiawei Yuan, Shucheng Yu:

Proofs of Retrievability with Public Verifiability and Constant Communication Cost in Cloud. 682 - (Withdrawn) Discarding the Endpoints makes the Cryptanalytic Time-Memory Trade-Offs even Faster. 683

- Thomas Peyrin, Yu Sasaki, Lei Wang:

Generic Related-key Attacks for HMAC. 684 - Gora Adj, Francisco Rodríguez-Henríquez:

Square root computation over even extension fields. 685 - Jian Zou, Wenling Wu, Shuang Wu, Le Dong:

Improved (Pseudo) Preimage Attack and Second Preimage Attack on Round-Reduced Grøstl. 686 - Karyn Benson, Hovav Shacham, Brent Waters:

The k-BDH Assumption Family: Bilinear Map Cryptography from Progressively Weaker Assumptions. 687 - Jintai Ding:

A Simple Provably Secure Key Exchange Scheme Based on the Learning with Errors Problem. 688 - Abishek Kumarasubramanian, Rafail Ostrovsky, Omkant Pandey, Akshay Wadia:

Cryptography Using CAPTCHA Puzzles. 689 - Teng Wu, Guang Gong:

The Weakness of Integrity Protection for LTE. 690 - Shi Bai, Richard P. Brent, Emmanuel Thomé:

Root Optimization of Polynomials in the Number Field Sieve. 691 - Yu Chen, Jiang Zhang, Zhenfeng Zhang, Dongdai Lin:

Integrated PKE and PEKS - Stronger Security Notions and New Constructions. 692 - Benny Applebaum, Yuval Ishai, Eyal Kushilevitz, Brent Waters:

Encoding Functions with Constant Online Rate or How to Compress Keys in Garbled Circuits. 693 - Alex D. Myasnikov, Alexander Ushakov:

Cryptanalysis of matrix conjugation schemes. 694 - Gilles Barthe, Juan Manuel Crespo, Benjamin Grégoire, César Kunz, Yassine Lakhnech, Santiago Zanella-Béguelin:

Automated Analysis and Synthesis of Padding-Based Encryption Schemes. 695 - Lin Ding, Jie Guan:

Cryptanalysis of RAKAPOSHI Stream Cipher. 696 - Melissa Chase, Markulf Kohlweiss, Anna Lysyanskaya, Sarah Meiklejohn:

Verifiable Elections That Scale for Free. 697 - Joshua Baron, Karim El Defrawy, Kirill Minkovich, Rafail Ostrovsky, Eric Tressler:

5PM: Secure Pattern Matching. 698 - Ivan Damgård, Sunoo Park:

Is Public-Key Encryption Based on LPN Practical? 699 - Seung Geol Choi, Jonathan Katz, Hoeteck Wee, Hong-Sheng Zhou:

Efficient, Adaptively Secure, and Composable Oblivious Transfer with a Single, Global CRS. 700 - Noboru Kunihiro, Naoyuki Shinohara, Tetsuya Izu:

Recovering RSA Secret Keys from Noisy Key Bits with Erasures and Errors. 701 - Nasour Bagheri, Masoumeh Safkhani, Pedro Peris-Lopez, Juan E. Tapiador:

Cryptanalysis of RAPP, an RFID Authentication Protocol. 702 - Nicolas Debande, Maël Berthier, Yves Bocktaels, Thanh-Ha Le:

Profiled Model Based Power Simulator for Side Channel Evaluation. 703 - Sebastian Faust, Markulf Kohlweiss, Giorgia Azzurra Marson, Daniele Venturi:

On the Non-malleability of the Fiat-Shamir Transform. 704 - Nir Bitansky, Sanjam Garg

, Daniel Wichs:
Why "Fiat-Shamir for Proofs" Lacks a Proof. 705 - Dana Dachman-Soled, Abhishek Jain

, Yael Tauman Kalai, Adriana López-Alt:
On the (In)security of the Fiat-Shamir Paradigm, Revisited. 706 - Gaëtan Leurent:

Cryptanalysis of WIDEA. 707 - Gilad Asharov, Claudio Orlandi:

Calling out Cheaters: Covert Security With Public Verifiability. 708 - Qun-Xiong Zheng, Wen-Feng Qi:

Further results on the distinctness of binary sequences derived from primitive sequences modulo square-free odd integers. 709 - Prabhanjan Ananth, Raghav Bhaskar:

Non Observability in the Random Oracle Model. 710 - Kai-Min Chung, Edward Lui, Mohammad Mahmoody, Rafael Pass:

Unprovable Security of Two-Message Zero Knowledge. 711 - Farzaneh Abed, Eik List, Stefan Lucks:

On the Security of the Core of PRINCE Against Biclique and Differential Cryptanalysis. 712 - Aurélien Francillon, Quan Nguyen, Kasper Bonne Rasmussen, Gene Tsudik:

Systematic Treatment of Remote Attestation. 713 - Shweta Agrawal, Craig Gentry, Shai Halevi, Amit Sahai:

Sampling Discrete Gaussians Efficiently and Obliviously. 714 - Jingyuan Zhao, Meiqin Wang, Jiazhe Chen, Yuliang Zheng:

New Impossible Differential Attack on SAFER+ and SAFER++. 715 - Xavier Boyen:

Attribute-Based Functional Encryption on Lattices. 716 - Jan Camenisch, Anna Lysyanskaya, Gregory Neven:

Practical Yet Universally Composable Two-Server Password-Authenticated Secret Sharing. 717 - Nir Bitansky, Alessandro Chiesa, Yuval Ishai, Rafail Ostrovsky, Omer Paneth:

Succinct Non-Interactive Arguments via Linear Interactive Proofs. 718 - Yun Song, Zhihui Li:

An ideal multi-secret sharing scheme based on minimal privileged coalitions. 719 - Antoine Joux:

Faster index calculus for the medium prime case. Application to 1175-bit and 1425-bit finite fields. 720 - Prabhanjan Ananth, Raghav Bhas



Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID