


default search action
IACR Cryptology ePrint Archive, Volume 2015
Volume 2015, 2015
- Oscar Reparaz:
A note on the security of Higher-Order Threshold Implementations. 1 - Baodong Qin, Shengli Liu, Tsz Hon Yuen, Robert H. Deng, Kefei Chen:
Continuous Non-Malleable Key Derivation and Its Application to Related-Key Security. 3 - Carmit Hazay:
Oblivious Polynomial Evaluation and Secure Set-Intersection from Algebraic PRFs. 4 - Srinivas Devadas, Marten van Dijk, Christopher W. Fletcher, Ling Ren:
Onion ORAM: A Constant Bandwidth and Constant Client Storage ORAM (without FHE or SWHE). 5 - Jan Camenisch, Robert R. Enderlein, Gregory Neven:
Two-Server Password-Authenticated Secret Sharing UC-Secure Against Transient Corruptions. 6 - Tobias Pulls, Roel Peeters:
Balloon: A Forward-Secure Append-Only Persistent Authenticated Data Structure. 7 - Satrajit Ghosh, Aniket Kate:
Post-Quantum Secure Onion Routing (Future Anonymity in Today's Budget). 8 - Donghoon Chang, Arpan Jati, Sweta Mishra, Somitra Kumar Sanadhya:
Rig: A simple, secure and flexible design for Password Hashing. 9 - Shengli Liu, Kenneth G. Paterson:
Simulation-based Selective Opening CCA Security for PKE from Key Encapsulation Mechanisms. 10 - Benjamin Buhrow, Paul Riemer, Mike Shea, Barry K. Gilbert, Erik S. Daniel:
Block Cipher Speed and Energy Efficiency Records on the MSP430: System Design Trade-Offs for 16-bit Embedded Applications. 11 - Tancrède Lepoint, Mehdi Tibouchi:
Cryptanalysis of a (Somewhat) Additively Homomorphic Encryption Scheme Used in PIR. 12 - Nico Döttling:
Low Noise LPN: KDM Secure Public Key Encryption and Sample Amplification. 13 - San Ling, Khoa Nguyen, Huaxiong Wang:
Group Signatures from Lattices: Simpler, Tighter, Shorter, Ring-based. 14 - Florian Bergsma, Tibor Jager, Jörg Schwenk:
One-Round Key Exchange with Strong Security: An Efficient and Generic Construction in the Standard Model. 15 - Yannis Rouselakis, Brent Waters:
Efficient Statically-Secure Large-Universe Multi-Authority Attribute-Based Encryption. 16 - Michel Abdalla, Florian Bourse, Angelo De Caro, David Pointcheval:
Simple Functional Encryption Schemes for Inner Products. 17 - Jintai Ding, Alexei Miasnikov, Alexander Ushakov:
A Linear Attack on a Key Exchange Protocol Using Extensions of Matrix Semigroups. 18 - Gilles Barthe, Edvard Fagerholm, Dario Fiore, Andre Scedrov, Benedikt Schmidt, Mehdi Tibouchi:
Strongly-Optimal Structure Preserving Signatures from Type II Pairings: Synthesis and Lower Bounds. 19 - Phong Q. Nguyen, Jiang Zhang, Zhenfeng Zhang:
Simpler Efficient Group Signatures from Lattices. 20 - Xin Li:
Non-Malleable Condensers for Arbitrary Min-Entropy, and Almost Optimal Protocols for Privacy Amplification. 21 - Bo Yang, Dengguo Feng, Yu Qin, Yingjun Zhang, Weijin Wang:
TMSUI: A Trust Management Scheme of USB Storage Devices for Industrial Control Systems. 22 - Chunsheng Gu:
Multilinear Maps Using Ideal Lattices without Encodings of Zero. 23 - Evgeni Begelfor, Stephen D. Miller, Ramarathnam Venkatesan:
Non-Abelian Analogs of Lattice Rounding. 24 - Benny Applebaum, Zvika Brakerski:
Obfuscating Circuits via Composite-Order Graded Encoding. 25 - Adam D. Smith, Ye Zhang:
On the Regularity of Lossy RSA: Improved Bounds and Applications to Padding-Based Encryption. 27 - Jeremy Maitin-Shepard:
Optimal software-implemented Itoh-Tsujii inversion for GF(2m). 28 - Sergey Gorbunov, Vinod Vaikuntanathan, Hoeteck Wee:
Predicate Encryption for Circuits from LWE. 29 - Christoph Dobraunig, Maria Eichlseder, Florian Mendel, Martin Schläffer:
Cryptanalysis of Ascon. 30 - Kai-Min Chung, Rafael Pass:
Tight Parallel Repetition Theorems for Public-Coin Arguments using KL-divergence. 31 - Zvika Brakerski, Vinod Vaikuntanathan:
Constrained Key-Homomorphic PRFs from Standard Lattice Assumptions Or: How to Secretly Embed a Circuit in Your PRF. 32 - Christoph Dobraunig, Maria Eichlseder, Stefan Mangard, Florian Mendel:
On the Security of Fresh Re-keying to Counteract Side-Channel and Fault Attacks. 33 - Hannes Groß, Erich Wenger, Christoph Dobraunig, Christoph Ehrenhöfer:
Suit up! Made-to-Measure Hardware Implementations of Ascon. 34 - Elena Dubrova, Mats Näslund, Göran Selander, Fredrik Lindqvist:
Cryptographically Secure CRC for Lightweight Message Authentication. 35 - Billy Bob Brumley:
Faster software for fast endomorphisms. 36 - Da-Zhi Sun, Zahra Ahmadian, Yue-Jiao Wang, Mahmoud Salmasizadeh, Mohammad Reza Aref:
Analysis and Enhancement of Desynchronization Attack on an Ultralightweight RFID Authentication Protocol. 37 - Aloni Cohen, Shafi Goldwasser, Vinod Vaikuntanathan:
Aggregatable Pseudorandom Functions and Connections to Learning. 38 - Véronique Cortier, Fabienne Eigner, Steve Kremer, Matteo Maffei, Cyrille Wiedling:
Type-Based Verification of Electronic Voting Protocols. 39 - Zahra Ahmadian, Shahram Rasoolzadeh, Mahmoud Salmasizadeh, Mohammad Reza Aref:
Automated Dynamic Cube Attack on Block Ciphers: Cryptanalysis of SIMON and KATAN. 40 - Artur Mariano, Thijs Laarhoven, Christian H. Bischof:
Parallel (probable) lock-free HashSieve: a practical sieving algorithm for the SVP. 41 - Rachid El Bansarkhani, Johannes Buchmann:
High Performance Lattice-based CCA-secure Encryption. 42 - Ai Ishida, Keita Emura, Goichiro Hanaoka, Yusuke Sakai, Keisuke Tanaka:
Group Signature with Deniability: How to Disavow a Signature. 43 - Binanda Sengupta, Abhijit Das:
Use of SIMD-Based Data Parallelism to Speed up Sieving in Integer-Factoring Algorithms. 44 - Valentina Banciu, Elisabeth Oswald, Carolyn Whitnall:
Reliable Information Extraction for Single Trace Attacks. 45 - Martin R. Albrecht, Rachel Player, Sam Scott:
On the concrete hardness of Learning with Errors. 46 - Guilhem Castagnos, Fabien Laguillaumie:
Linearly Homomorphic Encryption from DDH. 47 - Ran Canetti, Yael Tauman Kalai, Omer Paneth:
On Obfuscation with Random Oracles. 48 - Sonia Bogos, Florian Tramèr
, Serge Vaudenay:
On Solving Lpn using BKW and Variants. 49 - Carla Ràfols:
Stretching Groth-Sahai: NIZK Proofs of Partial Satisfiability. 50 - Li Lin, Wenling Wu:
Improved Meet-in-the-Middle Distinguisher on Feistel Schemes. 51 - Mihir Bellare, Sriram Keelveedhi:
Interactive Message-Locked Encryption and Secure Deduplication. 52 - Peter Gazi, Krzysztof Pietrzak, Stefano Tessaro:
Tight Bounds for Keyed Sponges and Truncated CBC. 53 - Brett Hemenway, Rafail Ostrovsky, Alon Rosen:
Non-committing encryption from Φ-hiding. 54 - Vladimir Kolesnikov, Payman Mohassel, Ben Riva, Mike Rosulek:
Richer Efficiency/Security Trade-offs in 2PC. 55 - Alexandre Duc, Florian Tramèr
, Serge Vaudenay:
Better Algorithms for LWE and LWR. 56 - Bertram Poettering, Dale L. Sibborn:
Cold Boot Attacks in the Discrete Logarithm Setting. 57 - Berry Schoenmakers, Meilof Veeningen:
Universally Verifiable Multiparty Computation from Threshold Homomorphic Cryptosystems. 58 - Alexandra Boldyreva, Jean Paul Degabriele, Kenneth G. Paterson, Martijn Stam:
Security of Symmetric Encryption in the Presence of Ciphertext Fragmentation. 59 - Gilles Barthe, Sonia Belaïd, François Dupressoir, Pierre-Alain Fouque, Benjamin Grégoire, Pierre-Yves Strub:
Verified Proofs of Higher-Order Masking. 60 - Gilad Asharov, Yehuda Lindell, Thomas Schneider, Michael Zohner:
More Efficient Oblivious Transfer Extensions with Security for Malicious Adversaries. 61 - Yuval Yarom, Gefei Li, Damith Chinthana Ranasinghe:
Evaluation and Cryptanalysis of the Pandaka Lightweight Cipher. 62 - Ryad Benadjila, Thomas Calderon, Marion Daubignard:
CamlCrush: A PKCS\#11 Filtering Proxy. 63 - Handan Kilinç, Alptekin Küpçü:
Optimally Efficient Multi-Party Fair Exchange and Fair Secure Multi-Party Computation. 64 - Andrey Dmukh, Denis Dygin, Grigory B. Marshalko:
A lightweight-friendly modifcation of GOST block cipher. 65 - Tobias Schneider, Amir Moradi, Tim Güneysu:
Arithmetic Addition over Boolean Masking - Towards First- and Second-Order Resistance in Hardware. 66 - Susumu Kiyoshima:
An Alternative Approach to Non-black-box Simulation in Fully Concurrent Setting. 67 - Gregor Leander, Brice Minaud, Sondre Rønjom:
A Generic Approach to Invariant Subspace Attacks: Cryptanalysis of Robin, iSCREAM and Zorro. 68 - Benoit Cogliati, Yannick Seurin:
On the Provable Security of the Iterated Even-Mansour Cipher against Related-Key and Chosen-Key Attacks. 69 - Gaëtan Leurent, Lei Wang:
The Sum Can Be Weaker Than Each Part. 70 - Jean-Sébastien Coron, Jean-Charles Faugère, Guénaël Renault, Rina Zeitoun:
Factoring N=pr qs for Large r and s. 71 - Olivier Blazy, Céline Chevalier, Damien Vergnaud:
Non-Interactive Zero-Knowledge Proofs of Non-Membership. 72 - Dana Dachman-Soled, Chang Liu, Charalampos Papamanthou, Elaine Shi, Uzi Vishkin:
Oblivious Network RAM. 73 - Gilles Barthe, Juan Manuel Crespo, Yassine Lakhnech, Benedikt Schmidt:
Mind the Gap: Modular Machine-checked Proofs of One-Round Key Exchange Protocols. 74 - Jian Guo, Yu Sasaki, Lei Wang, Meiqin Wang, Long Wen:
Equivalent Key Recovery Attacks against HMAC and NMAC with Whirlpool Reduced to 7 Rounds. 75 - Masayuki Abe, Markulf Kohlweiss, Miyako Ohkubo, Mehdi Tibouchi:
Fully Structure-Preserving Signatures and Shrinking Commitments. 76 - Yuwei Xu, Chuankun Wu:
On the Existence and Constructions of Vectorial Boolean Bent Functions. 77 - Chun-Xiang Gu, Dan Xin, Yonghui Zheng, Yuanji Kang:
Fully Homomorphic Encryption from Ring-LWE:Identity-Based,Arbitrary Cyclotomic,Tighter Parameters. 78 - Jiqiang Lu:
On the Security of the COPA and Marble Authenticated Encryption Algorithms against (Almost) Universal Forgery Attack. 79 - Feng Hao, Xun Yi, Liqun Chen, Siamak Fayyaz Shahandashti:
The Fairy-Ring Dance: Password Authenticated Key Exchange in a Group. 80 - Yan Huang, Jonathan Katz, Vladimir Kolesnikov, Ranjit Kumaresan, Alex J. Malozemoff:
Amortizing Garbled Circuits. 81 - Ihsan Haluk Akin, Berk Sunar:
On the Difficulty of Securing Web Applications using CryptDB. 82 - Massimo Chenal, Qiang Tang
:
Key Recovery Attack against an NTRU-type Somewhat Homomorphic Encryption Scheme. 83 - Zhengjun Cao, Lihua Liu:
On the Disadvantages of Pairing-based Cryptography. 84 - Anne Canteaut, Joëlle Roué:
On the behaviors of affine equivalent Sboxes regarding differential and linear attacks. 85 - Patrick Märtens:
Practical Compact E-Cash with Arbitrary Wallet Size. 86 - David Derler, Christian Hanser, Daniel Slamanig:
Revisiting Cryptographic Accumulators, Additional Properties and Relations to other Primitives. 87 - Klaus Kursawe, Christiane Peters:
Structural Weaknesses in the Open Smart Grid Protocol. 88 - Thomas Eisenbarth, Aaron Meyerowitz, Rainer Steinwandt:
On the security margin of MAC striping. 89 - Yosuke Todo:
Structural Evaluation by Generalized Integral Property. 90 - Christoph Dobraunig, Maria Eichlseder, Florian Mendel:
Related-Key Forgeries for Prøst-OTR. 91 - Grasha Jacob, A. Murugan, Irine Viola:
Towards the Generation of a Dynamic Key-Dependent S-Box to Enhance Security. 92 - Murat Cenk, M. Anwar Hasan:
Some New Results on Binary Polynomial Multiplication. 94 - Dmitry Khovratovich, Ivica Nikolic, Josef Pieprzyk, Przemyslaw Sokolowski, Ron Steinfeld:
Rotational Cryptanalysis of ARX Revisited. 95 - Riham AlTawy, Amr M. Youssef:
Meet in the Middle Attacks on Reduced Round Kuznyechik. 96 - Bruce Schneier, Matthew Fredrikson, Tadayoshi Kohno, Thomas Ristenpart:
Surreptitiously Weakening Cryptographic Systems. 97 - Shantian Cheng, Juanyang Zhang:
Adaptive-ID Secure Revocable Identity-Based Encryption from Lattices via Subset Difference Method. 98 - Dirk Achenbach, Jörn Müller-Quade, Jochen Rill:
Universally Composable Firewall Architectures using Trusted Hardware. 99 - Christian Wittke, Zoya Dyka, Peter Langendörfer:
Influence of Electrical Circuits of ECC Designs on Shape of Electromagnetic Traces measured on FPGA. 100 - Nicky Mouha, Atul Luykx:
Multi-Key Security: The Even-Mansour Construction Revisited. 101 - Shay Gueron, Yehuda Lindell:
GCM-SIV: Full Nonce Misuse-Resistant Authenticated Encryption at Under One Cycle per Byte. 102 - Vincenzo Iovino, Karol Zebrowski:
Mergeable Functional Encryption. 103 - Rafael Dowsley, Jörn Müller-Quade, Tobias Nilges:
Weakening the Isolation Assumption of Tamper-proof Hardware Tokens. 104 - Josep Balasch, Sebastian Faust, Benedikt Gierlichs:
Inner Product Masking Revisited. 105 - Yara Elias, Kristin E. Lauter, Ekin Ozman, Katherine E. Stange:
Provably weak instances of Ring-LWE. 106 - Attila Altay Yavuz, Jorge Guajardo:
Dynamic Searchable Symmetric Encryption with Minimal Leakage and Efficient Updates on Commodity Hardware. 107 - Lucjan Hanzlik, Przemyslaw Kubiak, Miroslaw Kutylowski:
Tracing Attacks on U-Prove with Revocation Mechanism. 108 - Shijun Zhao, Qianying Zhang:
sHMQV: An Efficient Key Exchange Protocol for Power-limited Devices. 110 - Steven D. Galbraith, Barak Shani:
The Multivariate Hidden Number Problem. 111 - Satsuya Ohata, Yutaka Kawai, Takahiro Matsuda, Goichiro Hanaoka, Kanta Matsuura:
Re-encryption Verifiability: How to Detect Malicious Activities of a Proxy in Proxy Re-encryption. 112 - Anne Canteaut, Sergiu Carpov, Caroline Fontaine, Tancrède Lepoint, María Naya-Plasencia, Pascal Paillier, Renaud Sirdey:
How to Compress Homomorphic Ciphertexts. 113 - Shai Halevi, William Eric Hall, Charanjit S. Jutla, Arnab Roy:
Weak Ideal Functionalities for Designing Random Oracles with Applications to Fugue. 114 - Muhammad Yasir Malik:
Comprehensive Efficient Implementations of ECC on C54xx Family of Low-cost Digital Signal Processors. 115 - Riadh Brinci, Walid Khmiri, Mefteh Mbarek, Abdellatif Ben Rabaa, Ammar Bouallègue:
Efficient Hardware Design for Computing Pairings Using Few FPGA In-built DSPs. 116 - Maciej Skorski
:
Nonuniform Indistinguishability and Unpredictability Hardcore Lemmas: New Proofs and Applications to Pseudoentropy. 117 - Takahiro Matsuda, Goichiro Hanaoka:
Constructing and Understanding Chosen Ciphertext Security via Puncturable Key Encapsulation Mechanisms. 118 - Alexandre Duc, Sebastian Faust, François-Xavier Standaert:
Making Masking Security Proofs Concrete Or How to Evaluate the Security of any Leaking Device. 119 - Debapriya Basu Roy, Shivam Bhasin, Sylvain Guilley, Jean-Luc Danger, Debdeep Mukhopadhyay:
Reconfigurable LUT: Boon or Bane for Secure Applications. 120 - Travis Mayberry, Erik-Oliver Blass, Guevara Noubir:
Multi-User Oblivious RAM Secure Against Malicious Servers. 121 - Siwei Sun, Lei Hu, Meiqin Wang, Peng Wang, Kexin Qiao, Xiaoshuang Ma, Danping Shi, Ling Song, Kai Fu:
Constructing Mixed-integer Programming Models whose Feasible Region is Exactly the Set of All Valid Differential Characteristics of SIMON. 122 - Dennis Hofheinz, Jessica Koch, Christoph Striecks
:
Identity-based encryption with (almost) tight security in the multi-instance, multi-ciphertext setting. 123 - Alexander Wild, Amir Moradi, Tim Güneysu:
GliFreD: Glitch-Free Duplication - Towards Power-Equalized Circuits on FPGAs. 124 - Aloni Cohen, Justin Holmgren
:
Multilinear Pseudorandom Functions. 125 - Nir Bitansky, Omer Paneth, Daniel Wichs:
Perfect Structure on the Edge of Chaos. 126 - Ricardo Dahab, Steven D. Galbraith, Eduardo Morais:
Adaptive key recovery attacks on NTRU-based somewhat homomorphic encryption schemes. 127 - Takashi Yamakawa, Shota Yamada, Goichiro Hanaoka, Noboru Kunihiro:
Self-bilinear Map on Unknown Order Groups from Indistinguishability Obfuscation and Its Applications. 128 - Nishanth Chandran, Vipul Goyal, Pratyay Mukherjee, Omkant Pandey, Jalaj Upadhyay:
Block-wise Non-Malleable Codes. 129 - Sune K. Jakobsen, Claudio Orlandi:
How to Bootstrap Anonymous Communication. 130 - Frederik Armknecht, Vasily Mikhalev:
On Lightweight Stream Ciphers with Shorter Internal States. 131 - Jung Hee Cheon, Miran Kim, Kristin E. Lauter:
Homomorphic Computation of Edit Distance. 132 - Kristin E. Lauter, Adriana López-Alt, Michael Naehrig:
Private Computation on Encrypted Genomic Data. 133 - Pierre Karpman:
From Related-Key Distinguishers to Related-Key-Recovery on Even-Mansour Constructions. 134 - Bernardo David, Ryo Nishimaki, Samuel Ranellucci, Alain Tapp:
Generalizing Efficient Multiparty Computation. 135 - Marcos A. Simplício Jr., Leonardo C. Almeida, Ewerton R. Andrade, Paulo C. F. dos Santos, Paulo S. L. M. Barreto:
Lyra2: Password Hashing Scheme with improved security against time-memory trade-offs. 136 - Mikhail Strizhov, Indrajit Ray:
Multi-keyword Similarity Search Over Encrypted Cloud Data. 137 - Vikram Singh:
A Practical Key Exchange for the Internet using Lattice Cryptography. 138 - Donghoon Chang, Arpan Jati, Sweta Mishra, Somitra Kumar Sanadhya:
Performance Analysis of Some Password Hashing Schemes. 139 - Neal Koblitz, Alfred Menezes:
The Random Oracle Model: A Twenty-Year Retrospective. 140 - Céline Blondeau, Marine Minier:
Analysis of Impossible, Integral and Zero-Correlation Attacks on Type-II Generalized Feistel Networks using the Matrix Method. 141 - S. Dov Gordon, Jonathan Katz, Feng-Hao Liu, Elaine Shi, Hong-Sheng Zhou:
Multi-Client Verifiable Computation with Stronger Security Guarantees. 142 - Erich Wenger, Paul Wolfger:
Harder, Better, Faster, Stronger - Elliptic Curve Discrete Logarithm Computations on FPGAs. 143 - Tyge Tiessen, Lars R. Knudsen, Stefan Kölbl, Martin M. Lauridsen:
Security of the AES with a Secret S-box. 144 - Stefan Kölbl, Gregor Leander, Tyge Tiessen:
Observations on the SIMON block cipher family. 145 - Itai Dinur, Orr Dunkelman, Nathan Keller, Adi Shamir:
New Attacks on Feistel Structures with Improved Memory Complexities. 146 - Lionel Rivière, Zakaria Najm, Pablo Rauzy, Jean-Luc Danger, Julien Bringer, Laurent Sauvage:
High Precision Fault Injections on the Instruction Cache of ARMv7-M Architectures. 147 - Yossef Oren, Ahmad-Reza Sadeghi, Christian Wachsmann:
On the Effectiveness of the Remanence Decay Side-Channel to Clone Memory-based PUFs. 148 - Jian Guo, Yu Sasaki, Lei Wang, Shuang Wu:
Cryptanalysis of HMAC/NMAC-Whirlpool. 149 - Tobias Pulls, Roel Peeters:
Insynd: Privacy-Preserving Secure One-Way Messaging Using Balloons. 150 - Daniel J. Bernstein, Andreas Hülsing, Tanja Lange, Ruben Niederhagen:
Bad directions in cryptographic hash functions. 151 - Ronan Lashermes, Jacques J. A. Fournier, Louis Goubin:
Inverting the Final exponentiation of Tate pairings on ordinary elliptic curves using faults. 152 - Kai-Min Chung, Jonathan Katz, Hong-Sheng Zhou:
Functional Encryption from (Small) Hardwae Tokens. 153 - Daniel Genkin, Yuval Ishai, Manoj Prabhakaran, Amit Sahai, Eran Tromer:
Circuits Resilient to Additive Attacks with Applications to Secure Computation. 154 - Loi Luu, Ratul Saha, Inian Parameshwaran, Prateek Saxena, Aquinas Hobor:
On Power Splitting Games in Distributed Computation: The Case of Bitcoin Pooled Mining. 155 - Brett Hemenway, Rafail Ostrovsky:
Building Lossy Trapdoor Functions from Lossy Encryption. 156 - Nuttapong Attrapadung, Shota Yamada:
Duality in ABE: Converting Attribute Based Encryption for Dual Predicate and Dual Policy via Computational Encodings. 157 - Zvika Brakerski, Ilan Komargodski, Gil Segev:
From Single-Input to Multi-Input Functional Encryption in the Private-Key Setting. 158 - Shengbao Wu, Hongjun Wu, Tao Huang, Mingsheng Wang, Wenling Wu:
Leaked-State-Forgery Attack Against The Authenticated Encryption Algorithm ALE. 159 - Tao Huang, Ivan Tjuawinata, Hongjun Wu:
Differential-Linear Cryptanalysis of ICEPOLE. 160 - Valentina Banciu, Elisabeth Oswald, Carolyn Whitnall:
Exploring the Resilience of Some Lightweight Ciphers Against Pro led Single Trace Attacks. 161 - Jean-Sébastien Coron, Tancrède Lepoint, Mehdi Tibouchi:
New Multilinear Maps over the Integers. 162 - Nir Bitansky, Vinod Vaikuntanathan:
Indistinguishability Obfuscation from Functional Encryption. 163 - Priyanka Bose, Dipanjan Das, C. Pandu Rangan:
Constant Size Ring Signature Without Random Oracle. 164 - Benny Applebaum:
The Cryptographic Hardness of Random Local Functions - Survey. 165 - Jeremiah Blocki, Manuel Blum, Anupam Datta:
Naturally Rehearsing Passwords. 166 - Saikrishna Badrinarayanan, Eric Miles, Amit Sahai, Mark Zhandry:
Post-Zeroizing Obfuscation: The case of Evasive Circuits. 167 - Claude Carlet:
More PS and H-like bent functions. 168 - Daniel R. L. Brown:
Short Schnorr signatures require a hash function with more than just random-prefix resistance. 169 - Daniel Genkin, Lev Pachmanov, Itamar Pipman, Eran Tromer:
Stealing Keys from PCs using a Radio: Cheap Electromagnetic Attacks on Windowed Exponentiation. 170 - Benjamin Dowling, Douglas Stebila, Greg Zaverucha
:
Authenticated Network Time Synchronization. 171 - Aria Shahverdi, Mostafa Taha, Thomas Eisenbarth:
Silent Simon: A Threshold Implementation under 100 Slices. 172 - Prabhanjan Ananth, Abhishek Jain
:
Indistinguishability Obfuscation from Compact Functional Encryption. 173 - Chenyang Tu, Neng Gao, Zeyi Liu, Lei Wang, Zongbin Liu, Bingke Ma:
A Practical Chosen Message Power Analysis Method on the Feistel-SP ciphers with Applications to CLEFIA and Camellia. 174 - Tomer Ashur, Bart Mennink:
Trivial Nonce-Misusing Attack on Pure OMD. 175 - Kim Laine, Kristin E. Lauter:
Key Recovery for LWE in Polynomial Time. 176 - B. R. Purushothama, Nishat Koti:
On the Security of an Efficient Group Key Agreement Scheme for MANETs. 177 - Pablo Azar, Shafi Goldwasser, Sunoo Park:
How to Incentivize Data-Driven Collaboration Among Competing Parties. 178 - Palash Sarkar, Shashank Singh:
A Simple Method for Obtaining Relations Among Factor Basis Elements for Special Hyperelliptic Curves. 179 - Abhishek Banerjee, Georg Fuchsbauer, Chris Peikert, Krzysztof Pietrzak, Sophie Stevens:
Key-Homomorphic Constrained Pseudorandom Functions. 180 - Bing Sun, Zhiqiang Liu, Vincent Rijmen, Ruilin Li, Lei Cheng, Qingju Wang, Hoda Alkhzaimi, Chao Li:
Links among Impossible Differential, Integral and Zero Correlation Linear Cryptanalysis. 181 - Rodolphe Lampe, Yannick Seurin:
Tweakable Blockciphers with Asymptotically Optimal Security. 182 - Céline Blondeau, Kaisa Nyberg:
New Links Between Differential and Linear Cryptanalysis. 183 - Céline Blondeau, Kaisa Nyberg:
Links Between Truncated Differential and Multidimensional Linear Properties of Block Ciphers and Underlying Attack Complexities. 184 - Elena Dubrova, Mats Näslund, Gunnar Carlsson, John Fornehed, Ben J. M. Smeets:
Remotely Managed Logic Built-In Self-Test for Secure M2M Communications. 185 - Sourav Das, Subhamoy Maitra, Willi Meier:
Higher Order Differential Analysis of NORX. 186 - Juan A. Garay, Jonathan Katz, Björn Tackmann, Vassilis Zikas:
How Fair is Your Protocol? A Utility-based Approach to Protocol Optimality. 187 - Fabrice Benhamouda, Olivier Blazy, Céline Chevalier, David Pointcheval, Damien Vergnaud:
New Techniques for SPHFs and Efficient One-Round PAKE Protocols. 188 - Viet Tung Hoang, Reza Reyhanitabar, Phillip Rogaway, Damian Vizár:
Online Authenticated-Encryption and its Nonce-Reuse Misuse-Resistance. 189 - Seung Geol Choi, Jonathan Katz, Ranjit Kumaresan, Carlos Cid:
Multi-Client Non-Interactive Verifiable Computation. 190 - Xiao Shaun Wang, Chang Liu, Kartik Nayak, Yan Huang, Elaine Shi:
iDASH Secure Genome Analysis Competition Using ObliVM. 191 - Sylvain Duquesne, Loubna Ghammam:
Memory-saving computation of the pairing fi nal exponentiation on BN curves. 192 - Karim Bigou, Arnaud Tisserand:
Improving Modular Inversion in RNS using the Plus-Minus Method. 193 - Dario Catalano, Dario Fiore:
Practical Homomorphic MACs for Arithmetic Circuits. 194 - Stephanie Bayer, Jens Groth:
Zero-knowledge Argument for Polynomial Evaluation with Application to Blacklists. 195 - Michel Abdalla, Fabrice Benhamouda, David Pointcheval:
Tighter Reductions for Forward-Secure Signature Schemes. 196 - N. Nalla Anandakumar:
SCA Resistance Analysis of MAC-PHOTON. 197 - Pascal Sasdrich, Oliver Mischke, Amir Moradi, Tim Güneysu:
Side-Channel Protection by Randomizing Look-Up Tables on Reconfigurable Hardware - Pitfalls of Memory Primitives. 198 - Amir Moradi, Gesine Hinterwälder:
Side-Channel Security Analysis of Ultra-Low-Power FRAM-based MCUs. 199 - Alexander Wild, Amir Moradi, Tim Güneysu:
Evaluating the Duplication of Dual-Rail Precharge Logics on FPGAs. 200 - Akbar Mahmoodi Rishakani, Seyed Mojtaba Dehnavi, M. R. Mirzaee Shamsabad, Hamidreza Maimani, Einollah Pasha:
Statistical Properties of Multiplication mod 2n. 201 - Shafi Goldwasser, Yael Tauman Kalai, Sunoo Park:
Adaptively Secure Coin-Flipping, Revisited. 202 - Pascal Sasdrich, Amir Moradi, Oliver Mischke, Tim Güneysu:
Achieving Side-Channel Protection with Dynamic Logic Reconfiguration on Modern FPGAs. 203 - Michel Abdalla, Sonia Belaïd, Pierre-Alain Fouque:
Leakage-Resilient Symmetric Encryption via Re-keying. 204 - Jooyoung Lee:
Towards Key-Length Extension with Optimal Security: Cascade Encryption and Xor-cascade Encryption. 205 - Bren Cavallo, Giovanni Di Crescenzo, Delaram Kahrobaei, Vladimir Shpilrain:
Efficient and Secure Delegation of Group Exponentiation to a Single Server. 206 - Tobias Schneider, Amir Moradi:
Leakage Assessment Methodology - a clear roadmap for side-channel evaluations. 207 - Ioana Boureanu, Aikaterini Mitrokotsa, Serge Vaudenay:
Towards Secure Distance Bounding. 208 - Daniel Dinu, Yann Le Corre, Dmitry Khovratovich, Léo Perrin, Johann Großschädl, Alex Biryukov:
Triathlon of Lightweight Block Ciphers for the Internet of Things. 209 - Chenglu Jin, Marten van Dijk:
Secure and Efficient Initialization and Authentication Protocols for SHIELD. 210 - Thijs Laarhoven, Benne de Weger:
Faster sieving for shortest lattice vectors using spherical locality-sensitive hashing. 211 - Christof Beierle, Philipp Jovanovic, Martin M. Lauridsen, Gregor Leander, Christian Rechberger:
Analyzing Permutations for AES-like Ciphers: Understanding ShiftRows. 212 - Javier Herranz:
Attribute-Based Versions of Schnorr and ElGamal. 213 - Yuichi Niwa, Keisuke Ohashi, Kazuhiko Minematsu, Tetsu Iwata:
GCM Security Bounds Reconsidered. 214 - Amadou Moctar Kane:
A revocable anonymity in Tor. 215 - Eike Kiltz, Hoeteck Wee:
Quasi-Adaptive NIZK for Linear Subspaces Revisited. 216 - Subhamoy Maitra, Goutam Paul, Willi Meier:
Salsa20 Cryptanalysis: New Moves and Revisiting Old Styles. 217 - Qinglong Wang:
Efficient k-out-of-n oblivious transfer protocol. 218 - Prakruti C, Sashank Dara, V. N. Muralidhara:
Efficient Format Preserving Encrypted Databases. 219 - Dan Boneh, Kevin Lewi, Hart William Montgomery, Ananth Raghunathan:
Key Homomorphic PRFs and Their Applications. 220 - Daniel J. Bernstein, Tanja Lange, Christine van Vredendaal:
Tighter, faster, simpler side-channel security evaluations beyond computing power. 221 - Elena Andreeva, Andrey Bogdanov, Bart Mennink:
Towards Understanding the Known-Key Security of Block Ciphers. 222 - Anubhab Baksi, Subhamoy Maitra, Santanu Sarkar:
New Distinguishers for Reduced Round Trivium and Trivia-SC using Cube Testers. 223 - Matteo Maffei, Giulio Malavolta, Manuel Reinert, Dominique Schröder:
Privacy and Access Control for Outsourced Personal Records. 224 - Ben Fisch, Daniel Freund, Moni Naor:
Secure Physical Computation using Disposable Circuits. 226 - Alex Biryukov, Dmitry Khovratovich:
Tradeoff Cryptanalysis of Memory-Hard Functions. 227 - Konrad Durnoga, Tomasz Kazana, Michal Zajac, Maciej Zdanowicz:
Leakage-Resilient Cryptography with Key Derived from Sensitive Data. 228 - Reza Hooshmand, Taraneh Eghlidos, Mohammad Reza Aref:
Improving GGH Public Key Scheme Using Low Density Lattice Codes. 229 - Der-Yeuan Yu, Aanjhan Ranganathan, Ramya Jayaram Masti, Claudio Soriente, Srdjan Capkun:
W-SPS: Designing a Wide-Area Secure Positioning System. 230 - Yonglin Hao:
A Related-Key Chosen-IV Distinguishing Attack on Full Sprout Stream Cipher. 231 - Virginie Lallemand, María Naya-Plasencia:
Cryptanalysis of Full Sprout. 232 - Ben Smyth, Steven Frink, Michael R. Clarkson:
Computational Election Verifiability: Definitions and an Analysis of Helios and JCJ. 233 - Megha Agrawal, Donghoon Chang, Mohona Ghosh, Somitra Kumar Sanadhya:
Collision Attack on 4-branch, Type-2 GFN based Hash Functions using Sliced Biclique Cryptanalysis Technique. 234 - Mashael AlSabah, Ian Goldberg:
Performance and Security Improvements for Tor: A Survey. 235 - Subhamoy Maitra, Santanu Sarkar, Anubhab Baksi, Pramit Dey:
Key Recovery from State Information of Sprout: Application to Cryptanalysis and Fault Attack. 236 - Wouter Lueks, Gergely Alpár, Jaap-Henk Hoepman, Pim Vullers:
Fast Revocation of Attribute-Based Credentials for Both Users and Verifiers. 237 - Konrad Durnoga, Stefan Dziembowski, Tomasz Kazana, Michal Zajac:
One Time Programs with Limited Memory. 238 - Patrick Derbez
, Léo Perrin:
Meet-in-the-Middle Attacks and Structural Analysis of Round-Reduced PRINCE. 239 - Alex Biryukov, Patrick Derbez
, Léo Perrin:
Differential Analysis and Meet-in-the-Middle Attack against Round-Reduced TWINE. 240 - Elena Dubrova, Martin Hell:
Espresso: A Stream Cipher for 5G Wireless Communication Systems. 241 - Benoît Libert, Thomas Peters, Marc Joye, Moti Yung:
Compactly Hiding Linear Spans: Tightly Secure Constant-Size Simulation-Sound QA-NIZK Proofs and Applications. 242 - Aris Pagourtzis, Giorgos Panagiotakos, Dimitris Sakavalas:
Reliable Message Transmission under Partial Knowledge. 243 - Jérémy Jean, Ivica Nikolic:
Internal Differential Boomerangs: Practical Analysis of the Round-Reduced Keccak-f Permutation. 244 - Pawel Morawiecki:
Practical Attacks on the Round-reduced PRINCE. 245 - Fabrice Benhamouda, Geoffroy Couteau, David Pointcheval, Hoeteck Wee:
Implicit Zero-Knowledge Arguments and Applications to the Malicious Setting. 246 - Paulo S. L. M. Barreto, Craig Costello, Rafael Misoczki, Michael Naehrig, C. C. F. Pereira Geovandro, Gustavo H. M. Zanon:
Subgroup security in pairing-based cryptography. 247 - Ryo Nishimaki, Keita Xagawa:
Verifiably Encrypted Signatures with Short Keys based on the Decisional Linear Problem and Obfuscation for Encrypted VES. 248 - Keita Xagawa:
Improved (Hierarchical) Inner-Product Encryption from Lattices. 249 - Junji Shikata:
Design and Analysis of Information-Theoretically Secure Authentication Codes with Non-Uniformly Random Keys. 250 - Kaoru Kurosawa, Yasuhiro Ohtaki:
How to Construct UC-Secure Searchable Symmetric Encryption Scheme. 251 - Haiyan Wang, Jianghua Zhong, Dongdai Lin:
Linearization of Multi-valued Nonlinear Feedback Shift Registers. 252 - Haiyan Wang, Dongdai Lin:
Stability and Linearization of Multi-valued Nonlinear Feedback Shift Registers. 253 - Pouyan Sepehrdad, Petr Susil, Serge Vaudenay, Martin Vuagnoux:
Tornado Attack on RC4 with Applications to WEP & WPA. 254 - David Bernhard, Véronique Cortier, David Galindo, Olivier Pereira, Bogdan Warinschi:
A comprehensive analysis of game-based ballot privacy definitions. 255 - Yang Lu, Quanling Zhang, Jiguo Li:
Cryptanalysis of Three Certificate-Based Authenticated Key Agreement Protocols and a Secure Construction. 256 - Vadim Lyubashevsky, Thomas Prest:
Quadratic Time, Linear Space Algorithms for Gram-Schmidt Orthogonalization and Gaussian Sampling in Structured Lattices. 257 - Siang Meng Sim, Khoongming Khoo, Frédérique E. Oggier, Thomas Peyrin:
Lightweight MDS Involution Matrices. 258 - Patrick Derbez
, Pierre-Alain Fouque:
Exhausting Demirci-Selçuk Meet-in-the-Middle Attacks against Reduced-Round AES. 259 - Paul Bottinelli, Joppe W. Bos:
Computational Aspects of Correlation Power Analysis. 260 - Joseph Bonneau, Andrew Miller, Jeremy Clark, Arvind Narayanan, Joshua A. Kroll, Edward W. Felten:
Research Perspectives and Challenges for Bitcoin and Cryptocurrencies. 261 - Hanno Böck:
A look at the PGP ecosystem through the key server data. 262 - Ethan Heilman, Alison Kendler, Aviv Zohar, Sharon Goldberg:
Eclipse Attacks on Bitcoin's Peer-to-Peer Network. 263 - Justine Sherry, Chang Lan, Raluca Ada Popa, Sylvia Ratnasamy:
BlindBox: Deep Packet Inspection over Encrypted Traffic. 264 - George Hatzivasilis, Ioannis Papaefstathiou, Charalampos Manifavas:
Password Hashing Competition - Survey and Benchmark. 265 - Xianrui Meng, Seny Kamara, Kobbi Nissim, George Kollios
:
GRECS: Graph Encryption for Approximate Shortest Distance Queries. 266 - Tung Chou, Claudio Orlandi:
The Simplest Protocol for Oblivious Transfer. 267 - Itai Dinur, Orr Dunkelman, Masha Gutman, Adi Shamir:
Improved Top-Down Techniques in Differential Cryptanalysis. 268 - Chunsheng Gu:
Ideal Multilinear Maps Based on Ideal Lattices. 269 - Markus Dichtl:
Fibonacci Ring Oscillators as True Random Number Generators - A Security Risk. 270 - Mariya Georgieva, Frédéric de Portzamparc:
Toward Secure Implementation of McEliece Decryption. 271 - Baodong Qin, Shengli Liu:
Leakage-Flexible CCA-secure Public-Key Encryption: Simple Construction and Free of Pairing. 272 - Hoeteck Wee:
Dual System Encryption via Predicate Encodings. 273 - Gizem S. Çetin, Yarkin Doröz, Berk Sunar, Erkay Savas:
Low Depth Circuits for Efficient Homomorphic Sorting. 274 - Takanori Yasuda, Xavier Dahan, Yun-Ju Huang, Tsuyoshi Takagi, Kouichi Sakurai:
MQ Challenge: Hardness Evaluation of Solving Multivariate Quadratic Problems. 275 - Binglong Chen, Chang-An Zhao:
An Improvment of the Elliptic Net Algorithm. 276 - Marco Tomamichel, Serge Fehr, Jedrzej Kaniewski, Stephanie Wehner:
One-Sided Device-Independent QKD and Position-based Cryptography from Monogamy Games. 277 - Sébastien Canard, David Pointcheval, Olivier Sanders:
Efficient Delegation of Zero-Knowledge Proofs of Knowledge in a Pairing-Friendly Setting. 278 - Jérémy Jean, María Naya-Plasencia, Thomas Peyrin:
Improved Cryptanalysis of AES-like Permutations. 279 - Jonathan Katz, Aishwarya Thiruvengadam, Hong-Sheng Zhou:
Feasibility and Infeasibility of Adaptively Secure Fully Homomorphic Encryption. 280 - Vinod Vaikuntanathan, Prashant Nalini Vasudevan:
From Statistical Zero Knowledge to Secret Sharing. 281 - Arash Afshar, Payman Mohassel, Benny Pinkas, Ben Riva:
Non-Interactive Secure Computation Based on Cut-and-Choose. 282 - Esha Ghosh, Michael T. Goodrich, Olga Ohrimenko, Roberto Tamassia:
Fully-Dynamic Verifiable Zero-Knowledge Order Queries for Network Data. 283 - Binglong Chen, Chuangqiang Hu, Chang-An Zhao:
A Note on Scalar Multiplication Using Division Polynomials. 284 - Tomer Ashur:
Improved Linear Trails for the Block Cipher Simon. 285 - Zhan Chen, Ning Wang, Xiaoyun Wang:
Impossible Differential Cryptanalysis of Reduced Round SIMON. 286 - John M. Schanck, William Whyte, Zhenfei Zhang:
A quantum-safe circuit-extension handshake for Tor. 287 - Aydin Aysu, Patrick Schaumont
:
Precomputation Methods for Faster and Greener Post-Quantum Cryptography on Emerging Embedded Platforms. 288 - Muhammed F. Esgin, Orhun Kara:
Practical Cryptanalysis of Full Sprout with TMD Tradeoff Attacks. 289 - Joseph A. Akinyele, Christina Garman, Susan Hohenberger:
Automating Fast and Secure Translations from Type-I to Type-III Pairing Schemes. 290 - Takeshi Sugawara
, Daisuke Suzuki, Minoru Saeki:
Two Operands of Multipliers in Side-Channel Attack. 291 - Shlomi Dolev, Yin Li:
Secret Shared Random Access Machine. 292 - Pratish Datta, Ratna Dutta, Sourav Mukhopadhyay:
Fully Secure Unbounded Revocable Attribute-Based Encryption in Prime Order Bilinear Groups via Subset Difference Method. 293 - Erdinç Öztürk, Yarkin Doröz, Berk Sunar, Erkay Savas:
Accelerating Somewhat Homomorphic Evaluation using FPGAs. 294 - Ralf Küsters, Tomasz Truderung:
Security Analysis of Re-Encryption RPC Mix Nets. 295 - Emil Lerner:
The Uniform Distribution of Sequences Generated by Iteration of Polynomials. 296 - Junzuo Lai, Robert H. Deng, Shengli Liu, Jian Weng, Yunlei Zhao:
Identity-Based Encryption Secure Against Selective Opening Chosen-Ciphertext Attack. 297 - Yongge Wang:
Secure Random Linear Code Based Public Key Encryption Scheme RLCE. 298 - Zhengjun Cao, Lihua Liu:
A Note on the Lindell-Waisbard Private Web Search Scheme. 299 - Sébastien Canard, David Pointcheval, Olivier Sanders, Jacques Traoré:
Scalable Divisible E-cash. 300 - Yupu Hu, Huiwen Jia:
Cryptanalysis of GGH Map. 301 - Reza Reyhanitabar, Serge Vaudenay, Damian Vizár:
Boosting OMD for Almost Free Authentication of Associated Data. 302 - Nicky Mouha:
The Design Space of Lightweight Cryptography. 303 - Joshua Baron, Karim El Defrawy, Joshua Lampkins, Rafail Ostrovsky:
Communication-Optimal Proactive Secret Sharing for Dynamic Groups. 304 - Jonas Schneider, Dominique Schröder:
Foundations of Reconfigurable PUFs (Full Version). 305 - Morris Dworkin, Ray A. Perlner:
Analysis of VAES3 (FF2). 306 - Sanjam Garg
, Steve Lu, Rafail Ostrovsky:
Black-Box Garbled RAM. 307 - Patrick McCorry, Siamak Fayyaz Shahandashti, Dylan Clarke, Feng Hao:
Authenticated Key Exchange over Bitcoin. 308 - Tore Kasper Frederiksen, Thomas P. Jakobsen, Jesper Buus Nielsen, Roberto Trifiletti:
TinyLEGO: An Interactive Garbling Scheme for Maliciously Secure Two-party Computation. 309 - Igor A. Semaev:
New algorithm for the discrete logarithm problem on elliptic curves. 310 - Masayuki Abe, Bernardo David, Markulf Kohlweiss, Ryo Nishimaki, Miyako Ohkubo:
Tagged One-Time Signatures: Tight Security and Optimal Tag Size. 311 - Pierre-Alain Fouque, Thomas Vannet:
Improving Key Recovery to 784 and 799 rounds of Trivium using Optimized Cube Attacks. 312 - Ronald Cramer, Léo Ducas, Chris Peikert, Oded Regev:
Recovering Short Generators of Principal Ideals in Cyclotomic Rings. 313 - Qihong Yu, Jiguo Li, Yichen Zhang, Wei Wu, Xinyi Huang, Yang Xiang:
Certificate-Based Encryption Resilient to Key Leakage. 314 - Grégory Demay, Peter Gazi, Ueli Maurer, Björn Tackmann:
Query-Complexity Amplification for Random Oracles. 315 - Zhengan Huang, Shengli Liu, Xianping Mao, Kefei Chen:
Non-malleability under Selective Opening Attacks: Implication and Separation. 316 - Marcin Andrychowicz, Daniel Masny, Edoardo Persichetti:
Leakage-Resilient Cryptography over Large Finite Fields: Theory and Practice. 317 - Patrick Märtens:
Practical Divisible E-Cash. 318 - Koray Karabina:
Point Decomposition Problem in Binary Elliptic Curves. 319 - James Alderman, Christian Janson, Carlos Cid, Jason Crampton:
Hybrid Publicly Verifiable Computation. 320 - (Withdrawn) Size-Hiding in Private Set Intersection: what can be done and how to do it without random oracles. 321
- Peeter Laud, Alisa Pankova:
Transformation-Based Outsourcing of Linear Equation Systems over Real Numbers. 322 - (Withdrawn) Efficient, Pairing-Free, One Round Attribute-Based Authenticated Key Exchange. 323
- Divesh Aggarwal, Alexander Golovnev:
A Note on Lower Bounds for Non-interactive Message Authentication Using Weak Keys. 324 - Yuval Ishai, Rafail Ostrovsky, Vassilis Zikas:
Secure Multi-Party Computation with Identifiable Abort. 325 - Saeideh Kabirirad, Hamideh Hajiabadi:
Cryptanalysis Of An Authenticated Image Encryption Scheme Based On Chaotic Maps And Memory Cellular Automata. 326 - Subhadeep Banik:
Some results on Sprout. 327 - Xiaopeng Yang, Wenping Ma:
Strongly Secure Authenticated Key Exchange from Ideal Lattices. 328 - Dieter Schmidt:
PAGES - A Family of Block Ciiphers. 329 - Tarun Kumar Bansal, Donghoon Chang, Somitra Kumar Sanadhya:
Sponge based CCA2 secure asymmetric encryption for arbitrary length message. 330 - Megha Agrawal, Donghoon Chang, Somitra Kumar Sanadhya:
A New Authenticated Encryption Technique for Handling Long Ciphertexts in Memory Constrained Devices. 331 - Sumit Chakraborty:
Security Intelligence for Broadcast : Threat Analytics. 332 - Johannes Krupp
, Dominique Schröder, Mark Simkin, Dario Fiore, Giuseppe Ateniese, Stefan Nürnberger:
Nearly Optimal Verifiable Data Streaming (Full Version). 333 - Ran Canetti, Yilei Chen, Leonid Reyzin:
On the Correlation Intractability of Obfuscated Pseudorandom Functions. 334 - Janaka Alawatugoda, Colin Boyd, Douglas Stebila:
Continuous After-the-fact Leakage-Resilient eCK-secure Key Exchange. 335 - Benny Applebaum, Jonathan Avron, Christina Brzuska:
Arithmetic Cryptography. 336 - Sujoy Sinha Roy, Kimmo Järvinen, Frederik Vercauteren, Vassil S. Dimitrov, Ingrid Verbauwhede:
Modular Hardware Architecture for Somewhat Homomorphic Function Evaluation. 337 - Amadou Moctar Kane:
Cryptanalysis of a fair anonymity for the tor network. 338 - Berry Schoenmakers, Meilof Veeningen:
Guaranteeing Correctness in Privacy-Friendly Outsourcing by Certificate Validation. 339 - Santanu Sarkar:
A New Distinguisher on Grain v1 for 106 rounds. 340 - Gilad Asharov, Gil Segev:
Limits on the Power of Indistinguishability Obfuscation and Functional Encryption. 341 - Yan Zhu, Xin Wang, Di Ma, Ruiqi Guo:
Identity-Set-based Broadcast Encryption supporting "Cut-or-Select" with Short Ciphertext. 342 - Michael Düll, Björn Haase, Gesine Hinterwälder, Michael Hutter, Christof Paar, Ana Helena Sánchez, Peter Schwabe:
High-speed Curve25519 on 8-bit, 16-bit, and 32-bit microcontrollers. 343 - Ryo Nishimaki, Daniel Wichs:
Watermarking Cryptographic Programs Against Arbitrary Removal Strategies. 344 - Pratyay Mukherjee, Daniel Wichs:
Two Round MPC from LWE via Multi-Key FHE. 345 - Aggelos Kiayias, Thomas Zacharias, Bingsheng Zhang:
End-to-End Verifiable Elections in the Standard Model∗. 346 - Riham AlTawy, Onur Duman, Amr M. Youssef:
Fault Analysis of Kuznyechik. 347 - Andreas Gornik, Amir Moradi, Jürgen Oehm, Christof Paar:
A Hardware-based Countermeasure to Reduce Side-Channel Leakage - Design, Implementation, and Evaluation. 348 - Chang Liu, Liehuang Zhu, Jinjun Chen:
Efficient Searchable Symmetric Encryption for Storing Multiple Source Data on Cloud. 349 - Florian Mendel, Tomislav Nad, Martin Schläffer:
Improving Local Collisions: New Attacks on Reduced SHA-256. 350 - Mohammad Etemad, Alptekin Küpçü:
Database Outsourcing with Hierarchical Authenticated Data Structures. 351 - Pavel Raykov:
Broadcast from Minicast Secure Against General Adversaries. 352 - Paz Morillo, Carla Ràfols, Jorge L. Villar:
Matrix Computational Assumptions in Multilinear Groups. 353 - Jacek Samotyja, Kerstin Lemke-Rust, Markus Ullmann:
SEMA and MESD Leakage of TinyECC 2.0 on a LOTUS Sensor Node. 354 - Tommaso Gagliardoni, Andreas Hülsing, Christian Schaffner:
Semantic Security and Indistinguishability in the Quantum World. 355 - Nir Bitansky, Sanjam Garg
, Huijia Lin, Rafael Pass, Sidharth Telang:
Succinct Randomized Encodings and their Applications. 356 - Ming Li, Yupeng Jiang, Dongdai Lin:
A Group-theory Method to The Cycle Structures of Feedback Shift Registers. 357 - Yun-Ju Huang, Christophe Petit, Naoyuki Shinohara, Tsuyoshi Takagi:
On Generalized First Fall Degree Assumptions. 358 - Jean-Sébastien Coron, Emmanuel Prouff, Matthieu Rivain, Thomas Roche:
Higher-Order Side Channel Security and Mask Refreshing. 359 - Yanqing Yao, Zhoujun Li
:
Achieving Differential Privacy with Bias-Control Limited Source. 360 - Dominique Unruh:
Computationally binding quantum commitments. 361 - Claude Crépeau, Raza Ali Kazmi:
Oblivious Transfer from weakly Random Self-Reducible Public-Key Cryptosystem. 362 - Bart Mennink:
Optimally Secure Tweakable Blockciphers. 363 - Qiang Tang
, Jun Wang:
Privacy-preserving Context-aware Recommender Systems: Analysis and New Solutions. 364 - Masoumeh Safkhani, Nasour Bagheri, Mehdi Hosseinzadeh, Mojtaba Eslamnezhad Namin, Samad Rostampour:
On the (im)possibility of receiving security beyond 2l using an l-bit PRNG: the case of Wang et. al. protocol. 365 - Arjen K. Lenstra, Benjamin Wesolowski:
A random zoo: sloth, unicorn, and trx. 366 - Achiya Bar-On:
Improved Higher-Order Differential Attacks on MISTY1. 367 - Evgeny Sidorov:
Breaking the Rabin-Williams digital signature system implementation in the Crypto++ library. 368 - Nir Bitansky, Omer Paneth:
On Non-Black-Box Simulation and the Impossibility of Approximate Obfuscation. 369 - Sumit Chakraborty:
Financial Cryptography: Discriminatory Pricing Mechanism. 370 - S. Dov Gordon, Feng-Hao Liu, Elaine Shi:
Constant-Round MPC with Fairness and Guarantee of Output Delivery. 371 - Jérémy Jean, Ivica Nikolic, Thomas Peyrin, Lei Wang, Shuang Wu:
Security Analysis of PRINCE. 372 - Aloni Cohen, Justin Holmgren
, Vinod Vaikuntanathan:
Publicly Verifiable Software Watermarking. 373 - Christoph Bader, Tibor Jager, Yong Li, Sven Schäge:
On the Impossibility of Tight Cryptographic Reductions. 374 - Daniel R. L. Brown:
Bounds on surmising remixed keys. 375 - Raza Ali Kazmi:
Cryptography from Post-Quantum Assumptions. 376 - Alessandro Chiesa, Eran Tromer, Madars Virza:
Cluster Computing in Zero Knowledge. 377 - Fatemeh Ganji, Shahin Tajik, Jean-Pierre Seifert:
PAC Learning of Arbiter PUFs. 378 - Jingwei Li, Anna Cinzia Squicciarini, Dan Lin, Smitha Sundareswaran, Chunfu Jia:
MMBcloud-tree: Authenticated Index for Verifiable Cloud Service Selection. 379 - Céline Blondeau, Aslí Bay, Serge Vaudenay:
Protecting against Multidimensional Linear and Truncated Differential Cryptanalysis by Decorrelation. 380 - Sumit Chakraborty:
Financial Cryptography: Algorithmic Mechanisms for a Hedonic Game. 381 - Thomas Pöppelmann, Tobias Oder, Tim Güneysu:
Speed Records for Ideal Lattice-Based Cryptography on AVR. 382 - Rafael Pass, Abhi Shelat:
Impossibility of VBB Obfuscation with Ideal Constant-Degree Graded Encodings. 383 - Maciej Skorski
, Alexander Golovnev, Krzysztof Pietrzak:
Condensed Unpredictability. 384 - Serge Fehr, Jonathan Katz, Fang Song, Hong-Sheng Zhou, Vassilis Zikas:
Feasibility and Completeness of Cryptographic Tasks in the Quantum World. 385 - David J. Wu, Tony Feng, Michael Naehrig, Kristin E. Lauter:
Privately Evaluating Decision Trees and Random Forests. 386 - Scott Contini:
Method to Protect Passwords in Databases for Web Applications. 387 - Ran Canetti, Justin Holmgren
:
Fully Succinct Garbled RAM. 388 - Guido Bertoni, Joan Daemen, Michaël Peeters, Gilles Van Assche:
Keccak. 389 - Nuttapong Attrapadung:
Dual System Encryption Framework in Prime-Order Groups. 390 - Deepesh Data, Manoj Prabhakaran, Vinod M. Prabhakaran:
On the Communication Complexity of Secure Computation. 391 - Christoph Dobraunig, Maria Eichlseder, Florian Mendel:
Forgery Attacks on round-reduced ICEPOLE-128. 392 - Mohammad Hossein Faghihi Sereshgi, Mohammad Dakhilalian, Mohsen Shakiba:
Biclique cryptanalysis of MIBS-80 and PRESENT-80. 393 - Christian Badertscher, Christian Matt, Ueli Maurer, Phillip Rogaway, Björn Tackmann:
Augmented Secure Channels and the Goal of the TLS 1.3 Record Layer. 394 - Nils Fleischhacker, Johannes Krupp
, Giulio Malavolta, Jonas Schneider, Dominique Schröder, Mark Simkin:
Efficient Unlinkable Sanitizable Signatures from Signatures with Rerandomizable Keys. 395 - Dario Catalano, Dario Fiore, Rosario Gennaro, Luca Nizzardo:
Generalizing Homomorphic MACs for Arithmetic Circuits. 396 - Peter Gazi, Jooyoung Lee, Yannick Seurin, John P. Steinberger, Stefano Tessaro:
Relaxing Full-Codebook Security: A Refined Analysis of Key-Length Extension Schemes. 397 - Abderrahmane Nitaj, Tajjeeddine Rachidi:
Factoring RSA moduli with weak prime factors. 398 - Abderrahmane Nitaj, Tajjeeddine Rachidi:
New attacks on RSA with Moduli N=prq. 399 - Stephen R. Tate, Roopa Vishwanathan:
Expiration and Revocation of Keys for Attribute-based Signatures. 400 - Eike Kiltz, Daniel Masny, Krzysztof Pietrzak:
Simple Chosen-Ciphertext Security from Low-Noise LPN. 401 - Adrian Thillard, Emmanuel Prouff, Thomas Roche:
Success through confidence: Evaluating the effectiveness of a side-channel attack. 402 - Mehrdad Nojoumian, Douglas R. Stinson:
Sequential Secret Sharing as a New Hierarchical Access Structure. 403 - Esha Ghosh, Olga Ohrimenko, Dimitrios Papadopoulos, Roberto Tamassia, Nikos Triandopoulos:
Zero-Knowledge Accumulators and Set Operations. 404 - Dana Dachman-Soled, Nils Fleischhacker, Jonathan Katz, Anna Lysyanskaya, Dominique Schröder:
Feasibility and Infeasibility of Secure Computation with Malicious PUFs. 405 - Yu-Chi Chen, Sherman S. M. Chow, Kai-Min Chung, Russell W. F. Lai, Wei-Kai Lin, Hong-Sheng Zhou:
Computation-Trace Indistinguishability Obfuscation and its Applications. 406 - Christoph Dobraunig, Maria Eichlseder, Florian Mendel:
Higher-order cryptanalysis of LowMC. 407 - Franck Rondepierre:
Revisiting Atomic Patterns for Scalar Multiplications on Elliptic Curves. 408 - Jie Chen, Romain Gay, Hoeteck Wee:
Improved Dual System ABE in Prime-Order Groups via Predicate Encodings. 409 - Zhe Liu, Hwajeong Seo, Sujoy Sinha Roy, Johann Großschädl, Howon Kim, Ingrid Verbauwhede:
Efficient Ring-LWE Encryption on 8-bit AVR Processors. 410 - Pei Luo, Yunsi Fei, Xin Fang, A. Adam Ding, David R. Kaeli, Miriam Leeser:
Side-Channel Analysis of MAC-Keccak Hardware Implementations. 411 - Máté Horváth:
Survey on Cryptographic Obfuscation. 412 - Shashank Agrawal, Melissa Chase:
A study of Pair Encodings: Predicate Encryption in prime order groups. 413 - Mridul Nandi:
On the Optimality of Non-Linear Computations of Length-Preserving Encryption Schemes. 414 - Markku-Juhani O. Saarinen:
STRIBOB / WHIRLBOB Security Analysis Addendum. 415 - Mayank Varia, Sophia Yakoubov, Yang Yang:
HETest: A Homomorphic Encryption Testing Framework. 416 - Mark Bun, Mark Zhandry:
Order-Revealing Encryption and the Hardness of Private Learning. 417 - Itai Dinur, Yunwen Liu, Willi Meier, Qingju Wang:
Optimized Interpolation Attacks on LowMC. 418 - Yasser Shoukry, Paul D. Martin, Paulo Tabuada, Mani B. Srivastava:
Non-invasive Spoofing Attacks for Anti-lock Braking Systems. 419 - Vipul Goyal, Divya Gupta, Abhishek Jain
:
What Information is Leaked under Concurrent Composition? 420 - Zhe Liu, Husen Wang, Johann Großschädl, Zhi Hu, Ingrid Verbauwhede:
VLSI Implementation of Double-Base Scalar Multiplication on a Twisted Edwards Curve with an Efficiently Computable Endomorphism. 421 - Marina Blanton
, Fattaneh Bayatbabolghani:
Efficient Server-Aided Secure Two-Party Function Evaluation with Applications to Genomic Computation. 422 - Santosh Ghosh, Amit Kumar, Amitabh Das, Ingrid Verbauwhede:
On the Implementation of Unified Arithmetic on Binary Huff Curves. 423 - Begül Bilgin
, Andrey Bogdanov, Miroslav Knezevic, Florian Mendel, Qingju Wang:
FIDES: Lightweight Authenticated Cipher with Side-Channel Resistance for Constrained Hardware. 424 - Stefan Heyse, Ingo von Maurich, Tim Güneysu:
Smaller Keys for Code-Based Cryptography: QC-MDPC McEliece Implementations on Embedded Devices. 425 - Alex Biryukov, Ivica Nikolic:
Complementing Feistel Ciphers. 426 - Mudit Bhargava, Ken Mai:
A High Reliability PUF Using Hot Carrier Injection Based Response Reinforcement. 427 - Philipp Jovanovic, Samuel Neves:
Dumb Crypto in Smart Grids: Practical Cryptanalysis of the Open Smart Grid Protocol. 428 - Ivica Nikolic, Lei Wang, Shuang Wu:
Cryptanalysis of Round-Reduced LED. 429 - Alex Biryukov, Daniel Dinu, Dmitry Khovratovich:
Fast and Tradeoff-Resilient Memory-Hard Functions for Cryptocurrencies and Password Hashing. 430 - Shota Yamada, Nuttapong Attrapadung, Goichiro Hanaoka:
Conversions among Several Classes of Predicate Encryption and Their Applications. 431 - (Withdrawn) Non-Repudiable Provable Data Possession in Cloud Storage. 432
- Wentao Zhang, Zhenzhen Bao, Vincent Rijmen, Meicheng Liu:
A New Classification of 4-bit Optimal S-boxes and its Application to PRESENT, RECTANGLE and SPONGENT. 433 - Pascale Charpin, Sihem Mesnager, Sumanta Sarkar:
Dickson Polynomials that are Involutions. 434 - Yusong Du, Baodian Wei, Fangguo Zhang, Huang Zhang:
On the (Fast) Algebraic Immunity of Boolean Power Functions. 435 - Yusong Du, Baodian Wei, Fangguo Zhang, Huang Zhang:
On the Resistance of Prime-variable Rotation Symmetric Boolean Functions against Fast Algebraic Attacks. 436 - Bryan Parno:
A Note on the Unsoundness of vnTinyRAM's SNARK. 437 - Ralf Küsters, Tomasz Truderung, Bernhard Beckert, Daniel Bruns, Michael Kirsten, Martin Mohr:
A Hybrid Approach for Proving Noninterference of Java Programs. 438 - Vipul Goyal, Abhishek Jain
:
On Concurrently Secure Computation in the Multiple Ideal Query Model. 439 - Martín Abadi, Dan Boneh, Ilya Mironov, Ananth Raghunathan, Gil Segev:
Message-Locked Encryption for Lock-Dependent Messages. 440 - Devu Manikantan Shila, Vivek Venugopalan, Cameron D. Patterson:
Enhancing Trust in Reconfigurable Based Hardware Systems with Tags and Monitors. 441 - Zoya Dyka, Thomas Basmer, Christian Wittke, Peter Langendörfer:
Individualizing Electrical Circuits of Cryptographic Devices as a Means to Hinder Tampering Attacks. 442 - Xiaolin Xu, Ulrich Rührmair, Daniel E. Holcomb, Wayne P. Burleson:
Security Evaluation and Enhancement of Bistable Ring PUFs. 443 - Mridul Nandi:
Revisiting Security Claims of XLS and COPA. 444 - Mridul Nandi:
XLS is not a Strong Pseudorandom Permutation. 445 - Ronald Cramer, Ivan Damgård, Marcel Keller:
On the Amortized Complexity of Zero-knowledge Protocols. 446 - Zhenqi Li, Bin Zhang, Junfeng Fan, Ingrid Verbauwhede:
A New Model for Error-Tolerant Side-Channel Cube Attacks. 447 - Yupu Hu, Huiwen Jia:
A Comment on Gu Map-1. 448 - Ruoxin Zhao, Rui Zhang, Yongqiang Li, Baofeng Wu:
On Constructions of a Sort of MDS Block Diffusion Matrices for Block Ciphers and Hash Functions. 449 - Carmit Hazay, Yehuda Lindell, Arpita Patra:
Adaptively Secure Computation with Partial Erasures. 450 - Sihong Su, Xiaohu Tang:
On the Systematic Constructions of Rotation Symmetric Bent Functions with Any Possible Algebraic Degrees. 451 - Nicolas Bruneau, Sylvain Guilley, Annelie Heuser, Olivier Rioul:
Masks will Fall Off - Higher-Order Optimal Distinguishers. 452 - Yupu Hu, Huiwen Jia:
An Optimization of Gu Map-1. 453 - Oscar García Morchon, Ronald Rietman, Sahil Sharma, Ludo Tolhuizen, Jose Luis Torre-Arce:
A comprehensive and lightweight security architecture to secure the IoT throughout the lifecycle of a device based on HIMMO. 454 - Jian Liu, N. Asokan, Benny Pinkas:
Secure Deduplication of Encrypted Data without Additional Independent Servers. 455 - Iraklis Symeonidis, Filipe Beato, Pagona Tsormpatzoudi, Bart Preneel:
Collateral damage of Facebook Apps: an enhanced privacy scoring model. 456 - Mridul Nandi, Tapas Pandit:
Generic Conversions from CPA to CCA secure Functional Encryption. 457 - Sheena Sathyan, Ramaswamy Swarnammal Shaji:
A Hybrid Approach for the Secure Transmission of H.264/AVC Video Streams. 458 - Bing Sun, Xin Hai, Wenyu Zhang, Lei Cheng, Zhichao Yang:
New Observation on Division Property. 459 - Kevin Delmolino, Mitchell Arnett, Ahmed E. Kosba, Andrew Miller, Elaine Shi:
Step by Step Towards Creating a Safe Smart Contract: Lessons and Insights from a Cryptocurrency Lab. 460 - Jung Hee Cheon, Changmin Lee:
Cryptanalysis of the multilinear map on the ideal lattices. 461 - Wei Dai, Yarkin Doröz, Berk Sunar:
Accelerating SWHE based PIRs using GPUs. 462 - (Withdrawn) Multilinear Maps Using Random Matrix. 463
- Florian Tschorsch, Björn Scheuermann:
Bitcoin and Beyond: A Technical Survey on Decentralized Digital Currencies. 464 - Hwajeong Seo, Zhe Liu, Johann Großschädl, Howon Kim:
Efficient Arithmetic on ARM-NEON and Its Application for High-Speed RSA Implementation. 465 - Tanping Zhou, Xiaoyuan Yang, Wei Zhang, Liqiang Wu:
Efficient Fully Homomorphic Encryption with Circularly Secure Key Switching Process. 466 - Marcel Keller:
The Oblivious Machine - or: How to Put the C into MPC. 467 - Dongxi Liu:
Practical Fully Homomorphic Encryption without Noise Reduction. 468 - Andrew Miller, Rob Jansen:
Shadow-Bitcoin: Scalable Simulation via Direct Execution of Multi-threaded Applications. 469 - Vincenzo Iovino, Qiang Tang
, Karol Zebrowski:
On the Power of Public-key Functional Encryption with Function Privacy. 470 - Yansong Gao, Damith Chinthana Ranasinghe, Gefei Li, Said F. Al-Sarawi, Omid Kavehei, Derek Abbott:
A Challenge Obfuscation Method for Thwarting Model Building Attacks on PUFs. 471 - Sai Sheshank Burra, Enrique Larraia, Jesper Buus Nielsen, Peter Sebastian Nordholt, Claudio Orlandi, Emmanuela Orsini, Peter Scholl, Nigel P. Smart:
High Performance Multi-Party Computation for Binary Circuits Based on Oblivious Transfer. 472 - Mehak Khurana, Meena Kumari:
VARIANTS OF DIFFERENTIAL AND LINEAR CRYPTANALYSIS. 473 - Masahiro Yagisawa:
Fully Homomorphic Encryption without bootstrapping. 474 - Eleonora Guerrini, Laurent Imbert, Théo Winterhalter:
Randomizing Scalar Multiplication Using Exact Covering Systems of Congruences. 475 - Bart Mennink:
XPX: Generalized Tweakable Even-Mansour with Improved Security Guarantees. 476 - John Preuß Mattsson:
Authentication Key Recovery in Galois/Counter Mode (GCM). 477 - (Withdrawn) How to Build Time-Lock Encryption. 478
- Martianus Frederic Ezerman, Hyung Tae Lee, San Ling, Khoa Nguyen, Huaxiong Wang:
A Provably Secure Group Signature Scheme from Code-Based Assumptions. 479 - Berry Schoenmakers, Meilof Veeningen, Niels de Vreede:
Trinocchio: Privacy-Friendly Outsourcing by Distributed Verifiable Computation. 480 - Theodosis Mourouzis, Guangyan Song, Nicolas T. Courtois, Michalis Christofi:
Advanced Differential Cryptanalysis of Reduced-Round SIMON64/128 Using Large-Round Statistical Distinguishers. 481 - Jia Liu, Saqib A. Kakvi, Bogdan Warinschi:
Extractable Witness Encryption and Timed-Release Encryption from Bitcoin. 482 - Shi Bai, Adeline Langlois, Tancrède Lepoint, Damien Stehlé, Ron Steinfeld:
Improved security proofs in lattice-based cryptography: using the Rényi divergence rather than the statistical distance. 483 - Jian Guo, Jérémy Jean, Nicky Mouha, Ivica Nikolic:
More Rounds, Less Security? 484 - Elena Andreeva, Guy Barwell, Dan Page, Martijn Stam:
Turning Online Ciphers Off. 485 - Jiangshan Yu, Mark Ryan, Cas Cremers:
How to detect unauthorised usage of a key. 486 - Mihir Bellare, Igors Stepanovs, Stefano Tessaro:
Contention in Cryptoland: Obfuscation, Leakage and UCE. 487 - Carmit Hazay, Muthuramakrishnan Venkitasubramaniam:
On Black-Box Complexity of Universally Composable Security in the CRS model. 488 - Trinabh Gupta, Natacha Crooks, Srinath T. V. Setty, Lorenzo Alvisi, Michael Walfish:
Scalable and private media consumption with Popcorn. 489 - Sonam Devgan Kaul, Amit K. Awasthi:
Cryptanalysis Of Dynamic ID Based Remote User Authentication Scheme With Key Agreement. 490 - Nishanth Chandran, Melissa Chase, Feng-Hao Liu, Ryo Nishimaki, Keita Xagawa:
Re-encryption, functional re-encryption, and multi-hop re-encryption: A framework for achieving obfuscation-based security and instantiations from lattices. 491 - Vincent Grosso, François-Xavier Standaert, Sebastian Faust:
Masking vs. Multiparty Computation: How Large is the Gap for AES? 492 - Sikhar Patranabis, Abhishek Chakraborty, Debdeep Mukhopadhyay:
Fault Tolerant Infective Countermeasure for AES. 493 - (Withdrawn) Cryptanalysis of the LSH and SHA-V Hash Functions. 494
- Sondre Rønjom:
Powers of Subfield Polynomials and Algebraic Attacks on Word-Based Stream Ciphers. 495 - Arthur Gervais, Hubert Ritzdorf, Mario Lucic, Srdjan Capkun:
Quantifying Location Privacy Leakage from Transaction Prices. 496 - Zhangxiang Hu, Payman Mohassel, Mike Rosulek:
Efficient Zero-Knowledge Proofs of Non-Algebraic Statements with Sublinear Amortized Cost. 497 - Jiajun Zhang, Haining Fan:
Low Space Complexity CRT-based Bit-Parallel GF(2n) Polynomial Basis Multipliers for Irreducible Trinomials. 498 - Dennis Hofheinz:
Algebraic partitioning: Fully compact and (almost) tightly secure cryptography. 499 - Alberto Battistello, Christophe Giraud:
Fault Cryptanalysis of CHES 2014 Symmetric Infective Countermeasure. 500 - Serge Fehr, Max Fillinger:
Multi-Prover Commitments Against Non-Signaling Attacks. 501 - George Danezis, Sarah Meiklejohn:
Centrally Banked Cryptocurrencies. 502 - Kristian Gjøsteen, Anders Smedstuen Lund:
The Norwegian Internet Voting Protocol: A new Instantiation. 503 - Brice Minaud, Yannick Seurin:
The Iterated Random Permutation Problem with Applications to Cascade Encryption. 504 - Razvan Barbulescu, Pierrick Gaudry, Thorsten Kleinjung:
The Tower Number Field Sieve. 505 - Gilles Barthe, Sonia Belaïd, François Dupressoir, Pierre-Alain Fouque, Benjamin Grégoire:
Compositional Verification of Higher-Order Masking: Application to a Verifying Masking Compiler. 506 - Itai Dinur, Orr Dunkelman, Thorsten Kranz, Gregor Leander:
Decomposing the ASASA Block Cipher Construction. 507 - Santanu Sarkar, Prakash Dey, Avishek Adhikari, Subhamoy Maitra:
Probabilistic Signature Based Framework for Differential Fault Analysis of Stream Ciphers. 508 - Daniel R. L. Brown:
A flaw in a theorem about Schnorr signatures. 509 - Gideon Samid:
Equivoe-T: Transposition Equivocation Cryptography. 510 - Baris Ege, Thomas Eisenbarth, Lejla Batina:
Near Collision Side Channel Attacks. 511 - Sami Saab, Andrew Leiserson, Michael Tunstall:
Efficient Key Extraction from the Primary Side of a Switched-Mode Power Supply. 512 - Aurore Guillevic:
Computing Individual Discrete Logarithms Faster in GF(pn). 513 - Nir Bitansky, Shafi Goldwasser, Abhishek Jain
, Omer Paneth, Vinod Vaikuntanathan, Brent Waters:
Time-Lock Puzzles from Randomized Encodings. 514 - Thomas Espitau, Pierre-Alain Fouque, Pierre Karpman:
Higher-Order Differential Meet-in-The-Middle Preimage Attacks on SHA-1 and BLAKE. 515 - Brice Minaud, Patrick Derbez
, Pierre-Alain Fouque, Pierre Karpman:
Key-Recovery Attacks on ASASA. 516 - Giuseppe Ateniese, Bernardo Magri, Daniele Venturi:
Subversion-Resilient Signature Schemes. 517 - Ren Zhang:
Broadcasting Intermediate Blocks as a Defense Mechanism Against Selfish-Mine in Bitcoin. 518 - Yongge Wang:
Notes on Two Fully Homomorphic Encryption Schemes Without Bootstrapping. 519 - Suvradip Chakraborty, Srinivasan Raghuraman, C. Pandu Rangan:
Efficient, Pairing-Free, One Round Attribute-Based Authenticated Key Exchange. 520 - Sergey Gorbunov, Silvio Micali:
Democoin: A Publicly Verifiable and Jointly Serviced Cryptocurrency. 521 - Anja Becker, Nicolas Gama, Antoine Joux:
Speeding-up lattice sieving without increasing the memory, using sub-quadratic nearest neighbor search. 522 - Yehuda Lindell, Benny Pinkas, Nigel P. Smart, Avishay Yanai:
Efficient Constant Round Multi-Party Computation Combining BMR and SPDZ. 523 - Yansong Gao:
Secure Key Exchange Protocol based on Virtual Proof of Reality. 524 - David Pointcheval, Olivier Sanders:
Short Randomizable Signatures. 525 - Takanori Isobe, Kyoji Shibutani:
Generic Key Recovery Attack on Feistel Scheme. 526 - Carolyn Whitnall, Elisabeth Oswald:
Robust Profiling for DPA-Style Attacks. 527 - Sunoo Park, Krzysztof Pietrzak, Albert Kwon, Joël Alwen, Georg Fuchsbauer, Peter Gazi:
Spacemint: A Cryptocurrency Based on Proofs of Space. 528 - Colin O'Flynn, Zhizhang Chen:
Power Analysis Attacks against IEEE 802.15.4 Nodes. 529 - Pierre Karpman, Thomas Peyrin, Marc Stevens:
Practical Free-Start Collision Attacks on 76-step SHA-1. 530 - Mohammad Hajiabadi, Bruce M. Kapron:
Reproducible Circularly-Secure Bit Encryption: Applications and Realizations. 531 - Xiaoshuang Ma, Kexin Qiao:
Related-Key Rectangle Attack on Round-reduced Khudra Block Cipher. 533 - Sergey Agievich, Anastasiya Gorodilova, Nikolay Kolomeec, Svetla Nikova, Bart Preneel, Vincent Rijmen, George Shushuev, Natalia N. Tokareva, Valeriya Vitkup:
Problems, solutions and experience of the first international student's Olympiad in cryptography. 534 - Vincent Grosso, François-Xavier Standaert:
ASCA, SASCA and DPA with Enumeration: Which One Beats the Other and When? 535 - François Durvaux, François-Xavier Standaert:
From Improved Leakage Detection to the Detection of Points of Interests in Leakage Traces. 536 - François Durvaux, François-Xavier Standaert:
Towards Easy Leakage Certification. 537 - Sarita Agrawal, Jay Patel, Manik Lal Das:
Pairing Based Mutual Healing in Wireless Sensor Networks. 538 - Benoit Cogliati, Rodolphe Lampe, Yannick Seurin:
Tweaking Even-Mansour Ciphers. 539 - (Withdrawn) PICO: An Ultra lightweight and Low power encryption design for pervasive computing. 540
- Bart Mennink, Reza Reyhanitabar, Damian Vizár:
Security of Full-State Keyed and Duplex Sponge: Applications to Authenticated Encryption. 541 - Sonia Belaïd, Jean-Sébastien Coron, Pierre-Alain Fouque, Benoît Gérard, Jean-Gabriel Kammerer, Emmanuel Prouff:
Improved Side-Channel Analysis of Finite-Field Multiplication. 542 - Moni Naor, Eylon Yogev:
Bloom Filters in Adversarial Environments. 543 - Daniel R. L. Brown:
Alternative cubics' rules with an algebraic appeal. 544 - Qinglong Zhang, Zongbin Liu, Cunqing Ma, Changting Li, Jiwu Jing:
FROPUF: How to Extract More Entropy from Two Ring Oscillators in FPGA-Based PUFs. 545 - Marcel Keller, Emmanuela Orsini, Peter Scholl:
Actively Secure OT Extension with Optimal Overhead. 546 - Xiao Wang, S. Dov Gordon, Allen McIntosh, Jonathan Katz:
Secure Computation of MIPS Machine Code. 547 - Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz:
Message Transmission with Reverse Firewalls - Secure Communication on Corrupted Machines. 548 - Amir Hassani Karbasi, Reza Ebrahimi Atani:
ILTRU: An NTRU-Like Public Key Cryptosystem Over Ideal Lattices. 549 - Charanjit S. Jutla:
Upending Stock Market Structure Using Secure Multi-Party Computation. 550 - Anne Broadbent, Stacey Jeffery:
Quantum homomorphic encryption for circuits of low T-gate complexity. 551 - Paul Kirchner, Pierre-Alain Fouque:
An Improved BKW Algorithm for LWE with Applications to Cryptography and Lattices. 552 - Rafail Ostrovsky, Silas Richelson, Alessandra Scafuro:
Round-Optimal Black-Box Two-Party Computation. 553 - Michel Abdalla, Fabrice Benhamouda, Alain Passelègue:
An Algebraic Framework for Pseudorandom Functions and Applications to Related-Key Security. 554 - Tapas Pandit, Sumit Kumar Pandey, Rana Barua:
Attribute-Based Signcryption : Signer Privacy, Strong Unforgeability and IND-CCA2 Security in Adaptive-Predicates Attack. 555 - Sujoy Sinha Roy, Kimmo Järvinen, Ingrid Verbauwhede:
Lightweight Coprocessor for Koblitz Curves: 283-bit ECC Including Scalar Conversion with only 4300 Gates. 556 - Takanori Isobe, Kyoji Shibutani:
Improved All-Subkeys Recovery Attacks on FOX, KATAN and SHACAL-2 Block Ciphers. 557 - Oksana Kulyk, Stephan Neumann, Jurlind Budurushi, Melanie Volkamer, Rolf Haenni, Reto E. Koenig, Philémon von Bergen:
Efficiency Evaluation of Cryptographic Protocols for Boardroom Voting. 558 - Ran Canetti, Vipul Goyal, Abhishek Jain
:
Concurrent Secure Computation with Optimal Query Complexity. 559 - Olivier Blazy, Céline Chevalier:
Generic Construction of UC-Secure Oblivious Transfer. 560 - Jake Longo, Elke De Mulder, Daniel Page, Michael Tunstall:
SoC it to EM: electromagnetic side-channel attacks on a complex system-on-chip. 561 - Iraklis Leontiadis, Kaoutar Elkhiyaoui, Melek Önen, Refik Molva:
PUDA - Privacy and Unforgeability for Data Aggregation. 562 - Muhammad Naveed, Erman Ayday, Ellen Wright Clayton, Jacques Fellay, Carl A. Gunter, Jean-Pierre Hubaux, Bradley A. Malin, XiaoFeng Wang:
Privacy in the Genomic Era. 563 - Victor Costan, Ilia A. Lebedev, Srinivas Devadas:
Sanctum: Minimal RISC Extensions for Isolated Execution. 564 - Craig Costello, Patrick Longa:
FourQ: four-dimensional decompositions on a Q-curve over the Mersenne prime. 565 - Nuttapong Attrapadung, Goichiro Hanaoka, Shota Yamada:
A Framework for Identity-Based Encryption with Almost Tight Security. 566 - Henri Gilbert, Jérôme Plût, Joana Treger:
Key-Recovery Attack on the ASASA Cryptosystem with Expanding S-boxes. 567 - Bingke Ma, Bao Li, Ronglin Hao, Xiaoqian Li:
Cryptanalysis of Reduced-Round Whirlwind (Full Version). 568 - Bingke Ma, Bao Li, Ronglin Hao, Xiaoqian Li:
Improved (Pseudo) Preimage Attacks on Reduced-Round GOST and Grøstl-256 and Studies on Several Truncation Patterns for AES-like Compression Functions (Full Version). 569 - Tarik Moataz, Travis Mayberry, Erik-Oliver Blass:
Constant Communication Oblivious RAM. 570 - Tobias Schneider, Amir Moradi, Tim Güneysu:
Robust and One-Pass Parallel Computation of Correlation-Based Attacks at Arbitrary Order. 571 - Eli Ben-Sasson, Iddo Bentov, Ivan Damgård, Yuval Ishai, Noga Ron-Zewi:
On Public Key Encryption from Noisy Codewords. 572 - Ming-Deh A. Huang, Michiel Kosters, Sze Ling Yeo:
Last fall degree, HFE, and Weil descent attacks on ECDLP. 573 - Aggelos Kiayias, Hong-Sheng Zhou, Vassilis Zikas:
Fair and Robust Multi-Party Computation using a Global Transaction Ledger. 574 - Céline Blondeau, Thomas Peyrin, Lei Wang:
Known-key Distinguisher on Full PRESENT. 575 - Michael Scott, Brian Spector:
The Carnac protocol - or how to read the contents of a sealed envelope. 576 - Manfred Lochter, Andreas Wiemers:
Twist Insecurity. 577 - Arthur Gervais, Hubert Ritzdorf, Ghassan O. Karame, Srdjan Capkun:
Tampering with the Delivery of Blocks and Transactions in Bitcoin. 578 - Mridul Nandi:
A Simple Proof of a Distinguishing Bound of Iterated Uniform Random Permutation. 579 - Jan Camenisch, Maria Dubovitskaya, Kristiyan Haralambiev, Markulf Kohlweiss:
Composable & Modular Anonymous Credentials: Definitions and Practical Constructions. 580 - Christina Brzuska, Arno Mittelbach:
Universal Computational Extractors and the Superfluous Padding Assumption for Indistinguishability Obfuscation. 581 - Robert Lychev, Samuel Jero, Alexandra Boldyreva, Cristina Nita-Rotaru:
How Secure and Quick is QUIC? Provable Security and Performance Analyses. 582 - Roel Maes, Vincent van der Leest, Erik van der Sluis, Frans M. J. Willems:
Secure Key Generation from Biased PUFs. 583 - Denise Demirel, Jean Lancrenon:
How to Securely Prolong the Computational Bindingness of Pedersen Commitments. 584 - Ray Beaulieu, Douglas Shors, Jason Smith, Stefan Treatman-Clark, Bryan Weeks, Louis Wingers:
SIMON and SPECK: Block Ciphers for the Internet of Things. 585 - (Withdrawn) SCLPV: Secure Certificateless Public Verification for Cloud Storage in Cyber-physical-social System. 586
- Trupil Limbasiya, Nishant Doshi:
AN ENHANCED BIOMETRIC BASED REMOTE USER AUTHENTICATION SCHEME USING SMART CARD. 587 - Bimal Mandal, Pantelimon Stanica, Sugata Gangopadhyay, Enes Pasalic:
An analysis of the C class of bent functions. 588 - Anastasia-Maria Leventi-Peetz, J.-V. Peetz:
Generating S-Box Multivariate Quadratic Equation Systems And Estimating Algebraic Attack Resistance Aided By SageMath. 589 - Avik Chakraborti, Anupam Chattopadhyay, Muhammad Hassan, Mridul Nandi:
TriviA: A Fast and Secure Authenticated Encryption Scheme. 590 - Maciej Skorski
:
How much randomness can be extracted from memoryless Shannon entropy sources? 591 - Milivoj Simeonovski, Fabian Bendun, Muhammad Rizwan Asghar, Michael Backes, Ninja Marnau, Peter Druschel:
Oblivion: Mitigating Privacy Leaks by Controlling the Discoverability of Online Information. 592 - Patrick Haddad, Viktor Fischer, Florent Bernard, Jean Nicolai:
A Physical Approach for Stochastic Modeling of TERO-based TRNG. 593 - Debrup Chakraborty, Cuauhtemoc Mancillas-López, Palash Sarkar:
Disk Encryption: Do We Need to Preserve Length? 594 - (Withdrawn) Differential Fault Intensity Analysis. 595
- Jean-Sébastien Coron, Craig Gentry, Shai Halevi, Tancrède Lepoint, Hemanta K. Maji, Eric Miles, Mariana Raykova, Amit Sahai, Mehdi Tibouchi:
Zeroizing Without Low-Level Zeroes: New MMAP Attacks and Their Limitations. 596 - Amir Moradi, Alexander Wild:
Assessment of Hiding the Higher-Order Leakages in Hardware - what are the achievements versus overheads? 597 - Martin Pettai, Peeter Laud:
Combining Differential Privacy and Secure Multiparty Computation. 598 - Krzysztof Pietrzak, Maciej Skorski
:
The Chain Rule for HILL Pseudoentropy, Revisited. 599 - John Kelsey, Kerry A. McKay, Meltem Sönmez Turan:
Predictive Models for Min-Entropy Estimation. 600 - Mei Wang, Zheng Yuan, Xiao Feng:
A Secure Oblivious Transfer Protocol from Indistinguishing Obfuscation. 601 - Abhishek Chakraborty, Bodhisatwa Mazumdar, Debdeep Mukhopadhyay:
Combined Side-Channel and Fault Analysis Attack on Protected Grain Family of Stream Ciphers. 602 - Claude Carlet, Sylvain Guilley:
Complementary Dual Codes for Counter-measures to Side-Channel Attacks. 603 - Eike Kiltz, Jiaxin Pan, Hoeteck Wee:
Structure-Preserving Signatures from Standard Assumptions, Revisited. 604 - Steven D. Galbraith, Ping Wang, Fangguo Zhang:
Computing Elliptic Curve Discrete Logarithms with Improved Baby-step Giant-step Algorithm. 605 - Kyu Young Choi, Jihoon Cho, Jung Yeon Hwang, Taekyoung Kwon:
Constructing Efficient PAKE Protocols from Identity-Based KEM/DEM. 606 - Hitesh Tewari, Eamonn O. Nuallain:
Netcoin - A Traceable P2P Electronic Cash System. 607 - Benoît Libert, Damien Stehlé:
Fully Secure Functional Encryption for Inner Products, from Standard Assumptions. 608 - Igor A. Semaev:
Experimental Study of DIGIPASS GO3 and the Security of Authentication. 609 - Daniel J. Bernstein, Tung Chou, Peter Schwabe:
McBits: fast constant-time code-based cryptography. 610 - (Withdrawn) A Unified Security Analysis of Two-phase Key Exchange Protocols in TPM 2.0. 611
- Gangqiang Yang, Bo Zhu, Valentin Suder, Mark D. Aagaard, Guang Gong:
The Simeck Family of Lightweight Block Ciphers. 612 - Jianting Ning, Xiaolei Dong, Zhenfu Cao, Lifei Wei:
Accountable Authority Ciphertext-Policy Attribute-Based Encryption with White-Box Traceability and Public Auditing in the Cloud. 613 - Fangguo Zhang:
Bit Security of the Hyperelliptic Curves Diffie-Hellman Problem. 614 - Nasour Bagheri, Masoumeh Safkhani, Hoda Jannati:
Security Analysis of Niu et al. Authentication and Ownership Management Protocol. 615 - Lukasz Olejnik, Gunes Acar, Claude Castelluccia, Claudia Díaz:
The leaking battery: A privacy analysis of the HTML5 Battery Status API. 616 - Boris Skoric, Wouter de Groot:
Generalised tally-based decoders for traitor tracing and group testing. 617 - Juan Carlos Ku-Cauich, Guillermo Morales-Luna, Horacio Tapia-Recillas:
An Authentication Code over Galois Rings with Optimal Impersonation and Substitution Probabilities. 618 - Seher Tutdere, Osmanbey Uzunkol:
Construction of Arithmetic Secret Sharing Schemes by Using Torsion Limits. 619 - Susumu Kiyoshima:
Statistical Concurrent Non-malleable Zero-knowledge from One-way Functions. 620 - Sarani Bhattacharya, Debdeep Mukhopadhyay:
Who watches the watchmen? : Utilizing Performance Monitors for Compromising keys of RSA on Intel Platforms. 621 - Nicolas Méloni, M. Anwar Hasan:
Random Digit Representation of Integers. 622 - (Withdrawn) Design, Evaluation and Optimization of Physical Unclonable Functions based on Transient Effect Ring Oscillators. 623
- Viet Tung Hoang, Jonathan Katz, Alex J. Malozemoff:
Automated Analysis and Synthesis of Authenticated Encryption Schemes. 624 - Mike Hamburg:
Ed448-Goldilocks, a new elliptic curve. 625 - Georg Fuchsbauer, Christian Hanser, Daniel Slamanig:
Practical Round-Optimal Blind Signatures in the Standard Model. 626 - Justin Holmgren
:
On Necessary Padding with IO. 627 - Daniel Cabarcas, Denise Demirel, Florian Göpfert, Jean Lancrenon, Thomas Wunderer:
An Unconditionally Hiding and Long-Term Binding Post-Quantum Commitment Scheme. 628 - Véronique Cortier, Georg Fuchsbauer, David Galindo:
BeleniosRF: A Strongly Receipt-Free Electronic Voting Scheme. 629 - Ivan Damgård, Jesper Buus Nielsen:
Unconditionally Secure Computation with Reduced Interaction. 630 - Thomas Pöppelmann, Michael Naehrig, Andrew Putnam, Adrián Macías:
Accelerating Homomorphic Evaluation on Reconfigurable Hardware. 631 - Mohammad Mahmoody, Ameer Mohammed, Soheil Nematihaji:
More on Impossibility of Virtual Black-Box Obfuscation in Idealized Models. 632 - Mehmet Sabir Kiraz, Isa Sertkaya, Osmanbey Uzunkol:
An Efficient ID-Based Message Recoverable Privacy-Preserving Auditing Scheme. 633 - Benny Pinkas, Thomas Schneider, Gil Segev, Michael Zohner:
Phasing: Private Set Intersection using Permutation-based Hashing. 634 - Chris Pavlovski, Colin Boyd:
Microcash: Efficient Off-Line Small Payments. 635 - Matthias Krause:
Analyzing Constructions for key-alternating Pseudorandom Functions with Applications to Stream Cipher Operation Modes. 636 - Fenghua Li, Yanchao Wang, Rongna Xie, Jinbo Xiong, Fangfang Shan:
A Novel Cyberspace-Oriented Access Control Model. 637 - Marco Indaco, Fabio Lauri, Andrea Miele, Pascal Trotta:
An Efficient Many-Core Architecture for Elliptic Curve Cryptography Security Assessment. 638 - (Withdrawn) Polynomial time reduction from approximate shortest vector problem to the principle ideal porblem for lattices in cyclotomic rings. 639
- Luís T. A. N. Brandão:
Very-efficient simulatable flipping of many coins into a well. 640 - Jing Li, Licheng Wang:
Noise-free Symmetric Fully Homomorphic Encryption based on noncommutative rings. 641 - Muhammed F. Esgin, Mehmet S. Kiraz, Osmanbey Uzunkol:
A New Partial Key Exposure Attack on Multi-power RSA. 642 - Jonathan Bootle, Andrea Cerulli, Pyrros Chaidos, Essam Ghadafi, Jens Groth, Christophe Petit:
Short Accountable Ring Signatures Based on DDH. 643 - Adam Everspaugh, Rahul Chatterjee, Samuel Scott, Ari Juels, Thomas Ristenpart:
The Pythia PRF Service. 644 - (Withdrawn) Improvements on Efficient Dynamic Provable Data Possession scheme with Public Verifiability and Data Privacy. 645
- Alex Biryukov, Dmitry Khovratovich:
Decomposition attack on SASASASAS. 646 - Andrea Miele, Arjen K. Lenstra:
Efficient ephemeral elliptic curve cryptographic keys. 647 - David Bernhard, Marc Fischlin, Bogdan Warinschi:
Adaptive Proofs of Knowledge in the Random Oracle Model. 648 - David Bernhard, Marc Fischlin, Bogdan Warinschi:
On the Hardness of Proving CCA-security of Signed ElGamal. 649 - Roman Oliynykov, Ivan Gorbenko, Oleksandr Kazymyrov, Victor Ruzhentsev, Oleksandr Kuznetsov, Yurii Gorbenko, Oleksandr Dyrda, Viktor Dolgov, Andrii Pushkaryov, Ruslan Mordvinov, Dmytro Kaidalov:
A New Encryption Standard of Ukraine: The Kalyna Block Cipher. 650 - Stephan Kleber, Florian Unterstein, Matthias Matousek, Frank Kargl, Frank Slomka, Matthias Hiller:
Secure Execution Architecture based on PUF-driven Instruction Level Code Encryption. 651 - Benjamin Dowling, Douglas Stebila:
Modelling ciphersuite and version negotiation in the TLS protocol. 652 - (Withdrawn) Homomorphic Signature Schemes - A survey. 653
- Bo Yang, Kang Yang, Yu Qin, Zhenfeng Zhang, Dengguo Feng:
DAA-TZ: An Efficient DAA Scheme for Mobile Devices using ARM TrustZone. 654 - Nizamud Din, Arif Iqbal Umar, Abdul Waheed, Noor Ul Amin:
An Efficient Multi-Message Multi-Receiver Signcryption Scheme with Forward Secrecy on Elliptic Curves. 655 - Ruhul Amin, G. P. Biswas:
Cryptanalysis of a Markov Chain Based User Authentication Scheme. 656 - Duc-Phong Le, Chik How Tan, Michael Tunstall:
Randomizing the Montgomery Powering Ladder. 657 - Pieter Maene, Ingrid Verbauwhede:
Single-Cycle Implementations of Block Ciphers. 658 - Jean-Pierre Flori, Jérôme Plût, Jean-René Reinhard, Martin Ekerå:
Diversity and Transparency for ECC. 659 - (Withdrawn) A Hybrid Gaussian Sampler for Lattices over Rings. 660
- Shane Kepley, David Russo, Rainer Steinwandt:
Cryptanalysis of a modern rotor machine in a multicast setting. 661 - Ryutaroh Matsumoto:
Strong Security of the Strongly Multiplicative Ramp Secret Sharing based on Algebraic Curves. 662 - Nahid Farhady Ghalaty, Bilgiday Yuce, Patrick Schaumont
:
Analyzing the Efficiency of Biased-Fault Based Attacks. 663 - Mahnush Movahedi, Jared Saia, Mahdi Zamani:
Secure Multi-Party Shuffling. 664 - Romain Gay, Iordanis Kerenidis, Hoeteck Wee:
Communication Complexity of Conditional Disclosure of Secrets and Attribute-Based Encryption. 665 - Huaifeng Chen, Xiaoyun Wang:
Improved Linear Hull Attack on Round-Reduced Simon with Dynamic Key-guessing Techniques. 666 - Ming Li, Dongdai Lin:
De Bruijn Sequences from Nonlinear Feedback Shift Registers. 667 - Ekawat Homsirikamol, William Diehl, Ahmed Ferozpuri, Farnoud Farahmand, Malik Umar Sharif, Kris Gaj:
GMU Hardware API for Authenticated Ciphers. 669 - Bruno Robisson, Michel Agoyan, Patrick Soquet, Sébastien Le Henaff, Franck Wajsbürt, Pirouz Bazargan-Sabet, Guillaume Phan:
Smart Security Management in Secure Devices. 670 - Peeter Laud, Alisa Pankova:
Privacy-preserving Frequent Itemset Mining for Sparse and Dense Data. 671 - Allison Bishop, Abhishek Jain
, Lucas Kowalczyk:
Function-Hiding Inner Product Encryption. 672 - Mike Hamburg:
Decaf: Eliminating cofactors through point compression. 673 - Peeter Laud, Alisa Pankova:
Preprocessing-Based Verification of Multiparty Protocols with Honest Majority. 674 - Ahmed E. Kosba, Andrew Miller, Elaine Shi, Zikai Wen, Charalampos Papamanthou:
Hawk: The Blockchain Model of Cryptography and Privacy-Preserving Smart Contracts. 675 - Scott R. Fluhrer:
Quantum Cryptanalysis of NTRU. 676 - Daniel J. Bernstein, Simon Josefsson, Tanja Lange, Peter Schwabe, Bo-Yin Yang:
EdDSA for more curves. 677 - Thomas Pornin:
Optimizing MAKWA on GPU and CPU. 678 - Subhabrata Samajder, Palash Sarkar:
Another Look at Normal Approximations in Cryptanalysis. 679 - Yevgeniy Dodis, Tianren Liu, Martijn Stam, John P. Steinberger:
Indifferentiability of Confusion-Diffusion Networks. 680 - Susan Hohenberger, Steven A. Myers, Rafael Pass, Abhi Shelat:
ANONIZE: A Large-Scale Anonymous Survey System. 681 - Yosuke Todo:
Integral Cryptanalysis on Full MISTY1. 682 - Irene Giacomelli, Ruxandra F. Olimid, Samuel Ranellucci:
Security of Linear Secret-Sharing Schemes against Mass Surveillance. 683 - Aggelos Kiayias, Yona Raekow, Alexander Russell, Narasimha K. Shashidhar:
A One-time Stegosystem and Applications to Efficient Covert Communication. 684 - Robert Granger, Thorsten Kleinjung, Jens Zumbrägel:
On the discrete logarithm problem in finite fields of fixed characteristic. 685 - Azeem Irshad, Muhammad Sher, Shahzad Ashraf, Ch. Muhammad Shahzad Faisal, Mahmood Ul Hassan:
Cryptanalysis for Secure and Efficient Smart-Card-Based Remote User Authentication Scheme for Multi-server Environment. 686 - Sean Hallgren, Adam D. Smith, Fang Song:
Classical Cryptographic Protocols in a Quantum World. 687 - Hwajeong Seo, Zhe Liu, Yasuyuki Nogami, Jongseok Choi, Howon Kim:
Binary Field Multiplication on ARMv8. 688 - Daniel P. Martin, Jonathan F. O'Connell, Elisabeth Oswald, Martijn Stam:
How to Enumerate Your Keys Accurately and Efficiently After a Side Channel Attack. 689 - Gorka Irazoqui Apecechea, Thomas Eisenbarth, Berk Sunar:
Systematic Reverse Engineering of Cache Slice Selection in Intel Processors. 690 - Cong Chen, Mehmet Sinan Inci, Mostafa Taha, Thomas Eisenbarth:
SpecTre: A Tiny Side-Channel Resistant Speck Core for FPGAs. 691 - Yoshinori Aono, Takuya Hayashi, Le Trieu Phong, Lihua Wang:
Fast and Secure Linear Regression and Biometric Authentication with Security Update. 692 - Jesper Buus Nielsen, Samuel Ranellucci:
Foundations of Reactive Garbling Schemes. 693 - Tore Kasper Frederiksen, Thomas P. Jakobsen, Jesper Buus Nielsen, Roberto Trifiletti:
On the Complexity of Additively Homomorphic UC Commitments. 694 - Alexander Russell, Qiang Tang, Moti Yung, Hong-Sheng Zhou:
Cliptography: Clipping the Power of Kleptographic Attacks. 695 - Miguel Morales-Sandoval, Arturo Diaz-Perez:
Novel algorithms and hardware architectures for Montgomery Multiplication over GF(p). 696 - Yandong Zheng, Hua Guo:
On the Security of a Self-healing Group Key Distribution Scheme. 697 - Subhamoy Maitra:
Chosen IV Cryptanalysis on Reduced Round ChaCha and Salsa. 698 - Ayantika Chatterjee, Indranil Sengupta:
FURISC: FHE Encrypted URISC Design. 699 - Jimmy Jose, Dipanwita Roy Chowdhury:
Four Neighbourhood Cellular Automata as Better Cryptographic Primitives. 700 - Sébastien Canard, Baptiste Olivier:
Differential Privacy in distribution and instance-based noise mechanisms. 701 - Loi Luu, Jason Teutsch, Raghav Kulkarni, Prateek Saxena:
Demystifying incentives in the consensus computer. 702 - Mihir Bellare, Igors Stepanovs:
Point-Function Obfuscation: A Framework and Generic Constructions. 703 - Nir Bitansky, Vinod Vaikuntanathan:
Indistinguishability Obfuscation: from Approximate to Exact. 704 - Ashish Choudhury, Emmanuela Orsini, Arpita Patra, Nigel P. Smart:
Linear Overhead Robust MPC with Honest Majority Using Preprocessing. 705 - Stefan Kölbl, Arnab Roy:
A Brief Comparison of Simon and Simeck. 706 - Siamak Fayyaz Shahandashti, Reihaneh Safavi-Naini, Nashad Ahmed Safa:
Reconciling User Privacy and Implicit Authentication for Mobile Devices. 707 - Jeffrey Hoffstein, Jill Pipher, John M. Schanck, Joseph H. Silverman, William Whyte, Zhenfei Zhang:
Choosing Parameters for NTRUEncrypt. 708 - Luka Malisa, Kari Kostiainen, Srdjan Capkun:
Detecting Mobile Application Spoofing Attacks by Leveraging User Visual Similarity Perception. 709 - Bernardo Ferreira, João Rodrigues, João Leitão, Henrique João L. Domingos:
Privacy-Preserving Content-Based Image Retrieval in the Cloud (Extended Version). 710 - Anne Canteaut, Sébastien Duval, Gaëtan Leurent:
Construction of Lightweight S-Boxes using Feistel and MISTY structures (Full Version). 711 - David Bernhard, Bogdan Warinschi:
On Limitations of the Fiat - Shamir Transformation. 712 - (Withdrawn) Light-hHB: A New Version of hHB with Improved Session Key Exchange. 713
- Masao Kasahara:
New classes of public key cryptosystem K(XVI)SE(1)PKC constructed based on Reed-Solomon code over extension field of m=8 and K(XVI)SE(2)PKC, based on binary cyclic code. 714 - Allison Bishop, Susan Hohenberger, Brent Waters:
New Circular Security Counterexamples from Decision Linear and Learning with Errors. 715