default search action
IACR Cryptology ePrint Archive, Volume 2013
Volume 2013, 2013
- Eric Miles, Emanuele Viola:
Shielding circuits with groups. 1 - Yu Chen, Zongyang Zhang, Dongdai Lin, Zhenfu Cao:
Generalized (Identity-Based) Hash Proof System and Its Applications. 2 - Guillermo Morales-Luna:
On Formal Expressions of BRW-polynomials. 3 - Damien Stehlé, Ron Steinfeld:
Making NTRUEncrypt and NTRUSign as Secure as Standard Worst-Case Problems over Ideal Lattices. 4 - Riadh Brinci, Walid Khmiri, Mefteh Mbarek, Abdellatif Ben Rabaa, Ammar Bouallegue, Faouzi Chekir:
Efficient Multiplier for pairings over Barreto-Naehrig Curves on Virtex-6 FPGA. 5 - Qingfeng Cheng:
Cryptanalysis of a pairing-free identity-based authenticated group key agreement protocol for imbalanced mobile networks. 6 - Yuyin Yu, Mingsheng Wang, Yongqiang Li:
A Matrix Approach for Constructing Quadratic APN Functions. 7 - Kai-Min Chung, Rafael Pass, Karn Seth:
Non-Black-Box Simulation from One-Way Functions And Applications to Resettable Security. 8 - Benedikt Driessen, Markus Dürmuth:
Achieving Anonymity Against Major Face Recognition Algorithms. 9 - Kai-Min Chung, Rafael Pass:
Simultaneous Resettable WI from One-way Functions. 10 - James McLaughlin, John A. Clark:
Evolving balanced Boolean functions with optimal resistance to algebraic and fast algebraic attacks, maximal algebraic degree, and very high nonlinearity. 11 - Dima Grigoriev, Vladimir Shpilrain:
Tropical cryptography. 12 - Andreas Peter, Erik Tews, Stefan Katzenbeisser:
Efficiently Outsourcing Multiparty Computation under Multiple Keys. 13 - Ta Vinh Thong, Amit Dvir:
On formal and automatic security verification of WSN transport protocols. 14 - Graham Enos:
Complete and Unified Group Laws are not Enough for Elliptic Curve Cryptography. 15 - Jae Hong Seo, Keita Emura:
Revocable Identity-Based Encryption Revisited: Security Model and Construction. 16 - Alexandra Boldyreva, Robert Lychev:
Provable Security of S-BGP and other Path Vector Protocols: Model, Analysis and Extensions. 17 - Jae Hong Seo, Keita Emura:
Efficient Delegation of Key Generation and Revocation Functionalities in Identity-Based Encryption. 18 - Peter Gazi:
On the Security of Plain and Randomized Cascades. 19 - Markus Rückert, Dominique Schröder:
Aggregate and Verifiably Encrypted Signatures from Multilinear Maps Without Random Oracles. 20 - Özgür Dagdelen, Payman Mohassel, Daniele Venturi:
Rate-Limited Secure Function Evaluation: Definitions and Constructions. 21 - James McLaughlin, John A. Clark:
Nonlinear cryptanalysis of reduced-round Serpent and metaheuristic search for S-box approximations. 22 - Jong Hwan Park, Dong Hoon Lee:
A New Practical Identity-Based Encryption System. 23 - Gook Hwa Cho, Namhun Koo, Eunhye Ha, Soonhak Kwon:
New Cube Root Algorithm Based on Third Order Linear Recurrence Relation in Finite Field. 24 - Ralf Küsters, Max Tuengerthal:
The IITM Model: a Simple and Expressive Model for Universal Composability. 25 - Constantinos Patsakis:
RSA private key reconstruction from random bits using SAT solvers. 26 - Ming-Feng Lee, Nigel P. Smart, Bogdan Warinschi, Gaven J. Watson:
Anonymity Guarantees of the UMTS/LTE Authentication and Connection Protocol. 27 - Stanislav Bulygin:
More on linear hulls of PRESENT-like ciphers and a cryptanalysis of full-round EPCBC-96. 28 - Subhadeep Banik, Subhamoy Maitra:
A Differential Fault Attack on MICKEY 2.0. 29 - Haiyan Sun:
On the security of an identity-based authenticated group key agreement protocol for imbalanced mobile networks. 30 - Christina Brzuska, Nigel P. Smart, Bogdan Warinschi, Gaven J. Watson:
An Analysis of the EMV Channel Establishment Protocol. 31 - Maki Yoshida, Satoshi Obana:
Detection of Cheaters in Non-interactive Polynomial Evaluation. 32 - Yu Chen, Zongyang Zhang, Dongdai Lin, Zhenfu Cao:
CCA-Secure IB-KEM from Identity-Based Extractable Hash Proof Systems. 33 - Fabrice Ben Hamouda, Olivier Blazy, Céline Chevalier, David Pointcheval, Damien Vergnaud:
New Smooth Projective Hash Functions and One-Round Authenticated Key Exchange. 34 - (Withdrawn) Improvements to NFC Mobile Transaction and Authentication Protocol. 35
- Jean-Sébastien Coron, Tancrède Lepoint, Mehdi Tibouchi:
Batch Fully Homomorphic Encryption over the Integers. 36 - Jayaprakash Kar:
Provably Secure Identity-Based Aggregate Signcryption Scheme in Random Oracles. 37 - Dominique Schröder, Heike Schröder:
Verifiable Data Streaming. 38 - Thomas Plantard, Michael Schneider:
Creating a Challenge for Ideal Lattices. 39 - Roohallah Rastaghi:
An Effi cient CCA2-Secure Variant of the McEliece Cryptosystem in the Standard Model. 40 - Gook Hwa Cho, Namhun Koo, Eunhye Ha, Soonhak Kwon:
Trace Expression of r-th Root over Finite Field. 41 - Hemanta K. Maji, Manoj Prabhakaran, Mike Rosulek:
Complexity of Multi-Party Computation Functionalities. 42 - Ling Song, Lei Hu:
Differential Fault Attack on the PRINCE Block Cipher. 43 - Fangguo Zhang, Xu Ma, Shengli Liu:
Efficient Computation Outsourcing for Inverting a Class of Homomorphic Functions. 44 - (Withdrawn) Towards Efficient Verifiable SQL Query for Outsourced Dynamic Databases in Cloud. 45
- Tore Kasper Frederiksen, Jesper Buus Nielsen:
Fast and Maliciously Secure Two-Party Computation Using the GPU. 46 - Carles Padró:
Lower Bounds on the Information Ratio of Linear Secret Sharing Schemes. 47 - Basel Halak, Julian P. Murphy, Alex Yakovlev:
Power Balanced Circuits for Leakage-Power-Attacks Resilient Design. 48 - Christopher Meyer, Jörg Schwenk:
Lessons Learned From Previous SSL/TLS Attacks - A Brief Chronology Of Attacks And Weaknesses. 49 - Roohallah Rastaghi:
Cryptanalysis and Improvement of Akleylek et al.'s cryptosystem. 50 - Payman Mohassel, Ben Riva:
Garbled Circuits Checking Garbled Circuits: More Efficient and Secure Two-Party Computation. 51 - Kuan Cheng:
Some Improved Complexity Results for uSVP and GapSVP. 52 - Yinxia Sun, Futai Zhang, Limin Shen, Robert H. Deng:
A revocable certificateless signature scheme. 53 - Ali Aydin Selçuk, Ramazan Yilmaz:
Joint Compartmented Threshold Access Structures. 54 - Dima Grigoriev, Vladimir Shpilrain:
Secrecy without one-way functions. 55 - Kishan Chand Gupta, Indranil Ghosh Ray:
On Constructions of MDS Matrices from Companion Matrices for Lightweight Cryptography. 56 - Jinsu Kim, Moon Sung Lee, Aaram Yun, Jung Hee Cheon:
CRT-based Fully Homomorphic Encryption over the Integers. 57 - Dylan Clarke, Feng Hao:
Cryptanalysis of the Dragonfly Key Exchange Protocol. 58 - Ayesha Khalid, Deblin Bagchi, Goutam Paul, Anupam Chattopadhyay:
Optimized GPU Implementation and Performance Analysis of HC Series of Stream Ciphers. 59 - Aayush Jain:
On FHE without bootstrapping. 60 - Elena Andreeva, Andrey Bogdanov, Yevgeniy Dodis, Bart Mennink, John P. Steinberger:
On the Indifferentiability of Key-Alternating Ciphers. 61 - Florian Böhl, Dominique Unruh:
Symbolic Universal Composability. 62 - Christian L. F. Corniaux, Hossein Ghodosi:
A Verifiable 1-out-of-n Distributed Oblivious Transfer Protocol. 63 - Sven Laur, Bingsheng Zhang:
Lightweight Zero-Knowledge Proofs for Crypto-Computing Protocols. 64 - Patrick Weiden, Andreas Hülsing, Daniel Cabarcas, Johannes Buchmann:
Instantiating Treeless Signature Schemes. 65 - Amin Mohammadali, Zahra Ahmadian, Mohammad Reza Aref:
Analysis and Improvement of the securing RFID systems conforming to EPC Class 1 Generation 2 standard. 66 - Guido Bertoni, Joan Daemen, Nicolas Debande, Thanh-Ha Le, Michaël Peeters, Gilles Van Assche:
Power Analysis of Hardware Implementations Protected with Secret Sharing. 67 - Allison B. Lewko, Brent Waters:
Why Proving HIBE Systems Secure is Difficult. 68 - Daniele Micciancio, Chris Peikert:
Hardness of SIS and LWE with Small Parameters. 69 - Markku-Juhani O. Saarinen:
Related-key Attacks Against Full Hummingbird-2. 70 - Jérémie Detrey, Pierrick Gaudry, Marion Videau:
Relation collection for the Function Field Sieve. 71 - István Vajda:
The UC approach: an application view. 72 - Marek Jawurek, Florian Kerschbaum, Claudio Orlandi:
Zero-Knowledge Using Garbled Circuits: How To Prove Non-Algebraic Statements Efficiently. 73 - Faruk Göloglu, Robert Granger, Gary McGuire, Jens Zumbrägel:
On the Function Field Sieve and the Impact of Higher Splitting Probabilities: Application to Discrete Logarithms in F21971. 74 - Joppe W. Bos, Kristin E. Lauter, Jake Loftus, Michael Naehrig:
Improved Security for a Ring-Based Fully Homomorphic Encryption Scheme. 75 - Ling Ren, Xiangyao Yu, Christopher W. Fletcher, Marten van Dijk, Srinivas Devadas:
Design Space Exploration and Optimization of Path Oblivious RAM in Secure Processors. 76 - Kaoru Kurosawa, Ryo Nojima, Le Trieu Phong:
UC-Secure Multi-Session OT Using Tamper-Proof Hardware. 77 - Nelly Fazio, Antonio Nicolosi, Irippuge Milinda Perera:
Broadcast Steganography. 78 - Yehuda Lindell:
Fast Cut-and-Choose Based Protocols for Malicious and Covert Adversaries. 79 - Grégory Landais, Jean-Pierre Tillich:
An efficient attack of a McEliece cryptosystem variant based on convolutional codes. 80 - Yan Huang, Jonathan Katz, David Evans:
Efficient Secure Two-Party Computation Using Symmetric Cut-and-Choose. 81 - Sebastià Martín Molleví, Carles Padró, An Yang:
Secret Sharing, Rank Inequalities and Information Inequalities. 82 - Frederik Armknecht, Ahmad-Reza Sadeghi, Steffen Schulz, Christian Wachsmann:
Towards Provably Secure Software Attestation. 83 - Boris Skoric, Allard P. Mosk, Pepijn W. H. Pinkse:
Security of Quantum-Readout PUFs against quadrature based challenge estimation attacks. 84 - Ashish Choudhury, Jake Loftus, Emmanuela Orsini, Arpita Patra, Nigel P. Smart:
Between a Rock and a Hard Place: Interpolating Between MPC and FHE. 85 - Travis Mayberry, Erik-Oliver Blass, Agnes Hui Chan:
Path-PIR: Lower Worst-Case Bounds by Combining ORAM and PIR. 86 - Namhun Koo, Gook Hwa Cho, Soonhak Kwon:
Square Root Algorithm in Fq for q≡2s+1 (mod 2s+1). 87 - Dan Boneh, Mark Zhandry:
Secure Signatures and Chosen Ciphertext Security in a Post-Quantum World. 88 - James McLaughlin, John A. Clark:
Filtered nonlinear cryptanalysis of reduced-round Serpent, and the Wrong-Key Randomization Hypothesis. 89 - (Withdrawn) Functional Encryption Supporting Recursive Languages. 90
- Hui Zhao, Yongbin Zhou, François-Xavier Standaert, Hailong Zhang:
Systematic Construction and Comprehensive Evaluation of Kolmogorov-Smirnov Test based Side-Channel Distinguishers. 91 - Vadim Lyubashevsky, Daniel Masny:
Man-in-the-Middle Secure Authentication Schemes from LPN and Weak PRFs. 92 - Lin Cheng, Qiaoyan Wen, Zhengping Jin, Hua Zhang, Liming Zhou:
On the security of a certificateless aggregate signature scheme. 93 - Adriana López-Alt, Eran Tromer, Vinod Vaikuntanathan:
On-the-Fly Multiparty Computation on the Cloud via Multikey Fully Homomorphic Encryption. 94 - Antoine Joux:
A new index calculus algorithm with complexity L(1/4+o(1)) in very small characteristic. 95 - Sui-Guan Teo, Harry Bartlett, Ali Al-Hamdan, Leonie Simpson, Kenneth Koon-Ho Wong, Ed Dawson:
State convergence in bit-based stream ciphers. 96 - Zahra Ahmadian, Mahmoud Salmasizadeh, Mohammad Reza Aref:
Biclique Cryptanalysis of the Full-Round KLEIN Block Cipher. 97 - Joël Alwen, Stephan Krenn, Krzysztof Pietrzak, Daniel Wichs:
Learning with Rounding, Revisited: New Reduction, Properties and Applications. 98 - Samuel Ranellucci, Alain Tapp:
Secure Two-Party Computation via Leaky Generalized Oblivious Transfer. 99 - Niu Liu, Shaohua Tang, Lingling Xu:
Attacks and Comments on Several Recently Proposed Key Management Schemes. 100 - Paul Baecher, Christina Brzuska, Marc Fischlin:
Notions of Black-Box Reductions, Revisited. 101 - Yuchen Cao, Yongbin Zhou, Zhenmei Yu:
On the Negative Effects of Trend Noise and Its Applications in Side-Channel Cryptanalysis. 102 - Martin Hirt, Pavel Raykov:
On the Complexity of Broadcast Setup. 103 - James A. Muir:
A Tutorial on White-box AES. 104 - Yuval Ishai, Eyal Kushilevitz, Omer Strulovich:
Lossy Chains and Fractional Secret Sharing. 105 - (Withdrawn) URDP: General Framework for Direct CCA2 Security from any Lattice-Based PKE Scheme. 106
- Murat Cenk, M. Anwar Hasan:
On the Arithmetic Complexity of Strassen-Like Matrix Multiplications. 107 - Ivan Damgård, Alessandra Scafuro:
Unconditionally Secure and Universally Composable Commitments from Physical Assumptions. 108 - Charanjit S. Jutla, Arnab Roy:
Shorter Quasi-Adaptive NIZK Proofs for Linear Subspaces. 109 - Gilad Asharov, Yehuda Lindell, Tal Rabin:
Full Characterization of Functions that Imply Fair Coin Tossing and Ramifications to Fairness. 110 - Keita Xagawa:
Message Authentication Codes Secure against Additively Related-Key Attacks. 111 - Ulrich Rührmair, Jan Sölter, Frank Sehnke, Xiaolin Xu, Ahmed Mahmoud, Vera Stoyanova, Gideon Dror, Jürgen Schmidhuber, Wayne P. Burleson, Srinivas Devadas:
PUF Modeling Attacks on Simulated and Silicon Data. 112 - Nuray At, Jean-Luc Beuchat, Eiji Okamoto, Ismail San, Teppei Yamazaki:
Compact Hardware Implementations of ChaCha, BLAKE, Threefish, and Skein on FPGA. 113 - Delaram Kahrobaei, Charalambos Koupparis, Vladimir Shpilrain:
Public Key Exchange Using Matrices Over Group Rings. 114 - Kaitai Liang, Qiong Huang, Roman Schlegel, Duncan S. Wong, Chunming Tang:
A Conditional Proxy Broadcast Re-Encryption Scheme Supporting Timed-Release. 115 - Shiyong Zhang, Gongliang Chen, Lei Fan:
The Algorithm of AAES. 116 - Namhun Koo, Gook Hwa Cho, Soonhak Kwon:
On r-th Root Extraction Algorithm in Fq For q≡lrs+1 (mod rs+1) with 0 < l < r and Small s. 117 - Jason R. Hamlet, Robert W. Brocato:
Speed Optimized Implementations of the QUAD Algorithm. 118 - Duc-Phong Le, Chik How Tan:
Speeding up Ate Pairing Computation in Affine Coordinates. 119 - Gergely Alpár, Jaap-Henk Hoepman, Wouter Lueks:
An Attack Against Fixed Value Discrete Logarithm Representations. 120 - Helger Lipmaa:
Succinct Non-Interactive Zero Knowledge Arguments from Span Programs and Linear Error-Correcting Codes. 121 - Gaoli Wang:
Practical collision attack on 40-step RIPEMD-128. 122 - Olivier Blazy, Céline Chevalier, David Pointcheval, Damien Vergnaud:
Analysis and Improvement of Lindell's UC-Secure Commitment Schemes. 123 - (Withdrawn) Tamper Resilient Cryptography Without Self-Destruct. 124
- Ananth Raghunathan, Gil Segev, Salil P. Vadhan:
Deterministic Public-Key Encryption for Adaptively Chosen Plaintext Distributions. 125 - Aysajan Abidin, Jan-Åke Larsson:
Direct Proof of Security of Wegman-Carter Authentication with Partially Known Key. 126 - Franziskus Kiefer, Mark Manulis:
Oblivious PAKE and Efficient Handling of Password Trials. 127 - Sanjam Garg, Craig Gentry, Shai Halevi, Amit Sahai, Brent Waters:
Attribute-Based Encryption for Circuits from Multilinear Maps. 128 - Raluca A. Popa, Frank H. Li, Nickolai Zeldovich:
An Ideal-Security Protocol for Order-Preserving Encoding. 129 - Christian Hanser, Daniel Slamanig:
Blank Digital Signatures. 130 - Thomaz Oliveira, Julio César López-Hernández, Diego F. Aranha, Francisco Rodríguez-Henríquez:
Two is the fastest prime. 131 - Niu Liu, Shaohua Tang, Lingling Xu:
Yet Another Attack On the Chinese Remainder Theorem Based Hierarchical Access Control Scheme. 132 - Hemlata Nagesh, Birendra Kumar Sharma:
New Lattice Based Signature Using The Jordan Normal Form. 133 - Nelly Fazio, Rosario Gennaro, Irippuge Milinda Perera, William E. Skeith III:
Hardcore Predicates for a Diffie-Hellman Problem over Finite Fields. 134 - Leonard J. Schulman:
An MQ/Code Cryptosystem Proposal. 135 - Dieter Schmidt:
2048XKS-F & 4096XKS-F - Two Software Oriented High Security Block Ciphers. 136