year |
venue |
title |
pages |
2014 | asiacrypt | The Legal Infrastructure Around Information Security in Asia | online |
2014 | asiacrypt | Algebraic Attack against Variants of McEliece with Goppa Polynomial of a Special Form | online |
2014 | asiacrypt | Homomorphic Authenticated Encryption Secure against Chosen-Ciphertext Attack | online |
2014 | asiacrypt | On Tight Security Proofs for Schnorr Signatures | online |
2014 | asiacrypt | All-But-Many Encryption - A New Framework for Fully-Equipped UC Commitments | online |
2014 | asiacrypt | Meet-in-the-Middle Attacks on Generic Feistel Constructions | online |
2014 | asiacrypt | Structure-Preserving Signatures on Equivalence Classes and Their Application to Anonymous Credentials | online |
2014 | asiacrypt | Poly-Many Hardcore Bits for Any One-Way Function and a Framework for Differing-Inputs Obfuscation | online |
2014 | asiacrypt | Big Bias Hunting in Amazonia: Large-Scale Computation and Exploitation of RC4 Biases | online |
2014 | asiacrypt | Fairness versus Guaranteed Output Delivery in Secure Multiparty Computation | online |
2014 | asiacrypt | Better Zero-Knowledge Proofs for Lattice Encryption and Their Application to Group Signatures | online |
2014 | asiacrypt | On the Enumeration of Double-Base Chains with Applications to Elliptic Curve Cryptography | online |
2014 | asiacrypt | Statistically-secure ORAM with Õ(log2 n) Overhead | online |
2014 | asiacrypt | Efficient, Oblivious Data Structures for MPC | online |
2014 | asiacrypt | Square Span Programs with Applications to Succinct NIZK Arguments | online |
2014 | asiacrypt | Jacobian Coordinates on Genus 2 Curves | online |
2014 | asiacrypt | Black-Box Separations for Differentially Private Protocols | online |
2014 | asiacrypt | Black-Box Separations for One-More (Static) CDH and Its Generalization | online |
2014 | asiacrypt | Composable Security of Delegated Quantum Computation | online |
2014 | asiacrypt | A Simplified Representation of AES | online |
2014 | asiacrypt | Higher-Order Threshold Implementations | online |
2014 | asiacrypt | How to Securely Release Unverified Plaintext in Authenticated Encryption | online |
2014 | asiacrypt | Concise Multi-challenge CCA-Secure Encryption and Signatures with Almost Tight Security | online |
2014 | asiacrypt | Multi-user Collisions: Applications to Discrete Logarithm, Even-Mansour and PRINCE | online |
2014 | asiacrypt | Forging Attacks on Two Authenticated Encryption Schemes COBRA and POET | online |
2014 | asiacrypt | GLV/GLS Decomposition, Power Analysis, and Attacks on ECDSA Signatures with Single-Bit Nonce Bias | online |
2014 | asiacrypt | Advances in Cryptology - ASIACRYPT 2014 - 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, R.O.C., December 7-11, 2014. Proceedings, Part I | |
2014 | asiacrypt | Adaptive Security of Constrained PRFs | online |
2014 | asiacrypt | Scrutinizing and Improving Impossible Differential Attacks: Applications to CLEFIA, Camellia, LBlock and Simon | online |
2014 | asiacrypt | Efficient Identity-Based Encryption over NTRU Lattices | online |
2014 | asiacrypt | Kummer Strikes Back: New DH Speed Records | online |
2014 | asiacrypt | Cryptanalysis of Iterated Even-Mansour Schemes with Two Keys | online |
2014 | asiacrypt | XLS is Not a Strong Pseudorandom Permutation | online |
2014 | asiacrypt | Low Probability Differentials and the Cryptanalysis of Full-Round CLEFIA-128 | online |
2014 | asiacrypt | Bivariate Polynomials Modulo Composites and Their Applications | online |
2014 | asiacrypt | Side-Channel Analysis of Multiplications in GF(2128) - Application to AES-GCM | online |
2014 | asiacrypt | Masks Will Fall Off - Higher-Order Optimal Distinguishers | online |
2014 | asiacrypt | Actively Secure Private Function Evaluation | online |
2014 | asiacrypt | Secret-Sharing for NP | online |
2014 | asiacrypt | Mersenne Factorization Factory | online |
2014 | asiacrypt | Multi-valued Byzantine Broadcast: The t < n Case | online |
2014 | asiacrypt | Using Indistinguishability Obfuscation via UCEs | online |
2014 | asiacrypt | Indistinguishability Obfuscation versus Multi-bit Point Obfuscation with Auxiliary Input | online |
2014 | asiacrypt | Round-Optimal Password-Protected Secret Sharing and T-PAKE in the Password-Only Model | online |
2014 | asiacrypt | Bootstrapping Obfuscators via Fast Pseudorandom Functions | online |
2014 | asiacrypt | Soft Analytical Side-Channel Attacks | online |
2014 | asiacrypt | Tweaks and Keys for Block Ciphers: The TWEAKEY Framework | online |
2014 | asiacrypt | Compact VSS and Efficient Homomorphic UC Commitments | online |
2014 | asiacrypt | Improving the Polynomial time Precomputation of Frobenius Representation Discrete Logarithm Algorithms - Simplified Setting for Small Characteristic Finite Fields | online |
2014 | asiacrypt | Multi-target DPA Attacks: Pushing DPA Beyond the Limits of a Desktop Computer | online |
2014 | asiacrypt | Automatic Security Evaluation and (Related-key) Differential Characteristic Search: Application to SIMON, PRESENT, LBlock, DES(L) and Other Bit-Oriented Block Ciphers | online |
2014 | asiacrypt | Memory-Demanding Password Scrambling | online |
2014 | asiacrypt | Advances in Cryptology - ASIACRYPT 2014 - 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, R.O.C., December 7-11, 2014, Proceedings, Part II | |
2014 | asiacrypt | Solving LPN Using Covering Codes | online |
2014 | asiacrypt | Cryptographic Schemes Based on the ASASA Structure: Black-Box, White-Box, and Public-Key (Extended Abstract) | online |
2014 | asiacrypt | Beyond 2 c/2 Security in Sponge-Based Authenticated Encryption Modes | online |
2014 | asiacrypt | Order-Preserving Encryption Secure Beyond One-Wayness | online |
2014 | asiacrypt | Simulatable Leakage: Analysis, Pitfalls, and New Constructions | online |
2014 | asiacrypt | Authenticating Computation on Groups: New Homomorphic Primitives and Applications | online |
2014 | ches | V2V Communication Security: a privacy-preserving design for 300 million vehicles | |
2014 | ches | Simple Power Analysis on AES Key Expansion Revisited | online |
2014 | ches | Get Your Hands Off My Laptop: Physical Side-Channel Key-Extraction Attacks on PCs | online |
2014 | ches | FOAM: Searching for Hardware-Optimal SPN Structures and Components with a Fair Comparison | online |
2014 | ches | Fast Evaluation of Polynomials over Binary Finite Fields and Application to Side-Channel Countermeasures | online |
2014 | ches | "Ooh Aah... Just a Little Bit" : A Small Amount of Side Channel Can Go a Long Way | online |
2014 | ches | A Statistical Model for Higher Order DPA on Masked Devices | online |
2014 | ches | Enhanced Lattice-Based Signatures on Reconfigurable Hardware | online |
2014 | ches | FPGA Implementations of SPRING - And Their Countermeasures against Side-Channel Attacks | online |
2014 | ches | Making RSA-PSS Provably Secure against Non-random Faults | online |
2014 | ches | Compact Ring-LWE Cryptoprocessor | online |
2014 | ches | Cofactorization on Graphics Processing Units | online |
2014 | ches | Efficient Power and Timing Side Channels for Physical Unclonable Functions | online |
2014 | ches | ICEPOLE: High-Speed, Hardware-Oriented Authenticated Encryption | online |
2014 | ches | Side-Channel Attack against RSA Key Generation Algorithms | online |
2014 | ches | A New Framework for Constraint-Based Probabilistic Template Side Channel Attacks | online |
2014 | ches | Bitline PUF: Building Native Challenge-Response PUF Capability into Any SRAM | online |
2014 | ches | Good Is Not Good Enough - Deriving Optimal Distinguishers from Communication Theory | online |
2014 | ches | RSA Meets DPA: Recovering RSA Secret Keys from Noisy Analog Data | online |
2014 | ches | Secure Conversion between Boolean and Arithmetic Masking of Any Order | online |
2014 | ches | Constructing S-boxes for Lightweight Cryptography with Feistel Structure | online |
2014 | ches | Efficient Pairings and ECC for Embedded Systems | online |
2014 | ches | Curve41417: Karatsuba Revisited | online |
2014 | ches | Reversing Stealthy Dopant-Level Circuits | online |
2014 | ches | Physical Characterization of Arbiter PUFs | online |
2014 | ches | Early Propagation and Imbalanced Routing, How to Diminish in FPGAs | online |
2014 | ches | Embedded Evaluation of Randomness in Oscillator Based Elementary TRNG | online |
2014 | ches | Destroying Fault Invariant with Randomization - A Countermeasure for AES Against Differential Fault Attacks | online |
2014 | ches | Cryptographic Hardware and Embedded Systems - CHES 2014 - 16th International Workshop, Busan, South Korea, September 23-26, 2014. Proceedings | |
2014 | ches | How to Estimate the Success Rate of Higher-Order Side-Channel Attacks | online |
2014 | ches | EM Attack Is Non-invasive? - Design Methodology and Validity Verification of EM Attack Sensor | online |
2014 | ches | Secure Lightweight Entity Authentication with Strong PUFs: Mission Impossible? | online |
2014 | ches | Side-Channel Leakage through Static Power - Should We Care about in Practice? | online |
2014 | ches | Gate-Level Masking under a Path-Based Leakage Metric | online |
2014 | ches | Entropy Evaluation for Oscillator-Based True Random Number Generators | online |
2014 | crypto | On the Communication Complexity of Secure Computation | online |
2014 | crypto | Efficient Three-Party Computation from Cut-and-Choose | online |
2014 | crypto | Witness Encryption from Instance Independent Assumptions | online |
2014 | crypto | Secure Multi-Party Computation with Identifiable Abort | online |
2014 | crypto | Indistinguishability Obfuscation from Semantically-Secure Multilinear Encodings | online |
2014 | crypto | Security of Symmetric Encryption against Mass Surveillance | online |
2014 | crypto | Minimizing the Two-Round Even-Mansour Cipher | 39-56 |
2014 | crypto | Converting Cryptographic Schemes from Symmetric to Asymmetric Bilinear Groups | online |
2014 | crypto | Feasibility and Infeasibility of Secure Computation with Malicious PUFs | online |
2014 | crypto | The Exact PRF-Security of NMAC and HMAC | online |
2014 | crypto | Round-Efficient Black-Box Construction of Composable Multi-Party Computation | online |
2014 | crypto | Revisiting the Gentry-Szydlo Algorithm | online |
2014 | crypto | Algorithms in HElib | online |
2014 | crypto | Interactive Proofs under Continual Memory Leakage | online |
2014 | crypto | FleXOR: Flexible Garbling for XOR Gates That Beats Free-XOR | online |
2014 | crypto | On the Implausibility of Differing-Inputs Obfuscation and Extractable Witness Encryption with Auxiliary Input | online |
2014 | crypto | Quantum Position Verification in the Random Oracle Model | online |
2014 | crypto | Advances in Cryptology - CRYPTO 2014 - 34th Annual Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part II | |
2014 | crypto | Faster Bootstrapping with Polynomial Error | online |
2014 | crypto | Updates on Generic Attacks against HMAC and NMAC | online |
2014 | crypto | Security Analysis of Multilinear Maps over the Integers | online |
2014 | crypto | Proving the TLS Handshake Secure (As It Is) | 235-255 |
2014 | crypto | Automated Analysis of Cryptographic Assumptions in Generic Group Models | online |
2014 | crypto | Self-bilinear Map on Unknown Order Groups from Indistinguishability Obfuscation and Its Applications | online |
2014 | crypto | Single-Shot Security for One-Time Memories in the Isolated Qubits Model | online |
2014 | crypto | Amplifying Privacy in Privacy Amplification | online |
2014 | crypto | Hardness of k-LWE and Applications in Traitor Tracing | online |
2014 | crypto | On the Impossibility of Cryptography with Tamperable Randomness | online |
2014 | crypto | Non-Interactive Secure Multiparty Computation | online |
2014 | crypto | Multiparty Key Exchange, Efficient Traitor Tracing, and More from Indistinguishability Obfuscation | online |
2014 | crypto | Client-Server Concurrent Zero Knowledge with Constant Rounds and Guaranteed Complexity | online |
2014 | crypto | Physical Zero-Knowledge Proofs of Physical Properties | online |
2014 | crypto | Memento: How to Reconstruct Your Secrets from a Single Password in a Hostile Environment | online |
2014 | crypto | Maliciously Circuit-Private FHE | online |
2014 | crypto | (Hierarchical) Identity-Based Encryption from Affine Message Authentication | online |
2014 | crypto | Improved Generic Attacks against Hash-Based MACs and HAIFA | online |
2014 | crypto | The Security of Multiple Encryption in the Ideal Cipher Model | online |
2014 | crypto | Advances in Cryptology - CRYPTO 2014 - 34th Annual Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part I | |
2014 | crypto | Block Ciphers - Focus on the Linear Layer (feat. PRIDE) | online |
2014 | crypto | Breaking '128-bit Secure' Supersingular Binary Curves - (Or How to Solve Discrete Logarithms in F24 1223 and F212 367) | online |
2014 | crypto | Cut-and-Choose Yao-Based Secure Computation in the Online/Offline and Batch Settings | online |
2014 | crypto | Optimal Non-perfect Uniform Secret Sharing Schemes | online |
2014 | crypto | Polynomial Spaces: A New Framework for Composite-to-Prime-Order Transformations | online |
2014 | crypto | Amortizing Garbled Circuits | online |
2014 | crypto | Scalable Zero Knowledge via Cycles of Elliptic Curves | online |
2014 | crypto | Indistinguishability Obfuscation and UCEs: The Case of Computationally Unpredictable Sources | online |
2014 | crypto | Switching Lemma for Bilinear Tests and Constant-Size NIZK Proofs for Linear Subspaces | online |
2014 | crypto | Structure-Preserving Signatures from Type II Pairings | online |
2014 | crypto | Homomorphic Signatures with Efficient Verification for Polynomial Functions | online |
2014 | crypto | Leakage-Tolerant Computation with Input-Independent Preprocessing | online |
2014 | crypto | Related-Key Security for Pseudorandom Functions Beyond the Linear Barrier | online |
2014 | crypto | New and Improved Key-Homomorphic Pseudorandom Functions | online |
2014 | crypto | Caught in Between Theory and Practice | |
2014 | crypto | The Impossibility of Obfuscation with Auxiliary Input or a Universal Simulator | online |
2014 | crypto | How to delegate computations: the power of no-signaling proofs | |
2014 | crypto | How to Eat Your Entropy and Have It Too - Optimal Recovery Strategies for Compromised RNGs | online |
2014 | crypto | Low Overhead Broadcast Encryption from Multilinear Maps | online |
2014 | crypto | Improved Short Lattice Signatures in the Standard Model | online |
2014 | crypto | RSA Key Extraction via Low-Bandwidth Acoustic Cryptanalysis | online |
2014 | crypto | Cryptography from Compression Functions: The UCE Bridge to the ROM | online |
2014 | crypto | Dishonest Majority Multi-Party Computation for Binary Circuits | online |
2014 | crypto | Cryptography with Streaming Algorithms | online |
2014 | crypto | How to Use Bitcoin to Design Fair Protocols | online |
2014 | crypto | On Virtual Grey Box Obfuscation for General Circuits | online |
2014 | eprint | Linkable Message Tagging: Solving the key distribution problem of signature schemes | online |
2014 | eprint | Fault attacks on pairing-based protocols revisited | online |
2014 | eprint | Related-Key Security for Pseudorandom Functions Beyond the Linear Barrier | online |
2014 | eprint | Lazy Modulus Switching for the BKW Algorithm on LWE | online |
2014 | eprint | Self-Updatable Encryption with Short Public Parameters and Its Extensions | online |
2014 | eprint | Homomorphic AES Evaluation using NTRU | online |
2014 | eprint | Fault Analysis of Grain Family of Stream Ciphers | online |
2014 | eprint | Verified Implementations for Secure and Verifiable Computation | online |
2014 | eprint | Kangaroos in Side-Channel Attacks | online |
2014 | eprint | A low complexity bit-parallel Montgomery multiplier based on squaring for trinomials | online |
2014 | eprint | Nothing is for Free: Security in Searching Shared & Encrypted Data | online |
2014 | eprint | Jacobian Coordinates on Genus 2 Curves | online |
2014 | eprint | A Cryptographic Study of Tokenization Systems | online |
2014 | eprint | On the Multi-output Filtering Model and Its Applications | online |
2014 | eprint | An Equivalence-Preserving Transformation of Shift Registers | online |
2014 | eprint | Millions of Millionaires: Multiparty Computation in Large Networks | online |
2014 | eprint | DAA-related APIs in TPM2.0 Revisited | online |
2014 | eprint | TRUESET: Nearly Practical Verifiable Set Computations | online |
2014 | eprint | One Weird Trick to Stop Selfish Miners: Fresh Bitcoins, A Solution for the Honest Miner | online |
2014 | eprint | Breaking POET Authentication with a Single Query | online |
2014 | eprint | From Single-Bit to Multi-Bit Public-Key Encryption via Non-Malleable Codes | online |
2014 | eprint | Privacy Failures in Encrypted Messaging Services: Apple iMessage and Beyond | online |
2014 | eprint | A Probabilistic Algebraic Attack on the Grain Family of Stream Cipher | online |
2014 | eprint | Weaknesses of Password Authentication Scheme Based on Geometric Hashing | online |
2014 | eprint | Witness Encryption from Instance Independent Assumptions | online |
2014 | eprint | Privacy-Enhancing Proxy Signatures from Non-Interactive Anonymous Credentials | online |
2014 | eprint | Almost Optimal Short Adaptive Non-Interactive Zero Knowledge | online |
2014 | eprint | Moments-Correlating DPA | online |
2014 | eprint | Recursive Trees for Practical ORAM | online |
2014 | eprint | Resilient Aggregation in Simple Linear Sensor Networks | online |
2014 | eprint | Resettably Sound Zero-Knoweldge Arguments from OWFs - the (semi) Black-Box way | online |
2014 | eprint | A Multi-Function Provable Data Possession Scheme in Cloud Computing | online |
2014 | eprint | GGHLite: More Efficient Multilinear Maps from Ideal Lattices | online |
2014 | eprint | Adaptive versus Static Security in the UC Model | online |
2014 | eprint | ChipWhisperer: An Open-Source Platform for Hardware Embedded Security Research | online |
2014 | eprint | Halka: A Lightweight, Software Friendly Block Cipher Using Ultra-lightweight 8-bit S-box | online |
2014 | eprint | New Generic Attacks Against Hash-based MACs | online |
2014 | eprint | Multi-target DPA attacks: Pushing DPA beyond the limits of a desktop computer | online |
2014 | eprint | Coding Theoretic Construction of Quantum Ramp Secret Sharing | online |
2014 | eprint | A Fast Modular Reduction Method | online |
2014 | eprint | Garbled RAM Revisited, Part I | online |
2014 | eprint | Security Enhanced Anonymous Multi-Server Authenticated Key Agreement Scheme using Smart Card and Biometrics | online |
2014 | eprint | Improved Cryptanalysis on Reduced-Round GOST and Whirlpool Hash Function (Full Version) | online |
2014 | eprint | Related Randomness Attacks for Public Key Encryption | online |
2014 | eprint | Making RSA-PSS Provably Secure Against Non-Random Faults | online |
2014 | eprint | Disjunctions for Hash Proof Systems: New Constructions and Applications | online |
2014 | eprint | Efficient Non-Interactive Zero Knowledge Arguments for Set Operations | online |
2014 | eprint | How to Eat Your Entropy and Have it Too - Optimal Recovery Strategies for Compromised RNGs | online |
2014 | eprint | Efficient Key-policy Attribute-based Encryption for General Boolean Circuits from Multilinear Maps | online |
2014 | eprint | New Results on Solving Linear Equations Modulo Unknown Divisors and its Applications | online |
2014 | eprint | MuR-DPA: Top-down Levelled Multi-replica Merkle Hash Tree Based Secure Public Auditing for Dynamic Big Data Storage on Cloud | online |
2014 | eprint | Isolated Execution on Many-core Architectures | online |
2014 | eprint | On the Powers of 2 | online |
2014 | eprint | Low Overhead Broadcast Encryption from Multilinear Maps | online |
2014 | eprint | Pragmatism vs. Elegance: comparing two approaches to Simple Power Attacks on AES | online |
2014 | eprint | Sakai-Ohgishi-Kasahara Non-Interactive Identity-Based Key Exchange Scheme, Revisited | online |
2014 | eprint | Human Assisted Randomness Generation Using Video Games | online |
2014 | eprint | An Applicable Public-Key-Cryptosystem Based on NP-Complete Problems | online |
2014 | eprint | Compact and Side Channel Secure Discrete Gaussian Sampling | online |
2014 | eprint | Towards Symmetric Functional Encryption for Regular Languages with Predicate Privacy | online |
2014 | eprint | Generic Universal Forgery Attack on Iterative Hash-based MACs | online |
2014 | eprint | Single-shot security for one-time memories in the isolated qubits model | online |
2014 | eprint | Optimal Algebraic Manipulation Detection Codes | online |
2014 | eprint | Simple AEAD Hardware Interface (S{\AE}HI) in a SoC: Implementing an On-Chip Keyak/WhirlBob Coprocessor | online |
2014 | eprint | A mechanical approach to derive identity-based protocols from Diffie-Hellman-based protocols | online |
2014 | eprint | Certified Bitcoins | online |
2014 | eprint | Parallelized hashing via j-lanes and j-pointers tree modes, with applications to SHA-256 | online |
2014 | eprint | Transcript Secure Signatures Based on Modular Lattices | online |
2014 | eprint | A Tamper and Leakage Resilient Random Access Machine | online |
2014 | eprint | Finding collisions for MD4 hash algorithm using hybrid algorithm | online |
2014 | eprint | Bootstrapping BGV Ciphertexts With A Wider Choice of p and q | online |
2014 | eprint | Improved Short Lattice Signatures in the Standard Model | online |
2014 | eprint | (Almost) Optimal Constructions of UOWHFs from 1-to-1 and Known-Regular One-way Functions | online |
2014 | eprint | Double Level Montgomery Cox-Rower Architecture, New Bounds | online |
2014 | eprint | Adaptive Security of Constrained PRFs | online |
2014 | eprint | Synthesis of Fault Attacks on Cryptographic Implementations | online |
2014 | eprint | Ultra-lightweight 8-bit Multiplicative Inverse Based S-box Using LFSR | online |
2014 | eprint | New Way to Construct Cryptographic Hash Function | online |
2014 | eprint | Folding Alternant and Goppa Codes with Non-Trivial Automorphism Groups | online |
2014 | eprint | Some Remarks on Honeyword Based Password-Cracking Detection | online |
2014 | eprint | What's the Gist? Privacy-Preserving Aggregation of User Profiles | online |
2014 | eprint | Attacks on Lin's Mobile Dynamic Identity-based Authenticated Key Agreement Scheme using Chebyshev Chaotic Maps | online |
2014 | eprint | Structural Lattice Reduction: Generalized Worst-Case to Average-Case Reductions | online |
2014 | eprint | Related-Key Secure Pseudorandom Functions: The Case of Additive Attacks | online |
2014 | eprint | Cryptanalysis on "Secure untraceable off-line electronic cash system" | online |
2014 | eprint | Randomized and Efficient Authentication in Mobile Environments | online |
2014 | eprint | Differential Fault Analysis of MICKEY Family of Stream Ciphers | online |
2014 | eprint | Early Propagation and Imbalanced Routing, How to Diminish in FPGAs | online |
2014 | eprint | Unrestricted Identity-Based Aggregate Signcryption in the Standard Model from Multilinear Maps | online |
2014 | eprint | How to Generate and use Universal Parameters | online |
2014 | eprint | Attack On the Markov Problem | online |
2014 | eprint | Private Predictive Analysis on Encrypted Medical Data | online |
2014 | eprint | Crypto-Multimedia | online |
2014 | eprint | Improving throughput of RC4 algorithm using multithreading techniques in multicore processors | online |
2014 | eprint | Untappable communication channels over optical fibers from quantum-optical noise | online |
2014 | eprint | Index calculus in the trace zero variety | online |
2014 | eprint | Distributed Smooth Projective Hashing and its Application to Two-Server PAKE | online |
2014 | eprint | An Efficient Abuse-Free Fair Contract-Signing Protocol Based on RSA Signature and Σ-protocol | online |
2014 | eprint | Low Probability Differentials and the Cryptanalysis of Full-Round CLEFIA-128 | online |
2014 | eprint | An Efficient Pseudo-Random Generator with Applications to Public-Key Encryption and Constant-Round Multiparty Computation | online |
2014 | eprint | A new class of system oriented PKC, K(I)SOPKC | online |
2014 | eprint | Relaxed Two-to-one Recoding Schemes | online |
2014 | eprint | Arithmetic on Abelian and Kummer Varieties | online |
2014 | eprint | A practical forgery and state recovery attack on the authenticated cipher PANDA-s | online |
2014 | eprint | Note of Multidimensional MITM Attack on 25-Round TWINE-128 | online |
2014 | eprint | Vernam Two | online |
2014 | eprint | Indifferentiability Results and Proofs for Some Popular Cryptographic Constructions | online |
2014 | eprint | Statistical Concurrent Non-Malleable Zero Knowledge | online |
2014 | eprint | Universally Composable Efficient Priced Oblivious Transfer from a Flexible Membership Encryption | online |
2014 | eprint | Hardness of k-LWE and Applications in Traitor Tracing | online |
2014 | eprint | Composable Authentication with Global PKI | online |
2014 | eprint | LCPR: High Performance Compression Algorithm for Lattice-Based Signatures and Schnorr-like Constructions | online |
2014 | eprint | Tuple decoders for traitor tracing schemes | online |
2014 | eprint | Bounded Fully Homomorphic Signature Schemes | online |
2014 | eprint | Just a Little Bit More | online |
2014 | eprint | Side-Channel Leakage through Static Power - Should We Care about in Practice? - | online |
2014 | eprint | An Empirical Study and some Improvements of the MiniMac Protocol for Secure Computation | online |
2014 | eprint | Offline Dictionary Attack on Password Authentication Schemes using Smart Cards | online |
2014 | eprint | Privacy and Imperfect Randomness | online |
2014 | eprint | Squaring Algorithms with Delayed Carry Method and Efficient Parallelization | online |
2014 | eprint | A New Algorithm for Solving the Approximate Common Divisor Problem and Cryptanalysis of the FHE based on GACD | online |
2014 | eprint | FORSAKES: A Forward-Secure Authenticated Key Exchange Protocol Based on Symmetric Key-Evolving Schemes | online |
2014 | eprint | (Leveled) Fully Homomorphic Signatures from Lattices | online |
2014 | eprint | On the Limits of Authenticated Key Exchange Security with an Application to Bad Randomness | online |
2014 | eprint | Template Attacks on Different Devices | online |
2014 | eprint | Lightweight Diffusion Layer from the $k^{th}$ root of the MDS Matrix | online |
2014 | eprint | On the Phase Space of Block-Hiding Strategies | online |
2014 | eprint | Key-Indistinguishable Message Authentication Codes | online |
2014 | eprint | A novel PUF Scheme | online |
2014 | eprint | $GF(2^n)$ Bit-Parallel Squarer Using Generalized Polynomial Basis For a New Class of Irreducible Pentanomials | online |
2014 | eprint | SIMON Says, Break the Area Records for Symmetric Key Block Ciphers on FPGAs | online |
2014 | eprint | Forging Attacks on two Authenticated Encryptions COBRA and POET | online |
2014 | eprint | A practical state recovery attack on the stream cipher Sablier v1 | online |
2014 | eprint | Practical Complexity Cube Attacks on Round-Reduced Keccak Sponge Function | online |
2014 | eprint | New candidates for multivariate trapdoor functions | online |
2014 | eprint | Soft Analytical Side-Channel Attacks | online |
2014 | eprint | Indistinguishability Obfuscation from the Multilinear Subgroup Elimination Assumption | online |
2014 | eprint | Fully Key-Homomorphic Encryption, Arithmetic Circuit ABE, and Compact Garbled Circuits | online |
2014 | eprint | Continuous After-the-fact Leakage-Resilient Key Exchange (full version) | online |
2014 | eprint | Security Pitfalls of a Provably Secure Identity-based Multi-Proxy Signature Scheme | online |
2014 | eprint | Cryptography from Compression Functions: The UCE Bridge to the ROM | online |
2014 | eprint | FNR : Arbitrary length small domain block cipher proposal | online |
2014 | eprint | Masking and Leakage-Resilient Primitives: One, the Other(s) or Both? | online |
2014 | eprint | High Parallel Complexity Graphs and Memory-Hard Functions | online |
2014 | eprint | Constructing Abelian Surfaces for Cryptography via Rosenhain Invariants | online |
2014 | eprint | Constrained Pseudorandom Functions: Verifiable and Delegatable | online |
2014 | eprint | Weak-Key Analysis of POET | online |
2014 | eprint | Implementing Pairing-Based Cryptosystems in USB Tokens | online |
2014 | eprint | Diffusion Programmable Device : The device to prevent reverse engineering | online |
2014 | eprint | RECTANGLE: A Bit-slice Ultra-Lightweight Block Cipher Suitable for Multiple Platforms | online |
2014 | eprint | On the Design of LIL Tests for (Pseudo) Random Generators and Some Experimental Results | online |
2014 | eprint | On a new properties of number sequences , a randomness test and a new RC4's key scheduling algorithm | online |
2014 | eprint | Some Randomness Experiments on TRIVIUM | online |
2014 | eprint | Practical polynomial time solutions of several major problems in noncommutative-algebraic cryptography | online |
2014 | eprint | Oblivious Parallel RAM | online |
2014 | eprint | Linear Sequential Circuit Approximation of Acterbahn Stream Cipher | online |
2014 | eprint | Cryptanalysis of FIDES | online |
2014 | eprint | Implicit factorization of unbalanced RSA moduli | online |
2014 | eprint | Practical and Secure Query Processing for Large-scale Encrypted Cloud Storage Systems | online |
2014 | eprint | Analysis of NORX | online |
2014 | eprint | Point compression for the trace zero subgroup over a small degree extension field | online |
2014 | eprint | Hyper-and-elliptic-curve cryptography | online |
2014 | eprint | Characterization of EME with Linear Mixing | online |
2014 | eprint | Private Database Access With HE-over-ORAM Architecture | online |
2014 | eprint | Solving closest vector instances using an approximate shortest independent vectors oracle | online |
2014 | eprint | A Statistical Model for Higher Order DPA on Masked Devices | online |
2014 | eprint | Constructing hyper-bent functions from Boolean functions with the Walsh spectrum taking the same value twice | online |
2014 | eprint | Differential Fault Analysis on the families of SIMON and SPECK ciphers | online |
2014 | eprint | Multipermutations in Crypto World: Different Faces of the Perfect Diffusion Layer | online |
2014 | eprint | Secrecy and Performance Analysis of Symmetric Key Encryption Algorithms | online |
2014 | eprint | Zero-Knowledge Password Policy Checks and Verifier-Based PAKE | online |
2014 | eprint | SHipher: Families of Block Ciphers based on SubSet-Sum Problem | online |
2014 | eprint | Faster Secure Arithmetic Computation Using Switchable Homomorphic Encryption | online |
2014 | eprint | Crypto-analyses on "user efficient recoverable off-line e-cashs scheme with fast anonymity revoking" | online |
2014 | eprint | Secure Fingerprint Identification of High Accuracy | online |
2014 | eprint | Practical Receipt-Free Sealed-Bid Auction in the Coercive Environment | online |
2014 | eprint | On the Existence of Extractable One-Way Functions | online |
2014 | eprint | Making and Breaking Leakage Simulators | online |
2014 | eprint | Two-round password-only authenticated key exchange in the three-party setting | online |
2014 | eprint | Faster Maliciously Secure Two-Party Computation Using the GPU | online |
2014 | eprint | New Attacks on the RSA Cryptosystem | online |
2014 | eprint | Memento: How to Reconstruct your Secrets from a Single Password in a Hostile Environment | online |
2014 | eprint | Affine-evasive Sets Modulo a Prime | online |
2014 | eprint | Channel Equalization for Side Channel Attacks | online |
2014 | eprint | Impact of ANSI X9.24-1: 2009 Key Check Value on ISO/IEC 9797-1: 2011 MACs | online |
2014 | eprint | Semi-Adaptive Attribute-Based Encryption and Improved Delegation for Boolean Formula | online |
2014 | eprint | Solving the Discrete Logarithm of a 113-bit Koblitz Curve with an FPGA Cluster | online |
2014 | eprint | Lightweight and Privacy-Preserving Delegatable Proofs of Storage | online |
2014 | eprint | Efficient Adaptively Secure IBBE from Standard Assumptions | online |
2014 | eprint | Reducing Communication Overhead of the Subset Difference Scheme | online |
2014 | eprint | Accumulating Automata and Cascaded Equations Automata for Communicationless Information Theoretically Secure Multi-Party Computation | online |
2014 | eprint | Fine Tuning the Function Field Sieve Algorithm for the Medium Prime Case | online |
2014 | eprint | Security of Symmetric Encryption against Mass Surveillance | online |
2014 | eprint | "Ooh Aah... Just a Little Bit" : A small amount of side channel can go a long way | online |
2014 | eprint | The M3dcrypt Password Scheme | online |
2014 | eprint | Minimizing the Two-Round Even-Mansour Cipher | online |
2014 | eprint | Black-Box Non-Black-Box Zero Knowledge | online |
2014 | eprint | FeW: A Lightweight Block Cipher | online |
2014 | eprint | A Security Proof of KCDSA using an extended Random Oracle Model | online |
2014 | eprint | TOWARD CERTIFICATELESS SIGNCRYPTION SCHEME WITHOUT RANDOM ORACLES | online |
2014 | eprint | Pipelineable On-Line Encryption | online |
2014 | eprint | Unified, Minimal and Selectively Randomizable Structure-Preserving Signatures | online |
2014 | eprint | New Classes of Public Key Cryptosystems over $F_2^8$ Constructed Based on Reed-Solomon Codes, K(XVII)SE(1)PKC and K(XVII)$\Sigma \Pi$PKC | online |
2014 | eprint | Efficient Secure and Verifiable Outsourcing of Matrix Multiplications | online |
2014 | eprint | On powers of codes | online |
2014 | eprint | Cryptanalysis and Security Enhancement of Two Advanced Authentication Protocols | online |
2014 | eprint | On Decomposition of an NFSR into a Cascade Connection of Two Smaller | online |
2014 | eprint | One-Round Witness Indistinguishability from Indistinguishability Obfuscation | online |
2014 | eprint | (Hierarchical) Identity-Based Encryption from Affine Message Authentication | online |
2014 | eprint | How Secure is Deterministic Encryption? | online |
2014 | eprint | Fast point multiplication algorithms for binary elliptic curves with and without precomputation | online |
2014 | eprint | On the Optimality of Differential Fault Analyses on CLEFIA | online |
2014 | eprint | Dishonest Majority Multi-Party Computation for Binary Circuits | online |
2014 | eprint | RSA meets DPA: Recovering RSA Secret Keys from Noisy Analog Data | online |
2014 | eprint | A new public key system based on Polynomials over finite fields GF(2) | online |
2014 | eprint | THE NEW HEURISTIC GUESS AND DETERMINE ATTACK ON SNOW 2.0 STREAM CIPHER | online |
2014 | eprint | A Subexponential Construction of Graph Coloring for Multiparty Computation | online |
2014 | eprint | Explicit endomorphism of the Jacobian of a hyperelliptic function field of genus 2 using base field operations | online |
2014 | eprint | Key-policy Attribute-based Encryption for Boolean Circuits from Bilinear Maps | online |
2014 | eprint | Verifiable Oblivious Storage | online |
2014 | eprint | Compact VSS and Efficient Homomorphic UC Commitments | online |
2014 | eprint | Efficient, Oblivious Data Structures for MPC | online |
2014 | eprint | Fast Lattice Point Enumeration with Minimal Overhead | online |
2014 | eprint | Formal Analysis of Chaumian Mix Nets with Randomized Partial Checking | online |
2014 | eprint | Expressive and Secure Searchable Encryption in the Public Key Setting (Full Version) | online |
2014 | eprint | Torsion Limits and Riemann-Roch Systems for Function Fields and Applications | online |
2014 | eprint | Modelling After-the-fact Leakage for Key Exchange | online |
2014 | eprint | Calculating Cryptographic Degree of an S-Box | online |
2014 | eprint | Unifying Leakage Models: from Probing Attacks to Noisy Leakage | online |
2014 | eprint | Cryptanalysis of KLEIN (Full version) | online |
2014 | eprint | How to Use Bitcoin to Design Fair Protocols | online |
2014 | eprint | The Exact PRF-Security of NMAC and HMAC | online |
2014 | eprint | The Hunting of the SNARK | online |
2014 | eprint | A Comparison of the Homomorphic Encryption Schemes FV and YASHE | online |
2014 | eprint | Verifiable Delegated Set Intersection Operations on Outsourced Encrypted Data | online |
2014 | eprint | Non-Interactive Cryptography in the RAM Model of Computation | online |
2014 | eprint | Construction of New Families of MDS Diffusion Layers | online |
2014 | eprint | Space-efficient, byte-wise incremental and perfectly private encryption schemes | online |
2014 | eprint | Dual System Groups and its Applications - Compact HIBE and More | online |
2014 | eprint | Towards Characterizing Complete Fairness in Secure Two-Party Computation | online |
2014 | eprint | Fully secure constrained pseudorandom functions using random oracles | online |
2014 | eprint | Improved Generic Attacks Against Hash-based MACs and HAIFA | online |
2014 | eprint | On Virtual Grey Box Obfuscation for General Circuits | online |
2014 | eprint | Reconsidering Generic Composition | online |
2014 | eprint | Pseudorandom Generator Based on Hard Lattice Problem | online |
2014 | eprint | Optimized Architecture for AES | online |
2014 | eprint | Garbled RAM Revisited, Part II | online |
2014 | eprint | Extending and Applying a Framework for the Cryptographic Verification of Java Programs | online |
2014 | eprint | Anonymous Authentication with Shared Secrets | online |
2014 | eprint | On the Enumeration of Double-Base Chains with Applications to Elliptic Curve Cryptography | online |
2014 | eprint | An Investigation of Some Forward Security Properties for PEKS and IBE | online |
2014 | eprint | Leakage-Resilient Signatures with Graceful Degradation | online |
2014 | eprint | Cryptanalysis of and Improvement on Biometric-based User Authentication Scheme for C/S System | online |
2014 | eprint | Realizing Pico: Finally No More Passwords! | online |
2014 | eprint | Round-Efficient Black-Box Construction of Composable Multi-Party Computation | online |
2014 | eprint | Cuckoo Cycle: a memory-hard proof-of-work system | online |
2014 | eprint | bitcoin.BitMint: Reconciling Bitcoin with Central Banks | online |
2014 | eprint | Automatic Protocol Selection in Secure Two-Party Computations | online |
2014 | eprint | AnoA: A Framework For Analyzing Anonymous Communication Protocols | online |
2014 | eprint | A Forgery Attack against PANDA-s | online |
2014 | eprint | Online/Offline Attribute-Based Encryption | online |
2014 | eprint | Encryption Quality Analysis of the RCBC Block Cipher Compared with RC6 and RC5 Algorithms | online |
2014 | eprint | Accelerating NTRU based Homomorphic Encryption using GPUs | online |
2014 | eprint | Security Analysis of Multilinear Maps over the Integers | online |
2014 | eprint | A Genetic Algorithm for Searching Shortest Lattice Vector of SVP Challenge | online |
2014 | eprint | Simon's Circuit | online |
2014 | eprint | Stronger Security Notions for Decentralized Traceable Attribute-Based Signatures and More Efficient Constructions | online |
2014 | eprint | Using Random Error Correcting Codes in Near-Collision Attacks on Generic Hash-Functions | online |
2014 | eprint | Short Signatures from Diffie-Hellman, Revisited: Sublinear Public Key, CMA Security, and Tighter Reduction | online |
2014 | eprint | Cofactorization on Graphics Processing Units | online |
2014 | eprint | Nearly Practical and Privacy-Preserving Proofs on Authenticated Data | online |
2014 | eprint | Analysis of a Modified RC4 Algorithm | online |
2014 | eprint | A Theoretical Study of Kolmogorov-Smirnov Distinguishers: Side-Channel Analysis vs. Differential Cryptanalysis | online |
2014 | eprint | Isogeny graphs with maximal real multiplication | online |
2014 | eprint | An Asymptotically Optimal Structural Attack on the ABC Multivariate Encryption Scheme | online |
2014 | eprint | Trial multiplication is not optimal but... On the symmetry of finite cyclic groups (Z/pZ)∗ | online |
2014 | eprint | Beyond 2^{c/2} Security in Sponge-Based Authenticated Encryption Modes | online |
2014 | eprint | Rounding and Chaining LLL: Finding Faster Small Roots of Univariate Polynomial Congruences | online |
2014 | eprint | Privacy-Preserving Implicit Authentication | online |
2014 | eprint | Private and Dynamic Time-Series Data Aggregation with Trust Relaxation | online |
2014 | eprint | Cryptanalysis and Improvement on Robust Three-Factor Remote User Authentication Scheme with Key Agreement for Multimedia System | online |
2014 | eprint | PPDCP-ABE: Privacy-Preserving Decentralized Cipher-Policy Attribute-Based Encryption | online |
2014 | eprint | Verifiable and Secure Outsourcing Schemes of Modular Exponentiations Using One Untrusted Cloud Server and Their Application | online |
2014 | eprint | A Novel Modular Adder for One Thousand Bits and More Using Fast Carry Chains of Modern FPGAs | online |
2014 | eprint | Privacy preserving delegated word search in the cloud | online |
2014 | eprint | Finding Roots in GF(p^n) with the Successive Resultant Algorithm | online |
2014 | eprint | The SPEKE Protocol Revisited | online |
2014 | eprint | A Key Recovery Attack on Error Correcting Code Based a Lightweight Security Protocol | online |
2014 | eprint | Branching Heuristics in Differential Collision Search with Applications to SHA-512 | online |
2014 | eprint | Countermeasures Against High-Order Fault-Injection Attacks on CRT-RSA | online |
2014 | eprint | Revisiting the Gentry-Szydlo Algorithm | online |
2014 | eprint | On Key Recovery Attacks against Existing Somewhat Homomorphic Encryption Schemes | online |
2014 | eprint | Privacy-preserving Data Aggregation with Optimal Utility | online |
2014 | eprint | Bounded-Collusion Identity-Based Encryption from Semantically-Secure Public-Key Encryption: Generic Constructions with Short Ciphertexts | online |
2014 | eprint | General Impossibility of Group Homomorphic Encryption in the Quantum World | online |
2014 | eprint | A Secure Text Messaging Protocol | online |
2014 | eprint | Redefining the Transparency Order | online |
2014 | eprint | Weak-Key Leakage Resilient Cryptography | online |
2014 | eprint | Chaskey: An Efficient MAC Algorithm for 32-bit Microcontrollers | online |
2014 | eprint | Related Key Secure PKE from Hash Proof Systems | online |
2014 | eprint | 4-point Attacks with Standard Deviation Analysis on A-Feistel Schemes | online |
2014 | eprint | Forgery on Stateless CMCC | online |
2014 | eprint | Improved Analysis of Zorro-Like Ciphers | online |
2014 | eprint | Groups With Two Generators Having Unsolvable Word Problem And Presentations of Mihailova Subgroups | online |
2014 | eprint | Algorithms in HElib | online |
2014 | eprint | The Randomized Iterate Revisited - Almost Linear Seed Length PRGs from A Broader Class of One-way Functions | online |
2014 | eprint | Efficient Hidden Vector Encryption with Constant-Size Ciphertext | online |
2014 | eprint | Tight Security Bounds for Triple Encryption | online |
2014 | eprint | A Little Honesty Goes a Long Way: The Two-Tier Model for Secure Multiparty Computation | online |
2014 | eprint | Fast GPGPU-Based Elliptic Curve Scalar Multiplication | online |
2014 | eprint | Privacy-Preserving Auditing for Attribute-Based Credentials | online |
2014 | eprint | STRIBOB: Authenticated Encryption from GOST R 34.11-2012 LPS Permutation | online |
2014 | eprint | Authentication Schemes Based on Resilient Maps | online |
2014 | eprint | Provably secure and efficient certificateless signature in the standard model | online |
2014 | eprint | When a Boolean Function can be Expressed as the Sum of two Bent Functions | online |
2014 | eprint | Ad-Hoc Secure Two-Party Computation on Mobile Devices using Hardware Tokens | online |
2014 | eprint | On the Classification of Finite Boolean Functions up to Fairness | online |
2014 | eprint | Block Ciphers - Focus On The Linear Layer (feat. PRIDE): Full Version | online |
2014 | eprint | A Note on the CLRW2 Tweakable Block Cipher Construction | online |
2014 | eprint | Large-Scale Secure Computation | online |
2014 | eprint | rPIR: Ramp Secret Sharing based Communication Efficient Private Information Retrieval | online |
2014 | eprint | The Temperature Side Channel and Heating Fault Attacks | online |
2014 | eprint | Maximal Information Coefficient Analysis | online |
2014 | eprint | Oblivious Data Structures | online |
2014 | eprint | Virtual Proofs of Reality | online |
2014 | eprint | SPOKE: Simple Password-Only Key Exchange in the Standard Model | online |
2014 | eprint | Automatic Proofs of Privacy of Secure Multi-Party Computation Protocols Against Active Adversaries | online |
2014 | eprint | On the Complexity of Finding Low-Level Solutions | online |
2014 | eprint | Key Derivation From Noisy Sources With More Errors Than Entropy | online |
2014 | eprint | Studying Potential Side Channel Leakages on an Embedded Biometric Comparison System | online |
2014 | eprint | Bootstrappable Identity-Based Fully Homomorphic Encryption | online |
2014 | eprint | Differential Power Analysis of a McEliece Cryptosystem | online |
2014 | eprint | Proposing Individualization of the design of cryptographic hardware accelerators as countermeasure against structure and side channel analysis | online |
2014 | eprint | Breaking `128-bit Secure' Supersingular Binary Curves (or how to solve discrete logarithms in $\F_{2^{4 \cdot 1223}}$ and $\F_{2^{12 \cdot 367}}$) | online |
2014 | eprint | Efficient Selection of Time Samples for Higher-Order DPA with Projection Pursuits | online |
2014 | eprint | MSEA: Modified Symmetric Encryption Algorithm | online |
2014 | eprint | Automated Proof for Authorization Protocols of TPM 2.0 in Computational Model (full version) | online |
2014 | eprint | Improved Meet-in-the-Middle Attacks on Reduced-Round Camellia-192/256 | online |
2014 | eprint | AES-Based Authenticated Encryption Modes in Parallel High-Performance Software | online |
2014 | eprint | Two-sources Randomness Extractors for Elliptic Curves | online |
2014 | eprint | Anonymous and Publicly Linkable Reputation Systems | online |
2014 | eprint | Publicly Auditable Secure Multi-Party Computation | online |
2014 | eprint | Cryptanalysis of the MORE symmetric key fully homomorphic encryption scheme | online |
2014 | eprint | FFS Factory: Adapting Coppersmith's "Factorization Factory" to the Function Field Sieve | online |
2014 | eprint | The M3lcrypt Password Based Key Derivation Function | online |
2014 | eprint | Optimal Resilience Broadcast against Locally Bounded and General Adversaries | online |
2014 | eprint | Secret-Sharing for NP from Indistinguishability Obfuscation | online |
2014 | eprint | Privacy-Free Garbled Circuits with Applications To Efficient Zero-Knowledge | online |
2014 | eprint | Proving Correctness and Security of Two-Party Computation Implemented in Java in Presence of a Semi-Honest Sender | online |
2014 | eprint | Lattice-based Group Signature Scheme with Verifier-local Revocation | online |
2014 | eprint | Function-Private Functional Encryption in the Private-Key Setting | online |
2014 | eprint | Constructing CCA-secure predicate encapsulation schemes from CPA-secure schemes and universal one-way hash functions | online |
2014 | eprint | Proof of Activity: Extending Bitcoin's Proof of Work via Proof of Stake | online |
2014 | eprint | Authenticated Encryption with SPECK | online |
2014 | eprint | Computing on the Edge of Chaos: Structure and Randomness in Encrypted Computation | online |
2014 | eprint | On the Cost of Lazy Engineering for Masked Software Implementations | online |
2014 | eprint | Public-Key Encryption Resilient Against Linear Related-Key Attacks Revisited | online |
2014 | eprint | Universally Composable secure TNC protocol based on IF-T binding to TLS | online |
2014 | eprint | Efficient Quantum-Immune Keyless Signatures with Identity | online |
2014 | eprint | A Full Characterization of Completeness for Two-party Randomized Function Evaluation | online |
2014 | eprint | Efficient Authentication and Pseudorandomness from Weaker (Ring-)LPN Assumptions | online |
2014 | eprint | Securing Cloud Data in the New Attacker Model | online |
2014 | eprint | Yao's millionaires' problem and decoy-based public key encryption by classical physics | online |
2014 | eprint | Twisting Edwards curves with isogenies | online |
2014 | eprint | Private Web Search with Constant Round Efficiency | online |
2014 | eprint | MaxMinMax problem and sparse equations over finite fields | online |
2014 | eprint | Investigating the Feasibility of LEAP+ in ZigBee Specification | online |
2014 | eprint | Graph-theoretic design and analysis of key predistribution schemes | online |
2014 | eprint | Identity-based encryption and digital signature schemes using extended chaotic maps | online |
2014 | eprint | One-Pass Authenticated Key Establishment Protocol on Bilinear Pairings for Wireless Sensor Networks | online |
2014 | eprint | A Simple Cast-as-Intended E-Voting Protocol by Using Secure Smart Cards | online |
2014 | eprint | Efficient Record-Level Keyless Signatures for Audit Logs | online |
2014 | eprint | Multiple Di fferential Cryptanalysis of Round-Reduced PRINCE (Full version) | online |
2014 | eprint | Performance Increasing Approaches For Binary Field Inversion | online |
2014 | eprint | Efficient Fuzzy Search on Encrypted Data | online |
2014 | eprint | Comments on: EIBAS - an efficient identity broadcast authentication scheme in wireless sensor networks | online |
2014 | eprint | FleXOR: Flexible garbling for XOR gates that beats free-XOR | online |
2014 | eprint | A Simpler Variant of Universally Composable Security for Standard Multiparty Computation | online |
2014 | eprint | Zerocash: Decentralized Anonymous Payments from Bitcoin | online |
2014 | eprint | An optimal representation for the trace zero subgroup | online |
2014 | eprint | A Punctured Programming Approach to Adaptively Secure Functional Encryption | online |
2014 | eprint | Wait a minute! A fast, Cross-VM attack on AES | online |
2014 | eprint | Practical Attribute Based Encryption: Traitor Tracing, Revocation, and Large Universe | online |
2014 | eprint | A Strong and Efficient Certificateless Digital Signature Scheme | online |
2014 | eprint | Linear Extension Cube Attack on Stream Ciphers | online |
2014 | eprint | Using Indistinguishability Obfuscation via UCEs | online |
2014 | eprint | Some Theoretical Conditions for Menezes-Qu-Vanstone Key Agreement to Provide Implicit Key Authentication | online |
2014 | eprint | An Efficient Cloud-based Revocable Identity-based Proxy Re-encryption Scheme for Public Clouds Data Sharing | online |
2014 | eprint | Down the Rabbit Hole: Revisiting the Shrinking Method | online |
2014 | eprint | A NEW SCALAR POINT MULTIPLICATION SCHEME IN ECC BASED ON ZECKENDORF REPRESENTATION AND MULTIBASE CONCEPT | online |
2014 | eprint | Statistical weaknesses in 20 RC4-like algorithms and (probably) the simplest algorithm free from these weaknesses - VMPC-R | online |
2014 | eprint | Authenticated Key Exchange from Ideal Lattices | online |
2014 | eprint | Indistinguishability Obfuscation versus Point Obfuscation with Auxiliary Input | online |
2014 | eprint | Optimal Non-Perfect Uniform Secret Sharing Schemes | online |
2014 | eprint | Mixcoin: Anonymity for Bitcoin with accountable mixes | online |
2014 | eprint | On the Effective Prevention of TLS Man-In-The-Middle Attacks in Web Applications | online |
2014 | eprint | KT-ORAM: A Bandwidth-efficient ORAM Built on K-ary Tree of PIR Nodes | online |
2014 | eprint | Polynomial Spaces: A New Framework for Composite-to-Prime-Order Transformations | online |
2014 | eprint | On the security of Xu et al.'s authentication and key agreement scheme for telecare medicine information systems | online |
2014 | eprint | Scan Based Side Channel Attack on Grain v1 | online |
2014 | eprint | A Second Look at Fischlin's Transformation | online |
2014 | eprint | Non-Malleable Extractors with Shorter Seeds and Min-Entropy Rate <1/2 | online |
2014 | eprint | Exponent-inversion Signatures and IBE under Static Assumptions | online |
2014 | eprint | FOAM: Searching for Hardware-Optimal SPN Structures and Components with a Fair Comparison | online |
2014 | eprint | New and Improved Key-Homomorphic Pseudorandom Functions | online |
2014 | eprint | Doubly Spatial Encryption from DBDH | online |
2014 | eprint | Quantum Attacks on Classical Proof Systems - The Hardness of Quantum Rewinding | online |
2014 | eprint | Reducing the Overhead of Cloud MPC | online |
2014 | eprint | Impossible differential cryptanalysis of LBlock with concrete investigation of key scheduling algorithm | online |
2014 | eprint | A Simple Recursive Tree Oblivious RAM | online |
2014 | eprint | Whitewash: Outsourcing Garbled Circuit Generation for Mobile Devices | online |
2014 | eprint | A Practical Second-Order Fault Attack against a Real-World Pairing Implementation | online |
2014 | eprint | Design of identity-based digital signature schemes using extended chaotic maps | online |
2014 | eprint | Dynamic Searchable Encryption via Blind Storage | online |
2014 | eprint | Quantum position verification in the random oracle model | online |
2014 | eprint | The Related-Key Analysis of Feistel Constructions | online |
2014 | eprint | Multi-Vendor PayWord with Payment Approval | online |
2014 | eprint | On The Orthogonal Vector Problem and The Feasibility of Unconditionally Secure Leakage Resilient Computation | online |
2014 | eprint | Privacy-Enhanced Participatory Sensing with Collusion-Resistance and Data Aggregation | online |
2014 | eprint | Optimally Resilient and Adaptively Secure Multi-Party Computation with Low Communication Locality | online |
2014 | eprint | Enhancing Oblivious RAM Performance Using Dynamic Prefetching | online |
2014 | eprint | The Fourier Entropy-Influence conjecture holds for a log-density 1 class of cryptographic Boolean functions | online |
2014 | eprint | Logic Synthesis based Public Key Scheme | online |
2014 | eprint | Collision Attack on 5 Rounds of Grøstl | online |
2014 | eprint | Composable Oblivious Extended Permutations | online |
2014 | eprint | Certification and Efficient Proofs of Committed Topology Graphs | online |
2014 | eprint | Collision Spectrum, Entropy Loss, T-Sponges, and Cryptanalysis of GLUON-64 | online |
2014 | eprint | (Nothing else) MATor(s): Monitoring the Anonymity of Tor's Path Selection | online |
2014 | eprint | Multiprecision multiplication on AVR revisited | online |
2014 | eprint | Dual System Encryption via Doubly Selective Security: Framework, Fully-secure Functional Encryption for Regular Languages, and More | online |
2014 | eprint | A Simple Framework for Noise-Free Construction of Fully Homomorphic Encryption from a Special Class of Non-Commutative Groups | online |
2014 | eprint | Scalable Zero Knowledge via Cycles of Elliptic Curves | online |
2014 | eprint | Faster Bootstrapping with Polynomial Error | online |
2014 | eprint | FPGA-Based High Performance AES-GCM Using Efficient Karatsuba Ofman Algorithm | online |
2014 | eprint | Universally Composable Non-Interactive Key Exchange | online |
2014 | eprint | A Bound For Multiparty Secret Key Agreement And Implications For A Problem Of Secure Computing | online |
2014 | eprint | CLOC: Authenticated Encryption for Short Input | online |
2014 | eprint | Triple and Quadruple Encryption: Bridging the Gaps | online |
2014 | eprint | Deja Q: Using Dual Systems to Revisit q-Type Assumptions | online |
2014 | eprint | Toward Robust Hidden Volumes using Write-Only Oblivious RAM | online |
2014 | eprint | Cryptographic Schemes Based on the ASASA Structure: Black-box, White-box, and Public-key | online |
2014 | eprint | Some security bounds for the DGHV scheme | online |
2014 | eprint | How to Avoid Obfuscation Using Witness PRFs | online |
2014 | eprint | Elligator Squared: Uniform Points on Elliptic Curves of Prime Order as Uniform Random Strings | online |
2014 | eprint | PoS Cryptocurrency wtih No Blockchain | online |
2014 | eprint | Ideal Social Secret Sharing Using Birkhoff Interpolation Method | online |
2014 | eprint | Rmind: a tool for cryptographically secure statistical analysis | online |
2014 | eprint | Diffusion Matrices from Algebraic-Geometry Codes with Efficient SIMD Implementation | online |
2014 | eprint | Automated algebraic analysis of structure-preserving signature schemes | online |
2014 | eprint | Improved Differential Cryptanalysis of Round-Reduced Speck | online |
2014 | eprint | Structural Cryptanalysis of McEliece Schemes with Compact Keys | online |
2014 | eprint | Honey Encryption: Security Beyond the Brute-Force Bound | online |
2014 | eprint | Differential Properties of the HFE Cryptosystem | online |
2014 | eprint | Indistinguishability Obfuscation and UCEs: The Case of Computationally Unpredictable Sources | online |
2014 | eprint | Combining Leakage-Resilient PRFs and Shuffling (Towards Bounded Security for Small Embedded Devices) | online |
2014 | eprint | Logical Reasoning to Detect Weaknesses About SHA-1 and MD4/5 | online |
2014 | eprint | On Cryptographic Applications of Matrices Acting on Finite Commutative Groups and Rings | online |
2014 | eprint | Spatial Bloom Filters: Enabling Privacy in Location-aware Applications | online |
2014 | eprint | Solving Random Subset Sum Problem by lp-norm SVP Oracle | online |
2014 | eprint | The Hash Function "Fugue" | online |
2014 | eprint | Public-Coin Concurrent Zero-Knowledge in Logarithmic Rounds | online |
2014 | eprint | On the Security of the Pre-Shared Key Ciphersuites of TLS | online |
2014 | eprint | Chosen Ciphertext Security via Point Obfuscation | online |
2014 | eprint | An Effective RC4 Stream Cipher | online |
2014 | eprint | Good is Not Good Enough: Deriving Optimal Distinguishers from Communication Theory | online |
2014 | eprint | Optimal constructions for ID-based one-way-function key predistribution schemes realizing specified communication graphs | online |
2014 | eprint | Verifiable Computation over Encrypted Data in the Presence of Verification Queries | online |
2014 | eprint | Weak instances of composite order protocols | online |
2014 | eprint | Curve41417: Karatsuba revisited | online |
2014 | eprint | (De-)Constructing TLS | online |
2014 | eprint | MJH: A Faster Alternative to MDC-2 | online |
2014 | eprint | Optimal Contracts for Outsourced Computation | online |
2014 | eprint | JHAE: An Authenticated Encryption Mode Based on JH | online |
2014 | eprint | The Multiple Number Field Sieve for Medium and High Characteristic Finite Fields | online |
2014 | eprint | Adaptively Secure Functional Encryption for Finite Languages from DLIN Assumption | online |
2014 | eprint | An Algebraic Approach to Non-Malleability | online |
2014 | eprint | Adding Controllable Linkability to Pairing-Based Group Signatures For Free | online |
2014 | eprint | Direct Construction of Recursive MDS Diffusion Layers using Shortened BCH Codes | online |
2014 | eprint | One-Way Functions and (Im)perfect Obfuscation | online |
2014 | eprint | Secure Outsourced Computation of the Characteristic Polynomial and Eigenvalues of Matrix | online |
2014 | eprint | Security Analysis of Key-Alternating Feistel Ciphers | online |
2014 | eprint | Total Break of Zorro using Linear and Differential Attacks | online |
2014 | eprint | CKEF: A Cluster-based Key Establishment Framework for homogenous mobile and static wireless sensor networks | online |
2014 | eprint | Recovering OpenSSL ECDSA Nonces Using the FLUSH+RELOAD Cache Side-channel Attack | online |
2014 | eprint | Lyra: Password-Based Key Derivation with Tunable Memory and Processing Costs | online |
2014 | eprint | Explicit Optimal Binary Pebbling for One-Way Hash Chain Reversal | online |
2014 | eprint | General Statistically Secure Computation with Bounded-Resettable Hardware Tokens | online |
2014 | eprint | Machine Learning Classification over Encrypted Data | online |
2014 | eprint | Anonymous Two-Factor Authentication: Certain Goals Are Beyond Attainment | online |
2014 | eprint | Secure Compression: Theory \& Practice | online |
2014 | eprint | EM Attack Is Non-Invasive? - Design Methodology and Validity Verification of EM Attack Sensor | online |
2014 | eprint | Sealing the Leak on Classical NTRU signatures | online |
2014 | eprint | Post-quantum key exchange for the TLS protocol from the ring learning with errors problem | online |
2014 | eprint | Deleting Secret Data with Public Verifiability | online |
2014 | eprint | NSEC5: Provably Preventing DNSSEC Zone Enumeration | online |
2014 | eprint | Outsourcing Private RAM Computation | online |
2014 | eprint | Adaptively Secure Puncturable Pseudorandom Functions in the Standard Model | online |
2014 | eprint | New Results in the Linear Cryptanalysis of DES | online |
2014 | eprint | Secret and Verifiable Delegated Voting for Wide Representation | online |
2014 | eprint | Tight security bounds for multiple encryption | online |
2014 | eprint | Explicit Non-Malleable Codes Resistant to Permutations | online |
2014 | eprint | Continuous Non-malleable Codes | online |
2014 | eprint | McEliece in the world of Escher | online |
2014 | eprint | Towards a Unified Theory of Cryptographic Agents | online |
2014 | eprint | Providing Root of Trust for ARM TrustZone using SRAM PUFs | online |
2014 | eprint | A realtime key recovery attack on the authenticated cipher FASER128 | online |
2014 | eprint | Handycipher: a Low-tech, Randomized, Symmetric-key Cryptosystem | online |
2014 | eprint | On Constrained Implementation of Lattice-based Cryptographic Primitives and Schemes on Smart Cards | online |
2014 | eprint | Leveled Fully Homomorphic Signatures from Standard Lattices | online |
2014 | eprint | System-level non-interference for constant-time cryptography | online |
2014 | eprint | Fully Secure Attribute Based Encryption from Multilinear Maps | online |
2014 | eprint | New Treatment of the BSW Sampling and Its Applications to Stream Ciphers | online |
2014 | eprint | Efficient Non-Interactive Verifiable Outsourced Computation for Arbitrary Functions | online |
2014 | eprint | SHADOW NUMBERS PUBLIC KEY ENCRYPTION | online |
2014 | eprint | Algebraic Properties of Modular Addition Modulo a Power of Two | online |
2014 | eprint | Efficient and Strongly Secure Dynamic Domain-Specific Pseudonymous Signatures for ID Documents | online |
2014 | eprint | Publicly Evaluable Pseudorandom Functions and Their Applications | online |
2014 | eprint | Simulation-Time Security Margin Assessment against Power-Based Side Channel Attacks | online |
2014 | eprint | Remarks on the Pocklington and Padr\'o-S\'aez Cube Root Algorithm in $\mathbb F_q$ | online |
2014 | eprint | Structure-Preserving Signatures from Type II Pairings | online |
2014 | eprint | Software implementation of an Attribute-Based Encryption scheme | online |
2014 | eprint | Selecting Elliptic Curves for Cryptography: An Efficiency and Security Analysis | online |
2014 | eprint | Attribute-Based Signatures without Pairings by the Fiat-Shamir Transformation | online |
2014 | eprint | Data Security in Cloud Architecture Based on Diffie Hellman and Elliptical Curve Cryptography | online |
2014 | eprint | A Certificate-Based Proxy Signature with Message Recovery without Bilinear Pairing | online |
2014 | eprint | Generalized proper matrices and constructing of $m$-resilient Boolean functions with maximal nonlinearity for expanded range of parameters | online |
2014 | eprint | A Provable Security Analysis of Intel's Secure Key RNG | online |
2014 | eprint | Locally Decodable Codes for edit distance | online |
2014 | eprint | A Framework and Compact Constructions for Non-monotonic Attribute-Based Encryption | online |
2014 | eprint | Preimage attacks on Reduced-round Stribog | online |
2014 | eprint | Invisible Adaptive Attacks | online |
2014 | eprint | RPKI vs ROVER: Comparing the Risks of BGP Security Solutions | online |
2014 | eprint | Time-Memory Trade-offs for Index Calculus in Genus 3 | online |
2014 | eprint | Improved Leakage Model Based on Genetic Algorithm | online |
2014 | eprint | Removing Erasures with Explainable Hash Proof Systems | online |
2014 | eprint | A Secure Cloud-based NFC Mobile Payment Protocol | online |
2014 | eprint | A New Way to Prevent UKS Attacks Using Trusted Computing | online |
2014 | eprint | Bandwidth Efficient PIR from NTRU | online |
2014 | eprint | Security Analysis of an Identity-Based Strongly Unforgeable Signature Scheme | online |
2014 | eprint | Template Attacks Based On Priori Knowledge | online |
2014 | eprint | Implementation and Comparison of Lattice-based Identification Protocols on Smart Cards and Microcontrollers | online |
2014 | eprint | A Practical Universal Forgery Attack against PAES-8 | online |
2014 | eprint | Faster Private Set Intersection based on OT Extension | online |
2014 | eprint | SETUP in Secret Sharing Schemes | online |
2014 | eprint | Improved Impossible Differential Attacks against Round-Reduced LBlock | online |
2014 | eprint | Verifiable Computation in Multiparty Protocols with Honest Majority | online |
2014 | eprint | On the Limits of Computational Fuzzy Extractors | online |
2014 | eprint | Optimizing Obfuscation: Avoiding Barrington's Theorem | online |
2014 | eprint | A Generic Scan Attack on Hardware based eStream Winners | online |
2014 | eprint | Kummer strikes back: new DH speed records | online |
2014 | eprint | Expressive Attribute-Based Encryption with Constant-Size Ciphertexts from the Decisional Linear Assumption | online |
2014 | eprint | The Locality of Searchable Symmetric Encryption | online |
2014 | eprint | Lattice Cryptography for the Internet | online |
2014 | eprint | A new attack on RSA with a composed decryption exponent | online |
2014 | eprint | How to Watermark Cryptographic Functions | online |
2014 | eprint | On the quaternion $\ell$-isogeny path problem | online |
2014 | eprint | An Improved Truncated Di fferential Cryptanalysis of KLEIN | online |
2014 | eprint | Differential Analysis on Block Cipher PRIDE | online |
2014 | eprint | Improved Exponential-time Algorithms for Inhomogeneous-SIS | online |
2014 | eprint | A Security Analysis of the Composition of ChaCha20 and Poly1305 | online |
2014 | eprint | Improved Slender-set Linear Cryptanalysis | online |
2014 | eprint | Scale-Invariant Fully Homomorphic Encryption over the Integers | online |
2014 | eprint | Reversing Stealthy Dopant-Level Circuits | online |
2014 | eprint | Even more practical secure logging: Tree-based Seekable Sequential Key Generators | online |
2014 | eprint | NREPO: Normal Basis Recomputing with Permuted Operands | online |
2014 | eprint | Implementation and improvement of the Partial Sum Attack on 6-round AES | online |
2014 | eprint | Enhanced Lattice-Based Signatures on Reconfigurable Hardware | online |
2014 | eprint | Improved Differential Attacks on Reduced SIMON Versions | online |
2014 | eprint | Unified Oblivious-RAM: Improving Recursive ORAM with Locality and Pseudorandomness | online |
2014 | eprint | Optimized Implementation of General Secret Sharing Scheme | online |
2014 | eprint | Relational Hash | online |
2014 | eprint | From Input Private to Universally Composable Secure Multiparty Computation Primitives | online |
2014 | eprint | On the Pitfalls of using Arbiter-PUFs as Building Blocks | online |
2014 | eprint | Active and Passive Side-Channel Attacks on Delay Based PUF Designs | online |
2014 | eprint | Optimality of Non-Adaptive Strategies: The Case of Parallel Games | online |
2014 | eprint | ICEPOLE: High-speed, Hardware-oriented Authenticated Encryption | online |
2014 | eprint | Hybrid Model of Fixed and Floating Point Numbers in Secure Multiparty Computations | online |
2014 | eprint | ZAPs and Non-Interactive Witness Indistinguishability from Indistinguishability Obfuscation | online |
2014 | eprint | Toward Practical Homomorphic Evaluation of Block Ciphers Using Prince | online |
2014 | eprint | FFT-Based Key Recovery for the Integral Attack | online |
2014 | eprint | Efficient Privacy-Preserving Big Data Processing through Proxy-Assisted ORAM | online |
2014 | eprint | DTKI: a new formalized PKI with no trusted parties | online |
2014 | eprint | Computing Discrete Logarithms in F_{3^{6*137}} using Magma | online |
2014 | eprint | How to Securely Release Unverified Plaintext in Authenticated Encryption | online |
2014 | eprint | A Security Definition for Multi Secret Sharing and a Scheme Based on LWE | online |
2014 | eprint | A Statistics-based Fundamental Model for Side-channel Attack Analysis | online |
2014 | eprint | How to Choose Interesting Points for Template Attacks? | online |
2014 | eprint | Fully Secure and Fast Signing from Obfuscation | online |
2014 | eprint | Optimizing Information Set Decoding Algorithms to Attack Cyclosymmetric MDPC Codes | online |
2014 | eprint | How to manipulate curve standards: a white paper for the black hat | online |
2014 | eprint | Secure Mutual Testing Strategy for Cryptographic SoCs | online |
2014 | eprint | Fine grain Cross-VM Attacks on Xen and VMware are possible! | online |
2014 | eprint | hHB: a Harder HB+ Protocol | online |
2014 | eprint | Efficient Round Optimal Blind Signatures | online |
2014 | eprint | Oblivious Radix Sort: An Efficient Sorting Algorithm for Practical Secure Multi-party Computation | online |
2014 | eprint | RAW Path ORAM: A Low-Latency, Low-Area Hardware ORAM Controller with Integrity Verification | online |
2014 | eprint | On the Connection between Leakage Tolerance and Adaptive Security | online |
2014 | eprint | Actively Private and Correct MPC Scheme in t<n/2 from Passively Secure Schemes with Small Overhead | online |
2014 | eprint | Constrained Verifiable Random Functions | online |
2014 | eprint | Non-interactive zero-knowledge proofs in the quantum random oracle model | online |
2014 | eprint | Proving the TLS Handshake Secure (as it is) | online |
2014 | eprint | An Optimal Strong Password Authentication Protocol with USB Sticks | online |
2014 | eprint | Efficient Revocable Identity-Based Encryption via Subset Difference Methods | online |
2014 | eprint | Lighter, Faster, and Constant-Time: WhirlBob, the Whirlpool variant of StriBob | online |
2014 | eprint | Completeness for Symmetric Two-Party Functionalities - Revisited | online |
2014 | eprint | Binary Elligator Squared | online |
2014 | eprint | Security and Efficiency Analysis of The Hamming Distance Computation Protocol Based On Oblivious Transfer | online |
2014 | eprint | A Polynomial Time Attack against Algebraic Geometry Code Based Public Key Cryptosystems | online |
2014 | eprint | Efficient Three-Party Computation from Cut-and-Choose | online |
2014 | eprint | Side-Channel Analysis on Blinded Regular Scalar Multiplications | online |
2014 | eprint | Homomorphic Signatures with Efficient Verification for Polynomial Functions | online |
2014 | eprint | Double shielded Public Key Cryptosystems | online |
2014 | eprint | WCFB: a tweakable wide block cipher | online |
2014 | eprint | Improved Secure Implementation of Code-Based Signature Schemes on Embedded Devices | online |
2014 | eprint | Prover Anonymous and Deniable Distance-Bounding Authentication | online |
2014 | eprint | Polynomial Time Attack on Wild McEliece Over Quadratic Extensions | online |
2014 | eprint | Actively Secure Private Function Evaluation | online |
2014 | eprint | Analysis of Boomerang Differential Trails via a SAT-Based Constraint Solver URSA | online |
2014 | eprint | Attribute-Based Encryption Optimized for Cloud Computing | online |
2014 | eprint | Large Universe Ciphertext-Policy Attribute-Based Encryption with White-Box Traceability | online |
2014 | eprint | Comments on a novel user authentication and key agreement scheme | online |
2014 | eprint | Automated Analysis of Cryptographic Assumptions in Generic Group Models | online |
2014 | eprint | Introducing Fault Tolerance into Threshold Password-Authenticated Key Exchange | online |
2014 | eurocrypt | A mathematical history of NTRU and some related cryptosystems | |
2014 | eurocrypt | The Security and Privacy of Bitcoin Transactions | |
2014 | eurocrypt | The Locality of Searchable Symmetric Encryption | online |
2014 | eurocrypt | Efficient Round Optimal Blind Signatures | online |
2014 | eurocrypt | Identity-Based Encryption Secure against Selective Opening Chosen-Ciphertext Attack | online |
2014 | eurocrypt | Key Derivation without Entropy Waste | online |
2014 | eurocrypt | Generic Universal Forgery Attack on Iterative Hash-Based MACs | online |
2014 | eurocrypt | Non-malleability from Malleability: Simulation-Sound Quasi-Adaptive NIZK Proofs and CCA2-Secure Encryption from Homomorphic Signatures | online |
2014 | eurocrypt | Garbled RAM Revisited | online |
2014 | eurocrypt | Unifying Leakage Models: From Probing Attacks to Noisy Leakage | online |
2014 | eurocrypt | Reconsidering Generic Composition | online |
2014 | eurocrypt | Non-Interactive Secure Computation Based on Cut-and-Choose | online |
2014 | eurocrypt | Key-Versatile Signatures and Applications: RKA, KDM and Joint Enc/Sig | online |
2014 | eurocrypt | Higher Order Masking of Look-Up Tables | online |
2014 | eurocrypt | Replacing a Random Oracle: Full Domain Hash from Indistinguishability Obfuscation | online |
2014 | eurocrypt | Parallelizable Rate-1 Authenticated Encryption from Pseudorandom Functions | online |
2014 | eurocrypt | Distributed Point Functions and Their Applications | online |
2014 | eurocrypt | Multi-input Functional Encryption | online |
2014 | eurocrypt | How to Certify the Leakage of a Chip? | online |
2014 | eurocrypt | Revocable Quantum Timed-Release Encryption | online |
2014 | eurocrypt | Symmetrized Summation Polynomials: Using Small Order Torsion Points to Speed Up Elliptic Curve Index Calculus | online |
2014 | eurocrypt | Déjà Q: Using Dual Systems to Revisit q-Type Assumptions | online |
2014 | eurocrypt | Polynomial Time Attack on Wild McEliece over Quadratic Extensions | online |
2014 | eurocrypt | Faster Compact Diffie-Hellman: Endomorphisms on the x-line | online |
2014 | eurocrypt | Sometimes-Recurse Shuffle - Almost-Random Permutations in Logarithmic Expected Time | online |
2014 | eurocrypt | A Heuristic Quasi-Polynomial Algorithm for Discrete Logarithm in Finite Fields of Small Characteristic | online |
2014 | eurocrypt | A Full Characterization of Completeness for Two-Party Randomized Function Evaluation | online |
2014 | eurocrypt | Dual System Encryption via Doubly Selective Security: Framework, Fully Secure Functional Encryption for Regular Languages, and More | online |
2014 | eurocrypt | Salvaging Indifferentiability in a Multi-stage Setting | online |
2014 | eurocrypt | A Bound for Multiparty Secret Key Agreement and Implications for a Problem of Secure Computing | online |
2014 | eurocrypt | Tight Security Bounds for Key-Alternating Ciphers | online |
2014 | eurocrypt | Honey Encryption: Security Beyond the Brute-Force Bound | online |
2014 | eurocrypt | Efficient Non-malleable Codes and Key-Derivation for Poly-size Tampering Circuits | online |
2014 | eurocrypt | Why Proving HIBE Systems Secure Is Difficult | online |
2014 | eurocrypt | Protecting Obfuscation against Algebraic Attacks | online |
2014 | eurocrypt | GGHLite: More Efficient Multilinear Maps from Ideal Lattices | online |
2014 | eurocrypt | Universally Composable Symbolic Analysis for Two-Party Protocols Based on Homomorphic Encryption | online |
2014 | eurocrypt | On the Complexity of UC Commitments | online |
2014 | eurocrypt | Advances in Cryptology - EUROCRYPT 2014 - 33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Copenhagen, Denmark, May 11-15, 2014. Proceedings | |
2014 | eurocrypt | Fully Key-Homomorphic Encryption, Arithmetic Circuit ABE and Compact Garbled Circuits | online |
2014 | eurocrypt | Links between Truncated Differential and Multidimensional Linear Properties of Block Ciphers and Underlying Attack Complexities | online |
2014 | fse | Fast Software Encryption - 21st International Workshop, FSE 2014, London, UK, March 3-5, 2014. Revised Selected Papers | |
2014 | fse | Low weight polynomials and crypto | |
2014 | fse | New Encryption Primitives for Uncertain Times | |
2014 | fse | CLOC: Authenticated Encryption for Short Input | online |
2014 | fse | Improved Slender-Set Linear Cryptanalysis | online |
2014 | fse | Improved Single-Key Attacks on 9-Round AES-192/256 | online |
2014 | fse | Plaintext Recovery Attacks Against WPA/TKIP | online |
2014 | fse | Differential Analysis of Block Ciphers SIMON and SPECK | 546-570 |
2014 | fse | Collision Attack on 5 Rounds of Grøstl | online |
2014 | fse | Equivalent Key Recovery Attacks Against HMAC and NMAC with Whirlpool Reduced to 7 Rounds | online |
2014 | fse | SPRING: Fast Pseudorandom Functions from Rounded Ring Products | online |
2014 | fse | Cryptanalysis of KLEIN | online |
2014 | fse | Collision Spectrum, Entropy Loss, T-Sponges, and Cryptanalysis of GLUON-64 | online |
2014 | fse | Impact of ANSI X9.24-1: 2009 Key Check Value on ISO/IEC 9797-1: 2011 MACs | online |
2014 | fse | On the Minimum Number of Multiplications Necessary for Universal Hash Functions | online |
2014 | fse | Security Analysis of Key-Alternating Feistel Ciphers | online |
2014 | fse | Differential-Linear Cryptanalysis Revisited | online |
2014 | fse | Branching Heuristics in Differential Collision Search with Applications to SHA-512 | online |
2014 | fse | Pipelineable On-line Encryption | online |
2014 | fse | Efficient Fuzzy Search on Encrypted Data | online |
2014 | fse | Dependence in IV-Related Bytes of RC4 Key Enhances Vulnerabilities in WPA | online |
2014 | fse | Improved Linear Sieving Techniques with Applications to Step-Reduced LED-64 | online |
2014 | fse | Multiple Differential Cryptanalysis of Round-Reduced PRINCE | online |
2014 | fse | The Related-Key Analysis of Feistel Constructions | online |
2014 | fse | Cryptanalysis of FIDES | online |
2014 | fse | Probabilistic Slide Cryptanalysis and Its Applications to LED-64 and Zorro | online |
2014 | fse | Direct Construction of Recursive MDS Diffusion Layers Using Shortened BCH Codes | online |
2014 | fse | Differential Cryptanalysis of Round-Reduced Simon and Speck | online |
2014 | fse | COBRA: A Parallelizable Authenticated Online Cipher Without Block Cipher Inverse | online |
2014 | fse | Match Box Meet-in-the-Middle Attack Against KATAN | online |
2014 | fse | APE: Authenticated Permutation-Based Encryption for Lightweight Cryptography | online |
2014 | fse | LS-Designs: Bitslice Encryption for Efficient Masked Software Implementations | online |
2014 | fse | The Indistinguishability of the XOR of k Permutations | online |
2014 | fse | Improved All-Subkeys Recovery Attacks on FOX, KATAN and SHACAL-2 Block Ciphers | online |
2014 | jofc | Key-Dependent Message Security: Generic Amplification and Completeness | 429-451 |
2014 | jofc | Security Models and Proof Strategies for Plaintext-Aware Encryption | 139-180 |
2014 | jofc | Rotational Rebound Attacks on Reduced Skein | 452-479 |
2014 | jofc | An Efficient State Recovery Attack on the X-FCSR Family of Stream Ciphers | 1-22 |
2014 | jofc | Cryptography in the Multi-string Model | 506-543 |
2014 | jofc | Computationally Secure Pattern Matching in the Presence of Malicious Adversaries | 358-395 |
2014 | jofc | A One-Time Stegosystem and Applications to Efficient Covert Communication | 23-44 |
2014 | jofc | Better Security for Deterministic Public-Key Encryption: The Auxiliary-Input Setting | 210-247 |
2014 | jofc | On Strong Simulation and Composable Point Obfuscation | 317-357 |
2014 | jofc | Authenticated Adversarial Routing | 636-771 |
2014 | jofc | On the Amortized Complexity of Zero-Knowledge Protocols | 284-316 |
2014 | jofc | Using Symmetries in the Index Calculus for Elliptic Curves Discrete Logarithm | 595-635 |
2014 | jofc | (Non-)Random Sequences from (Non-)Random Permutations - Analysis of RC4 Stream Cipher | 67-108 |
2014 | jofc | A New Interactive Hashing Theorem | 109-138 |
2014 | jofc | Concurrent Zero Knowledge, Revisited | 45-66 |
2014 | jofc | On Best-Possible Obfuscation | 480-505 |
2014 | jofc | Improved Practical Attacks on Round-Reduced Keccak | 183-209 |
2014 | jofc | Erratum to: A Comparison of Cryptanalytic Tradeoff Algorithms | 181 |
2014 | jofc | Improved Cryptanalysis of AES-like Permutations | 772-798 |
2014 | jofc | Robust Multi-Property Combiners for Hash Functions | 397-428 |
2014 | jofc | Verifiable Random Functions: Relations to Identity-Based Key Encapsulation and New Constructions | 544-593 |
2014 | jofc | Four-Dimensional Gallant-Lambert-Vanstone Scalar Multiplication | 248-283 |
2014 | jofc | A Practical-Time Related-Key Attack on the KASUMI Cryptosystem Used in GSM and 3G Telephony | 824-849 |
2014 | jofc | A Characterization of Chameleon Hash Functions and New, Efficient Designs | 799-823 |
2014 | pkc | Post-Snowden Cryptography | |
2014 | pkc | Multilinear Maps and Obfuscation | |
2014 | pkc | Leakage-Resilient Signatures with Graceful Degradation | online |
2014 | pkc | Lazy Modulus Switching for the BKW Algorithm on LWE | online |
2014 | pkc | Encryption Schemes Secure under Related-Key and Key-Dependent Message Attacks | online |
2014 | pkc | Parallel Gauss Sieve Algorithm: Solving the SVP Challenge over a 128-Dimensional Ideal Lattice | online |
2014 | pkc | Identity-Based Lossy Trapdoor Functions: New Definitions, Hierarchical Extensions, and Implications | online |
2014 | pkc | Elliptic and Hyperelliptic Curves: A Practical Security Analysis | online |
2014 | pkc | Practical Covert Authentication | online |
2014 | pkc | Verifiable Oblivious Storage | online |
2014 | pkc | Online/Offline Attribute-Based Encryption | online |
2014 | pkc | Policy-Based Signatures | online |
2014 | pkc | General Impossibility of Group Homomorphic Encryption in the Quantum World | online |
2014 | pkc | On Minimal Assumptions for Sender-Deniable Public Key Encryption | online |
2014 | pkc | Traceable Group Encryption | online |
2014 | pkc | Fine-Tuning Groth-Sahai Proofs | online |
2014 | pkc | Solving Random Subset Sum Problem by l p -norm SVP Oracle | online |
2014 | pkc | Chosen Ciphertext Security via UCE | online |
2014 | pkc | A Framework and Compact Constructions for Non-monotonic Attribute-Based Encryption | online |
2014 | pkc | Scale-Invariant Fully Homomorphic Encryption over the Integers | online |
2014 | pkc | Related Randomness Attacks for Public Key Encryption | online |
2014 | pkc | Cross-Domain Secure Computation | online |
2014 | pkc | Proxy Re-encryption from Lattices | online |
2014 | pkc | Enhanced Chosen-Ciphertext Security and Applications | online |
2014 | pkc | Simple Chosen-Ciphertext Security from Low-Noise LPN | online |
2014 | pkc | Discrete Logarithm in GF(2809) with FFS | online |
2014 | pkc | Practical Cryptanalysis of a Public-Key Encryption Scheme Based on New Multivariate Quadratic Assumptions | online |
2014 | pkc | Rounding and Chaining LLL: Finding Faster Small Roots of Univariate Polynomial Congruences | online |
2014 | pkc | Verifiable Set Operations over Outsourced Databases | online |
2014 | pkc | Bounded-Collusion Identity-Based Encryption from Semantically-Secure Public-Key Encryption: Generic Constructions with Short Ciphertexts | online |
2014 | pkc | A Black-Box Construction of a CCA2 Encryption Scheme from a Plaintext Aware (sPA1) Encryption Scheme | online |
2014 | pkc | Re-encryption, Functional Re-encryption, and Multi-hop Re-encryption: A Framework for Achieving Obfuscation-Based Security and Instantiations from Lattices | online |
2014 | pkc | Lattice-Based Group Signature Scheme with Verifier-Local Revocation | online |
2014 | pkc | On the Security of the Pre-shared Key Ciphersuites of TLS | online |
2014 | pkc | Leakage-Flexible CCA-secure Public-Key Encryption: Simple Construction and Free of Pairing | online |
2014 | pkc | On the Lossiness of the Rabin Trapdoor Function | online |
2014 | pkc | Generalizing Homomorphic MACs for Arithmetic Circuits | online |
2014 | pkc | Achieving Privacy in Verifiable Computation with Multiple Servers - Without FHE and without Pre-processing | online |
2014 | pkc | Public-Key Cryptography - PKC 2014 - 17th International Conference on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina, March 26-28, 2014. Proceedings | |
2014 | pkc | Functional Signatures and Pseudorandom Functions | online |
2014 | pkc | Efficient Delegation of Zero-Knowledge Proofs of Knowledge in a Pairing-Friendly Setting | online |
2014 | tcc | General Versus Specific Hardness Assumptions in Cryptography | online |
2014 | tcc | Collusion and Privacy in Mechanism Design | online |
2014 | tcc | Can Optimally-Fair Coin Tossing Be Based on One-Way Functions? | online |
2014 | tcc | Unified, Minimal and Selectively Randomizable Structure-Preserving Signatures | online |
2014 | tcc | Securing Circuits and Protocols against 1/poly(k) Tampering Rate | online |
2014 | tcc | Standard versus Selective Opening Security: Separation and Equivalence Results | online |
2014 | tcc | On the Impossibility of Structure-Preserving Deterministic Primitives | online |
2014 | tcc | On the Cryptographic Complexity of the Worst Functions | online |
2014 | tcc | Virtual Black-Box Obfuscation for All Circuits via Generic Graded Encoding | online |
2014 | tcc | Broadcast Amplification | online |
2014 | tcc | Chosen Ciphertext Security via Point Obfuscation | online |
2014 | tcc | How to Fake Auxiliary Input | online |
2014 | tcc | Two-Round Secure MPC from Indistinguishability Obfuscation | online |
2014 | tcc | Dual System Encryption via Predicate Encodings | online |
2014 | tcc | Obfuscation for Evasive Functions | online |
2014 | tcc | One-Sided Adaptively Secure Two-Party Computation | online |
2014 | tcc | On the Power of Public-Key Encryption in Secure Computation | online |
2014 | tcc | Locally Updatable and Locally Decodable Codes | online |
2014 | tcc | 4-Round Resettably-Sound Zero Knowledge | online |
2014 | tcc | On Extractability Obfuscation | online |
2014 | tcc | Achieving Constant Round Leakage-Resilient Zero-Knowledge | online |
2014 | tcc | Leakage Resilient Fully Homomorphic Encryption | online |
2014 | tcc | Non-malleable Coding against Bit-Wise and Split-State Tampering | online |
2014 | tcc | Continuous Non-malleable Codes | online |
2014 | tcc | Lower Bounds in the Hardware Token Model | online |
2014 | tcc | Constant-Round Black-Box Construction of Composable Multi-Party Computation Protocol | online |
2014 | tcc | Multi-linear Secret-Sharing Schemes | online |
2014 | tcc | Statistical Concurrent Non-malleable Zero Knowledge | online |
2014 | tcc | Theory of Cryptography - 11th Theory of Cryptography Conference, TCC 2014, San Diego, CA, USA, February 24-26, 2014. Proceedings | |
2014 | tcc | On the Impossibility of Basing Public-Coin One-Way Permutations on Trapdoor Permutations | online |
2014 | tcc | (Efficient) Universally Composable Oblivious Transfer Using a Minimal Number of Stateless Tokens | online |
2014 | tcc | Probabilistically Checkable Proofs of Proximity with Zero-Knowledge | online |
2014 | tcc | Towards Characterizing Complete Fairness in Secure Two-Party Computation | online |