Page | Title |
---|

1 | Comments on: EIBAS - an efficient identity broadcast authentication scheme in wireless sensor networks |

2 | Pseudorandom Generator Based on Hard Lattice Problem |

3 | $GF(2^n)$ Bit-Parallel Squarer Using Generalized Polynomial Basis For a New Class of Irreducible Pentanomials |

4 | MaxMinMax problem and sparse equations over finite fields |

6 | Efficient Non-Interactive Zero Knowledge Arguments for Set Operations |

7 | One Weird Trick to Stop Selfish Miners: Fresh Bitcoins, A Solution for the Honest Miner |

8 | A Theoretical Study of Kolmogorov-Smirnov Distinguishers: Side-Channel Analysis vs. Differential Cryptanalysis |

9 | Characterization of EME with Linear Mixing |

10 | A Certificate-Based Proxy Signature with Message Recovery without Bilinear Pairing |

11 | Construction of New Families of MDS Diffusion Layers |

12 | Maximal Information Coefficient Analysis |

13 | A Novel Modular Adder for One Thousand Bits and More Using Fast Carry Chains of Modern FPGAs |

14 | Linkable Message Tagging: Solving the key distribution problem of signature schemes |

15 | Tight Security Bounds for Triple Encryption |

16 | Triple and Quadruple Encryption: Bridging the Gaps |

17 | Two-round password-only authenticated key exchange in the three-party setting |

18 | Completeness for Symmetric Two-Party Functionalities - Revisited |

19 | Lazy Modulus Switching for the BKW Algorithm on LWE |

20 | (De-)Constructing TLS |

21 | Online/Offline Attribute-Based Encryption |

22 | Ultra-lightweight 8-bit Multiplicative Inverse Based S-box Using LFSR |

23 | Solving Random Subset Sum Problem by l_{p}-norm SVP Oracle |

24 | An Efficient Pseudo-Random Generator with Applications to Public-Key Encryption and Constant-Round Multiparty Computation |

25 | Side-Channel Leakage through Static Power - Should We Care about in Practice? - |

26 | Studying Potential Side Channel Leakages on an Embedded Biometric Comparison System |

27 | Twisting Edwards curves with isogenies |

28 | Channel Equalization for Side Channel Attacks |

29 | General Impossibility of Group Homomorphic Encryption in the Quantum World |

30 | Lyra: Password-Based Key Derivation with Tunable Memory and Processing Costs |

31 | On the Design of LIL Tests for (Pseudo) Random Generators and Some Experimental Results |

32 | Scale-Invariant Fully Homomorphic Encryption over the Integers |

33 | Lattice-based Group Signature Scheme with Verifier-local Revocation |

34 | Authenticated Encryption with SPECK |

35 | A new attack on RSA with a composed decryption exponent |

36 | A Secure Text Messaging Protocol |

37 | On the Security of the Pre-Shared Key Ciphersuites of TLS |

38 | Extending and Applying a Framework for the Cryptographic Verification of Java Programs |

39 | Homomorphic AES Evaluation using NTRU |

40 | A Fast Modular Reduction Method |

41 | Practical polynomial time solutions of several major problems in noncommutative-algebraic cryptography |

42 | A New Algorithm for Solving the Approximate Common Divisor Problem and Cryptanalysis of the FHE based on GACD |

43 | Elligator Squared: Uniform Points on Elliptic Curves of Prime Order as Uniform Random Strings |

44 | rPIR: Ramp Secret Sharing based Communication Efficient Private Information Retrieval |

45 | Human Assisted Randomness Generation Using Video Games |

46 | Crypto-analyses on "user efficient recoverable off-line e-cashs scheme with fast anonymity revoking" |

47 | Down the Rabbit Hole: Revisiting the Shrinking Method |

48 | When a Boolean Function can be Expressed as the Sum of two Bent Functions |

49 | Data Security in Cloud Architecture Based on Diffie Hellman and Elliptical Curve Cryptography |

50 | Some Theoretical Conditions for Menezes-Qu-Vanstone Key Agreement to Provide Implicit Key Authentication |

51 | An Equivalence-Preserving Transformation of Shift Registers |

52 | DAA-related APIs in TPM2.0 Revisited |

53 | Masking and Leakage-Resilient Primitives: One, the Other(s) or Both? |

54 | The Fourier Entropy-Influence conjecture holds for a log-density 1 class of cryptographic Boolean functions |

55 | Security Enhanced Anonymous Multi-Server Authenticated Key Agreement Scheme using Smart Card and Biometrics |

56 | Low Probability Differentials and the Cryptanalysis of Full-Round CLEFIA-128 |

57 | Computing Discrete Logarithms in F_{3^{6*137}} using Magma |

58 | Cryptanalysis of FIDES |

59 | Cuckoo Cycle: a memory-hard proof-of-work system |

60 | Verifiable Computation in Multiparty Protocols with Honest Majority |

61 | Bounded-Collusion Identity-Based Encryption from Semantically-Secure Public-Key Encryption: Generic Constructions with Short Ciphertexts |

62 | A Comparison of the Homomorphic Encryption Schemes FV and YASHE |

63 | Cryptanalysis on "Secure untraceable off-line electronic cash system" |

64 | A Polynomial Time Attack against Algebraic Geometry Code Based Public Key Cryptosystems |

65 | Fine Tuning the Function Field Sieve Algorithm for the Medium Prime Case |

66 | A Subexponential Construction of Graph Coloring for Multiparty Computation |

67 | Efficient and Strongly Secure Dynamic Domain-Specific Pseudonymous Signatures for ID Documents |

68 | Some security bounds for the DGHV scheme |

69 | One-Pass Authenticated Key Establishment Protocol on Bilinear Pairings for Wireless Sensor Networks |

70 | Lattice Cryptography for the Internet |

71 | Implementing Pairing-Based Cryptosystems in USB Tokens |

72 | Efficient Privacy-Preserving Big Data Processing through Proxy-Assisted ORAM |

73 | Anonymous Authentication with Shared Secrets |

74 | New and Improved Key-Homomorphic Pseudorandom Functions |

75 | Publicly Auditable Secure Multi-Party Computation |

76 | Certified Bitcoins |

77 | Mixcoin: Anonymity for Bitcoin with accountable mixes |

78 | Implementation and Comparison of Lattice-based Identification Protocols on Smart Cards and Microcontrollers |

79 | Unifying Leakage Models: from Probing Attacks to Noisy Leakage |

80 | A Full Characterization of Completeness for Two-party Randomized Function Evaluation |

81 | Efficient Round Optimal Blind Signatures |

82 | Garbled RAM Revisited, Part I |

83 | Garbled RAM Revisited, Part II |

84 | RECTANGLE: A Bit-slice Ultra-Lightweight Block Cipher Suitable for Multiple Platforms |

85 | Multipermutations in Crypto World: Different Faces of the Perfect Diffusion Layer |

86 | Randomized and Efficient Authentication in Mobile Environments |

87 | AnoA: A Framework For Analyzing Anonymous Communication Protocols |

88 | A Bound For Multiparty Secret Key Agreement And Implications For A Problem Of Secure Computing |

89 | Multiple Di fferential Cryptanalysis of Round-Reduced PRINCE (Full version) |

90 | Cryptanalysis of KLEIN (Full version) |

91 | On Cryptographic Applications of Matrices Acting on Finite Commutative Groups and Rings |

92 | A new class of system oriented PKC, K(I)SOPKC |

93 | The Related-Key Analysis of Feistel Constructions |

94 | Faster Bootstrapping with Polynomial Error |

95 | Unified, Minimal and Selectively Randomizable Structure-Preserving Signatures |

96 | Tight security bounds for multiple encryption |

97 | A Simple Framework for Noise-Free Construction of Fully Homomorphic Encryption from a Special Class of Non-Commutative Groups |

98 | Towards Characterizing Complete Fairness in Secure Two-Party Computation |

99 | Indistinguishability Obfuscation and UCEs: The Case of Computationally Unpredictable Sources |

100 | Improved Slender-set Linear Cryptanalysis |

101 | Dishonest Majority Multi-Party Computation for Binary Circuits |

102 | Actively Secure Private Function Evaluation |

103 | SHipher: Families of Block Ciphers based on SubSet-Sum Problem |

104 | Space-efficient, byte-wise incremental and perfectly private encryption schemes |

105 | Reducing the Overhead of Cloud MPC |

106 | Algorithms in HElib |

107 | Key-Indistinguishable Message Authentication Codes |

108 | MJH: A Faster Alternative to MDC-2 |

109 | Diffusion Programmable Device : The device to prevent reverse engineering |

110 | Halka: A Lightweight, Software Friendly Block Cipher Using Ultra-lightweight 8-bit S-box |

111 | A Note on the CLRW2 Tweakable Block Cipher Construction |

112 | Polynomial Time Attack on Wild McEliece Over Quadratic Extensions |

113 | Secure Compression: Theory \& Practice |

114 | Prover Anonymous and Deniable Distance-Bounding Authentication |

115 | Comments on a novel user authentication and key agreement scheme |

116 | Optimal Algebraic Manipulation Detection Codes |

117 | An Applicable Public-Key-Cryptosystem Based on NP-Complete Problems |

118 | Quantum position verification in the random oracle model |

119 | Breaking `128-bit Secure' Supersingular Binary Curves (or how to solve discrete logarithms in $\F_{2^{4 \cdot 1223}}$ and $\F_{2^{12 \cdot 367}}$) |

120 | Automated Proof for Authorization Protocols of TPM 2.0 in Computational Model (full version) |

121 | Oblivious Radix Sort: An Efficient Sorting Algorithm for Practical Secure Multi-party Computation |

122 | New Way to Construct Cryptographic Hash Function |

123 | FORSAKES: A Forward-Secure Authenticated Key Exchange Protocol Based on Symmetric Key-Evolving Schemes |

124 | Optimal Non-Perfect Uniform Secret Sharing Schemes |

125 | Removing Erasures with Explainable Hash Proof Systems |

126 | Public-Key Encryption Resilient Against Linear Related-Key Attacks Revisited |

127 | Algebraic Properties of Modular Addition Modulo a Power of Two |

128 | Efficient Three-Party Computation from Cut-and-Choose |

129 | How to Use Bitcoin to Design Fair Protocols |

130 | Selecting Elliptic Curves for Cryptography: An Efficiency and Security Analysis |

131 | Modelling After-the-fact Leakage for Key Exchange |

132 | Efficient Revocable Identity-Based Encryption via Subset Difference Methods |

133 | Efficient Secure and Verifiable Outsourcing of Matrix Multiplications |

134 | Kummer strikes back: new DH speed records |

135 | Anonymous Two-Factor Authentication: Certain Goals Are Beyond Attainment |

136 | Isolated Execution on Many-core Architectures |

137 | Efficient, Oblivious Data Structures for MPC |

138 | Short Signatures from Diffie-Hellman, Revisited: Sublinear Public Key, CMA Security, and Tighter Reduction |

139 | On the Phase Space of Block-Hiding Strategies |

140 | Recovering OpenSSL ECDSA Nonces Using the FLUSH+RELOAD Cache Side-channel Attack |

141 | Unrestricted Identity-Based Aggregate Signcryption in the Standard Model from Multilinear Maps |

142 | FPGA-Based High Performance AES-GCM Using Efficient Karatsuba Ofman Algorithm |

143 | Statistical Concurrent Non-Malleable Zero Knowledge |

144 | How to Securely Release Unverified Plaintext in Authenticated Encryption |

145 | Calculating Cryptographic Degree of an S-Box |

146 | Untappable communication channels over optical fibers from quantum-optical noise |

147 | The Multiple Number Field Sieve for Medium and High Characteristic Finite Fields |

148 | Outsourcing Private RAM Computation |

149 | Millions of Millionaires: Multiparty Computation in Large Networks |

150 | On the Effective Prevention of TLS Man-In-The-Middle Attacks in Web Applications |

151 | Security Analysis of Key-Alternating Feistel Ciphers |

152 | A Statistics-based Fundamental Model for Side-channel Attack Analysis |

153 | Verifiable Oblivious Storage |

154 | Non-Interactive Cryptography in the RAM Model of Computation |

155 | Honey Encryption: Security Beyond the Brute-Force Bound |

156 | Non-Malleable Extractors with Shorter Seeds and Min-Entropy Rate <1/2 |

157 | CLOC: Authenticated Encryption for Short Input |

158 | Point compression for the trace zero subgroup over a small degree extension field |

159 | Weak-Key Leakage Resilient Cryptography |

160 | TRUESET: Nearly Practical Verifiable Set Computations |

161 | "Ooh Aah... Just a Little Bit" : A small amount of side channel can go a long way |

162 | TOWARD CERTIFICATELESS SIGNCRYPTION SCHEME WITHOUT RANDOM ORACLES |

163 | Improved Secure Implementation of Code-Based Signature Schemes on Embedded Devices |

164 | Generalized proper matrices and constructing of $m$-resilient Boolean functions with maximal nonlinearity for expanded range of parameters |

165 | A NEW SCALAR POINT MULTIPLICATION SCHEME IN ECC BASED ON ZECKENDORF REPRESENTATION AND MULTIBASE CONCEPT |

166 | Tuple decoders for traitor tracing schemes |

167 | How to Eat Your Entropy and Have it Too - Optimal Recovery Strategies for Compromised RNGs |

168 | Privacy Failures in Encrypted Messaging Services: Apple iMessage and Beyond |

169 | Encryption Quality Analysis of the RCBC Block Cipher Compared with RC6 and RC5 Algorithms |

170 | Parallelized hashing via j-lanes and j-pointers tree modes, with applications to SHA-256 |

171 | An Effective RC4 Stream Cipher |

172 | A novel PUF Scheme |

173 | Continuous Non-malleable Codes |

174 | Analysis of a Modified RC4 Algorithm |

175 | Secrecy and Performance Analysis of Symmetric Key Encryption Algorithms |

176 | One-Round Witness Indistinguishability from Indistinguishability Obfuscation |

177 | Pragmatism vs. Elegance: comparing two approaches to Simple Power Attacks on AES |

178 | Verifiable Delegated Set Intersection Operations on Outsourced Encrypted Data |

179 | Optimal constructions for ID-based one-way-function key predistribution schemes realizing specified communication graphs |

180 | Improving throughput of RC4 algorithm using multithreading techniques in multicore processors |

181 | A Framework and Compact Constructions for Non-monotonic Attribute-Based Encryption |

182 | Proving the TLS Handshake Secure (as it is) |

183 | Impact of ANSI X9.24-1: 2009 Key Check Value on ISO/IEC 9797-1: 2011 MACs |

184 | SETUP in Secret Sharing Schemes |

185 | Oblivious Data Structures |

186 | AES-Based Authenticated Encryption Modes in Parallel High-Performance Software |

187 | FFT-Based Key Recovery for the Integral Attack |

188 | A Second Look at Fischlin's Transformation |

189 | Practical Receipt-Free Sealed-Bid Auction in the Coercive Environment |

190 | The Temperature Side Channel and Heating Fault Attacks |

191 | Side-Channel Analysis on Blinded Regular Scalar Multiplications |

192 | Two-sources Randomness Extractors for Elliptic Curves |

193 | JHAE: An Authenticated Encryption Mode Based on JH |

194 | Cryptanalysis and Security Enhancement of Two Advanced Authentication Protocols |

195 | Low Overhead Broadcast Encryption from Multilinear Maps |

196 | Crypto-Multimedia |

197 | Breaking POET Authentication with a Single Query |

198 | Fast GPGPU-Based Elliptic Curve Scalar Multiplication |

199 | Doubly Spatial Encryption from DBDH |

200 | Automatic Protocol Selection in Secure Two-Party Computations |

201 | From Input Private to Universally Composable Secure Multiparty Computation Primitives |

202 | Verifiable Computation over Encrypted Data in the Presence of Verification Queries |

203 | Privacy-Preserving Implicit Authentication |

204 | ChipWhisperer: An Open-Source Platform for Hardware Embedded Security Research |

205 | Unified Oblivious-RAM: Improving Recursive ORAM with Locality and Pseudorandomness |

206 | Reconsidering Generic Composition |

207 | Expressive Attribute-Based Encryption with Constant-Size Ciphertexts from the Decisional Linear Assumption |

208 | Offline Dictionary Attack on Password Authentication Schemes using Smart Cards |

209 | A Little Honesty Goes a Long Way: The Two-Tier Model for Secure Multiparty Computation |

210 | Structural Cryptanalysis of McEliece Schemes with Compact Keys |

211 | Some Randomness Experiments on TRIVIUM |

212 | Remarks on the Pocklington and Padr\'o-S\'aez Cube Root Algorithm in $\mathbb F_q$ |

213 | Secret-Sharing for NP from Indistinguishability Obfuscation |

214 | Squaring Algorithms with Delayed Carry Method and Efficient Parallelization |

215 | Attack On the Markov Problem |

216 | Implementation and improvement of the Partial Sum Attack on 6-round AES |

217 | A Forgery Attack against PANDA-s |

218 | A Practical Universal Forgery Attack against PAES-8 |

219 | Dynamic Searchable Encryption via Blind Storage |

220 | Total Break of Zorro using Linear and Differential Attacks |

221 | Hybrid Model of Fixed and Floating Point Numbers in Secure Multiparty Computations |

222 | Optimizing Obfuscation: Avoiding Barrington's Theorem |

223 | Collision Spectrum, Entropy Loss, T-Sponges, and Cryptanalysis of GLUON-64 |

224 | Whitewash: Outsourcing Garbled Circuit Generation for Mobile Devices |

225 | Adaptively Secure Functional Encryption for Finite Languages from DLIN Assumption |

226 | Weak-Key Analysis of POET |

227 | CKEF: A Cluster-based Key Establishment Framework for homogenous mobile and static wireless sensor networks |

228 | Improved Analysis of Zorro-Like Ciphers |

229 | Investigating the Feasibility of LEAP+ in ZigBee Specification |

230 | Isogeny graphs with maximal real multiplication |

231 | Self-Updatable Encryption with Short Public Parameters and Its Extensions |

232 | Bandwidth Efficient PIR from NTRU |

233 | Toward Practical Homomorphic Evaluation of Block Ciphers Using Prince |

234 | Enhancing Oblivious RAM Performance Using Dynamic Prefetching |

235 | Efficient Fuzzy Search on Encrypted Data |

236 | Linear Sequential Circuit Approximation of Acterbahn Stream Cipher |

237 | SIMON Says, Break the Area Records for Symmetric Key Block Ciphers on FPGAs |

238 | High Parallel Complexity Graphs and Memory-Hard Functions |

239 | Logical Reasoning to Detect Weaknesses About SHA-1 and MD4/5 |

240 | Automatic Proofs of Privacy of Secure Multi-Party Computation Protocols Against Active Adversaries |

241 | A New Way to Prevent UKS Attacks Using Trusted Computing |

242 | Zero-Knowledge Password Policy Checks and Verifier-Based PAKE |

243 | Key Derivation From Noisy Sources With More Errors Than Entropy |

244 | bitcoin.BitMint: Reconciling Bitcoin with Central Banks |

245 | A practical state recovery attack on the stream cipher Sablier v1 |

246 | Security Analysis of an Identity-Based Strongly Unforgeable Signature Scheme |

247 | Introducing Fault Tolerance into Threshold Password-Authenticated Key Exchange |

248 | Fine grain Cross-VM Attacks on Xen and VMware are possible! |

249 | Linear Extension Cube Attack on Stream Ciphers |

250 | Cryptanalysis of the MORE symmetric key fully homomorphic encryption scheme |

251 | Forgery on Stateless CMCC |

252 | Making RSA-PSS Provably Secure Against Non-Random Faults |

253 | Practical and Secure Query Processing for Large-scale Encrypted Cloud Storage Systems |

254 | Enhanced Lattice-Based Signatures on Reconfigurable Hardware |

255 | Certification and Efficient Proofs of Committed Topology Graphs |

256 | Private and Dynamic Time-Series Data Aggregation with Trust Relaxation |

257 | Handycipher: a Low-tech, Randomized, Symmetric-key Cryptosystem |

258 | A realtime key recovery attack on the authenticated cipher FASER128 |

259 | Practical Complexity Cube Attacks on Round-Reduced Keccak Sponge Function |

260 | Locally Decodable Codes for edit distance |

261 | Fault Analysis of Grain Family of Stream Ciphers |

262 | Differential Fault Analysis of MICKEY Family of Stream Ciphers |

263 | A Generic Scan Attack on Hardware based eStream Winners |

264 | Continuous After-the-fact Leakage-Resilient Key Exchange (full version) |

265 | Dual System Groups and its Applications - Compact HIBE and More |

266 | ICEPOLE: High-speed, Hardware-oriented Authenticated Encryption |

267 | Differential Fault Analysis on the families of SIMON and SPECK ciphers |

268 | A low complexity bit-parallel Montgomery multiplier based on squaring for trinomials |

269 | Chosen Ciphertext Security via Point Obfuscation |

270 | Faster Maliciously Secure Two-Party Computation Using the GPU |

271 | STRIBOB: Authenticated Encryption from GOST R 34.11-2012 LPS Permutation |

272 | Impossible differential cryptanalysis of LBlock with concrete investigation of key scheduling algorithm |

273 | Witness Encryption from Instance Independent Assumptions |

274 | Weak instances of composite order protocols |

275 | Identity-based encryption and digital signature schemes using extended chaotic maps |

276 | Design of identity-based digital signature schemes using extended chaotic maps |

277 | New Treatment of the BSW Sampling and Its Applications to Stream Ciphers |

278 | Stronger Security Notions for Decentralized Traceable Attribute-Based Signatures and More Efficient Constructions |

279 | Improved Impossible Differential Attacks against Round-Reduced LBlock |

280 | MSEA: Modified Symmetric Encryption Algorithm |

281 | WCFB: a tweakable wide block cipher |

282 | On The Orthogonal Vector Problem and The Feasibility of Unconditionally Secure Leakage Resilient Computation |

283 | Structural Lattice Reduction: Generalized Worst-Case to Average-Case Reductions |

284 | Resettably Sound Zero-Knoweldge Arguments from OWFs - the (semi) Black-Box way |

285 | Privacy-Enhancing Proxy Signatures from Non-Interactive Anonymous Credentials |

286 | Weaknesses of Password Authentication Scheme Based on Geometric Hashing |

287 | Active and Passive Side-Channel Attacks on Delay Based PUF Designs |

288 | Resilient Aggregation in Simple Linear Sensor Networks |

289 | An Empirical Study and some Improvements of the MiniMac Protocol for Secure Computation |

290 | Optimal Resilience Broadcast against Locally Bounded and General Adversaries |

291 | Trial multiplication is not optimal but... On the symmetry of finite cyclic groups (Z/pZ)∗ |

292 | Improved Meet-in-the-Middle Attacks on Reduced-Round Camellia-192/256 |

293 | An Efficient Abuse-Free Fair Contract-Signing Protocol Based on RSA Signature and Σ-protocol |

294 | The M3lcrypt Password Based Key Derivation Function |

295 | ZAPs and Non-Interactive Witness Indistinguishability from Indistinguishability Obfuscation |

296 | Quantum Attacks on Classical Proof Systems - The Hardness of Quantum Rewinding |

297 | Pipelineable On-Line Encryption |

298 | Torsion Limits and Riemann-Roch Systems for Function Fields and Applications |

299 | Optimality of Non-Adaptive Strategies: The Case of Parallel Games |

300 | On the Powers of 2 |

301 | How to Avoid Obfuscation Using Witness PRFs |

302 | Branching Heuristics in Differential Collision Search with Applications to SHA-512 |

303 | On the security of Xu et al.'s authentication and key agreement scheme for telecare medicine information systems |

304 | Actively Private and Correct MPC Scheme in t<n/2 from Passively Secure Schemes with Small Overhead |

305 | Collision Attack on 5 Rounds of Grøstl |

306 | Publicly Evaluable Pseudorandom Functions and Their Applications |

307 | Simulation-Time Security Margin Assessment against Power-Based Side Channel Attacks |

308 | The Locality of Searchable Symmetric Encryption |

309 | Indistinguishability Obfuscation from the Multilinear Subgroup Elimination Assumption |

310 | Sakai-Ohgishi-Kasahara Non-Interactive Identity-Based Key Exchange Scheme, Revisited |

311 | Exponent-inversion Signatures and IBE under Static Assumptions |

312 | Structure-Preserving Signatures from Type II Pairings |

313 | On the Complexity of Finding Low-Level Solutions |

314 | Improved Leakage Model Based on Genetic Algorithm |

315 | Statistical weaknesses in 20 RC4-like algorithms and (probably) the simplest algorithm free from these weaknesses - VMPC-R |

316 | Explicit Non-Malleable Codes Resistant to Permutations |

317 | Analysis of NORX |

318 | Index calculus in the trace zero variety |

319 | Preimage attacks on Reduced-round Stribog |

320 | Improved Differential Cryptanalysis of Round-Reduced Speck |

321 | Efficient Quantum-Immune Keyless Signatures with Identity |

322 | Coding Theoretic Construction of Quantum Ramp Secret Sharing |

323 | Some Remarks on Honeyword Based Password-Cracking Detection |

324 | From Single-Bit to Multi-Bit Public-Key Encryption via Non-Malleable Codes |

325 | A practical forgery and state recovery attack on the authenticated cipher PANDA-s |

326 | FeW: A Lightweight Block Cipher |

327 | An Optimal Strong Password Authentication Protocol with USB Sticks |

328 | Affine-evasive Sets Modulo a Prime |

329 | Explicit Optimal Binary Pebbling for One-Way Hash Chain Reversal |

330 | PoS Cryptocurrency wtih No Blockchain |

331 | Machine Learning Classification over Encrypted Data |

332 | How to Choose Interesting Points for Template Attacks? |

333 | An optimal representation for the trace zero subgroup |

334 | LCPR: High Performance Compression Algorithm for Lattice-Based Signatures and Schnorr-like Constructions |

335 | SHADOW NUMBERS PUBLIC KEY ENCRYPTION |

336 | Private Predictive Analysis on Encrypted Medical Data |

337 | Related Randomness Attacks for Public Key Encryption |

338 | A Tamper and Leakage Resilient Random Access Machine |

339 | Public-Coin Concurrent Zero-Knowledge in Logarithmic Rounds |

340 | A Strong and Efficient Certificateless Digital Signature Scheme |

341 | Formal Analysis of Chaumian Mix Nets with Randomized Partial Checking |

342 | Proposing Individualization of the design of cryptographic hardware accelerators as countermeasure against structure and side channel analysis |

343 | New Results on Solving Linear Equations Modulo Unknown Divisors and its Applications |

344 | Toward Robust Hidden Volumes using Write-Only Oblivious RAM |

345 | Private Database Access With HE-over-ORAM Architecture |

346 | Time-Memory Trade-offs for Index Calculus in Genus 3 |

347 | One-Way Functions and (Im)perfect Obfuscation |

348 | A Simple Cast-as-Intended E-Voting Protocol by Using Secure Smart Cards |

349 | Zerocash: Decentralized Anonymous Payments from Bitcoin |

350 | Distributed Smooth Projective Hashing and its Application to Two-Server PAKE |

351 | Secret and Verifiable Delegated Voting for Wide Representation |

352 | Multi-Vendor PayWord with Payment Approval |

353 | Folding Alternant and Goppa Codes with Non-Trivial Automorphism Groups |

354 | Optimizing Information Set Decoding Algorithms to Attack Cyclosymmetric MDPC Codes |

355 | Graph-theoretic design and analysis of key predistribution schemes |

356 | Fully Key-Homomorphic Encryption, Arithmetic Circuit ABE, and Compact Garbled Circuits |

357 | Making and Breaking Leakage Simulators |

358 | A mechanical approach to derive identity-based protocols from Diffie-Hellman-based protocols |

359 | Explicit endomorphism of the Jacobian of a hyperelliptic function field of genus 2 using base field operations |

360 | McEliece in the world of Escher |

361 | New Results in the Linear Cryptanalysis of DES |

362 | Nothing is for Free: Security in Searching Shared & Encrypted Data |

363 | Forging Attacks on two Authenticated Encryptions COBRA and POET |

364 | Deleting Secret Data with Public Verifiability |

365 | Multi-target DPA attacks: Pushing DPA beyond the limits of a desktop computer |

366 | Cryptanalysis and Improvement on Robust Three-Factor Remote User Authentication Scheme with Key Agreement for Multimedia System |

367 | Redefining the Transparency Order |

368 | Solving the Discrete Logarithm of a 113-bit Koblitz Curve with an FPGA Cluster |

369 | On the Limits of Authenticated Key Exchange Security with an Application to Bad Randomness |

370 | Compact VSS and Efficient Homomorphic UC Commitments |

371 | On the Enumeration of Double-Base Chains with Applications to Elliptic Curve Cryptography |

372 | Fully secure constrained pseudorandom functions using random oracles |

373 | Beyond 2^{c/2} Security in Sponge-Based Authenticated Encryption Modes |

374 | Optimal Contracts for Outsourced Computation |

375 | Improved Cryptanalysis on Reduced-Round GOST and Whirlpool Hash Function (Full Version) |

376 | How Secure is Deterministic Encryption? |

377 | Logic Synthesis based Public Key Scheme |

378 | Attacks on Lin's Mobile Dynamic Identity-based Authenticated Key Agreement Scheme using Chebyshev Chaotic Maps |

379 | Hyper-and-elliptic-curve cryptography |

380 | Efficient Adaptively Secure IBBE from Standard Assumptions |

381 | Using Indistinguishability Obfuscation via UCEs |

382 | Privacy-Enhanced Participatory Sensing with Collusion-Resistance and Data Aggregation |

383 | Cryptanalysis of and Improvement on Biometric-based User Authentication Scheme for C/S System |

384 | Yao's millionaires' problem and decoy-based public key encryption by classical physics |

385 | Jacobian Coordinates on Genus 2 Curves |

386 | Chaskey: An Efficient MAC Algorithm for 32-bit Microcontrollers |

387 | New candidates for multivariate trapdoor functions |

388 | Finding collisions for MD4 hash algorithm using hybrid algorithm |

389 | Accelerating NTRU based Homomorphic Encryption using GPUs |

390 | Black-Box Non-Black-Box Zero Knowledge |

391 | MuR-DPA: Top-down Levelled Multi-replica Merkle Hash Tree Based Secure Public Auditing for Dynamic Big Data Storage on Cloud |

392 | The Randomized Iterate Revisited - Almost Linear Seed Length PRGs from A Broader Class of One-way Functions |

393 | (Almost) Optimal Constructions of UOWHFs from 1-to-1 and Known-Regular One-way Functions |

394 | Relational Hash |

395 | Lightweight and Privacy-Preserving Delegatable Proofs of Storage |

396 | Almost Optimal Short Adaptive Non-Interactive Zero Knowledge |

397 | Cofactorization on Graphics Processing Units |

398 | Differential Properties of the HFE Cryptosystem |

399 | An Asymptotically Optimal Structural Attack on the ABC Multivariate Encryption Scheme |

400 | Composable Oblivious Extended Permutations |

401 | Software implementation of an Attribute-Based Encryption scheme |

402 | On the Existence of Extractable One-Way Functions |

403 | Generic Universal Forgery Attack on Iterative Hash-based MACs |

404 | Large-Scale Secure Computation |

405 | Indistinguishability Obfuscation versus Point Obfuscation with Auxiliary Input |

406 | New Generic Attacks Against Hash-based MACs |

407 | Towards Symmetric Functional Encryption for Regular Languages with Predicate Privacy |

408 | Bootstrapping BGV Ciphertexts With A Wider Choice of p and q |

409 | Moments-Correlating DPA |

410 | Soft Analytical Side-Channel Attacks |

411 | Combining Leakage-Resilient PRFs and Shuffling (Towards Bounded Security for Small Embedded Devices) |

412 | Efficient Selection of Time Samples for Higher-Order DPA with Projection Pursuits |

413 | On the Cost of Lazy Engineering for Masked Software Implementations |

414 | A Security Proof of KCDSA using an extended Random Oracle Model |

415 | Virtual Proofs of Reality |

416 | Adaptive Security of Constrained PRFs |

417 | Using Random Error Correcting Codes in Near-Collision Attacks on Generic Hash-Functions |

418 | A Simple Recursive Tree Oblivious RAM |

419 | FFS Factory: Adapting Coppersmith's "Factorization Factory" to the Function Field Sieve |

420 | Bounded Fully Homomorphic Signature Schemes |

421 | FNR : Arbitrary length small domain block cipher proposal |

422 | System-level non-interference for constant-time cryptography |

423 | The Hash Function "Fugue" |

424 | Constructing Abelian Surfaces for Cryptography via Rosenhain Invariants |

425 | Note of Multidimensional MITM Attack on 25-Round TWINE-128 |

426 | Efficient Authentication and Pseudorandomness from Weaker (Ring-)LPN Assumptions |

427 | Fast point multiplication algorithms for binary elliptic curves with and without precomputation |

428 | Dual System Encryption via Doubly Selective Security: Framework, Fully-secure Functional Encryption for Regular Languages, and More |

429 | Memento: How to Reconstruct your Secrets from a Single Password in a Hostile Environment |

430 | Revisiting the Gentry-Szydlo Algorithm |

431 | RAW Path ORAM: A Low-Latency, Low-Area Hardware ORAM Controller with Integrity Verification |

432 | Composable Authentication with Global PKI |

433 | A Statistical Model for Higher Order DPA on Masked Devices |

434 | Just a Little Bit More |

435 | Wait a minute! A fast, Cross-VM attack on AES |

436 | Synthesis of Fault Attacks on Cryptographic Implementations |

437 | Rounding and Chaining LLL: Finding Faster Small Roots of Univariate Polynomial Congruences |

438 | Security of Symmetric Encryption against Mass Surveillance |

439 | Efficient Non-Interactive Verifiable Outsourced Computation for Arbitrary Functions |

440 | Double Level Montgomery Cox-Rower Architecture, New Bounds |

441 | Improved Generic Attacks Against Hash-based MACs and HAIFA |

442 | Secure Outsourced Computation of the Characteristic Polynomial and Eigenvalues of Matrix |

443 | Minimizing the Two-Round Even-Mansour Cipher |

444 | RPKI vs ROVER: Comparing the Risks of BGP Security Solutions |

445 | Polynomial Spaces: A New Framework for Composite-to-Prime-Order Transformations |

446 | 4-point Attacks with Standard Deviation Analysis on A-Feistel Schemes |

447 | Faster Private Set Intersection based on OT Extension |

448 | Improved Differential Attacks on Reduced SIMON Versions |

449 | Related Key Secure PKE from Hash Proof Systems |

450 | Optimized Implementation of General Secret Sharing Scheme |

451 | Leveled Fully Homomorphic Signatures from Standard Lattices |

452 | Proof of Activity: Extending Bitcoin's Proof of Work via Proof of Stake |

453 | Block Ciphers - Focus On The Linear Layer (feat. PRIDE): Full Version |

454 | Early Propagation and Imbalanced Routing, How to Diminish in FPGAs |

455 | Single-shot security for one-time memories in the isolated qubits model |

456 | Verified Implementations for Secure and Verifiable Computation |

457 | Transcript Secure Signatures Based on Modular Lattices |

458 | Automated Analysis of Cryptographic Assumptions in Generic Group Models |

459 | Template Attacks on Different Devices |

460 | FleXOR: Flexible garbling for XOR gates that beats free-XOR |

461 | Provably secure and efficient certificateless signature in the standard model |

462 | Efficient Key-policy Attribute-based Encryption for General Boolean Circuits from Multilinear Maps |

463 | (Leveled) Fully Homomorphic Signatures from Lattices |

464 | Providing Root of Trust for ARM TrustZone using SRAM PUFs |

465 | Semi-Adaptive Attribute-Based Encryption and Improved Delegation for Boolean Formula |

466 | On a new properties of number sequences , a randomness test and a new RC4's key scheduling algorithm |

467 | Ad-Hoc Secure Two-Party Computation on Mobile Devices using Hardware Tokens |

468 | Privacy-Preserving Auditing for Attribute-Based Credentials |

469 | Homomorphic Signatures with Efficient Verification for Polynomial Functions |

470 | PPDCP-ABE: Privacy-Preserving Decentralized Cipher-Policy Attribute-Based Encryption |

471 | Large Universe Ciphertext-Policy Attribute-Based Encryption with White-Box Traceability |

472 | How to Watermark Cryptographic Functions |

473 | An Efficient Cloud-based Revocable Identity-based Proxy Re-encryption Scheme for Public Clouds Data Sharing |

474 | Cryptographic Schemes Based on the ASASA Structure: Black-box, White-box, and Public-key |

475 | A Key Recovery Attack on Error Correcting Code Based a Lightweight Security Protocol |

476 | Simon's Circuit |

477 | Relaxed Two-to-one Recoding Schemes |

478 | Related-Key Secure Pseudorandom Functions: The Case of Additive Attacks |

479 | Even more practical secure logging: Tree-based Seekable Sequential Key Generators |

480 | Towards a Unified Theory of Cryptographic Agents |

481 | Universally Composable Non-Interactive Key Exchange |

482 | Privacy-preserving Data Aggregation with Optimal Utility |

483 | Disjunctions for Hash Proof Systems: New Constructions and Applications |

484 | Sealing the Leak on Classical NTRU signatures |

485 | An Improved Truncated Di fferential Cryptanalysis of KLEIN |

486 | Binary Elligator Squared |

487 | GGHLite: More Efficient Multilinear Maps from Ideal Lattices |

488 | Related-Key Security for Pseudorandom Functions Beyond the Linear Barrier |

489 | A Genetic Algorithm for Searching Shortest Lattice Vector of SVP Challenge |

490 | Universally Composable secure TNC protocol based on IF-T binding to TLS |

491 | Bootstrappable Identity-Based Fully Homomorphic Encryption |

492 | Fault attacks on pairing-based protocols revisited |

493 | Arithmetic on Abelian and Kummer Varieties |

494 | Hardness of k-LWE and Applications in Traitor Tracing |

495 | Improved Short Lattice Signatures in the Standard Model |

496 | Security Pitfalls of a Provably Secure Identity-based Multi-Proxy Signature Scheme |

497 | NREPO: Normal Basis Recomputing with Permuted Operands |

498 | Lightweight Diffusion Layer from the $k^{th}$ root of the MDS Matrix |

499 | Security and Efficiency Analysis of The Hamming Distance Computation Protocol Based On Oblivious Transfer |

500 | Verifiable and Secure Outsourcing Schemes of Modular Exponentiations Using One Untrusted Cloud Server and Their Application |

501 | Lighter, Faster, and Constant-Time: WhirlBob, the Whirlpool variant of StriBob |

502 | What's the Gist? Privacy-Preserving Aggregation of User Profiles |

503 | Efficient Hidden Vector Encryption with Constant-Size Ciphertext |

504 | A Provable Security Analysis of Intel's Secure Key RNG |

505 | On the quaternion $\ell$-isogeny path problem |

506 | Finding Roots in GF(p^n) with the Successive Resultant Algorithm |

507 | How to Generate and use Universal Parameters |

508 | Reversing Stealthy Dopant-Level Circuits |

509 | Privacy preserving delegated word search in the cloud |

510 | A Probabilistic Algebraic Attack on the Grain Family of Stream Cipher |

511 | Constructing CCA-secure predicate encapsulation schemes from CPA-secure schemes and universal one-way hash functions |

512 | Rmind: a tool for cryptographically secure statistical analysis |

513 | RSA meets DPA: Recovering RSA Secret Keys from Noisy Analog Data |

514 | On Constrained Implementation of Lattice-based Cryptographic Primitives and Schemes on Smart Cards |

515 | Ideal Social Secret Sharing Using Birkhoff Interpolation Method |

516 | On the Classification of Finite Boolean Functions up to Fairness |

517 | On the Connection between Leakage Tolerance and Adaptive Security |

518 | Cryptography from Compression Functions: The UCE Bridge to the ROM |

519 | Realizing Pico: Finally No More Passwords! |

520 | On powers of codes |

521 | Adaptively Secure Puncturable Pseudorandom Functions in the Standard Model |

522 | Constrained Pseudorandom Functions: Verifiable and Delegatable |

523 | Fully Secure and Fast Signing from Obfuscation |

524 | Constructing hyper-bent functions from Boolean functions with the Walsh spectrum taking the same value twice |

525 | Differential Analysis on Block Cipher PRIDE |

526 | Curve41417: Karatsuba revisited |

527 | Good is Not Good Enough: Deriving Optimal Distinguishers from Communication Theory |

528 | Groups With Two Generators Having Unsolvable Word Problem And Presentations of Mihailova Subgroups |

529 | Leakage-Resilient Signatures with Graceful Degradation |

530 | FOAM: Searching for Hardware-Optimal SPN Structures and Components with a Fair Comparison |

531 | Spatial Bloom Filters: Enabling Privacy in Location-aware Applications |

532 | On the Pitfalls of using Arbiter-PUFs as Building Blocks |

533 | Indifferentiability Results and Proofs for Some Popular Cryptographic Constructions |

534 | Differential Power Analysis of a McEliece Cryptosystem |

535 | On Key Recovery Attacks against Existing Somewhat Homomorphic Encryption Schemes |

536 | On Decomposition of an NFSR into a Cascade Connection of Two Smaller |

537 | Constrained Verifiable Random Functions |

538 | A Secure Cloud-based NFC Mobile Payment Protocol |

539 | Faster Secure Arithmetic Computation Using Switchable Homomorphic Encryption |

540 | Optimized Architecture for AES |

541 | EM Attack Is Non-Invasive? - Design Methodology and Validity Verification of EM Attack Sensor |

542 | On the Multi-output Filtering Model and Its Applications |

543 | A Practical Second-Order Fault Attack against a Real-World Pairing Implementation |

544 | Secure Mutual Testing Strategy for Cryptographic SoCs |

545 | Solving closest vector instances using an approximate shortest independent vectors oracle |

546 | Anonymous and Publicly Linkable Reputation Systems |

547 | Authentication Schemes Based on Resilient Maps |

548 | Implicit factorization of unbalanced RSA moduli |

549 | New Attacks on the RSA Cryptosystem |

550 | Function-Private Functional Encryption in the Private-Key Setting |

551 | Diffusion Matrices from Algebraic-Geometry Codes with Efficient SIMD Implementation |

552 | Efficient Record-Level Keyless Signatures for Audit Logs |

553 | A Simpler Variant of Universally Composable Security for Standard Multiparty Computation |

554 | On Virtual Grey Box Obfuscation for General Circuits |

555 | General Statistically Secure Computation with Bounded-Resettable Hardware Tokens |

556 | Securing Cloud Data in the New Attacker Model |

557 | Round-Efficient Black-Box Construction of Composable Multi-Party Computation |

558 | Double shielded Public Key Cryptosystems |

559 | Countermeasures Against High-Order Fault-Injection Attacks on CRT-RSA |

560 | An Investigation of Some Forward Security Properties for PEKS and IBE |

561 | Performance Increasing Approaches For Binary Field Inversion |

562 | hHB: a Harder HB+ Protocol |

563 | Analysis of Boomerang Differential Trails via a SAT-Based Constraint Solver URSA |

564 | A Security Definition for Multi Secret Sharing and a Scheme Based on LWE |

565 | Kangaroos in Side-Channel Attacks |

566 | Direct Construction of Recursive MDS Diffusion Layers using Shortened BCH Codes |

567 | Attribute-Based Signatures without Pairings by the Fiat-Shamir Transformation |

568 | New Classes of Public Key Cryptosystems over $F_2^8$ Constructed Based on Reed-Solomon Codes, K(XVII)SE(1)PKC and K(XVII)$\Sigma \Pi$PKC |

569 | Fast Lattice Point Enumeration with Minimal Overhead |

570 | Deja Q: Using Dual Systems to Revisit q-Type Assumptions |

571 | How to manipulate curve standards: a white paper for the black hat |

572 | On the Optimality of Differential Fault Analyses on CLEFIA |

573 | A new public key system based on Polynomials over finite fields GF(2) |

574 | Security Analysis of Multilinear Maps over the Integers |

575 | Simple AEAD Hardware Interface (S{\AE}HI) in a SoC: Implementing an On-Chip Keyak/WhirlBob Coprocessor |

576 | Vernam Two |

577 | Reducing Communication Overhead of the Subset Difference Scheme |

578 | The Exact PRF-Security of NMAC and HMAC |

579 | Scan Based Side Channel Attack on Grain v1 |

580 | The Hunting of the SNARK |

581 | (Hierarchical) Identity-Based Encryption from Affine Message Authentication |

582 | NSEC5: Provably Preventing DNSSEC Zone Enumeration |

583 | Template Attacks Based On Priori Knowledge |

584 | Universally Composable Efficient Priced Oblivious Transfer from a Flexible Membership Encryption |

585 | The SPEKE Protocol Revisited |

586 | An Algebraic Approach to Non-Malleability |

587 | Non-interactive zero-knowledge proofs in the quantum random oracle model |

588 | A Punctured Programming Approach to Adaptively Secure Functional Encryption |

589 | Authenticated Key Exchange from Ideal Lattices |

590 | Automated algebraic analysis of structure-preserving signature schemes |

591 | Compact and Side Channel Secure Discrete Gaussian Sampling |

592 | Multiprecision multiplication on AVR revisited |

593 | Improved Exponential-time Algorithms for Inhomogeneous-SIS |

594 | Oblivious Parallel RAM |

595 | Scalable Zero Knowledge via Cycles of Elliptic Curves |

596 | Secure Fingerprint Identification of High Accuracy |

597 | Invisible Adaptive Attacks |

598 | Privacy-Free Garbled Circuits with Applications To Efficient Zero-Knowledge |

599 | Post-quantum key exchange for the TLS protocol from the ring learning with errors problem |

600 | DTKI: a new formalized PKI with no trusted parties |

601 | Adaptive versus Static Security in the UC Model |

602 | A Cryptographic Study of Tokenization Systems |

603 | Recursive Trees for Practical ORAM |

604 | Private Web Search with Constant Round Efficiency |

605 | On the Limits of Computational Fuzzy Extractors |

606 | A Multi-Function Provable Data Possession Scheme in Cloud Computing |

607 | Adding Controllable Linkability to Pairing-Based Group Signatures For Free |

608 | Key-policy Attribute-based Encryption for Boolean Circuits from Bilinear Maps |

609 | SPOKE: Simple Password-Only Key Exchange in the Standard Model |

610 | Computing on the Edge of Chaos: Structure and Randomness in Encrypted Computation |

611 | Accumulating Automata and Cascaded Equations Automata for Communicationless Information Theoretically Secure Multi-Party Computation |

612 | Attribute-Based Encryption Optimized for Cloud Computing |

613 | A Security Analysis of the Composition of ChaCha20 and Poly1305 |

614 | Expressive and Secure Searchable Encryption in the Public Key Setting (Full Version) |

615 | Optimally Resilient and Adaptively Secure Multi-Party Computation with Low Communication Locality |

616 | Practical Attribute Based Encryption: Traitor Tracing, Revocation, and Large Universe |

617 | Nearly Practical and Privacy-Preserving Proofs on Authenticated Data |

618 | Proving Correctness and Security of Two-Party Computation Implemented in Java in Presence of a Semi-Honest Sender |

619 | THE NEW HEURISTIC GUESS AND DETERMINE ATTACK ON SNOW 2.0 STREAM CIPHER |

620 | The M3dcrypt Password Scheme |

621 | (Nothing else) MATor(s): Monitoring the Anonymity of Tor's Path Selection |

622 | Fully Secure Attribute Based Encryption from Multilinear Maps |

623 | Privacy and Imperfect Randomness |

624 | KT-ORAM: A Bandwidth-efficient ORAM Built on K-ary Tree of PIR Nodes |